{"id":928,"date":"2013-01-21T10:00:39","date_gmt":"2013-01-21T15:00:39","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=928"},"modified":"2019-11-15T15:26:40","modified_gmt":"2019-11-15T11:26:40","slug":"protect-your-twitter-account","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/protect-your-twitter-account\/928\/","title":{"rendered":"Protect Your Twitter Account"},"content":{"rendered":"<p>Twitter is an essential part of anyone\u2019s brand these days, whether you\u2019re a small company, a media mogul or someone who simply likes to share her views with anyone willing to listen.<\/p>\n<p>But everyone from celebrities such as Barack Obama and Britney Spears to major international organizations such as British Petroleum and <a href=\"https:\/\/threatpost.com\/en_us\/blogs\/after-twitter-hack-ny-times-debates-social-network-security-092310\" target=\"_blank\" rel=\"noopener nofollow\"><em>The New York Times<\/em> have had their Twitter accounts hacked<\/a>. These are breaches of security that aren\u2019t just embarrassing, but can also cripple a user\u2019s reputation and credibility.<\/p>\n<p>So how can you make sure that your tweets \u2013 or those of the brand you\u2019re managing \u2013 remain your own?<\/p>\n<p><strong>Use Strong Passwords<\/strong>: Don\u2019t make your password your dog\u2019s name or your mom\u2019s birthday. Don\u2019t make it \u2018password,\u2019 \u2018admin\u2019 or some other key that will be just as easy for a stranger to figure out as it is for you to remember. In fact, any word found in the dictionary is not safe. Adding numbers to words is a start, but kick it up a notch: Think of a phrase that is something you are likely to know or remember but that isn\u2019t widely known by others. If you can remember it, mix in some non-alphanumeric symbols. Extend this practice to all of your online accounts, whether banking, social media or email.<\/p>\n<p><strong>Watch Out for Phishing Pages<\/strong>: Why would an attacker try to guess your password if he can trick you into simply giving it to them? He wouldn\u2019t. Which is why you should constantly be on the lookout for phishing scams that ask you for your password or any other sensitive information. If you get an email prompting you to reset your password but you didn\u2019t request that email, don\u2019t click through. And be careful about clicking through on links from URL shorteners like bit.ly, which have become the unwitting conduits for scammers who want to mask the final destination of that click.<\/p>\n<p><strong>Stop Using Infected Computers<\/strong>: Users whose systems are infected sometimes think they can continue to use their computer because they are still able to access their email and various applications even though their computer has clearly been compromised. Well, guess what. If you\u2019re still able to do your thing on your infected system, others are doing their thing on it too. Stop. Take immediate actions to disinfect your system. Better yet, avoid getting infected in the first place. Keep your applications \u2013 your web browsers, browser plug-ins, software suites, etc. \u2013 updated to the latest versions.<\/p>\n<p><strong>Don\u2019t Use Public Computers<\/strong>: If it\u2019s not your personal computer, don\u2019t use it to access personal accounts. You have no idea what kind of malware or malicious scripts are running on hotel or airport business center computers or even your friend\u2019s laptop. Be smart. Stay safe.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Twitter is an essential part of anyone\u2019s brand these days, whether you\u2019re a small company, a media mogul or someone who simply likes to share her views with anyone willing<\/p>\n","protected":false},"author":32,"featured_media":935,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[187,192,83],"class_list":{"0":"post-928","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-passwords","9":"tag-protection","10":"tag-twitter"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/protect-your-twitter-account\/928\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/protect-your-twitter-account\/928\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/protect-your-twitter-account\/928\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/protect-your-twitter-account\/928\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/protect-your-twitter-account\/928\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/protect-your-twitter-account\/235\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/protect-your-twitter-account\/928\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/protect-your-twitter-account\/928\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/passwords\/","name":"passwords"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/928","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=928"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/928\/revisions"}],"predecessor-version":[{"id":15057,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/928\/revisions\/15057"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/935"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=928"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=928"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=928"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}