As you know, you have to pay attention to keeping your accounts on social networking sites enough that you do not know when they may be hacked. Pirates hunt any gap that allows them to break through any account and of course you do not want the target account to be your account. So we’ve compiled 5 important actions to protect your Facebook and Twitter accounts:
1. Keep the screen lock on all your devices
You must always set the settings of any device you use so that the screen will be activated after a very short period of time. You can stop using the device to prevent any intrusion into your accounts if the device is lost or someone around you is not using it. Hack later.
You should also use a strong passcode and keep away from using easy pass codes such as your birthday. It is also recommended to use biometric insurance features such as fingerprints or face recognition if available on your phone.
2. Strong passwords are not duplicate and the attribute of binary authentication
Using a different password for each of your accounts is one of the most important steps to ensure that passwords are strong and difficult to guess, so as to avoid being compromised by using your email address or phone number and guessing multiple passwords with a hacking software.
You can also use the two-factor authentication feature on your Facebook, Twitter and other accounts. A new code will be sent to your phone every time you log in to your account.
To activate the authentication feature in your Facebook account, select “Settings” then “Security and login” and then go to the section “Authentication” and enter the password for your account to activate this feature.
On Twitter, you can activate this feature by going to “Settings and Privacy” and then selecting “Account” and from the “Security” section click on ” Login Authentication “.
Using a different strong password for each of your accounts with dual authentication will help you reduce your chances of getting hacked too much.
3. Control all your devices from anywhere
Most of us use more than one device to access their accounts on social networking sites. For example, you may use your phone when you are outside the home while you use a computer while you are at work, so Facebook allows users to monitor and track the devices they use to access their accounts.
To use this feature in your Facebook account go to Settings and choose “Security and Log In”. You will find a list of all the devices you use to access your account. This includes the types of devices and operating system used and the last date of entry and clarifying whether the device is now active Or you can log out of any device you suspect you did not use to access your account. You can also sign out of any lost device or any device located in a remote location that you can not access.
You can also activate the feature of receiving notifications on your email or Facebook Messenger when you log in to your account from a browser or device that you do not use periodically, and you can activate this feature from “setting up additional security measures within the same security and login” section. The binary authentication feature on your twitter account.
4. Limiting the powers of third party applications
Although it is difficult for hackers to exploit a trusted third-party application to hack your accounts, it is recommended that you review all third-party applications that you have granted access to your accounts and delete any applications you do not need.
You can control the third-party applications that you have enabled to access your Facebook account from Settings and then choose Applications and Websites . In Twitter, you can do so by accessing Settings and selecting Applications .
5. Monitor your personal information about yourself
It is recommended that you reduce the amount of personal information you publish about yourself on your social networking accounts, and close down any accounts you have not used for a long time so that your accounts are constantly the focus of attention and follow-up.
Of course, there is no absolute security to protect against the hack, but following the previous procedures you have done everything you can to secure your accounts against the hack and reduced the likelihood of this happening to a minimum.