1 Social Media and Cyber Safety Presented to the National Association of REALTORS by Andrew Wooten Safety and Security Consultant
2 Social Media and Cyber Safety Our instructor today is Andrew Wooten, he has been teaching safety in the real estate industry for the past 27 years. He has authored two books; A Safety Guide for Open Houses, Listing Appointments & Vacant Properties and The Real Estate Guide to Safety. Andrew teaches nationally at associations and corporations instructing on how to live, work and play safely.
3 In the News Man arrested after kidnapping a REALTOR as she was leaving home for work. It was later discovered he had been stalking her through Facebook. Harassment charges have been filed against a woman for verbally attacking her Broker through Twitter. Agent found beaten and stabbed to death at his listing. Appointment was set via an unnamed social network.
4 What You Will Learn Today The most popular forms of Social Media and what you should do to protect yourself. Other types of Cyber Crime to watch out for. How to take charge of your online reputation.
5 Social Media
6 What is your personal reputation worth to you?
7 What is your business reputation worth to you?
8 Our business is built off one word Integrity
9 The Three P s Professionalism Professionalism Professionalism
12 Accepting Friends
13 Facebook Never post personal information, including where you are and where you are going. Do not post when you are going on vacation or that you are on vacation.
14 Facebook Set and check often your privacy levels.
15 Facebook Set and check often your security levels. First Go to Account Settings Then Go to Security
16 Security Secure Browsing Facebook
17 Security Login Notifications Facebook
18 Security Login Approvals Facebook
19 Security Recognized Devices Facebook
20 How to Protect Yourself on Facebook Don t put your address and home phone number in your profile. Don t accept friend request from people you do not know. Only open links from trusted websites. Do not give out your password. Make your page private, only viewable by friends.
21 How to Protect Yourself on Facebook Consider separating professional & personal profiles. Use different addresses, screen names, blogs, and websites for each profile. Add only necessary personal information to your professional profile. Look for Settings or Options to help you manage what can be seen, how people search you, and who can make comments.
23 How to Protect Yourself on Twitter Never share personal information. Review applications that use your twitter account.
24 How to Protect Yourself on Twitter Regularly change your password. Twitter will NEVER contact you and ask for your password. Preview short URL s before clicking. Beware of unsolicited direct messages. Block and report spam. Use an anti-virus and firewall.
25 When Using Social Media Do not allow social networking services to scan your address book. If you are asked to enter your address and password to find out if your contacts are on a network, do not do it.
26 The Most Common Forms of Cyber Crime Craigslist Scams Phishing Scams Screen Scraping Geotagging
28 Craigslist Scams Someone claims that craigslist will guarantee a transaction, certify a buyer/seller, handle or provide protection for a payment. Someone requests wire service payment via Western Union or MoneyGram. A distant seller suggests use of an online escrow service. A distant seller asks for a partial payment upfront, after which he will ship goods. A foreign company offers you a job receiving payments from customers, then wiring funds.
29 Phishing Phishing is a way of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.
30 Telltale Signs of Phishing Alarmist messages and threats of account closures. Promises of money for little or no effort. Deals that sound too good to be true. Requests to donate to a charitable organization after a disaster that has been in the news. Bad grammar and misspellings.
31 Common Phishing Scams Scams using the name of well-known companies: fake s claiming you ve won a contest and need your log-on information or password, or that a representative is contacting you to solve some problem. Lottery scams: stating you ve won. Remember if you didn t buy a lottery ticket, you didn t win the lottery. Rogue security software or fake virus alerts.
32 Screen Scraping Screen scraping is the act of taking all the information that a person has posted on their website or social networking pages and using the information to break into the user s accounts.
33 How to Protect Yourself from Screen Scraping Use strong passwords. Do not post anything online you wouldn t want made public and minimize details that identify you or your whereabouts. Keep your account numbers, user names, and passwords secret.
34 How to Avoid Being a Victim of Cyber Crime Don t trust the sender information-fraudsters can easily spoof the identity information Read before you click-look at where the link is going and check the spelling Verify the identity of the site Use an updated browser Be cautious of images and buttons
35 The Importance of Security Questions Used to retrieve forgotten passwords. Hackers can use information from your website, blogs and other social media pages to determine the answers to these questions. Change your questions to be less random and more personal, with answers you wouldn t share with anyone.
36 Take Charge of Your Online Reputation Find out what is on the Internet about you. Evaluate your online reputation. Protect your online reputation. Polish your professional reputation. Restore your online reputation.
