Skip to main content

Social media security



Social media security: How to keep hackers away of your social accounts



Protecting your social media accounts has become critical in an age where hacking appears to be most easiest way to leak public data. When even Mark Zuckerberg himself can be subject to a breach, no-one is immune.
Below are the few steps which will help you to secure your social accounts.

1.       Keep third-party apps to a minimum
Social media accounts can be vulnerable to hacks via third-party applications, It’s therefore a good idea to regularly check the list of third-party apps connected to your account.

2.     Make Good Password Hygiene Easier

·        Change the passwords on social media accounts and third-party management tools per company guidelines (e.g., minimum number of characters, upper- and lowercase letters, letters and numbers included, etc.).
·        Avoid reusing the same password.
·        Verify that the information connected to the account (e.g., email, phone number, etc.) is current.
·        Remove admins who no longer need access.
·        Eliminate apps that no longer need access.
·        Monitor your social media regularly—keep an eye on what’s happening on all your social media platforms.
·        Limit access to only the necessary people—the fewer people with access, the better. This makes it easier to control the posts and avoid any deliberate sabotage.



3.     CHECK YOUR EMAILS FOR SUSPICIOUS LOGINS

Most social media platforms, block any login attempt that they deem suspicious and immediately send an email to the account holder informing them of this attempt and requesting them to change their password. So, keep a close eye at your email and if you get an email that a hacker was trying to access your social media account, change your password right away.


4.     DO NOT CLICK SHORTENED URLS
Think twice about clicking on shortened links, even if you receive it from a trusted source. Sometimes, you may end up doing it, but if your antennae go up, close the web page without clicking anything on the page. This move will protect you from clickjacking that hackers use to gain access to social media profiles and other sensitive information.



Comments

Popular posts from this blog

How to setup Active Directory in Linux using Samba4

Samba version 4 can work as a domain controller which is compatible with Microsoft Active Directory, companies can save licensing cost by switching to Samba4 for Active Directory. I will put below the complete steps. Software Requirements: 1. A latest linux based operating system, I will be using Centos 7 for this example, you can use any flavor of linux  2. We will be using Sernet Samba version 4.2, because the samba package provided in Centos 7 DVD uses MIT Kerberos which does not support Active Directory. Hardware Requirements: 1. A system with at least 1 GB RAM for better performance, at least 10 GB of disk space and a decent processor 2. You can use a desktop class or server class system depending on choice Download Links for required softwares: 1. Download Centos 7 DVD from the below link      CentOS 7 DVD 2. Download Sernet Samba & other required rpm packages      Sernet Samba 4.2 and other dependent packages for...

"samba-tool" to Manage a Linux based Active Directory

A linux based Active Directory server can be managed from a Windows client using the Remote System Administration Tool very easily, and it is the convenient way for system administrators with only Microsoft Windows background. But for administrators who love to use the command line,  "samba-tool" is a great command line tool to manage Active Directory configured on a Linux Box. Throughout this post and on my future posts I will be showing hands-on examples about using the  "samba-tool"  command. User Management using samba-tool Create a new user using samba-tool Syntax: samba-tool user create <username> [<password>] [options] samba-tool user create user1 password --given-name=firstname --surname=surname The above command will create a new user with the name as user1 and password will be password, you can type your desired password. The options --given-name and --surname are to assign user first name and surname. To make the user change ...

Citrix Xen Server Review

Citrix Xen Server The Fantastic Virtualisation Platform At No Cost Friends the IT infrastructure around the world have evolved to Virtualisation because of its flexibility and scalability. There are some big players in the virtualisation segment like VMWARE, Microsoft Hyper-V, and Citrix Xen Servers, etc. All these platforms have free and licensed software to create virtualised data center. All have their pros and cons. But I am writing this post only for Citrix Xen Server which I have been using since last 8 years, and it has given our data center tremendous flexibility, scalability, performance and durability at zero software licensing cost. I think it may be beneficial to other people to share my experience so that they can take a better decision to choose a virtualisation software for their IT infrastructure. Back in 2010 my company had purchased IBM blade servers and SAN based storage to upgrade its data center but without proper planning and after purchasing our company f...