SlideShare a Scribd company logo
Simple Safeguards:                                                         Presented by Retired
                                                                                                FBI Special Agent
           Preventing Social Media Fraud                                                                Jeff Lanza

 Keep your guard up on sites like Facebook, LinkedIn and Twitter. Scammers are exploiting the trust we
        have of our connections on these sites to gain access to your accounts and commit fraud.

                    Current Threats                                        Specific Actions to Avoid
Fake Notification E-mails                                             1.    Don’t click on a message that seems
Look out for fake emails that look like they came from                      weird. If it seems unusual for a friend to
Facebook. These typically include links to phony pages that                 write on your Wall and post a link, that
attempt to steal your login information or prompt you to                    friend may have gotten phished.
download malware. Never click on links in suspicious                  2.    Don’t enter your password through a
emails. Log-in to a site directly.                                          link. Just because a page on the Internet
                                                                            looks like Facebook, it doesn't mean it is.
Suspicious Posts and Messages                                               It is best to go the Facebook log-in page
Wall posts or messages that appear to come from a friend                    through your browser.
asking you to click on a link to check out a new photo or             3.    Don't use the same password on
video that doesn't actually exist. The link is typically for a              Facebook that you use in other places
phony login page or a site that will put a virus on your                    on the web. If you do this, phishers or
computer to steal your passwords.                                           hackers who gain access to one of your
Money Transfer Scams                                                        accounts will easily be able to access
Messages that appear to come from friends or others                         your others as well, including your bank.
claiming to be stranded and asking for money. These                   4.    Don’t share your password with
messages are typically from scammers. Ask them a                            anyone. Social sites will never ask for
question that only they would be able to answer. Or                         your password through any form of
contact the person by phone to verify the situation,                        communication.
even if they say not to call them.                                    5.    Don't click on links or open
                                                                            attachments in suspicious emails. Fake
                                                                            emails can be very convincing, and
                General Online Safety Rules                                 hackers can spoof the "From:" address so
       Be wary of strangers - The internet makes it easy for               the email looks like it's from a social site.
        people to misrepresent their identities and motives. If             If the e-mail looks weird, don't trust it,
        you interact with strangers, be cautious about the
                                                                            and delete it from your inbox.
        amount of information you reveal or agreeing to meet
        them in person.                                               6.    Don’t send money anywhere unless
       Be skeptical - People may post false or misleading                  you have verified the story of someone
        information about various topics, including their own. Try          who says they are your friend or relative.
        to verify the authenticity of any information before taking   7.    Don’t provide your cell phone number
        any action.
                                                                            to verify the results of a Facebook
       Evaluate your settings - Use privacy settings. The
        default settings for some sites may allow anyone to see             game or survey without reading the
        your profile. Even private information could be exposed,            terms and conditions. It may result in
        so don't post anything that you wouldn't want the public            recurring charges on your cell phone bill.
        to see.
       Use strong passwords - Protect your account with                      More resource Information:
        passwords that cannot easily be guessed. If your
        password is compromised, someone else may be able to          www.us-cert.gov or www.fbi.gov
        access your account and pretend to be you.
                                                                                 Speaker Information:
       Security Information For Social Networking Sites                                Jeff Lanza
                  www.facebook.com/security                                       Phone: 816-853-3929
         www.twitip.com/twitter-security-dos-and-donts                     Email:jefflanza@thelanzagroup.com
                www.linkedin.com/secure/settings                           Web Site: www.thelanzagroup.com

More Related Content

PDF
Guide to facebook security
PDF
10.a guide-to-facebook-security
PDF
Guide to facebook security
PDF
How to avoid facebook scams
PPTX
Are Phishing Attacks Angling For You?
PPTX
Dangers of Facebook
PPTX
Danger of facebook
PPT
School presentation
Guide to facebook security
10.a guide-to-facebook-security
Guide to facebook security
How to avoid facebook scams
Are Phishing Attacks Angling For You?
Dangers of Facebook
Danger of facebook
School presentation

What's hot (17)

