Table of Contents

Workshop 04 - Social Media and Online Safety

Here we will:

  1. Secure your devices, connection, browser and accounts
  2. Identify risky situations
  3. Understand online privacy

Secure your Devices

Computer

Install a firewall. It's a barrier between your computer and others. You can authorise/deny access attempts.

Install anti-virus software (and anti-spyware if not already included). Examples of viruses and malware are:

Phone

Use a password, pin or biometric data to lock your device when unused. Consider enabling device locking after a set time unused.

Don’t leave it unattended in public. Even if locked, it can be stolen. Do not lend it to others unless needed, and don't let it out of your sight if you do.

Keep software updated - security patches reduce vulnerabilities.

Download reputable apps from trusted sources, eg. Google Play.

Install reputable security software with anti-virus and anti-loss capabilities.

Keep Bluetooth off or hidden if not in use.

Consider app-lock applications to protect unlocked access to apps with sensitive information.

Consider enabling remote locking and wiping so you can lock/wipe your phone from afar. Auto-wiping can remove data after a number of incorrect login attempts.

Consider adding emergency information to your lock screen. This could help it be returned if lost.

Secure your Connection

Home Wifi

Unsecured connections allow access to your devices/connection without permission.

Change the default administrator password on your router. - default passwords can sometimes be found online. Choose something strong instead.

Public Wifi

Free wifi can have security risks.

Secure your Browsing

Internet Explorer is an identified security risk. Consider another browser where possible.

Browsers offer a number of security settings to configure. Sometimes these are under ‘advanced’ options.

Some features may introduce vulnerabilities. You can turn these off, or turn them on only sometimes. Eg:

Install only reputable browser plugins/extensions. Do you research first.

Always keep your browser updated. Security patches reduce vulnerabilities.

Don't enter sensitive information into a website without 'HTTPS:'. HTTPS: means it has a SSL (Secure Socket Connection) Certificate installed to encrypt traffic, so it is more secure.

Always pay attention to what you allow or restrict, including access to camera, microphone, location, etc.

Secure your Accounts

Strong passwords are your first line of defense. Consider reputable password manager software or make your own strong passwords.

Cyber-criminals can crack weak passwords easily:

Also pick a unique username. E.g. ‘admin’ is a very common username (so easy to guess).

Pick Passwords

Do use:

Don’t Use:

Easy Password Generation

  1. Think of a sentence
  2. Use part of each word
  3. Substitute numbers, symbols and capitals.

E.g.:

  1. Sentence: ‘ilove interiordesign’.
  2. Sentence fragments: ilointrdsgn
  3. Substitution: !lo1nTRdsgN

Try it in a different language too!

Password Security

Make your passwords different If you use the same password everywhere, your information is more vulnerable.

This can be easy! Use extra letters to make them different. E.g.

Do:

Don't:

If your account is used by someone else change your password/s immediately and/or perform a password recovery.

Password Recovery

When setting a password, you may need to provide a secret question and answer for password recovery. Eg:

Use information only you know. If password recovery is weak, you are still vulnerable - especially if your email is compromised.

Using 2FA

2FA is Two Factor Authentication. Instead of one verification method (eg Username/Password), 2FA adds security with a second. Eg:

Your accounts and transactions are more secure with 2FA.

Eg. This website sends a token via Push Notification:

You must enter the code to continue the transaction:

Two Factor Authentication reduces risk, but not entirely.

Spot Risks/Scams

Scams cheat people out of information (for identity fraud), money, or other things. Learn about common scams at https://www.scamwatch.gov.au.

Example Video: https://www.youtube.com/watch?v=BL7WJM342Uc

Most importantly:

Premium Charge Scams

Block problematic numbers. If compromised, contact your mobile provider - they might remove charges.

Remote Access Scams

Scammers call and claim to be from a company/tech service that needs to access your computer (often to ‘fix’ a non-existent problem or process a refund).

If compromised, seek help from a qualified computer technician, change account details and contact your payment method to reverse charges if possible.

Phishing

Phishing scams try to gain personal information (eg. login/credit card details/etc) often by pretending to be a trusted source.

Eg, calls or emails claiming to be from a bank or other institution asking for details to secure your account.

They are often designed to scare (eg. 'Centrelink' asking to confirm details or they'll stop payment). Others might pretend to offer a prize or similar.

