Wyszukiwanie
polski
  • English
  • 正體中文
  • 简体中文
  • Deutsch
  • Español
  • Français
  • Magyar
  • 日本語
  • 한국어
  • Монгол хэл
  • Âu Lạc
  • български
  • bahasa Melayu
  • فارسی
  • Português
  • Română
  • Bahasa Indonesia
  • ไทย
  • العربية
  • čeština
  • ਪੰਜਾਬੀ
  • русский
  • తెలుగు లిపి
  • हिन्दी
  • polski
  • italiano
  • Wikang Tagalog
  • Українська Мова
  • Others
  • English
  • 正體中文
  • 简体中文
  • Deutsch
  • Español
  • Français
  • Magyar
  • 日本語
  • 한국어
  • Монгол хэл
  • Âu Lạc
  • български
  • bahasa Melayu
  • فارسی
  • Português
  • Română
  • Bahasa Indonesia
  • ไทย
  • العربية
  • čeština
  • ਪੰਜਾਬੀ
  • русский
  • తెలుగు లిపి
  • हिन्दी
  • polski
  • italiano
  • Wikang Tagalog
  • Українська Мова
  • Others
Tytuł
Transkrypcja
Następnie
 

Staying Safe Online, Part 2 of 2: Benefits and Safe Practices on Social Media Platforms

2024-05-25
Szczegóły
Pobierz Docx
Czytaj więcej
In part 1, we provided fundamental cybersecurity information and recommendations from experts to help safeguard your internet-related systems. In part 2, we will focus on some of the common social media privacy issues and how to stay safe. Social media has expanded exponentially over the years with features that easily invite others to follow or participate in a media thread. A massive amount of information is shared voluntarily, including sensitive data stored in the cloud through user activity such as webpage views, purchase history, and tracking cookies. This data can be gathered, categorized, and sold for marketing purposes. In 2021 the U.S. Federal Trade Commission reported that one in four people fell victim to fraud, which originated on social media. Privacy concerns about platforms used for staying in touch, having fun, making friends, or shopping have become a hot topic.

In response to privacy crises, most social networks have introduced some security settings that empower users to safeguard their data, including two-factor authentication, privacy settings, comment filtering, and blocking unwanted accounts. Facebook and Instagram have taken it a step further by offering end-to-end encryption, the ability to disable face recognition, unfriend requests, or hide offensive content. Since there are numerous social media platforms with different security features, the following safety practices will serve as guidance only.

Be smart about your passwords. Use a unique and strong password for each of your accounts. A strong password should be at least 12 characters long and contain a combination of random uppercase and lowercase letters, numbers, and special characters. It should not be tied to your personal information and should avoid using dictionary words. Be mindful about what you share because cybercriminals can use the information you provided or extract from your security questions to figure out your password. Disable location services to retain your privacy. Some web browsers or social media platforms use tracking cookies to monitor your location and collect data. Location-based functions are often turned on by default on some platforms that allow users to physically locate someone’s whereabouts, potentially compromising your safety.

“In this video, we will explore one of the most common and dangerous types of cyberattacks: phishing. Always remember, legitimate websites use secure connections and have a lock icon in the address bar. Now that you’ve identified the phishing attempt, what should you do? Delete the email immediately. Do not click any links or provide any personal information. Remember, staying vigilant and informed is the key to protecting yourself against phishing attacks.” Block suspicious or unfamiliar accounts to prevent potential scammers from obtaining your information. Update profile settings and provide information only if it is mandatory, keeping it as minimal as possible.
Obejrzyj więcej
Wszystkie części  (2/2)
Obejrzyj więcej
Program  1 / 100
5
2024-05-09
588 Poglądy
7
2024-05-02
523 Poglądy
8
2024-04-20
323 Poglądy
9
2024-04-13
537 Poglądy
10
2024-04-06
537 Poglądy
11
2024-03-30
806 Poglądy
12
2024-03-28
441 Poglądy
14
2024-03-14
428 Poglądy
17
2024-02-14
882 Poglądy
18
2024-01-27
1064 Poglądy
19
2024-01-11
991 Poglądy
20
2023-12-30
626 Poglądy
21
2023-11-23
791 Poglądy
22
2023-11-04
2083 Poglądy
23
2023-10-28
3263 Poglądy
24
24:03
2023-10-25
1637 Poglądy
27
22:08
2023-10-04
734 Poglądy
29
2023-09-14
1148 Poglądy
32
2023-08-24
783 Poglądy
37
2023-06-08
775 Poglądy
38
2023-05-18
726 Poglądy
39
2023-05-11
956 Poglądy
40
2023-04-06
1446 Poglądy
41
2023-03-06
1330 Poglądy
42
2023-02-27
1207 Poglądy
43
2023-02-23
978 Poglądy
44
2023-02-09
876 Poglądy
45
2023-02-07
784 Poglądy
46
2023-01-26
7193 Poglądy
47
2023-01-19
990 Poglądy
48
2023-01-18
12230 Poglądy
49
2023-01-16
1120 Poglądy
54
2022-11-03
1043 Poglądy
58
2022-10-19
1735 Poglądy
63
2022-09-29
1030 Poglądy
65
2022-08-04
1320 Poglądy
66
2022-08-02
1322 Poglądy
67
2022-07-29
1240 Poglądy
68
2022-07-26
1837 Poglądy
70
2022-05-21
5553 Poglądy
72
2021-11-05
1987 Poglądy
73
2021-11-01
2993 Poglądy
74
2021-10-11
1365 Poglądy
75
2021-10-04
1283 Poglądy
76
2021-09-27
1537 Poglądy
77
2021-09-20
1582 Poglądy
83
15:28
2021-02-17
2128 Poglądy
92
2020-11-10
18831 Poglądy
94
2020-10-29
2033 Poglądy
95
2020-10-22
2877 Poglądy
Obejrzyj więcej
Najnowsze filmy wideo
2024-06-01
4 Poglądy
2024-05-31
253 Poglądy
2024-05-31
633 Poglądy
30:46
2024-05-30
60 Poglądy
2024-05-30
46 Poglądy
2024-05-30
1011 Poglądy
2024-05-29
14384 Poglądy
Udostępnij
Udostępnij dla
Umieść film
Rozpocznij od
Pobierz
Telefon komórkowy
Telefon komórkowy
iPhone
Android
Oglądaj w przeglądarce mobilnej
GO
GO
Prompt
OK
Aplikacja
Zeskanuj kod QR lub wybierz odpowiedni system telefoniczny do pobrania
iPhone
Android