(727) 692-7055
Pentasys Corporation
  • Home
  • About Us
    • Our Clients
    • Our Methodology
    • Our Partners
    • Our Projects
    • Our Team
  • Services & Solutions
    • Network Support
    • Managed Services
    • Business Continuity & Disaster Recovery
    • Security
    • Development Services
    • Cloud Solutions
    • Business Consulting
  • Blog
  • Client Portal
  • Contact Us
  • Menu Menu

Leave no room for hackers to operate

Security

For most people, social media is a convenient way to stay in touch with family and friends. For a small group of people, it’s an opportunity to profit off other people’s trust. Here are some things you can do to continue enjoying Facebook and Twitter without compromising your privacy.

Lockscreens exist for a reason

Make sure all your computing devices lock the moment you stop using them. This way, you are safe from the simplest hack of all: someone opening a browser on your computer that has your social media login saved. As long as your password isn’t your birthday or anniversary, you’ll be forcing hackers to work for access to your account.

Strong passwords are never out of fashion

Unlocking your phone may be limited to a six-digit passcode, but you’ll need something much more complicated for your account password. The first thing you’ll need to do is create a password that isn’t used for any other account. Because data breaches have become such a regular occurrence, hackers probably have a long list of your favorite passwords from other websites and platforms.

In this case, it is best to use a password manager like an app or online service that allows you to generate and retrieve complex passwords.

Another thing you can do is enable something called two-factor authentication, which requires you to type in a secondary code sent to your phone. Even if hackers have your password, they won’t be able to log in without your phone.

Make use of social media features

Facebook offers functions that help you keep tabs on who’s accessing your account and from
where. To use this feature, click the down arrow in the upper right corner of your Newsfeed and select Settings. Then click Security and Login to get more information. If you sense an imposter, click the right-hand icon to give you the option of logging out remotely or reporting the person.

From there, turn on Get alerts about unrecognized logins to be notified via Facebook, Messenger, or email if someone is logged into your account from an unrecognized browser. Unfortunately, Twitter doesn’t have the same option (that makes the two-factor authentication extremely necessary).

While it may be difficult for a hacker to barge into your Facebook or Twitter account through a third-party service that you have given access to your profile, it’s still advisable that you check what you have approved.

  • Facebook: Go to Settings > Apps and Websites to view and manage outside service with access to your account
  • Twitter: Go to Settings and Privacy > Apps to check and edit the list

Last, be sure to check the permissions mobile apps like Facebook and Twitter have on your smartphone or tablet.

  • Android: Go to Settings > Apps > tap the icon in the upper right and then tap App permissions
  • iOS: Go to Settings > Privacy to manage which service can access which parts of your phone

Less personal info, fewer problems

These steps are just the beginning of what you should be doing. The next thing you should consider is limiting the personal data you input into your social media accounts. If you have to put a ton of information, then be sure you read this blog from the top.

With a little practical knowledge, you can prevent Facebook and Twitter hackers from doing what they do. Cybersecurity is a sprawling issue and social media privacy is such a small sliver of what you need to stay on top of. For 24/7 support, call our team of experts today.

Published with permission from TechAdvisory.org. Source.
May 17, 2018/by Pentasys Corporation
Tags: 2018may17security_c, android, apps, facebook, ios, login, privacy, security, settings, twitter, two factor authentication
Share this entry
  • Share on Facebook
  • Share on Twitter
  • Share on WhatsApp
  • Share on Pinterest
  • Share on LinkedIn
  • Share on Tumblr
  • Share on Vk
  • Share on Reddit
  • Share by Mail
https://www.pentasys.net/wp-content/uploads/2018/05/2018May17Security_C_PH.jpg 300 900 Pentasys Corporation https://www.pentasys.net/wp-content/uploads/2015/12/logo.jpg Pentasys Corporation2018-05-17 20:00:302018-05-23 02:14:14Leave no room for hackers to operate
You might also like
5 tips for using Facebook reactions
Chrome: From HTTP to HTTPS
Facebook announces News Feed change
Hackers use browsers to get credit card info
How to leverage social media effectively
Is two-step authentication the only way?

Recent Posts

  • Assess risks before buying new softwareJuly 5, 2018 - 8:00 PM
  • What to do in case of a website breachJune 28, 2018 - 8:00 PM
  • SMB routers targeted by VPNFilter malwareJune 20, 2018 - 8:00 PM
  • Apple WWDC 2018: News and updatesJune 19, 2018 - 8:00 PM
  • Hide & Seek malware: What you need to knowJune 15, 2018 - 8:00 PM
  • Chrome: From HTTP to HTTPSJune 14, 2018 - 8:00 PM

Post Categories

Archives

Say goodbye to complex IT holding your business back

We make IT simple

Get IT Support that works

Interesting links

Here are some interesting links for you! Enjoy your stay :)

Pages

  • Home
  • About Us
  • Services & Solutions
  • Blog
  • Citrix Demo
  • Contact Us
  • FREE Security Assessment
  • Privacy Policy
  • Support Center
  • Thank You!
  • Network Support
  • Our Clients
  • Managed Services
  • Our Methodology
  • Business Continuity & Disaster Recovery
  • Our Partners
  • Our Projects
  • Security
  • Development Services
  • Our Team
  • Cloud Solutions
  • Business Consulting

Categories

  • Apple
  • Business
  • Business Continuity
  • Business Intelligence
  • Business Value
  • Google
  • Healthcare
  • Internet Social Networking and Reputation Management
  • Office
  • Security
  • Social Media
  • Web & Cloud

Archive

  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
© 2023 Pentasys Corporation All Rights Reserved. | Website Hosting by K.Tek Systems Inc.
  • Privacy Policy
How to make social media marketing work for youCan AI empower customer service agents?
Scroll to top