Social Media Security By: Opeyemi A. Rasaki

Download as pdf or txt
Download as pdf or txt
You are on page 1of 41

SOCIAL MEDIA SECURITY BY: OPEYEMI A.

RASAKI 0
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 1

DISCLAIMER

The author does not assume any responsibility whatsoever under any conditions or circumstances.
You are 100% responsible for any inconveniencies, injury, or fallouts that result from changes that
might occur after the publication of this material.
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 2

READ THIS

This book is the intellectual property of the author and you should by no means modify, copy,
transfer or use this book for any purpose that is against the ideal set for it.

You are free to share it to anyone.

This book is not for sale.

Cheers!
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 3

PART ONE

I'm delighted to meet you here.

Without wasting our time because we have a lot to cover in 2days

WHO IS AN HACKER?

Let's Check from British English Dictionary

Noun

Hacker (plural hackers)

1. (computing) One who is expert at programming and solving problems with a computer.

2. (computing) One who uses a computer to gain unauthorized access to data, or to carry out
malicious attacks.

3. (computing) A computer security professional.

4. Something that hacks; a tool or device for hacking.

5. Someone who hacks.

With respect to these definitions, Hackers are categorized in to 3

1. Black Hat Hackers- Evil doers

2. White Hat Hackers- Saviour

3. The Grey Hat Hackers- Not for Evil not for Good

Each type of hacker hacks for a different reason, a cause, or both.

All have the required skills needed to accomplish their mission.

At one end of the spectrum is the black hat, who hacks for evil and malicious intent and without
permission.

On the other end of the spectrum is the white hat, who hacks against a black hat in order to
protect computer and network access and has permission to do so.

In the middle is the grey hat, who hacks not for evil and not for good; they are neutral in their
cause and usually try to sell their skills for monetary gain, like a mercenary.

I hope you get that now?

So, whenever you heard of hacker, they are not always a bad element.

Even, you can choose to be a professional hacker, I mean Ethical Hacker which is the same thing
as White Hat Hacker.
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 4

At the end of this training, you should be able to secure your social media account against
Evil Doer Hackers.

Now, let's go into main business

Today we will work on

▪ How to secure your Email Account;


▪ Facebook and Instagram Account;
▪ Twitter Account and
▪ Whatsapp Account

Let's work on Email Account.

I believe you will agree with me that nearly 99% of online registration including social media
accounts require Email address.

That means, having email account is a must for every individual using smartphone.

Well, there's different between using smartphone device and using internet sha.

Therefore, it's very important that you ensure your email account is secured.

Once hacker has access to your email account just say goodbye to every other thing that are
connected with it.

HOW TO SECURE YOUR EMAIL ACCOUNT

▪ Gmail

Are you with me?

Visit www.account.google.com

Type in your email address in the field to login

Click on Next and type in your password.

If you come across page like this just click Add or


confirm your recovery....
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 5

Enter your phone number here

Six Digit code will be sent to your phone number.


Make sure your line is with you.

Enter the code in the field below

Then, click Next


SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 6

If you have another email address you can use as


a recovery mail type it in here and click Next.

If not, click on Cancel

Then, you will be taken back to this page

Click on Done
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 7

Then, you will be directed to the page below

Click on Get started

Check if the 3 marks are green in colour.

Click on the 3 drop-down icons to check if there is any

problem.
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 8

You may still decide to add recovery email here

Click on the back button to go back home

Are you following please?

Anybody having issues at this stage?

Let's proceed…

Continue clicking on the tab one after the other till you get to Security
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 9

We are working on 1 & 2 here

Here is the main security Box.

Let's start with 1

Click on Use Your Phone to Sign In

You will be directed to this page.

Click on Set it up

1
2

Then, you will be asked to sign in again.


SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 10

Click on NEXT

Click on NEXT
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 11

Click on CONFIRM SCREEN LOCK and

enter your lock pin or pattern or finger prints.

Click YES
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 12

You will be redirected to this page

You may choose to TURN IT OFF if you


don't like the feature.

This page will always pop-up whenever anybody or


you are trying to login on any other devices aside
your phone.

Hope you get it to this stage❓


SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 13

LET'S MOVE TO 2

2- Step Verification

Click on 2-Step Verification

1
2

Click on GET STARTED


SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 14

Click on OK

Click on Yes
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 15

Click on YES

Click on TRY IT NOW


SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 16

Click on YES

If using the phone number work for you click


on SEND

6 Digit code will be sent to you to enter on the


next page.

But if you get notified that the phone number


is invalid, Click on USE ANOTHER
BACKUP OPTION

The number doesn't work out most times

You can use the code option and save it


somewhere (not on Android phone for security
purpose, not even on your line).

If you can cram one at a time, it's better.


SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 17

You are advised to protect this code very well


don't leave it on your phone, write it somewhere
safe. It is backup to login when your phone is not
with you.

You can only use a code at a time.

You have ten there.

Once you finish the ten, you can go back to


generate another ten.

You will be redirected to this page

Read the detail on this image

Click on TURN ON
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 18

Switch this on

A second step after entering your password verifies that


It is you signing in.