DOCX
Jonathan cullishpuma
PPTX
Internet saftey
PPTX
Internet safety
PPT
Staying safe on_the_internet_presentation (2)
PDF
MindMake - Online Safety Talking to your Kids Parental Control
PPT
Social Networking Safety
PPT
The Basics Of Internet Safety
PPTX
Cyber safety
PDF
Facebook Password Sniper
PDF
Cyber safety tips
PPT
Social Media Safety Presentation
PPTX
Slideshow - Lil Rat
PPTX
Internet Safety & Cyberbullying Workshop for Parents
PPTX
How to keep your digital identity safe
PDF
Internet Safety for 1950s Adults and Beginners
PPT
Social Networking
PDF
Online Security
Jonathan cullishpuma
Internet saftey
Internet safety
Staying safe on_the_internet_presentation (2)
MindMake - Online Safety Talking to your Kids Parental Control
Social Networking Safety
The Basics Of Internet Safety
Cyber safety
Facebook Password Sniper
Cyber safety tips
Social Media Safety Presentation
Slideshow - Lil Rat
Internet Safety & Cyberbullying Workshop for Parents
How to keep your digital identity safe
Internet Safety for 1950s Adults and Beginners
Social Networking
Online Security
Ad

Viewers also liked (7)

PDF
ICD- 10 is coming -Brenda Edwards
DOC
Polozhenie o konkurse__moya_malaya_rodina
PDF
Social networking fraud handout june 2011
PDF
Glrb2010 auvi
PDF
Lawrence mm june 2011
PDF
Medical identity theft handout june 2011
PDF
Jeff lanza id theft handout business march 2011
ICD- 10 is coming -Brenda Edwards
Polozhenie o konkurse__moya_malaya_rodina
Social networking fraud handout june 2011
Glrb2010 auvi
Lawrence mm june 2011
Medical identity theft handout june 2011
Jeff lanza id theft handout business march 2011
Ad

Similar to Social networking fraud handout june 2011 (20)

PPTX
IS Presetation.pptx
PPTX
EMPOWERMENT TECHNOLOGIES LESSON 2
PPTX
PDF
Facebook Hacked, Protect Your Facebook Account
PPTX
Rules of netiquette-lesson 2.pptx
PDF
Hack FB Messages To Catch a Cheating Partner.pdf
PPTX
Online privacy
PPTX
Online privacy
PPTX
EMPOWERMENT TECHNOLOGIES LESSON 2 - NETIQUETTE
PPTX
Security-Awareness-Training.pptx
PPTX
phishing-awareness-powerpoint.pptx
PPSX
IDENTIFYING CYBER THREATS NEAR YOU
PPTX
phishing-awareness-powerpoint.pptx
PPTX
Lesson-2-Online-Safety-Security-Ethics-And-Etiquette.pptx
PDF
PPTX
phishing and reporting emailfdlhl;glllfd
PPTX
phishingsssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss...
PDF
10 tips to prevent phishing attacks
PPT
Cyberbullying and Cybercrime
PPTX
phishing-awareness-powerpoint [Autosaved].pptx
IS Presetation.pptx
EMPOWERMENT TECHNOLOGIES LESSON 2
Facebook Hacked, Protect Your Facebook Account
Rules of netiquette-lesson 2.pptx
Hack FB Messages To Catch a Cheating Partner.pdf
Online privacy
Online privacy
EMPOWERMENT TECHNOLOGIES LESSON 2 - NETIQUETTE
Security-Awareness-Training.pptx
phishing-awareness-powerpoint.pptx
IDENTIFYING CYBER THREATS NEAR YOU
phishing-awareness-powerpoint.pptx
Lesson-2-Online-Safety-Security-Ethics-And-Etiquette.pptx
phishing and reporting emailfdlhl;glllfd
phishingsssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss...
10 tips to prevent phishing attacks
Cyberbullying and Cybercrime
phishing-awareness-powerpoint [Autosaved].pptx

More from Lawrence Medical Managers (11)

PPTX
Accountable care organizations lawrence 101211
PDF
Cms aco information
PDF
Social networking fraud handout june 2011
PDF
Id theft handout individual june 2011
PDF
Presentation by Sheila Richmeier
DOC
Software vendor 5010 checklist
DOC
Clearinghouse payer 5010 checklist
XLS
ICD-10 action plan-revised
PDF
ICD-10, Brenda Edwards 07.14.2010
PPT
Disaster Planning Local state-federal roles and responsibilities
PPT
Secretary Rod Bremby Presentation
Accountable care organizations lawrence 101211
Cms aco information
Social networking fraud handout june 2011
Id theft handout individual june 2011
Presentation by Sheila Richmeier
Software vendor 5010 checklist
Clearinghouse payer 5010 checklist
ICD-10 action plan-revised
ICD-10, Brenda Edwards 07.14.2010
Disaster Planning Local state-federal roles and responsibilities
Secretary Rod Bremby Presentation

