Reading Time: 2 minutes

The Twitter accounts of prominent users were hacked to push a bitcoin scam. The compromised accounts include Elon Musk, Bill Gates, Kim Kardashian, Kanye West, Apple, and Uber among others.

Although Twitter has brought the hack under control, it is imperative that you keep your account secure by following these helpful tips.

Use and create a strong password

The use of strong passwords cannot be overemphasized as this is one of the easiest ways to access your account. Ultimately, always remember to change your password.

Activate two-step authentication

Having a secure password is a great first step, but presently, it is not enough to ensure or guarantee water-tight security. According to Twitter, two-factor authentication is an extra layer of security for your account. Instead of only entering a password to log in, you’ll also enter a code or use a security key. This additional step helps make sure that you, and only you, can access your account. To activate two-factor authentication on Twitter, 1.) Click on your Account settings and click Security 2.) Tap Two-factor authentication. 3.) There are three methods to choose from: Text messageAuthentication app, or Security key. 4.) Select any of the methods best suited for you.

Be conscious of shortened links

There are so many posts shared with short links on Twitter. As such, you have to be careful with such links as they could jeopardize your account.

Be careful with third-party apps you connect to your account

To make it easy for you to sign in on a particular platform, you are given the option of signing in with your Twitter account. Many users will simply grant access without a second thought. With the rising spates of online scams, you have to be careful with third-party apps.

Don’t get hooked by Phishing

Phishing according to is a cybercrime in which a target or targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking, and credit card details and passwords.

The most common phishing method used by hackers to steal your information is to build clone websites or pages. By building a clone page that looks exactly like Twitter’s and sending you there, it is easy for someone to capture your login information. You could get an email telling you what is trending, or a news story that is breaking on Twitter. If you’re interested, you’ll probably hit the link and log in. And just like that, your login details will be captured. Don’t fall for these scams. As previously stated, always ensure you check links

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.