37 Find Out What Is On the Internet About You Type your name into several popular search engines. Be specific. Search variations of your name including nicknames, middle name and initial, maiden name, and if your name is commonly misspelled. Review what others have posted about you in comments, pictures, videos, blogs, etc.
38 Evaluate Your Online Reputation You ve collected and viewed all the information online about you. What story does it tell? Does it reflect the way you want others to perceive you? Is it accurate? If not, what should be deleted or corrected? Information online is searchable, permanent and can be seen by anyone
39 Protect Your Online Reputation Think before you share: Postings Pictures and videos What others share about you. Treat others as you would like to be treated. Stay vigilant about what the Internet is saying about you. Sign up for personal alerts and search yourself. Reassess who has access to your pages.
40 Polish Your Professional Reputation Publish positive information about yourself, link anything you publish to your name: Create what you want other to see. Join a professional network. Comment on professionally-oriented blogs, forums and book reviews. Start a blog or register a website in your name.
41 Restore Your Online Reputation Act quickly if you find information about yourself that does not fit the reputation you want. Ask politely for the person who posted it to remove it or correct it If they do not respond or refuse, contact website administrators If public correction is necessary, present your case simply and politely without attacking the person.
42 Did You Know? Adam Savage of Myth Busters, took a photo of his vehicle using his smartphone. He then posted the photo to his Twitter account including the phrase off to work,
43 Did You Know? Since the photo was taken by his smartphone, the image contained metadata reveling the exact geographical location the photo was taken.
44 Did You Know? So by simply taking and posting a photo, Savage revealed the exact location of his home, the vehicle he drives and the time he leaves for work.
45 What is Geotagging? Geotagging is the process of adding geographical identification to photographs, video, websites and SMS messages.
46 What is Geotagging? Geotags are automatically embedded in pictures taken with smartphones. Many people are unaware of the fact that the photos they take with their smartphones and load to the Internet have been geotagged.
47 Why are these applications potentially dangerous? Establishes patterns: These services allow strangers to track your movements every day. If they watch someone long enough they will know exactly when and where to find that person on any given day. Exposes work places and home: By tracking movements and information, strangers can determine where someone lives and works.
48 Turn Off GPS Function on Phones One of the simplest ways to avoid displaying too much information is to disable the geotagging function on smartphones.
50 Andrew Wooten (904) For more information, or to sign up for monthly articles, visit
Online Security Tips Is your computer set to automatically check for software and security updates? Do you type your name in search engines to see what personal information is online? Have you customized
P a g e 1 Internet Basics ABOUT THIS CLASS This class is designed to provide a basic introduction to accessing and navigating the internet (a.k.a. the world wide web or the web ). Throughout the class,
Table of Contents Protection from Fraud & Identity Theft... 1 Simple Steps to Secure Your Devices... 1 Setting Up Your Computer and/or Mobile Device... 2 Adding Security Software... 2 Internet Safety Tips...
INTERNET FRAUD Online scams and viruses are constantly evolving and they threaten the security of computers worldwide. As criminals evolve their tactics, you need to keep your PC's security software (virus
Identity Theft Awareness: Don t Fall Victim to these Common Scams We want you to understand what identity theft is, how it happens, and how to protect yourself. Please read and familiarize yourself with
Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
IT Computer Technical Support Newsletter March 23, 2015 Vol.1, No.22 Recognizing Spam Spam messages are messages that are unwanted. If you have received an e-mail from the Internal Revenue Service or the
OPSEC and Safe Social Networking Agenda Introduction Did you know? Social media access What not to post Privacy settings Geotagging Social Media OPSEC for units Social media concerns for Families and Family
Practical guide for secure Christmas shopping Navid 1 CONTENTS 1. Introduction 3 2. Internet risks: Threats to secure transactions 3 3. What criteria should a secure e-commerce page meet?...4 4. What security
Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer
Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer
Deter, Detect, Defend Deter Never provide personal information, including social security number, account numbers or passwords over the phone or Internet if you did not initiate the contact Never click
Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN
Network Security Demo: Web browser Email Messages An email message can be instantly forwarded around the globe, even if accidentally. Do not write anything in a message that you will later regret! Read
November 2012 Follow these guidelines to help protect your information while banking online. At First Entertainment Credit Union, our goal is to provide you with the best all around banking experience.
