Facebook settings for privacy

  1. Log in to your Facebook account and go to the question mark on the right side at the top of your screen.

  1. Go to the Privacy Checkup

  1. Check the settings for your Posts. The recommended settings are your Friends only, as Public shows everyone all your posts.  If you post publicly, then be careful what you post.

  1. Go to the next menu. Check what information that you have available there.  Make sure that you secure information that should remain private.

  1. Go the next menu and check where you have logged into with your Facebook credentials. Update any that are not available to the appropriate groups.

  1. You aren’t done yet! You now need to check the rest of your settings.  Go to the Settings menu up in the top right-hand side of your page.

  1. Review the settings carefully to ensure that they are not exposing your Facebook posts to an inappropriate audience.

Recipe for protecting yourself online

We wanted to end the year with a new beginning…a series of posts about various ways to better secure your online presence.   We’ll first start with a series on general computer security (the how and the why), and then dive into your mobile devices.  This is not intended to be a definitive guide, but rather a baseline to help you get started and have some immediate positive impact.  This first post is your basic ‘recipe’ of security ingredients, courtesy of the ID Theft Center .  Hope that you find it useful!

Overall security/privacy recipe

  • Check Privacy and Security settings for any application that you use. Ensure they are set to meet your preferences.
  • Read the Privacy policy of any app you sign up for first.
  • Be careful how many apps that you download on your devices. Too many can be difficult to manage and leave holes in your privacy/security unnoticed.
  • Choose a strong and different password for each application. Store them in an encrypted vault like KeePass (https://keepass.info/) or LastPass (https://www.lastpass.com/).
  • If the application offers a second form of authentication, use it! This could be as easy as texting a passcode to your phone or sending you an email.
  • Use the least amount of information necessary to register for and use the site. Be careful when picking a screen name – make sure it doesn’t provide clues to your “identity.”
  • Be wise about what you post.  Never post personal information such as your address, phone numbers, e-mail address, driver’s license number, Social Security Number (SSN), birth date, birth place, school’s name, or student ID number. When blogging, do not disclose your location for any given day or the exact location for an event you are going to attend.
  • Only connect to people you already know and trust.
  • Verify emails and links in emails you supposedly get from your social networking site. These are often designed to gain access to your user name, password, and ultimately your personal information.
  • Install a firewall, reputable anti-spam and anti-virus software to protect your information– and keep it updated.
  • Keep your system up to date on updates. This helps reduce the risk of any technical vulnerabilities that can be exploited on your system or device.
  • Use two-factor authentication for any service that you use that offers it. This will entail having an additional way to identify you above and beyond your password (such as texting a code to your cell phone).

http://www.idtheftcenter.org/Solutions/sn-14.html

 

Security for Researchers

Tom Liffiton and Mark Monday are addressing the annual convention of Investigative Reporters and Editors this week. Security and self-protection on the Internet, and in all parts of life, are essential to the open source information collector. Some of the handouts we are providing to endangered journalists are attached below.IRE Page is: http://theresearchschool.com/?page_id=566

Stegonography — Secret Communication in the Open

Surveillance and Tailing, How It is Done

By Lines not Tombstones — Security on and off the Internet