If compromised, change your account information immediately, and contact the real company/institution to secure your details.

Buying/Selling

When buying from individual sellers:

When buying from stores:

When selling:

If compromised while using a payment method with fraud protection (eg, credit card or Paypal), you may be able to arrange a charge-back. Also contact your Consumer Protection Agency (eg, the Office of Fair Trading: https://www.qld.gov.au/law/fair-trading)

Socialising Online

Some social media memes ask personally identifying questions that can be used for identity fraud - eg, 'name creators' that use your birthdate/street you grew up on to make a name).

Be cautious of 'catfishing' (fake profiles to take advantage of you, often on dating sites). ACCC example video: https://youtu.be/YDt0F7ETmRU

They may also pretend to be family or friends with fake profiles or compromised accounts. Eg:

What if I'm scammed?

More Information: https://www.scamwatch.gov.au/get-help/where-to-get-help

Privacy Controls

Privacy controls where your information is displayed and who sees it.

Some information you give intentionally. Eg, Your details to open an account. This is Personally Identifying Information.

Other information you might not realise you’re sharing – Eg, shopping habits or search history. This Non-Personally Identifying Information is connected to 'someone’, but not specifically you.

Who Owns your Data?

Video explanation: https://www.youtube.com/watch?v=y1txYjoSQQc

Information may be about you, but it is not owned by you.

  1. Check terms and conditions and privacy policies before using a service.
  2. Check how your data is used.
  3. Often we give our data to get a service. Eg. Facebook receives permission to use data for advertising when you join.

Secure your data

Social Media Privacy

Each social media platform has its own terms of service and privacy options. Review these before and during use of these platforms.

You can often Google guides on how to navigate privacy on each platform. We'll look at Facebook's settings today.

Facebook

Facebook's account privacy options can be adjusted in ‘Settings’:

Timeline and tagging restricts who sees your content or can 'tag' you. Lists allow you to restrict these to specific people.

Review what other people see on your timeline: view as a general user, or specific person.

Friend lists

Create lists to easily share with only specific people.

  1. In News Feed, click 'Friend Lists' on the left. You may need to click 'See More' first.
  2. Click '+ Create List'.
  3. Create list name and add friends to the list. You can add/remove people at any time.
  4. Click Create.

Set privacy on posts

Select from the drop-down menu - you can select a friends list here too. Check this setting every time you post.

You (and others) can change the privacy of a post later.

Comments inherit privacy settings of original posts. Eg, if a post is public, so are your comments.

Facebook Pages and most Facebook groups have public posts. 'Account privacy' does not cover content on something marked as public.

You can block people if someone is harassing or bullying you (located under 'settings'). You can also report behavior on individual posts.

Consider disabling facial recognition to maintain privacy.

{{ workshop_04_Image_26.jpg?601

View and edit the accounts you’ve logged into using Facebook. Logging in with Facebook allows sites to access certain information. Regularly check and adjust information being shared.

{{ workshop_04_Image_28.jpg?601

Facebook advertisers use your data to show targeted content.

{{ workshop_04_Image_29.jpg?601

A lot of data is stored here. You can remove information (e.g. your interests), but Facebook will continue collecting data to rebuild lists.

Permissions allow/deny advertiser access to certain information.

{{ workshop_04_Image_30.jpg?601

Regularly check your activity log and review your data. Do you still need to share it? Remove what you don't need.

{{ workshop_04_Image_31.jpg?601

Use the security and log-in screen to review your logins, and log out remotely. If you left Facebook logged in somewhere accidentally, log out here.

Turn on Two Factor Authentication, and consider nominating people to vouch for your identity if you're locked out.

Remember!

Privacy is not guaranteed even with strong settings:

  1. Screen-shots can be shown to people who don’t usually have access.
  2. Your copied/downloaded information can be shared.
  3. You may inadvertently give access to the wrong person.
  4. Security flaws can make private information public.

To keep information 100% private, don't put it online.

Further Resources

https://www.staysmartonline.gov.au/

https://www.scamwatch.gov.au/

https://aifs.gov.au/cfca/publications/online-safety

https://www.esafety.gov.au/

https://www.opencolleges.edu.au/informed/cyber-safety/

https://www.facebook.com/help/325807937506242

https://help.instagram.com/196883487377501

https://help.twitter.com/en/safety-and-security