SlideShare a Scribd company logo
1 of 34
Securing Your
Facebook Identity
Nicholas A. Davis, CISA, CISSP
UW-Madison
Division of Information Technology
10/9/2013 UNIVERSITY OF WISCONSIN 1
!!Advisory!!
The content of today’s presentation is designed
to help people protect themselves on Facebook.
This is NOT a session on Facebook hacking. If
hacking Facebook is your motivation for
attending today’s session, please leave now
10/9/2013 UNIVERSITY OF WISCONSIN 2
Overview
Basic rules of Facebook security
Unique situation on UW-Madison campus
(academic research poses a unique Facebook
chalenge)
Why unauthenticated identity means “be careful”
The dangers of Facebook photos
Application settings and security preferences
Facebook passwords
Time and place concerns
Roaming security
Account cleanup and maintenance
Tips and tricks
Q&A session
10/9/2013 UNIVERSITY OF WISCONSIN 3
Basic Rules of Security
1. Think before you post
2. Customize your privacy settings
3. Don’t accept friend requests from people
you do not know
4. Keep sensitive information private
5. Remember, being on Facebook means that
you are living like a rock star! (kind of)
10/9/2013 UNIVERSITY OF WISCONSIN 4
Research Lab Example
10/9/2013 UNIVERSITY OF WISCONSIN 5
Meet Flat Cow
We will be using Flat Cow, known to his
friends as FC, in a few slides
10/9/2013 UNIVERSITY OF WISCONSIN 6
Wait, Cows Can’t Be On FB!
Unauthenticated Identity
10/9/2013 UNIVERSITY OF WISCONSIN 7
Organize Friends In Lists
10/9/2013 UNIVERSITY OF WISCONSIN 8
Photos Tell Stories
(Not Always Safe Ones)
10/9/2013 UNIVERSITY OF WISCONSIN 9
Photos Tell Stories
(Not Always Flattering Ones)
10/9/2013 UNIVERSITY OF WISCONSIN 10
Keep In Mind
Don’t get yourself into a situation in
which such pictures can be taken
You have little to no control over who
takes your picture in public
Think about the stories your photos tell
about you
Exercise control over pictures of you
tagged by others
10/9/2013 UNIVERSITY OF WISCONSIN 11
Automatic Updates
Take Control!
10/9/2013 UNIVERSITY OF WISCONSIN 12
Don’t Advertise Yourself
10/9/2013 UNIVERSITY OF WISCONSIN 13
You Can’t Control Your Friends
But You Can Control Their
Applications
10/9/2013 UNIVERSITY OF WISCONSIN 14
Don’t Let Your App Excitement
Obscure Your Judgement
10/9/2013 UNIVERSITY OF WISCONSIN 15
Keep The Stalkers At Bay
Change Search Visibility
10/9/2013 UNIVERSITY OF WISCONSIN 16
Get Your Facebook Profile
Out of Google
10/9/2013 UNIVERSITY OF WISCONSIN 17
Tips To Keep You Safe On
Facebook
Change your Facebook password often
10/9/2013 UNIVERSITY OF WISCONSIN 18
Facebook Is a Prime Target For
Password Hackers
Never use the same password for
Facebook as you use for your bank
access
10/9/2013 UNIVERSITY OF WISCONSIN 19
Examine Photos Before You Post
Avoid posting photos with identifying
information, such as addresses, license
plates, etc.
10/9/2013 UNIVERSITY OF WISCONSIN 20
Don’t Advertise Your Absence
Post vacation pictures AFTER you get
home
10/9/2013 UNIVERSITY OF WISCONSIN 21
Browse Facebook Securely When
at Starbucks (HTTPS)
10/9/2013 UNIVERSITY OF WISCONSIN 22
Remove Facebook Apps Which
You Do Not Use
10/9/2013 UNIVERSITY OF WISCONSIN 23
Use Privacy Settings To Block
People
10/9/2013 UNIVERSITY OF WISCONSIN 24
Check the Facebook URL Often
10/9/2013 UNIVERSITY OF WISCONSIN 25
Know The Difference Between
Deactivating and Deleting Your
Facebook Account
Deactivating your account leaves all posts
and pictures intact
Deletion is supposed to remove everything
Don’t login after you request deletion
10/9/2013 UNIVERSITY OF WISCONSIN 26
The Facebook
Doppelganger Spy
“But Flat Cow is already my friend”
10/9/2013 UNIVERSITY OF WISCONSIN 27
Three Strikes and You’re Out!
Don’t Be a Friend Pig
10/9/2013 UNIVERSITY OF WISCONSIN 28
How Liking Things Could
Take Advantage of You
10/9/2013 UNIVERSITY OF WISCONSIN 29
Facebook Security
Best Practices
http://www.sophos.com/en-us/security-
news-trends/best-practices/facebook.aspx
10/9/2013 UNIVERSITY OF WISCONSIN 30
Carnival Cruise Scam
Just One Example
Message purporting to be from "Carnival Cruise" claims that
Facebook users can win an all-expenses-paid vacation package
by liking and sharing a promotional image and clicking a link
to apply for the free tickets.
http://www.hoax-slayer.com/facebook-related.html
10/9/2013 UNIVERSITY OF WISCONSIN 31
Enable Login Notifications
Login notifications are an extra security
feature. When you turn on login
notifications, we'll send you an alert each
time someone logs into your account from a
new place.
10/9/2013 UNIVERSITY OF WISCONSIN 32
A Note About UW NetID
Your NetID is like your toothbrush, only you
should use it
UW-Madison will NEVER ask for your NetID
and/or password via email
Report any such requests to abuse@wisc.edu
10/9/2013 UNIVERSITY OF WISCONSIN 33
Q&A Session
Nicholas Davis
ndavis1@wisc.edu
facebook.com/nicholas.a.davis
10/9/2013 UNIVERSITY OF WISCONSIN 34

