Which of the following are security measures you should follow when using social media sites?

The following best practices for managing social media account access should be followed by University of Illinois at Urbana-Champaign accounts to ensure they remain secure and only authorized individuals have access.

Unit-level accounts are a direct extension of the University and should to be treated as a university resource. They need to be secured and may be subject to public records requests and other laws and policies.

Managing Account Access

  1. Document everyone who has access and passwords for each of the unit’s social media accounts. At least once a year, units should audit the access list to make sure it is up to date. Remove people who should no longer have access to post to the unit account.

  2. Make sure at least two people have access to every social media account. At least one of them should be a full-time University employee. When multiple people have access to an account, it reduces the risk of the unit being locked out of the account when an account manager leaves or changes roles.
  3. Use department emails, rather than personal ones, for account email needs. When possible, use a department email that many users can access rather than an email tied to a specific person. This will help reduce the risk of units losing access to the account when staffing changes occur. Additionally, notifications sent to the shared department email account will be seen by everyone managing the social media account.
  4. When possible, use the account management tools provided by the platform. The tools for group management of social media accounts vary from platform to platform. Use these tools, like Facebook’s Business Manager, to provide greater resources for managing access and to make a clearer distinction between personal and unit accounts.
  5. If working with outside vendors, limit the account access to only what is necessary. If the unit is contracting someone else to work on the accounts, use secure practices when sharing account information. When possible, use official platform tools like Facebook Ads Manager and Twitter Ads Manager to limit vendor access to necessary levels. Sharing passwords to university accounts should be done only when no other alternative is available.

Account Security

  1. Only people who are currently managing the account should have the current password. Change passwords as quickly as possible each time someone who has access leaves the unit or changes roles and no longer needs access to the account.
  2. New passwords should be securely shared. Admins should be notified of new passwords either over the phone or in-person. No passwords should be shared via email.
  3. Create a new password for account takeovers. Units that allow individuals or groups, including contracted outside vendors, to temporarily take over their social media accounts should create a temporary password for the takeover and change it immediately after the takeover ends.
  4. Follow best practices for creating strong passwords and do not reuse passwords for multiple accounts. Make sure passwords are complex and unique for each platform. When accounts reuse passwords, compromising one account puts all of the other accounts at risk.

A 19-year-old running for public office in New Hampshire found out about the importance of following Internet safety rules the hard way. As Seacoast Online reports, his opponents found images in his social media posts that were sexually suggestive and referenced past drug use. Just like that, his political career crashed and burned upon takeoff. But, unfortunately, he isn't the only one, as careless Internet habits have left others exposed to scams, identity theft and physical harm at the hands of people they met online. With more users accessing the Internet through mobile devices, these risks are changing and growing quickly.

Even though apps loom larger in most people's daily online interactions than traditional websites do, that does not mean that the basic Internet safety rules have changed. Hackers are still on the lookout for personal information they can use to access your credit card and bank information.

Unsafe surfing can also lead to other threats—from embarrassing personal comments or images that, once online, are nearly impossible to erase, to getting mixed up with people you'd rather have had nothing to do with.

Here are the Top 10 Internet safety rules to follow to help you avoid getting into trouble online (and offline).

1. Keep Personal Information Professional and Limited

Potential employers or customers don't need to know your personal relationship status or your home address. They do need to know about your expertise and professional background, and how to get in touch with you. You wouldn't hand purely personal information out to strangers individually—don't hand it out to millions of people online.

2. Keep Your Privacy Settings On

Marketers love to know all about you, and so do hackers. Both can learn a lot from your browsing and social media usage. But you can take charge of your information. As noted by Lifehacker, both web browsers and mobile operating systems have settings available to protect your privacy online. Major websites like Facebook also have privacy-enhancing settings available. These settings are sometimes (deliberately) hard to find because companies want your personal information for its marketing value. Make sure you have enabled these privacy safeguards, and keep them enabled.

3. Practice Safe Browsing

You wouldn't choose to walk through a dangerous neighborhood—don't visit dangerous neighborhoods online. Cybercriminals use lurid content as bait. They know people are sometimes tempted by dubious content and may let their guard down when searching for it. The Internet's demimonde is filled with hard-to-see pitfalls, where one careless click could expose personal data or infect your device with malware. By resisting the urge, you don't even give the hackers a chance.

