You can be hacked as long as you are on the internet. With an estimated 2.65 billion users of social media, these apps are the main goals for hackers.
Although companies such as Facebook, Snap and Twitter perform formidable work against the waves of attacks they receive every day, they are not impenetrable. So don't just rely on them, take the time to set up your own defense.
: Use an email from the burner
Most social media apps ask for an email address when they sign up. Email services are a haven for cyber attacks, and if yours is compromised, hackers can reset your password to gain full access to your account and the ability to lock you.
You can closely protect your primary email address, or you can simply use a disposable email address. You avoid all spam emails sent by the social media site and if the address has ever been compromised, you can simply throw it away and use another one with your social accounts.
While you can create a free fake email address with major email providers such as Gmail, Yahoo, and Outlook, we recommend the & # 39; Temp Email & # 39; app to use. With this app you can create a clear fake email that can be created (and destroyed) in seconds. See how it works below!
Sharing your real number online is a bad idea – only do it if you are ready for robocalls, spam or maybe even stalkers. And if they know your phone number, a hacker can start the process of SIM-jacking, a recent exploit to take over your phone number (and, by extension, your accounts).
A great way to combat this is to use a burner number. Using an app (you can find our top choices on the link below), you create a temporary number that can be deleted at any time. Use this number to create accounts and update existing accounts to be linked to this number. If you don't need it, just burn it.
Tip 3: Lock your social apps in password-protected folders
Not all threats come from far – often our accounts are hacked by people around us. Your first line of defense against this is a strong password. But to be extra safe, you have to add layers.
A folder with password protection provides a second layer of protection by placing certain apps in a vault. Apps in the vault are only accessible with a password that can (and must) differ from the lock screen code of your phone.
Although there are third-party apps such as IObit to help you with this, some phones come with this built-in feature, such as Samsung & # 39; s Secure Folder and BlackBerry & # 39; s Locker. Whatever the case may be, the extra security layer helps you against local threats.
Tip 4: use two-factor authentication (no two-step authentication)
Most social media apps have two-factor authentication (2FA), a security protocol that requires two different factors to log in. This can be something that you know, something that you have or something that you are. For example, a password can be something that you know, while a USB security key is something that you have.
2FA should not be confused with two-step verification (2SV), which also requires two factors, but unlike 2FA are two factors from the same category. Although two-step and two-factor are sometimes used interchangeably, they are not the same – true 2FA is better.
One of the best ways to add 2FA to your accounts is by using a 2FA app. These can serve as a software-based security key (something you have) without the vulnerabilities that occur with SMS code systems. If you want a recommendation here, view our full review of 2FA apps below. Otherwise you can learn how to set 2FA on your accounts .
Tip 5: Get a good password manager
Your first line of defense against every attack is your password . Although your username or e-mail address is likely to be easily found by someone else, your password is something that only you need to know. Before a hacker even has to worry about secondary factors, he has to retrieve your password.
The problem is that most people's passwords are terrible. A password manager can help you with this by storing all your complex passwords and automatically entering them in your apps when you need them. The passwords are stored in an encrypted database, which itself is protected by one main password. You have to learn the master password, but because it is only one password, it should be easy enough to remember.
One of the first indications you encounter when you first open the camera app, it is whether you want to enable geotagging. While this feature is great for recalling memories, it is also a gateway for hackers or stalkers trying to learn your movements.
Open the settings of your Camera app and make sure that "geotagging" or "location services" (or similar) is disabled. You also want to turn off location permission for social media apps if you often take photos from the social app instead of your standard Camera app.
Just because you stop using an account, this does not mean it will stop. Unattended accounts are a goldmine for hackers because they have almost an unlimited amount of time to break into the account. Once they have gained access to your account, they can activate it again and cause destruction.
So delete any account that you are not currently using. Use the tools provided by the platform to delete the account and make sure you delete all your data before deleting it. Usually, deleting a social media account has a period before the termination takes effect, so there is no data to steal during that time.
This article was produced during Gadget Hacks special news about an expert on social media on your phone. View the entire social media series.
Don't miss it: The 5 best phones for social media addicts in 2020