More Related Content

What's hot

Ana Neves
Ana NevesAna Neves
Ana Neves
e20biz
 
Teenage Depression
Teenage DepressionTeenage Depression
Teenage Depression
danisebenick
 
PCS - Acceptable Use Presentation
PCS - Acceptable Use PresentationPCS - Acceptable Use Presentation
PCS - Acceptable Use Presentation
Lucas Gillispie
 

What's hot (18)

dunia mistik
dunia mistikdunia mistik
dunia mistik
 
Michael Barita's Professional Persona Project
Michael Barita's Professional Persona Project Michael Barita's Professional Persona Project
Michael Barita's Professional Persona Project
 
Gaggle
GaggleGaggle
Gaggle
 
we need to talk about... designing better library experiences
we need to talk about... designing better library experienceswe need to talk about... designing better library experiences
we need to talk about... designing better library experiences
 
Keeping It All Together
Keeping It All TogetherKeeping It All Together
Keeping It All Together
 
Ana Neves
Ana NevesAna Neves
Ana Neves
 
TOP25 największych polskich profili na Instagramie - marzec 2015
TOP25 największych polskich profili na Instagramie - marzec 2015TOP25 największych polskich profili na Instagramie - marzec 2015
TOP25 największych polskich profili na Instagramie - marzec 2015
 
Social media: Advances in education technology for midwifery
Social media: Advances in education technology for midwifery Social media: Advances in education technology for midwifery
Social media: Advances in education technology for midwifery
 
The networked nurse: Using virtual communication systems for practice develop...
The networked nurse: Using virtual communication systems for practice develop...The networked nurse: Using virtual communication systems for practice develop...
The networked nurse: Using virtual communication systems for practice develop...
 
Teenage Depression
Teenage DepressionTeenage Depression
Teenage Depression
 
#SXSWedu Panel: Technology for Enhancing Social Emotional Learning
#SXSWedu Panel: Technology for Enhancing Social Emotional Learning#SXSWedu Panel: Technology for Enhancing Social Emotional Learning
#SXSWedu Panel: Technology for Enhancing Social Emotional Learning
 
Blog Talk
Blog TalkBlog Talk
Blog Talk
 
May 28 2010
May 28 2010May 28 2010
May 28 2010
 
DevOps - Ten tips for developers
DevOps - Ten tips for developersDevOps - Ten tips for developers
DevOps - Ten tips for developers
 
teaching outside the "box" workshop prep
teaching outside the "box" workshop prepteaching outside the "box" workshop prep
teaching outside the "box" workshop prep
 
Using social media for collaboration and engagement in associations and organ...
Using social media for collaboration and engagement in associations and organ...Using social media for collaboration and engagement in associations and organ...
Using social media for collaboration and engagement in associations and organ...
 