Another Backup Option

On this, you will need an application called

Google Authenticator.

You can get it from Google Play Store for Android Phone

IOS user, you can get it from your store too

Click on SET UP
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 19

Android User, Choose Android

Then, Click Next

You may be redirected to this page

Enter your password and Click Next


SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 20

Faster option,

Click on CAN'T SCAN IT

Then, Click NEXT

Copy this code

Then, Click Next


SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 21

Open your Google Authenticator App

Click on that PLUS ICON


SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 22

Click on Enter a provided key

1. Type the name of the account

2. Paste the code/key you copied from Google then.

3. Select time based 1


4. Click on Add
2

3 4
D
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 23

Copy the code you have here

Type the code from Authenticator in the field

provided after clicking on Next here

Then click on DONE


SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 24

You can see, this has changed.

There are other options you can choose from.

They're direct and straight forward

The Authenticator App is not meant for Google

alone or Gmail alone.

You can use it to secure some other apps social

media too.

You can also activate 2-Step verification on

your yahoo mail too.

Just go to its settings and find out.

It's easier than Gmail.

Once your email is secure, all other connected platforms are secure too.

Though, there are other social media platforms that accept either phone number/email

If you choose to use secure email instead of phone number, Facebook for instance, you need not
to worry.

God... Sleeping things ☺

Are you there please?

However, you can WATCH or DOWNLOAD video on how to secure your:

Facebook Account
and Your WhatsApp Account now.
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 25

HOW TO SECURE YOUR INSTAGRAM ACCOUNT

Yeah,

Welcome back on point.

Let’s get started with Instagram.

Instagram Security

Open your Instagram app

Go to the side bar

Click on Settings

Click on Two-factor Authentication


SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 26

Read that

Then, click Get Started

You have two options

1. Text message

2. Authentication App

You may choose to activate the two or either of


the two.

2
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 27

Let's start with 1. Text Message

Click on the Text Message

Enter SIX-DIGIT code sent to your Phone Number

Click on Next

Done

Save the Recovery/ Backup code, for in case you misplace

your line.

Read the detail on the image

Click the back Icon


SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 28

Let's activate 2. Authentication App

Click on it

Click Next

Note:

You must have installed Google Authenticator


on your phone.

The App I talked about last night.

Once you click on NEXT, you will be redirected to

the app, Google Authenticator

Click Ok
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 29

Copy this CODE

Type it HERE

Then, click NEXT

Click DONE

That's all about Instagram Security


SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 30

TWITTER SECURITY

The procedure is the same thing with Instagram

Just let me show you where you can get started, then you proceed from there

Click Settings and Privacy

Click on Account
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 31

Click on Security

Click Two-factor Authentication

Don't forget to come back to activate Password Reset Protection

You can continue from here

• You have 3 options there.


• The first 2 is enough for you to get secure
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 32

TAKE NOTE

1. Your Email must be secured.


2. If you use just your email on your social media platform without your phone number it's
secured.
3. If you use your phone number without your email, activate 2-Step Authentication or 2-
StepVerification.
4. If your email is not secure, you must activate 2-Step Authentication or Verification on
your social media account to get it protected.
5. It's highly recommended that you secure your email connected with your social media
accounts and still activate 2-Step Authentication or Verification on your social media
accounts.

SECURE ALL YOUR EMAIL AND ALL YOUR SOCIAL MEDIA


ACCOUNTS
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 33

PART TWO

Now, we shall discuss:

1. How to identify unsecured website at a glance


2. How to identify phishing website that can be used to hack you or collect your data
unaware
3. Guides to stay secured.

HOW TO IDENTIFY UNSECURED WEBSITE AT A GLANCE

Let’s start with the full meaning of HTTP and HTTPS

HTTP = Hyper Text Transfer Protocol

HTTPS = Hyper Text Transfer Protocol Secure

From the meaning given above,

You can see the difference

The word ‘Secure’

It means a website with https is a secure website

Visit punchng.com for example

Tap this padlock


SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 34

You can see just read that

For unsecured website, it will only be http://www......

Thank God now that if you are using Chrome google will notify you that the link is not secure

Let me get sample


SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 35

HOW TO IDENTIFY PHISHING WEBSITE

Actually,

Phishing is a method of trying to gather personal information using deceptive e-mails and
websites.

How do you identify one?

Because, phishing website look like real one sometimes.

Let me explain with:

▪ Domain name
▪ Subdomain
▪ Domain extension

1. Domain name is the name of a website as in coca-cola.com, jumia.com.ng, etc.

2. Subdomain is an additional part to your main domain name.

Example, track.jumia.com.ng

The track here is the subdomain, it’s always at the left-side of the main domain name.

3. Domain extension is what end domain name like .com, .net, .ng, etc.

So, let's go into this

https://cocacola.com-cheap.best

This is an example of a phishing website link

Can you identify domain name here?

Anybody that come across the link will think it's from COCA-COLA.

The link is deceptive,

And that's why it's a phishing website link

The real domain name here is com-cheap.best

I mean, the main website here is https://com-cheap.best

Its extension is .best

Instead of the popularly known .com, .net, .org, ng, etc.

