- Plastic examples of possible risks in dealing with social media
- Helpful tips for a sovereign appearance in social networks
- Clear indications for the separation of private and professional appearance in the net
- Effective information on secure privacy settings
- Knowledge on how to deal with negative reactions in social media More info
7 Course Chapters
Every course module you find here can be used as a short learning unit – also called Learning Nugget. Do you have any questions about the course content? – We would be glad to help you.
Course Insight
Safe use of social media
It's hard to imagine our lives without social media. Whether it's posts about the latest promotion or a job change, photos of dinner with friends or the last family vacation, social media gives us the opportunity to stay in touch with the whole world and let them share our lives. But using social media is not without risk. That's why it's all the more important to use it safely.
Social media - a risk for users and companies
Whether it's fraud, identity theft or other forms of cybercrime, criminals have long since recognized social media for their dirty tricks. This does not only result in dangers for individuals. Companies are also exposed to them if their own employees do not exercise the necessary caution when dealing with social media. This is because sensitive content, in particular, can all too quickly find its way onto the Internet in this way. It's no wonder that social media is also an excellent arena for social engineering. Reason enough to educate people about the risks of social media and to actively train them in the safe use of social media.
Train employees in the use of social media
To ensure that employees and managers know and understand the dangers lurking in social media, Security-Island uses case studies to create a practical context. In our e-learning "Safe use of social media", participants learn how to reduce potential damage through simple measures. These include specific privacy settings as well as the correct handling of contact requests.