It’s the kind of thing that can happen to anyone. You click a dodgy link, you grant access to a third party app, or someone guesses your password. Just three ways that you might loose control of your Twitter account.
Most people know how important it is to keep their computers up to date and run anti virus software, but are you just as concerned about protecting your social media accounts and identity?
Here, we share six simple ways to help keep your Twitter account secure.
1 – Use a secure password
Whilst we tend to think of hackers as people who use sophisticated programs, trying millions of passwords automatically as they look for the right password, many are able to gain access to accounts simply by guessing common passwords.
Whilst it can be a faff to type in on a mobile device a long (8 character plus) password with a combination of letters, cases, number and symbols, the extra security is surely worth the extra time it takes to type it in.
Stuck for a password? Try our secure password generator.
2 – Turn on Twitter two-step
As well as using your secure password. Twitter includes and optional feature that adds an extra layer of security to your account. It does this by requiring a login verification from a mobile device, the idea being that for someone to gain access to your account, they’d also need your mobile phone.
3 – Be wary of shortened links
Short link services became very popular on Twitter thanks to its 140 character limit, and although Twitters own link shortening service now works automatically, many people still use services such as Bitly and Tinyurl for their tracking abilities.
The problem with this though, is that you can’t quite be sure where that link will eventually take you. That is of course, unless you use a service such as LongURL to check it out first.
4 – Do they really need access?
Whilst you do want your employees to engage with other users on Twitter, the more people have access, and the more devices permanently logged in, the more possible weak spots there are in your account security.
It is a tricky balance to find, though some organisations rely solely upon a single device secured to a desk in an office.
5 – Check your authorised apps
These have contributed to the success of Twitter, allowing you to login to wifi hotspots and other websites using your Twitter account. Unless you know for certain who published that app, you should not grant it access to your account.
It is also a good idea to go through the list of authorised apps from time to time, to clear out the ones you don’t use any more.
6 – Check the URL
It sounds simple, but you’d be surprised how easy it can be to spoof a website, simply by making both it, and the URL look like the real thing. After that, should you login to the fake site, you’ve just handed the hacker your login information.
A quick check of the address bar before typing in any information can make all the difference. You should look out for addresses that don’t seem right – http://twitter.com.fakewebsites.co.uk.