Stressless Paperless
Stressless PaperlessStressless Paperless
Stressless Paperless
 
PCS - Acceptable Use Presentation
PCS - Acceptable Use PresentationPCS - Acceptable Use Presentation
PCS - Acceptable Use Presentation
 

Viewers also liked

Facebook and Security Settings Report
Facebook and Security Settings ReportFacebook and Security Settings Report
Facebook and Security Settings Report
Abhishek Gupta
 
Facebook and security settings settings
Facebook and security settings settingsFacebook and security settings settings
Facebook and security settings settings
Abhishek Gupta
 
motion sensing technology
motion sensing technologymotion sensing technology
motion sensing technology
Santosh Kumar
 
Facebook Powerpoint
Facebook PowerpointFacebook Powerpoint
Facebook Powerpoint
myra14
 

Viewers also liked (11)

Facebook and Security Settings Report
Facebook and Security Settings ReportFacebook and Security Settings Report
Facebook and Security Settings Report
 
facebook secrets by SHASHI
facebook secrets by SHASHIfacebook secrets by SHASHI
facebook secrets by SHASHI
 
Facebook security
Facebook securityFacebook security
Facebook security
 
Facebook and security settings settings
Facebook and security settings settingsFacebook and security settings settings
Facebook and security settings settings
 
How to prevent Road Accidents, Road Safety tips, Road Safety Seminar, Road Sa...
How to prevent Road Accidents, Road Safety tips, Road Safety Seminar, Road Sa...How to prevent Road Accidents, Road Safety tips, Road Safety Seminar, Road Sa...
How to prevent Road Accidents, Road Safety tips, Road Safety Seminar, Road Sa...
 
Road Safety PowerPoint Presentation
Road Safety PowerPoint PresentationRoad Safety PowerPoint Presentation
Road Safety PowerPoint Presentation
 
Motion sensing and detection
Motion sensing and detectionMotion sensing and detection
Motion sensing and detection
 
Road Safety Presentation
Road Safety PresentationRoad Safety Presentation
Road Safety Presentation
 
motion sensing technology
motion sensing technologymotion sensing technology
motion sensing technology
 
Facebook ppt
Facebook pptFacebook ppt
Facebook ppt
 
Facebook Powerpoint
Facebook PowerpointFacebook Powerpoint
Facebook Powerpoint
 

More from Nicholas Davis

More from Nicholas Davis (20)

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) Assessment
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support Systems
 
Lecture blockchain
Lecture blockchainLecture blockchain
Lecture blockchain
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development Methodologies
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD Security
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things Overview
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets Personal
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team Project
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up Summary
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing Education
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An Overview
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security Implications
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Facebook Security