Did you get that?


SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 36

https://cocacola.com-cheap.best

The cocacola.com is just to deceive people to click on the link and get them to take action

The web designer designed main website https://com-cheap.best

Then, created subdomain cocacola to make it

https://cocacola.com-cheap.best

Looking at https here,

It shows the website is secure but,

They have nothing to offer.

From my own personal analysis of the website ‘https://cocacola.com-cheap.best’ during time of


this writing,

I discovered It was just created to generate traffic to a particular website.

Actually, some other phishing website may not secure like the one used as an example.

So, you need to be very careful.

Some other phishing website may be created to collect your data.

➢ Like email address, phone number, date of birth, location, gender, ...
➢ After collection of data from a lot of people, they will organize everything, sell it to
anybody that needs the info.
➢ They may use it themselves,
➢ To target audience for email marketing and the likes.
➢ They may collect your email for newsletters
➢ Whenever you receive text messages like you win 10million or from unrecognized body,
don't blame them, blame yourself because you are the one that filled your phone number
on a particular website. The same thing with email too.

Some phishing website may be created to collect your Bank Account Details, BVN

When you come across any suspicious web link,

▪ Check the link to the website critically.


▪ Fish out the domain name, subdomain and domain extension. You will get it.
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 37

NOTE:

• NOT EVERY WEBSITE LINK WITH SUBDOMAIN IS A PHISHING WEBSITE

FOR EXAMPLE: https://chat.whatsapp.com

‘Chat’ from the link is a subdomain and it is not a phishing website. Because, Main domain
name from the link is whatsapp.com and it’s recorgnised.

• WEBSITE LINK MAY NOT HAVE SUBDOMAIN AND STILL BE A PHISHING


WEBSITE

FOR EXAMPLE:

Assuming it’s something like https://chat-whatsapp-com.xyz

Just pick your race because it’s a phishing site.

1. The link doesn’t have subdomain


2. https://chat-whatsapp-com.xyz there is no dot(.) between the two red lines, it’s hyphen(-)
that connects the words.
3. Its domain extension is .xyz not .com
• ALWAYS CHECK WORDS THAT IS NEXT TO DOMAIN EXTENSION (.com,
.net, .org, .ng, etc.) WHETHER IT’S WELL RECORGNIZED AND NO ANY
MISSED UP
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 38

GUIDES TO STAY SECURED

➢ Never rush to follow a link that comes to your way. Check the link properly, be sure it is
from acclaimed source
➢ Be careful of freebies.

For instance,

When you are asked to follow a link from MTN to win 100gb, you should know that is a
problem.

How can MTN just give even 10gig for free.

Like I said, awoof can kill

Let me give you another instance.

We were talking about social media hacking like this in a physical training. Then, somebody
raised a point a that he was hacked due to the fact he was very anxious to win a plasma TV on
facebook.

He was just asked some simple questions then; he was informed that he won a Plasma TV and
they entered him through that.

Another instance,

there is something called spyware. It's a program that can be used to spy and report actions or
activities on computer.

There was a time somebody sent a VPN application to me for free browsing on smartphone.

Then, I noticed that whenever I was using the VPN on my phone it would just pop-up on my
screen anytime, whether I'm on whatsapp or any other applications.

I just uninstalled it when I thought it might be spying on my activities on phone.

So, you have to be very careful.

➢ Never use your name, your birth year and the likes as password.

There was a day when I was in school, I just collected a friend's a phone then, I unlocked it once,
without stress.

The lady was surprised that how did I know her pin because that was the first time I would be
holding her phone.

I just told her to go and change her pin

How did I discover her pin?


SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 39

It's very simple

I know most ladies do use their year of birth as their pin.

I just looked at her face thought about what her year of birth would be, then, typed it on the
phone and it worked.

➢ JUST BE CAREFUL

THE END

For any question or enquiry contact the author on (+234) 08161354832

Connect with Opeyemi A. Rasaki on whatsapp for valuable discussions on

➢ Smartphone Productivity;
➢ Social Media Marketing Strategies;
➢ Smartphone Operation Maximization;
➢ Personal Development and
➢ Free Masterclass

Follow this link to connect Now!


SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 40

Opeyemi A. Rasaki is a calm and competent individual with high moral rectitude and
ability to achieve set goals, even at the tightest deadline. Also, a versatile individual
with a thorough understanding of Branding, Online Marketing Strategies and
Information and Communication Technology.
He graduated from Osun state university Osogbo with a bachelor’s degree in
Economics Education.

He is passionate about creativity and peer personal development.

He is a smartphone ICT expert; he has trained over 1000 individuals how to be smart and productive
with their smartphone; and how to turn it to money making machine and free from the shackle of
brokenness.

He is a graphics designer, a content developer, a social media marketer and an infopreneur.

He is the Co-founder of MidasPlug Solutions; and the Chief Executive Officer of Rasqopym Konsult,
a multidimensional firm organized for business development.

He can be reached for consultation and freelancing via:

[email protected]
(+234) 0816 135 4832.

You might also like