Safe Social Networking Guide

515 KB | 3 files | null PDF

The more you come to rely on social networks for business, the more hackers are motivated to attack your accounts and steal your private information. This guide highlights the main security threats you need to worry about as you navigate the social Web.

Everybody is on a social network these days. They’ve evolved from a way for college kids to see who is single or in a relationship to key business marketing and communications platforms. And of course, as more people find value in a software platform, hackers have more valuable data to go after by cracking your social networking accounts.
This guide addresses the most common threats to social networking security, including third-party applications that may access and expose your personal information to bad actors.
Included in this zip file are:
  • safe_social_networking.pdf
  • Intro Doc.pdf
  • Terms and Conditions.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

US-CERT is charged with providing response support and defense against cyber attacks for the Federal Civil Executive Branch (.gov) and information sharing and collaboration with state and local government, industry and international partners. US-CERT interacts with federal agencies, industry, the research community, state and local governments, and others to disseminate reasoned and actionable cyber security information to the public.

All IT Downloads from US-CERT» | Visit US-CERT »
Related IT Downloads

Compliance2 Building a GRC Program: Assessing Stakeholder Needs and Readiness

This table outlines the top needs of each stakeholder group that can help guide your conversations on priorities and needs for the GRC program. ...  More >>

Security95 Guide to Cyber Threat Information Sharing

This publication provides guidelines for establishing and participating in cyber threat information sharing relationships. ...  More >>

email9 Trustworthy Email

This document provides recommendations and guidelines for enhancing trust in email, including transmission and content security recommendations. ...  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.