Protecting your Twitter Account (2 Minute Read)

Article author
Betty Fleming
  • Updated

When it comes to securing your Twitter account, Twitter's Help Center provides a thorough list of tips and instructions to prevent against phishing and hacking. We'll highlight several of them for you here.

 

1. Turn on 2 Step Verification

Turning on 2SV/MFA is always the best form of defense against hacking attempts.

 

Screen_Shot_2021-12-13_at_12.16.32_PM.png

Step 1: In the side menu, click More, then click Settings and privacy.
Step 2: Click on Security and account access, and then click Security.
Step 3: Click Two-factor authentication.
Step 4: There are three methods to choose from: Text messageAuthentication app, or Security key.
Step 5: Once enrolled, when you log in to your account, you'll be prompted to provide the two-factor authentication method you used during your previous login, along with your password. You’ll also see the option to Choose a different two-factor authentication method. If you’d like to proceed, simply click the prompt to select a different method. Follow the onscreen instructions to finish logging in.
 
 
2.

 Twitter will never ask you to provide your password via email, Direct Message, or reply.

It's important to note that, if you receive an email asking you for your Twitter password, it is not coming from Twitter, and is a phishing email. Don't click on any links contained in these emails, or give any personal or account information. 

They will also never ask you to download something or sign-in to a non-Twitter website. Never open an attachment or install any software from an email that claims to be from Twitter; it's not.


If they suspect your account has been phished or hacked, they may reset your password to prevent the hacker from misusing your account. In this case, they'll email you a twitter.com password reset link.


If you forget your password, you can reset it via this link.

 

3. Keep your computer and browser up-to-date and virus-free
Keep your browser and operating system updated with the most current versions and patches—patches are often released to address particular security threats. Be sure to also scan your computer regularly for viruses, spyware, and adware.

If you're using a public computer, make sure you sign out of Twitter when you're done.

 

4. Select third-party applications with care

There are many third-party applications built on the Twitter platform by external developers that you can use with your Twitter account. However, you should be cautious before giving third-party applications access to your account.

If you wish to grant a third-party application access to your account, we recommend that you only do so using Twitter’s OAuth method. OAuth is a secure connection method and doesn’t require you to give your Twitter username and password to the third party. You should be particularly cautious when you're asked to give your username and password to an application or website, as third-party applications don’t need your username and password to be granted access to your account via Oauth. When you give your username and password to someone else, they have complete control of your account and can lock you out or take actions that cause your account to be suspended. Learn about connecting or revoking third-party applications.

We suggest you review third-party applications that have access to your account from time to time. You can revoke access for applications that you don't recognize or that are Tweeting on your behalf by visiting the Applications tab in your account settings.

 

5. Get Blue Check Verified

The blue Verified badge  on Twitter lets people know that an account of public interest is authentic. To receive the blue badge, your candidate's or state party account must be authenticnotable, and active.

Here is how you can apply for verification:

On web, navigate to Settings and privacy Your account > Account information. Once you enter your password, go to Request Verification. On Android and iOS, tap on Settings and Privacy > Account > Verification request. Please read the criteria below to understand if your account qualifies. For more information about the verification process, including eligibility details, visit this FAQ article.

 

 

Learn More: Protecting your Instagram and TikTok Accounts (1 minute read), Protecting Your Facebook Account (2 minute read & video), What is MFA/2FA/2SV and Why is it Important? (3 Minute Read)

 
 
 

Was this article helpful?

0 out of 0 found this helpful

Have more questions? Submit a request

Comments

0 comments

Please sign in to leave a comment.