Showing posts with label twitter. Show all posts
Showing posts with label twitter. Show all posts

Wednesday, February 26, 2014

Social Networking Sites: Security and Privacy

Recent hacks involving several high-profile social networking accounts once again highlight the potential vulnerability of social media. The sheer volume of users and the information that gets posted on social media sites create plenty of opportunity for an attacker to use social engineering or other methods to gain access to the accounts of individuals and organizations. The more information you post, the more your security and privacy are at risk. 

What Precautions Should I Take on Social Networking Sites? 

Below are some helpful tips regarding security and privacy while using social networking sites: 

 Ensure that any computer you use to connect to a social media site has proper security measures in place. Use and maintain anti-virus software, anti-spyware software, and a firewall and keep these applications and operating system patched and up-to-date. 

 Be cautious when clicking on links. If a link seems suspicious, or too good to be true, do not click on it...even if the link is on your most trusted friend's page. Your friend's account may have been hijacked or infected and now be spreading malware. 

 If you are going to request that your account be deleted, first remove all of the data. Request that the account be deleted, rather than deactivated. 

 Type the address of your social networking site directly into your browser or use your personal bookmarks. If you click a link to your site through email or another website, you might be entering your account name and password into a fake site where your personal information could be stolen 

 Be cautious about installing applications. Some social networking sites provide the ability to add or install third party applications, such as games. Keep in mind there is sometimes little or no quality control or review of these applications and they may have full access to your account and the data you share. Malicious applications can use this access to interact with your friends on your behalf and to steal and misuse personal data. Only install applications that come from trusted, well-known sites.   If you are no longer using the app, remove it. Also, please note that installing some applications may modify your security and privacy settings. 

 Use strong and unique passwords. Using the same password on all accounts increases the 
vulnerability of these accounts if one becomes compromised. Use different passwords for different accounts, and do not use a password you use to access your organizations network on any personal sites you access. 

 Be careful whom you add as a “friend,” or what groups or pages you join. The more “friends” you have or groups/pages you join, the more people who have access to your information. 

 Do not assume privacy on a social networking site. For both business and personal use, confidential information should not be shared. You should only post information you are comfortable disclosing to a complete stranger. 

 Use discretion before posting information or comments. Once information is posted online, it can potentially be viewed by anyone and may not be able to be retracted afterwards. Keep in mind that content or communications on government-related social networking pages may be considered 
public records. 

 When posting pictures, delete the meta data, which includes the date and time of the picture. 

 Do not announce that you are on vacation or away for an extended period of time. 

 Configure privacy settings to allow only those people you trust to have access to the information you post, and your profile. Also, restrict the ability for others to post information to your page. The default settings for some sites may allow anyone to see your information or post information to your page. 

 Review a site’s privacy policy. Some sites may share information, such as email addresses or user 
preferences, with other parties. If a site’s privacy policy is vague or does not properly protect your 
information, do not use the site. 

For More Information: 

For additional information, please visit: 

1. STOP.THINK.CONNECT Social Networking and Cyberbullying Tips: 
http://stopthinkconnect.org/resources/viewimageembed/?id=341 

2. US-CERT Socializing Securely: Using Social Networking Services 
http://www.us-cert.gov/sites/default/files/publications/safe_social_networking.pdf 

3. Facebook: A Guide to Privacy: 
http://www.facebook.com/privacy/explanation.php 

4. Sophos: Facebook Security Best Practices: 
http://www.sophos.com/en-us/security-news-trends/best-practices/facebook.aspx 

5. Twitter: Protecting and Unprotecting Your Tweets: 
https://support.twitter.com/articles/20169886-how-to-protect-and-unprotect-your-tweets 




Thursday, January 2, 2014

Paying It Forward In 2014

Is Paying  It Forward In 2014 on Your List Of Things to Do?  

Here are just a few ways you can check it off!
  • Volunteer at your local Homeless Shelter. 
  • Serve a hot meal to a neighbor or a stranger if you so desire.
  • Visit/Volunteer at  a Nursing Home and/or Children's home.
  • Your Local Shelter Is In Need Year Round!
  • Foster, Rescue or Adopt a Pet from your Local Shelter.Shelters are Always looking for donations in the form of money, blankets, cleaning supplies, food, toys. 
  • Volunteer to hold and play with kittens and pups and/or walk a dog at Your local shelters.
  • Shovel snow, salt down sidewalks, walkways of neighbors, local restaurants, stores
  • Clean public toilets
  • Check in on your Elderly and/or disabled neighbors to make sure they have what they need with respect to heating (or cooling during warmer months), blankets, plumbing in working order, etc.


*~*~*~*~*~*~*~*

PET FOOD BANK:

Donate Food for Needy families with pets.


Find one in your Area 


Here in Louisville you can donate to No Kill Louisville:

http://www.nokill-louisville.com/petfoodbank.htm



If there isn't one in your area,  then start one!

 

Cross-Post, Tweet and/or post on your other online social networks!

See a pet in need on Face Book?  Then pay it forward by cross-posting, tweeting and/or adding to your other online social networks.  They DO work when it comes to helping others in need! 


The Toys For Tots Foundation
www.toysfortots.org


Feed The Children
www.feedthechildren.org/

The American Red Cross
www.redcross.org/Donate
 


These are only a few suggestions on how you can Pay It Forward  In 2014







PLEASE NOTE:  All artwork, unless otherwise specified, are the property of the individual artists themselves. The author of these blogs claims no ownership of the original artwork, but only of the sig tags created using said artwork. Each sig tag shown on these blogs include the appropriate copyright information of the Artists and the unique licensure for use.

Reproduction and copying of said work without proper authority is strictly prohibited

Tuesday, July 16, 2013

Follow My Blog!

Never miss another article! 

Sign up to follow my blog Today! 

Signing up is fast, easy and FREE!!!    


The Sign up buttons are here on your RIGHT. 

And if you are on Google Plus, add me to your cirlce!

As a follower of my blog you'll never be out of the loop ever again!   And the best part is, as a follower of my blog, you get to leave comments!!!   I thoroughly enjoy interacting with my readers! 

Feel free to Share this Blog on your Social Networks! 



Have a Twitter account?  Would love to have you as a part of my Twitter Circle!







Known as The Empress of the Known & Unknown Universes™ and The Diva of Duct Tape, Julia has made it her personal mission to put Reality back into Spirituality™. Julia sets out to assist people in expanding their conscious awareness through her rather unique and personal take on the human experience. 

In the style comparable to Erma Bombeck, Julia utilizes her own brand of humor and down to earth demeanor to get her messages across in an all so delightful way.







PLEASE NOTE:  All artwork, unless otherwise specified, are the property of the individual artists themselves. The author of these blogs claims no ownership of the original artwork, but only of the sig tags created using said artwork. Each sig tag shown on these blogs include the appropriate copyright information of the Artists and the unique licensure for use.

Reproduction and copying of said work without proper authority is strictly prohibited