There has been report of Pictures and Videos leaking on the internet. Many people have complained of their private conversations, pictures and videos being posted out. This is the work of Hackers. Hackers have increased over time and are causing a lot of worry.
There have been several tips given to avoid such mishap. Here are a few to keep you and your data secure if your data has been compromised. Here is a quick rundown of the steps you need to follow to secure your online presence.
Something I found fascinating on Facebook is “Login Verification” and alerts but there are a bunch of additional options; one is setting trusted contacts (these are the people who can help you get access to your account if you get locked out) and you can see which browsers and apps you are signed in from.
One very useful feature you will find in the security settings page is ‘where you logged in’. That is, you forget to sign out on any device you last signed in. You can use this option to sign out from any devices- just click the link that says “End Activity”. If you head to the help page, Facebook offers a handy wizard- style security checkup that will show you old logins, let you sign out with one click, review your alerts and give you password tips.
Instagram seem to be another platform where Hackers can easily gain access to your photos. You might not want everyone in the world to see and comment on your Instagram photos. If you want only those who follow you see your photos, there is a simple way you to make your Instagram account private, this includes sending your photos directly to a contact on your Instagram account even new followers will require approval from you.
The other security feature you should activate is Manual Photo Tagging. Go to the Instagram profile section and tap on the Photo of you which is the last icon below your bio, tap on the menu button on top right and select tagging options. Here you can enable ‘Add Manually’- this will prevent you from being tagged in unwanted photos.
You have given third- party apps access to your Instagram account. To manage these apps, you will need to login to Instagram on a computer and select ‘Edit Profile’. In the settings page that opens up, you will see Manage Applications section where you can revoke access for unwanted apps.
One of the best thing about WhatsApp now is the end- to –end encryption to secure your chats.
Encryption is the most effective way to achieve data security. To read an Encrypted file, you must have access to a secret key or password that enables you to decrypt it. Believe me when I say NO ONE will be able to access your chats when encryption is on. Fortunately, encryption on WhatsApp is by default.
Unfortunately, the most common mishap is losing your phone. Anyone with the phone can impersonate you to extract funds from your contacts. He/She will have full access to your WhatsApp account which may include photo, videos, personal information and messages. To prevent this, lock WhatsApp with a PIN, mind you, third-party apps will be needed to do this.
In case of theft of phone with an unlocked WhatsApp account, get a new SIM immediately and use it to register with WhatsApp on another device, this will instantly deactivate WhatsApp on the other phone.
Apart from changing your password often, one of the easiest things you can do to secure your Twitter account is to use “Login Verification”.
Once you sign in to Twitter on a computer, from your profile icon drop down menu, click Settings and then Security & Privacy Settings.
Before you can use login verification, you will need to confirm your email ID.
You can use the iOS or Android app to complete the process. Once in a while, also head to Twitter’s settings page and click Apps. In the Apps, you can check which Apps and devices have access to your account.
Some may be from a couple of years ago on older devices, you should revoke access to the ones you no longer use or recognize.
There are other means of keeping your devices safe for example, phone trackers, back ups and most importantly,
“LOCK YOUR PHONES”