Thus it seems necessary for the users of Twitter to fortify themselves. This is to ensure that the security of ourselves when it was busy singing terkamin in this blue bird site. Here are 10 tips to play safe by Ema Linaker Twitter, AVG Global Head of Online Engagement:
1. Limit your talk
Use Twitter to easily allow users to easily perform common Tweet about their location and activities. However, users are often unaware that their account is a public account (not protected or restricted), then everyone could see that they Tweet.
The comments provided in response to light from Tweet the long run could be used to determine the daily schedule of activities and plans for that user. Criminals can use this to make that user the next victim.
2. Be careful Link Opens
Be careful opening the link or links you get. Many people who use a URL shortening service on Twitter, so it is often difficult to actually find the sites you visit.
Web security products do allow you to check these links. However, the most important thing is to keep in mind that if there is any doubt about the links you get, you should not be opened!
3. Beware!
Beware of suspicious activities on the timeline or your inbox. When you start getting suspicious messages or friends you start a Tweet or send messages of smell spam, you should confirm in advance whether your partner's account had been targeted by hackers or perengkah.
4. Think Before Posting
Tweet you can read by all people around the world. Even when removed, Tweet you can still be seen by using the search engine. Think carefully what you write, because the consequences of your writing will probably further than you expected. Using hashtag will also facilitate the search for your Tweet.
5. Do not Hurry Believe
You never know who you are in a twitter follower. Do not easily believe in and make friends with people who may have bad intentions.
6. Check carefully Third Party Applications
There are hundreds of applications that you can use in Twitter. Before you use these applications, make sure that their security. Look for a lot of applications are discussed in the trusted sites. Remember that these applications often require your username and password.
7. Password Information
Use a different password for each account on your social networking. If you want more secure, create different e-mail to the accounts of your social network. That way, when you close your social networking account, you can easily delete the e-mail account.
8. When Log in
Check your browser settings you use. Make sure that your information is not recorded when you use the computer together.
9. Beware of Phishing Attacks
Beware of attempts to obtain your personal information through a Tweet or Direct Message (DM) is deceiving.
10. When Using Cell Phones
Be careful with your cell phone and anyone who can use them. If you have a Twitter application, make sure you always log out after you use it.
Labels: Internet News