Internet Safety & Awareness Dan Tomlinson 02/23/2013 Internet risks Top six tips for online safety What to do if there is a problem Online safety resources Internet Risks Primary Threats to your Computer
www.tn.gov/consumer Tennessee Division of Consumer Affairs Don t Get Scammed Table of Contents Auction Fraud...1 Counterfeit Cashier s Check...1 Credit Card Fraud...1 Debt Elimination...2 DHL/UPS...2 Employment/Business
Social Network Security Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA) How Do We Communicate Today? I can write you a letter by snail mail. I can write you a letter
Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013 Todays Discussion Overview of Computer and Internet Security What is Computer and Internet Security Who Should
Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage
FRAUD ALERT THESE SCAMS CAN COST YOU MONEY Phishing spear phishing vishing smishing debit card skimming fake check scams THE COMMON SENSE PRECAUTIONS INSIDE CAN KEEP YOU SAFE! SCHEMES SCAMS FRAUDS Criminals
How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware
LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams
Protecting Yourself from Identity Theft Guide 4 Because you don t have to be the next victim Desert Schools Money Matters Series Guiding you toward financial success Table of Contents How ID theft happens.............................
PROTECT YOURSELF A CONSUMER PROTECTION PAMPHLET Money Transfer Scams Many scammers ask consumers to send money by wire transfer through companies like Western Union and MoneyGram. If you wire money and
THE Mcafee guide to staying safe online How to shop, bank, socialise and protect your identity online. contents 1 Introduction 2 Today s Internet: Proceed with Caution 3 Consider the Upsides 4 Be Aware
NATIONAL CRIME PREVENTION COUNCIL What is Cybercrime? A crime committed or facilitated via the Internet is a cybercrime. Cybercrime is any criminal activity involving computers and networks. It can range
Internet Safety Tips For Dummies In This Book Recognizing how online risks occur Staying safer with technology Taking care with shared photos Understanding how crooks collect information Reporting fraud
Basics Beginner s guide to Internet basics 2.2 Staying safe online Use this document with the glossary A helper should take you through this guide This activity will help you register safely online and
FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful
Information Security Advisor December 2015 Be a Human Firewall! The Human Firewall' s Top Concerns in the Cyber, People & Physical Domains +GAMES Spot the insider & Human firewall Filtering EXerCISE Good
Cyber Security Securing Your Mobile and Online Banking Transactions For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides 2014 Center for Internet
What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security
ONLINE SECURITY GUIDELINES Internet Banking is convenient and times saving. You can do remittances, place online deposit and other transactions through online banking with the convenience and privacy of
NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the
Online Security Information ProCredit Bank is committed to protecting the integrity of your transactions and bank account details. ProCredit Bank therefore uses the latest security software and procedures
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
Email Security 01-15-09 Fort Mac Most Common Mistakes in Email Security Email Security 1. Using just one email account. 2. Holding onto spammed-out accounts too long. 3. Not closing the browser after logging
High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a
Monitoring mobile communication network, how does it work? How to prevent such thing about that? 潘 維 亞 周 明 哲 劉 子 揚 (P78017058) (P48027049) (N96011156) 1 Contents How mobile communications work Why monitoring?
Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet
Computer Security Awareness at Home Presented By Gavin Worden Agenda What is Computer Security? What is at Risk? What can be done to protect your computer? Overview of the Internet and World Wide Web Protecting
Class 3: Identify Tricks and Scams Online Identify Tricks and Scams Online Instructor s Overview DESCRIPTION: In this lesson, students will learn how to avoid online tricks and scams, and learn best practices
Cyber Security Maintaining Your Identity on the Net Why Cyber Security? There are three points of failure in any secure network: Technology (hardware and software) Technology Support (ITS) End Users (USD
Advance Fee Loans Scam artists can trick you into paying money to qualify for a loan or credit card. Despite their guarantees, you do not receive a loan, credit card, or any money. Never pay money to qualify
Guide To Keeping Your Social Media Accounts Secure Social media is an integral part of the strategic communications and public affairs missions of the Department of Defense. Like any asset, it is something
GREG ABBOTT Attorney General of Texas CONTACT information For more information or to obtain copies of brochures, call the Attorney General s Consumer Protection Hotline at (800) 621-0508, or contact your
Creating and Protecting Your Online Identity for Job Search Contents 1. Creating a Positive Online Presence... 2 2. Your Digital Tattoo... 3 3. Your Professional Identity... 5 4. Social Media Advice...
