Go to listing page

How To Protect Your Social Media Account From Getting Hacked

How To Protect Your Social Media Account From Getting Hacked

Social media has become an indispensable part of our lives now. Our Facebook, Twitter, WhatsApp and Instagram accounts have emerged as our alter-egos. They are a goldmine for hackers with lots of information. So it has become imperative for these platforms to introduce robust security measures which are extremely difficult to crack for any hacker. But equally the responsibility lies on the us to keep ourselves updated of the features provided by these platforms; make best use of them and protect your social media account from getting hacked. One needs to know about these features especially because they are meant to rescue us when we lose our smartphone and want to revoke unauthorized access.

In this Article, we will talk about how you can best utilize features on social media platforms to protect your social media account from getting hacked. The article will deal with Facebook, Twitter, Instagram and mobile messaging app WhatsApp.

Facebook

1. Login Approval

It is a security feature that requires you to enter a code that is texted to your phone when you login from an unrecognized computer. If you ever lose access to your device, you can always return to the previously recognized computer to gain access to your account.Login approvals is a Two Factor Authentication system that requires you to enter a code we send to your mobile phone via text message whenever you log into Facebook from a new or unrecognized computer. Once you have entered this security code, you’ll have the option to save the device to your account so that you don’t see this challenge on future logins.

  • Go to Settings and from their into Security
  • Click on Login Alerts
  • Add your email address or mobile phone number
  • Complete the process by entering the security code you receive on your mobile phone.

2. Trusted Contacts

This feature allows you to set trusted contacts who can help you get access to your account if you get locked out. Following steps will help you to set trusted contacts.

  • Goto Settings and from their into Security
  • Click on Trusted Contacts
  • Choose your trusted contacts

3. Where you have logged in

This feature allows you to know what all devices you have logged in through. You can remove the access to any device you no longer want.

  • Go to Settings
  • Go to Security
  • Click on “Where you have logged in”
  • Revoke access to unauthorized devices

Instagram

1. Keep Your Account Private

Keeping your account Private on Instagram is good trade off against likes from unknown people. It’s always better that only your friends and people whom you approve can see your personal images unless you want to attract stalkers or want to headline the internet with a morphed image.

2. Dont get tagged in Unwanted Images

You can also prevent yourself from being tagged in unwanted photos. This feature is known as Manual Photo Tagging.

  • Go to the Instagram profile section
  • Tap on “Photo of You” (the right most icon below your bio)
  • Tap on the Menu Button on top right
  • Select Tagging Options
  • Select “Add Manually”

3. Remove access to third party apps

Once in awhile you should always check what all apps enjoy access to your instagram account. Its always better to revoke access to apps which you are no longer using.

  • Login to Instagram through Desktop
  • Select “Edit Profile”
  • Click on “Manage Application” on the prompted screen.
  • Manage your apps

Twitter

1.Use login verification

It is a very interesting feature. It is an extra layer of security for your Twitter account. Instead of only entering a password to log in, you’ll also enter a code which is sent via text message to your mobile phone. This verification helps make sure that you, and only you, can access your account.

After you enable this feature, you will need both your password and your mobile phone to log in to your account. When you log in to twitter.com, Twitter for iOS, Twitter for Android, or mobile.twitter.com, you will receive a text message with a six-digit login code to enter. Following steps will help you to start using login verification.

  • Sign into your account from your desktop
  • Go to Drop down menu on profile icon
  • Click Settings → Click Security and Privacy Settings
  • You need to confirm your email before you start using login verification
  • Go to the App on your phone to complete the process

2. Revoke access to the devices which you no longer use

  • Go to Settings → Click Apps
  • A list of all devices having access to your page will be displayed
  • Revoke the ones which you no longer use.

WhatsApp

It uses end to end encryption. So the only case in which your private data can be stolen is when your phone is stolen. To prevent theft of data in such case use a third party app to lock WhatsApp using a pin code. Buy a new sim for the same number and register the same account on the new device. It will automatically deactivate your WhatsApp account on the stolen device.


A universal secret followed by all security experts is to change your password every few months. Moreover, the password should be strong enough to prevent any hacker from breaking into your account easily. You can use random password generators like the one provided by Symantec. And you should not keep the same password for all accounts. Never lay your all eggs (Accounts) in one basket (Password). Instead use password storing apps like LastPass, KeePass and 1Password. All you need to do is to just remember one strong password for the password storing app. Happy Socializing!

Cyware Publisher

Publisher

Cyware