Recent news of Twitter accounts being hacked has slowed a bit, partly due to Twitter implementing two-factor authentication. When you sign in to Twitter.com, there's an option in "Settings" under "Account security" for a second check to require a verification code to make sure it's really you. You'll be asked to register
. To get started, follow these steps:
- Visit your account settings page.
- Select "Require a verification code when I sign in."
- Click on the link to "add a phone" and follow the prompts.
- After you enroll in login verification, you'll be asked to enter a six-digit code that Twitter will send to your phone via SMS each time you sign in to www.twitter.com.
In cases where more than one person accesses the same Twitter account, Twitter's two-factor authentication is less effective. Create an open dialog with fellow account holders and share second-factor authenticating identifiers via text.
Some more tips:
- Limit the number of people that have access to your account.
- Use a strong password.
- Use Twitters login verification.
- Watch out for suspicious links, and always make sure you're actually on Twitter.com before you enter your login information.
- Never give your username and password out to untrusted third parties, especially those promising to get you followers or make you money.
- Make sure your computer and operating system is up to date with the most recent patches, upgrades and anti-virus software.
- Beware of phishing. Phishing is when someone tries to trick you into giving up your Twitter or email username and password, usually so they can send out spam to all your followers from your account. Often, they'll try to trick you with a link that goes to a fake login page.
- Beware of typosquatting or cybersquatting. Typosquatting, which is also known as URL hijacking, is a form of cybersquatting that targets internet users who accidentally type a website address into their web browser incorrectly. When users make a typographical error while entering the website address, they may be led to an alternative website owned by a cybersquatter.
- Beware of short urls. Before you click on shortened URLs, find out where they lead by pasting them into a URL lengthening service, such as URL Expanders for Internet Explorer and URL Expanders for Firefox.
10. Use aVPN (Virtual Private Network). Protect your private information and sensitive data from snoopers and hackers while surfing the web at WiFi hotspots, hotels, airports and corporate offices with
Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America. Disclosures.
REAL LIFE. REAL NEWS. REAL VOICES.
Help us tell more of the stories that matter from voices that too often remain unheard.