Upload
others
View
6
Download
0
Embed Size (px)
Citation preview
James Wilkinson
Gary Simms
Social Media Smarts – The impact your social media presence has on your personal brand and career
May 22, 2018
What we will explore today
• The Impact of Social Media on your brand
• The users of social media and how it is being used • How Smart Devises are
connect and the vulnerability of the IoT
Learning Objectives:
• Social Media Facts
• Social Engineering & Oversharing
Key Takeaways:
Understand the employers point of view
Managing your professional reputation on social media
• What does your messaging say about your persona and brand
OPM ECQ’s
• Developing others • Tech Mgmt• Interpersonal skills• Oral communications• Social Media Risk
What we will explore today• Risk of Malware, Hacking, Identify
Theft, Cyber Bullying, Extortion, and Ransomware
• Are you portraying Executive/Professional Presence in your social media activities
• What are the risks associated with Social Media as it relates to Career Impact
The Digital Impact on your Professional Brand
• Your character matters on-line and will affect your off-line life
• Can social networks prohibit you from getting hired or getting asecurity clearance?
• Constantly review your social networks and contacts:Know who is reading your post
• Improper use of social media can result in legal actions
– Cyber Bullying, Sexting, Cyber Stalking…
• Use common sense before you post “Don’t Follow Others”
– Pause Before you POST!
• An instant message/posting can last a lifetime
A Few Social Media Facts
Surviving Social Media Risk:
Cyberbullying
PasswordSecurity
Oversharing
Virus/Spyware Hacking Sexting & Sexstortion
Identity Theft
Ransomeware
Malware, GeoTagging, VirusesMalware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.[1] Malware is defined by its malicious intent, acting against the requirements of the computer user, and does not include software that causes unintentional harm due to some deficiency..
• Beware of USB flash drive's autoplay feature• Don't Trust Links Sent in Email Messages• E-mail is insecure by default because it is
more like a postcard, not a sealed envelope
Geotagging (also written as GeoTagging) is the process of adding geographical information to various media in the form of metadata. The data usually consists of coordinates like latitude and longitude, but may even include bearing, altitude, distance and place names. Geotagging is most commonly used for photographs and can help people get a lot of specific information about where the picture was taken or the exact location of a friend who logged on to a service.
• Be aware of the ability for your images to be geotagged
Virus: Virus is a program written to enter to your computer and damage/alter your files/data. A virus might corrupt or delete data on your computer. Viruses can also replicate themselves. A computer Virus is more dangerous than a computer worm as it makes changes or deletes your files while worms only replicates itself with out making changes to your files/data• installing and running anti-virus
software is the first line of defense to prevent infections and attacks against your computer
Social Media Apps & The Dangers
Tinder: An app that is used for hooking-up and dating. Users can rate profiles and find potential hook-ups via GPS location tracking. Problem: It is easy for adults and minors to find one another. Also, due to the rating system, it is often used for cyber-bullying,
Kik Messenger: An instant messaging app with over 100 million users that allows users to exchange videos, pics and sketches. Problem: people using the app for sexting and sending nude selfies through the app is common
Snapchat: This app allows a user to send photos and videos to anyone on
his/her friend list. Problem: It is the #1 app used for sexting, mostly because people think it is the safer way to sext
Instagram: An app is a photo and video-sharing social networking service
owned b y Facebook, Inc. Problem: Used for trolling, sexting, looking for minors, open platform for bullying.
How Google and other apps Social Engineer
My name, Gender and birthdate
My recent google searches
My personal cellphone numbers
The websites I’ve visited
That I turned on my bedroom lights last
night
Exactly where I’ve been over the past
several years
That I like American football, games,
jazz, audio equipment, my
favorite food & drink and more
Where I work
Where I live
The YouTube videos I’ve watched and my
YouTube searches
Every time I’ve used my voice to interact
with google assistant (complete with
recordings of my voice)
What Employers See on Social Media
38% - posted info about Drinking or using drugs
39% - inappropriatePhotos, videos
32% - discriminatory comments Related to race, gender, religion
30% - Badmouthed the previous company
27% - Lied about qualification
27% - had poor communication skills
26% - linked to criminal behavior
23% - Candidate shared confidential info from previous company
22% - Candidate’s screen name was unprofessional
17% - Candidate lied about absences
17% - Candidate posted too frequently
Survey June 2017
What does your online activities say about you
Experienced negative consequences do to online activity
Understanding the risk and impacts of Social MediaDiscussion Topics: Social media can impact you in a positiveway and allow for global communications but at the sametime it can be a dangerous environment if you are not awareof the pitfalls
During this session, you learned and discussed how yoursocial media impacts your professional persona.
• Risk of Malware, Hacking, Identify Theft, Cyber Bullying, Extortion, and Ransomware
• Are you portraying Executive/Professional Presence in your social media activities
• What are the risks associated with Social Media as it relates to Career Impact
• Do you know who is watching you on Social Media
Questions