How to Protect Yourself From Identity Theft and Internet Scams Recent Statistics (2011) Internet Crime Complaint Center (IC3) received 314,246 complaints nationwide Complaints received in 2010 was 303,809
Contents Click on a title below to jump straight to that section. What is credit card fraud? Types of credit card fraud Current scams Keeping your card and card details safe Banking and shopping securely
This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. Hft Safeguarding Group commissioned a member of Hft National
Fraud Detection and Prevention Timothy P. Minahan Vice President Government Banking TD Bank Prevention vs. Detection Prevention controls are designed to keep fraud from occurring Detection controls are
Staying Safe.....on social media and online What is this guide about This booklet is about how to keep safe when you are using social media and the internet. Some people get called names, are bullied or
Adjust Webmail Spam Settings An unsolicited bulk email message is known as "spam." Spam, which usually contains some sort of commercial advertising or proposition, is sent to a large number of recipients
Facebook and Social Networking Security By Martin Felsky November 2009 Table of Contents Introduction... 1 What is Facebook?... 2 Privacy Settings... 5 Friends... 7 Applications... 8 Twitter... 9 Should
2012 NCSA / McAfee Online Safety Survey National Cyber Security Alliance McAfee JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National Cyber Security
Mind your money Keeping Your Money Safe Keeping Your Money Safe What we want you to take out of this lesson: Be aware be careful with your money Understand a little more about keeping your money safe online
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.
April, 2014 Cybercrime Prevention and Awareness Basic Security Principles to Help You Better Navigate Through Cyberspace To join conference call dial (305) 433-6663 option 4 PIN # 42014 Presented by: Miguel
Mark R. Herring Attorney General Commonwealth of Virginia Office of the Attorney General 900 East Main Street Richmond, Virginia 23219 (804) 786-2071 (Telephone) (804) 786-1991 (Facsimile) Introduction
EDEXCEL FUNCTIONAL SKILLS ICT Study Module 8 Using ICT to communicate Published by Pearson Education, Edinburgh Gate, Harlow CM20 2JE Pearson Education 2010 All rights reserved. This material may be used
Cyber Crime: You Are the Target When talking about computer crime, we often hear the observation from computer users that they aren t rich and therefore what they have isn t worth much to a cyber criminal.
Email and Security U3A Radlett Computer Group Meeting 6-Oct-2014 V1.1 Agenda Introduction Email Security Q&A Introduction Gary Harding email:- U3A@GaryHarding.com Spent more than 40 years working in the
Merrillville Community School Corporation ITS SUPPORT DESK NEWS U P C O M I N G E V E N T S ISTEP Online Testing Grades 3,4,5,6,7,8 4/30 to 5/9 ECA Testing @ MHS 5/15 to 5/25 MHS Grade Period 5 Ends 4/20
Fraud Prevention Tips The best defense against fraud or identity theft is a proactive approach. Here are a few steps you can take to help protect yourself. Protect your identity Copy the front and back
WISE Online: An Internet and Mobile Phone Guide http://esafety.ngfl-cymru.org.uk File sharing and Copyright Everyone loves to file share to get music files. But here are some points to take note of: Downloading
Customer Awareness for Security and Fraud Prevention Identity theft continues to be a growing problem in our society today. All consumers must manage their personal information wisely and cautiously to
$ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security
Information Security By Louis Morgan, CISSP Information Security Officer Why Bother with IT Security? Recent estimate - 900 million personal computers worldwide. Computer hackers are out there. How long
HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more
Provided by: December 2014 Oliver James Enterprise DON T BE FOOLED BY EMAIL SPAM FREE GUIDE 1 This guide will teach you: How to spot fraudulent and spam e-mails How spammers obtain your email address How
How to prevent computer viruses in 10 steps Following on from our advice on how to keep your online data secure, we ve created a follow-up outlining how you can keep your computer itself safe. Not only
To p t i p s f o r s a f e o n l i n e b a n k i n g a n d s h o p p i n g The Internet offers the opportunity to bank and shop in safety whenever you want. More than 15 million people in the UK now use
BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take
Visa CREDIT Card General Guidelines General Account Information Phone Numbers and Addresses It is very important to keep us up-to-date with your correct address and phone number. Card reissues/replacements
Data protection Protecting your personal information online 3 Introduction More and more people are conducting their personal affairs online. Online shopping, social networking, job hunting and the ability
INFOCOMM SEC RITY is INCOMPLETE WITHOUT Be aware, responsible secure! U HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD FASTEN UP!
If proper attention is given to safety and security, banking and monetary activities can be completed online in a convenient and effective fashion. This guide helps to establish procedures for remaining
David Watterson & Ross Cavazos Chief Information Officer IT Director City of Billings Yellowstone County Local Government IT Group Vice-Chairmen Classic Battle of Good vs Evil GOOD EVIL Firewall E-Mail
Tahoe Tech Group LLC Cyber Security Briefing Truckee Donner Chamber of Commerce March 6, 2015 Tahoe Tech Group serves as your technology partner with a focus on providing cost effective and long term solutions.