4. Make Sure Your Internet Connection is Secure. Use a Secure VPN Connection

When you go online in a public place, for example by using a public Wi-Fi connection, PCMag notes you have no direct control over its security. Corporate cybersecurity experts worry about "endpoints"—the places where a private network connects to the outside world. Your vulnerable endpoint is your local Internet connection. Make sure your device is secure, and when in doubt, wait for a better time (i.e., until you're able to connect to a secure Wi-Fi network) before providing information such as your bank account number.

To further improve your Internet browsing safety, use secure VPN connection (virtual private network ). VPN enables you to have a secure connection between your device and an Internet server that no one can monitor or access the data that you’re exchanging. Read more about What is VPN

5. Be Careful What You Download

A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather. As PCWorld advises, don't download apps that look suspicious or come from a site you don't trust.

6. Choose Strong Passwords

Passwords are one of the biggest weak spots in the whole Internet security structure, but there's currently no way around them. And the problem with passwords is that people tend to choose easy ones to remember (such as "password" and "123456"), which are also easy for cyber thieves to guess. Select strong passwords that are harder for cybercriminals to demystify. Password manager software can help you to manage multiple passwords so that you don't forget them. A strong password is one that is unique and complex—at least 15 characters long, mixing letters, numbers and special characters.

7. Make Online Purchases From Secure Sites

Any time you make a purchase online, you need to provide credit card or bank account information—just what cybercriminals are most eager to get their hands on. Only supply this information to sites that provide secure, encrypted connections. As Boston University notes, you can identify secure sites by looking for an address that starts with (the S stands for secure) rather than simply They may also be marked by a padlock icon next to the address bar.

8. Be Careful What You Post

The Internet does not have a delete key, as that young candidate in New Hampshire found out. Any comment or image you post online may stay online forever because removing the original (say, from Twitter) does not remove any copies that other people made. There is no way for you to "take back" a remark you wish you hadn't made, or get rid of that embarrassing selfie you took at a party. Don't put anything online that you wouldn't want your mom or a prospective employer to see.

9. Be Careful Who You Meet Online

People you meet online are not always who they claim to be. Indeed, they may not even be real. As InfoWorld reports, fake social media profiles are a popular way for hackers to cozy up to unwary Web users and pick their cyber pockets. Be as cautious and sensible in your online social life as you are in your in-person social life.

10. Keep Your Antivirus Program Up To Date

Internet security software cannot protect against every threat, but it will detect and remove most malware—though you should make sure it's to date. Be sure to stay current with your operating system's updates and updates to applications you use. They provide a vital layer of security.

Keep these 10 basic Internet safety rules in mind and you'll avoid many of the nasty surprises that lurk online for the careless.

Even though apps loom larger in most people's daily online interactions than traditional websites do, that does not mean that the basic Internet safety rules have changed. Hackers are still on the lookout for personal information they can use to access your credit card and bank information.

Which of the following are social media guidelines leading Marines?

DO NOT share information that is not approved for public release. Be aware of security measures regarding your identity and finances. Keep all important information out of Social Media. Be cautious against cyber criminals and attackers by following sound security procedures.

When posting on social media which of the following is a guideline for political activities by members of the armed forces?

Guidance on Political Activity and DOD Support You must adhere to the policy in Department of Defense Directive 1344.10 when posting any political content, which includes: Cannot participate in any interview or discussion as an advocate for or against a party, candidate or cause.

Which are the guidelines for political activities by members of the armed forces?

Active duty members will not engage in partisan political activities, and all military personnel will avoid the inference that their political activities imply or appear to imply DoD sponsorship, approval, or endorsement of a political candidate, campaign, or cause.

What is one of the objectives of the Marine Corps promotion system?

The basic goal of the system is to advance the best-qualified Marines to higher grades so MOS/OccFld vacancies in the enlisted structure will be continuously occupied by Marines who are fully qualified to perform the duties and to assume the responsibilities of the next higher grade.

Toplist

Neuester Beitrag

Stichworte