An official website of the United States government
Here's how you know
Official websites use .gov
A
.gov
website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A
lock (
lock
)
or
https://
means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Toggle navigation
Chief Information Officer
U.S. Department of Defense
Chief Information Officer
Search
Search Chief Information Officer:
Search
Search Chief Information Officer:
Search
Home
About DoD CIO
Bios
History
Organization
CXO
DCIO C3
DCIO CS
DCIO IE
DCIO R&A
Library
Cyber Workforce
DoD Cyber Workforce
Strategy
Framework
Management
Cyber Excepted Service
CDAO
CIC
Cyber Service Academy
CITEP
For DoD Participants
For Industry Participants
CITEP Resources
Resources
Contact
CMMC
About
Resources-Documentation
FAQs
Contact
Contact us
Social Media Education and Training
MENU:
General/Mixed Topics
|
Operations Security (OPSEC)
|
Specific Social Media Guides
|
Service-Specific
|
Threat-Specific
|
Records Management
General/Mixed Topics
Standards of Conduct as Applied to Personal Social Media Use
– Office of Government Ethics Legal Advisory 15-03
OnGuardOnline.gov
– Online safety portal managed by the Federal Trade Commission
Internet Social Networking Risks
– FBI tips for mitigating risks when using social media
Information Assurance Education, Training and Awareness
– From the Information Assurance Support Environment (IASE)
Privacy Best Practices for Social Media
– Created by the Federal CIO Council [PDF]
Best Practices for Keeping Your Home Network Secure
– From the Information Assurance Mission at NSA [PDF]
Back to Top
OPSEC
OPSEC awareness training
– Provided by DoD Center for Development of Security Excellence
Organizational Level OPSEC: Vulnerabilities And Indicators
[Slides]
Your Safety and Security Online
– A “One-Pager” of Safety Tips [Slides]
Social Media Cyber Security Awareness Briefing
[Slides]
OPSEC Snapshot
– The threat is real [Slides]
Back to Top
Specific Social Media Guides
Blogging:
Blogging in Plain English
[Video]
Getting Started With Blogging
– A guide for creating Official Pages [Slides]
Facebook:
Facebook Page Admin Roles
Building your presence with Facebook Pages: A guide for educators
[PDF]
Building your presence with Facebook Pages: A guide for governments
[PDF]
Building your presence with Facebook Pages: A guide for military organizations
[PDF]
Step-by-step guide to lock down your Facebook profile
Facebook Farmville Security Compromise
– Includes a "Facebook App Hall of Shame" [Blog, 2011/03/30]
Page Post Scheduling
[Facebook guidance]
Promote Your Page Posts
[Facebook guidance]
Flickr:
Getting Started with Flickr
[Slides]
Flickr privacy settings
Twitter:
Twitter in Plain English
[Video, 2008/03]
How To Tweet
[Slides]
Connecting your mobile device to Twitter
[Slides]
Advertising Your Twitter Account
[Slides]
YouTube:
Getting Started With YouTube
– A Guide for Creating Official Pages [Slides]
Customizing Your YouTube Channel
[Slides]
Tips and Tools for YouTube
[Slides]
YouTube Uses in the Field
[Slides]
Back to Top
Service-Specific
Army:
US Army E-Learning Program
[Once registered/logged in, type "Social Media" in the search bar and then click on the "Courses" link to display over 21 courses on a variety of topics.]
Navy:
US Navy Social Media Landscape Overview
Air Force:
Navigating the Social Network
– The Air Force Guide to Effective Social Media Use [PDF, June 2013]
Back to Top
Threat-Specific
Exploitation of Irrational Trust:
The Robin Sage Experiment
[Blog, 2010/09/06]
Geo-Tagging:
How to disable a smart phone's geotagging feature
Geotagging poses security risks
[Army.mil article]
Geotags and Location Based Social Networking
[Slides]
Geotags invade privacy and OPSEC
Hatch Act:
Hatch Act Social Media and Email Guidance
Identity Theft:
Fighting Back Against Identity Theft
[Consumer information website with video and PDF downloads.]
Identity Theft: What to Know, What to Do for Military Personnel and Families
[PDF trifold]
Malware:
New Breed of Social Media Threats and Sophisticated Targeted Attacks
[Article and embedded video, 2011/03/29.]
Phishing Awareness:
Phishing Scams
– Will you take the bait or live to swim another day? [Game]
Spyware:
Malware Overview
[Consumer awareness website]
Beware of Spyware
[Interactive Game]
Back to Top
Records Management
Procedures for Archiving Social Media Accounts of OSD Components
[PDF]
Toolkit for Managing Electronic Records
[Website with links resources]
Records Management Training
[National Archives and Records Administration Training Program portal]
Social Media Records Management Training
[NARA PPT on MAX Portal - requires MAX account]
Are these Records?
– Discussion on agencies' recordkeeping responsibilities when using web 2.0 and social media tools. [Blog, 2010/11/02]
Back to Top