Recently uploaded (20)

PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PPTX
A Presentation on Artificial Intelligence
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
August Patch Tuesday
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
A Presentation on Touch Screen Technology
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Hybrid model detection and classification of lung cancer
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Approach and Philosophy of On baking technology
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Mushroom cultivation and it's methods.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
Univ-Connecticut-ChatGPT-Presentaion.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Heart disease approach using modified random forest and particle swarm optimi...
A Presentation on Artificial Intelligence
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
August Patch Tuesday
Zenith AI: Advanced Artificial Intelligence
Encapsulation_ Review paper, used for researhc scholars
A Presentation on Touch Screen Technology
A novel scalable deep ensemble learning framework for big data classification...
Unlocking AI with Model Context Protocol (MCP)
A comparative study of natural language inference in Swahili using monolingua...
Programs and apps: productivity, graphics, security and other tools
Hybrid model detection and classification of lung cancer
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Approach and Philosophy of On baking technology
cloud_computing_Infrastucture_as_cloud_p
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Mushroom cultivation and it's methods.pdf
Hindi spoken digit analysis for native and non-native speakers

Social networking fraud handout june 2011

  • 1. Simple Safeguards: Presented by Retired FBI Special Agent Preventing Social Media Fraud Jeff Lanza Keep your guard up on sites like Facebook, LinkedIn and Twitter. Scammers are exploiting the trust we have of our connections on these sites to gain access to your accounts and commit fraud. Current Threats Specific Actions to Avoid Fake Notification E-mails 1. Don’t click on a message that seems Look out for fake emails that look like they came from weird. If it seems unusual for a friend to Facebook. These typically include links to phony pages that write on your Wall and post a link, that attempt to steal your login information or prompt you to friend may have gotten phished. download malware. Never click on links in suspicious 2. Don’t enter your password through a emails. Log-in to a site directly. link. Just because a page on the Internet looks like Facebook, it doesn't mean it is. Suspicious Posts and Messages It is best to go the Facebook log-in page Wall posts or messages that appear to come from a friend through your browser. asking you to click on a link to check out a new photo or 3. Don't use the same password on video that doesn't actually exist. The link is typically for a Facebook that you use in other places phony login page or a site that will put a virus on your on the web. If you do this, phishers or computer to steal your passwords. hackers who gain access to one of your Money Transfer Scams accounts will easily be able to access Messages that appear to come from friends or others your others as well, including your bank. claiming to be stranded and asking for money. These 4. Don’t share your password with messages are typically from scammers. Ask them a anyone. Social sites will never ask for question that only they would be able to answer. Or your password through any form of contact the person by phone to verify the situation, communication. even if they say not to call them. 5. Don't click on links or open attachments in suspicious emails. Fake emails can be very convincing, and General Online Safety Rules hackers can spoof the "From:" address so  Be wary of strangers - The internet makes it easy for the email looks like it's from a social site. people to misrepresent their identities and motives. If If the e-mail looks weird, don't trust it, you interact with strangers, be cautious about the and delete it from your inbox. amount of information you reveal or agreeing to meet them in person. 6. Don’t send money anywhere unless  Be skeptical - People may post false or misleading you have verified the story of someone information about various topics, including their own. Try who says they are your friend or relative. to verify the authenticity of any information before taking 7. Don’t provide your cell phone number any action. to verify the results of a Facebook  Evaluate your settings - Use privacy settings. The default settings for some sites may allow anyone to see game or survey without reading the your profile. Even private information could be exposed, terms and conditions. It may result in so don't post anything that you wouldn't want the public recurring charges on your cell phone bill. to see.  Use strong passwords - Protect your account with More resource Information: passwords that cannot easily be guessed. If your password is compromised, someone else may be able to www.us-cert.gov or www.fbi.gov access your account and pretend to be you. Speaker Information: Security Information For Social Networking Sites Jeff Lanza www.facebook.com/security Phone: 816-853-3929 www.twitip.com/twitter-security-dos-and-donts Email:jefflanza@thelanzagroup.com www.linkedin.com/secure/settings Web Site: www.thelanzagroup.com