  • 1. Securing Your Facebook Identity Nicholas A. Davis, CISA, CISSP UW-Madison Division of Information Technology 10/9/2013 UNIVERSITY OF WISCONSIN 1
  • 2. !!Advisory!! The content of today’s presentation is designed to help people protect themselves on Facebook. This is NOT a session on Facebook hacking. If hacking Facebook is your motivation for attending today’s session, please leave now 10/9/2013 UNIVERSITY OF WISCONSIN 2
  • 3. Overview Basic rules of Facebook security Unique situation on UW-Madison campus (academic research poses a unique Facebook chalenge) Why unauthenticated identity means “be careful” The dangers of Facebook photos Application settings and security preferences Facebook passwords Time and place concerns Roaming security Account cleanup and maintenance Tips and tricks Q&A session 10/9/2013 UNIVERSITY OF WISCONSIN 3
  • 4. Basic Rules of Security 1. Think before you post 2. Customize your privacy settings 3. Don’t accept friend requests from people you do not know 4. Keep sensitive information private 5. Remember, being on Facebook means that you are living like a rock star! (kind of) 10/9/2013 UNIVERSITY OF WISCONSIN 4
  • 5. Research Lab Example 10/9/2013 UNIVERSITY OF WISCONSIN 5
  • 6. Meet Flat Cow We will be using Flat Cow, known to his friends as FC, in a few slides 10/9/2013 UNIVERSITY OF WISCONSIN 6
  • 7. Wait, Cows Can’t Be On FB! Unauthenticated Identity 10/9/2013 UNIVERSITY OF WISCONSIN 7
  • 8. Organize Friends In Lists 10/9/2013 UNIVERSITY OF WISCONSIN 8
  • 9. Photos Tell Stories (Not Always Safe Ones) 10/9/2013 UNIVERSITY OF WISCONSIN 9
  • 10. Photos Tell Stories (Not Always Flattering Ones) 10/9/2013 UNIVERSITY OF WISCONSIN 10
  • 11. Keep In Mind Don’t get yourself into a situation in which such pictures can be taken You have little to no control over who takes your picture in public Think about the stories your photos tell about you Exercise control over pictures of you tagged by others 10/9/2013 UNIVERSITY OF WISCONSIN 11
  • 12. Automatic Updates Take Control! 10/9/2013 UNIVERSITY OF WISCONSIN 12
  • 13. Don’t Advertise Yourself 10/9/2013 UNIVERSITY OF WISCONSIN 13
  • 14. You Can’t Control Your Friends But You Can Control Their Applications 10/9/2013 UNIVERSITY OF WISCONSIN 14
  • 15. Don’t Let Your App Excitement Obscure Your Judgement 10/9/2013 UNIVERSITY OF WISCONSIN 15
  • 16. Keep The Stalkers At Bay Change Search Visibility 10/9/2013 UNIVERSITY OF WISCONSIN 16
  • 17. Get Your Facebook Profile Out of Google 10/9/2013 UNIVERSITY OF WISCONSIN 17
  • 18. Tips To Keep You Safe On Facebook Change your Facebook password often 10/9/2013 UNIVERSITY OF WISCONSIN 18
  • 19. Facebook Is a Prime Target For Password Hackers Never use the same password for Facebook as you use for your bank access 10/9/2013 UNIVERSITY OF WISCONSIN 19
  • 20. Examine Photos Before You Post Avoid posting photos with identifying information, such as addresses, license plates, etc. 10/9/2013 UNIVERSITY OF WISCONSIN 20
  • 21. Don’t Advertise Your Absence Post vacation pictures AFTER you get home 10/9/2013 UNIVERSITY OF WISCONSIN 21
  • 22. Browse Facebook Securely When at Starbucks (HTTPS) 10/9/2013 UNIVERSITY OF WISCONSIN 22
  • 23. Remove Facebook Apps Which You Do Not Use 10/9/2013 UNIVERSITY OF WISCONSIN 23
  • 24. Use Privacy Settings To Block People 10/9/2013 UNIVERSITY OF WISCONSIN 24
  • 25. Check the Facebook URL Often 10/9/2013 UNIVERSITY OF WISCONSIN 25
  • 26. Know The Difference Between Deactivating and Deleting Your Facebook Account Deactivating your account leaves all posts and pictures intact Deletion is supposed to remove everything Don’t login after you request deletion 10/9/2013 UNIVERSITY OF WISCONSIN 26
  • 27. The Facebook Doppelganger Spy “But Flat Cow is already my friend” 10/9/2013 UNIVERSITY OF WISCONSIN 27
  • 28. Three Strikes and You’re Out! Don’t Be a Friend Pig 10/9/2013 UNIVERSITY OF WISCONSIN 28
  • 29. How Liking Things Could Take Advantage of You 10/9/2013 UNIVERSITY OF WISCONSIN 29
  • 31. Carnival Cruise Scam Just One Example Message purporting to be from "Carnival Cruise" claims that Facebook users can win an all-expenses-paid vacation package by liking and sharing a promotional image and clicking a link to apply for the free tickets. http://www.hoax-slayer.com/facebook-related.html 10/9/2013 UNIVERSITY OF WISCONSIN 31
  • 32. Enable Login Notifications Login notifications are an extra security feature. When you turn on login notifications, we'll send you an alert each time someone logs into your account from a new place. 10/9/2013 UNIVERSITY OF WISCONSIN 32
  • 33. A Note About UW NetID Your NetID is like your toothbrush, only you should use it UW-Madison will NEVER ask for your NetID and/or password via email Report any such requests to abuse@wisc.edu 10/9/2013 UNIVERSITY OF WISCONSIN 33