Once here, go to ‘The Basics’ menu on the left side of the page and click on ‘Customizing your experience’:
It is helpful to go through each of these menus to understand the differences between protected and unprotected tweets, as well as how to be able to approve your followers. Another helpful page is their Safety & Security tips:
Pay special attention to the ‘Protecting your personal information’ page as it has detailed steps about how to protect your personal information in your account, how to have your personal information removed if someone else posts it and keeping your account secure. One particular page to note is how to turn off tagging for pictures that you post:
Google is now offering a program to help protect those most susceptible to online attacks. The service has phishing security features, as well as strong data protection for email and file storage and better control of blocking fraudulent access to your account. You can sign up for this service here.
We wanted to end the year with a new beginning…a series of posts about various ways to better secure your online presence. We’ll first start with a series on general computer security (the how and the why), and then dive into your mobile devices. This is not intended to be a definitive guide, but rather a baseline to help you get started and have some immediate positive impact. This first post is your basic ‘recipe’ of security ingredients, courtesy of the ID Theft Center . Hope that you find it useful!
Overall security/privacy recipe
Check Privacy and Security settings for any application that you use. Ensure they are set to meet your preferences.
Be careful how many apps that you download on your devices. Too many can be difficult to manage and leave holes in your privacy/security unnoticed.
Choose a strong and different password for each application. Store them in an encrypted vault like KeePass (https://keepass.info/) or LastPass (https://www.lastpass.com/).
If the application offers a second form of authentication, use it! This could be as easy as texting a passcode to your phone or sending you an email.
Use the least amount of information necessary to register for and use the site. Be careful when picking a screen name – make sure it doesn’t provide clues to your “identity.”
Be wise about what you post. Never post personal information such as your address, phone numbers, e-mail address, driver’s license number, Social Security Number (SSN), birth date, birth place, school’s name, or student ID number. When blogging, do not disclose your location for any given day or the exact location for an event you are going to attend.
Only connect to people you already know and trust.
Verify emails and links in emails you supposedly get from your social networking site. These are often designed to gain access to your user name, password, and ultimately your personal information.
Install a firewall, reputable anti-spam and anti-virus software to protect your information– and keep it updated.
Keep your system up to date on updates. This helps reduce the risk of any technical vulnerabilities that can be exploited on your system or device.
Use two-factor authentication for any service that you use that offers it. This will entail having an additional way to identify you above and beyond your password (such as texting a code to your cell phone).