From the course: Security Tips
Unlock this course with a free trial
Join today to access over 24,000 courses taught by industry experts.
Social media security options
From the course: Security Tips
Social media security options
- [Instructor] Every day, billions of people around the world connect with each other through social media. And as with any time we share information, when we're using social media, we need to be aware of our own information security. In this episode, I want to point out some important security and safety considerations when using social media networks and apps. Social media isn't necessarily about sharing your whole life with everyone online. Most, if not all, of the services allow you to create a private account. A private account lets you choose who can see what you post, while still allowing you to see what people with public accounts post. If you want to dip your toe into the social media world, this can be a good option, allowing you to view other people's public posts, but without worrying that you are posting information where people can see it. Take some time to consider the name and handle or nickname you'll use for your account. Keep in mind that this information is public…
Contents
-
-
-
Use a password manager3m 3s
-
(Locked)
Choose good passwords3m 18s
-
(Locked)
Use two-factor authentication5m 22s
-
(Locked)
Security questions3m 39s
-
(Locked)
Smart home devices3m 24s
-
(Locked)
Secure your home Wi-Fi5m 40s
-
(Locked)
Laptop security5m 36s
-
(Locked)
Browse the web safely3m 52s
-
(Locked)
Block ads and trackers4m 57s
-
Recognize phishing emails5m 6s
-
(Locked)
Recognize phone scams6m 42s
-
(Locked)
Donate a computer safely3m 45s
-
(Locked)
Back up data securely2m 37s
-
(Locked)
Encrypt sensitive files9m 4s
-
(Locked)
Use a VPN service5m 5s
-
Browse the web with Tor4m 45s
-
(Locked)
Social media security options6m 20s
-
(Locked)
Mobile device security5m 14s
-
(Locked)
Stay secure on shared computers6m 9s
-
(Locked)
Scan for viruses and malware5m 45s
-
(Locked)
Stay secure when traveling6m 56s
-
(Locked)
Keep work and home information separate5m 21s
-
(Locked)
Use the cloud securely2m 8s
-
(Locked)
Cache and cookies5m 54s
-
(Locked)
Spear phishing and catfishing4m 55s
-
(Locked)
Understanding and preventing ransomware2m 29s
-
(Locked)
Keeping an eye on your own security4m 8s
-
(Locked)
What's a URL?6m 28s
-
(Locked)
Turning on and using full-disk encryption2m 13s
-
(Locked)
What to do if your information is compromised5m 34s
-
(Locked)
How to tell if a link is legitimate4m 3s
-
(Locked)
Understanding biometric security3m 26s
-
(Locked)
What is public key encryption?3m 3s
-
(Locked)
Build a portable apps USB6m 41s
-
(Locked)
Handling information securely3m 54s
-
(Locked)
Understanding common attacks5m 17s
-
(Locked)
Paying securely online5m 45s
-
(Locked)
Wireless security for mobile phones4m 3s
-
(Locked)
Chatting securely4m
-
(Locked)
Configuring 2FA with Authy3m 45s
-
(Locked)
Configuring 2FA with 1Password3m 28s
-
(Locked)
Securing your email account2m 38s
-
(Locked)
Encrypted email2m 29s
-
(Locked)
Steganography2m 24s
-
(Locked)
Exploring app permissions2m 36s
-
(Locked)
Using kiosk mode in Windows 104m 5s
-
(Locked)
Using a separate network for your IoT devices4m 26s
-
(Locked)
Adding a guest account to your computer4m 52s
-
(Locked)
Safely donating mobile devices3m 38s
-
(Locked)
Learn more about security with LinkedIn Learning2m 22s
-