Blog Layout

Safeguarding your social media from hackers

Apogee Compliance Group • Aug 16, 2019

Recent Posts

By Apogee Compliance Group 01 Jul, 2020
The question of monitoring your employees’ computers is a tricky one. Some say such a practice is unethical. But it can also be a way to prevent data breaches. Find out the pros and cons of monitoring your employees’ online behavior by reading this blog. And should you decide your business needs employee monitoring, we […]
By Apogee Compliance Group 26 Jun, 2020
Advances in IT have transformed paper medical records into digital files that can easily be accessed and stored. Sadly, this development has also resulted in sensitive healthcare data, or personal health information (PHI), becoming a bigger target for hackers. Because of this, healthcare providers must remain vigilant against all forms of cyberattacks. From financial information […]
By Apogee Compliance Group 24 Jun, 2020
Cutting costs is great for business, but only if doing so does not result in lower-quality products or services. You can achieve this kind of compromise in your IT system, too. Instead of investing in expensive computer hardware, you can opt for affordable but powerful thin and zero clients. What are thin and zero clients? […]
By Apogee Compliance Group 17 Jun, 2020
Most people don’t question the padlock icon that sometimes appears in their web browser’s address bar. If you’re one of those who didn’t know, it’s a security feature that authenticates websites and protects the information users submit to them. Another indicator you’re in a secure site is the HTTP before the site’s URL. But why […]
By Apogee Compliance Group 15 Jun, 2020
IT services are more critical than ever before, proving their value in the face of a health crisis and the abrupt shift to remote working. Here are some ways managed IT services providers (MSPs) are helping small companies leverage technology to support their remote teams and go about business as usual. Providing infrastructure and service […]
By Apogee Compliance Group 10 Jun, 2020
If you have an Android device, be careful! An exceptionally dangerous Android malware known as DEFENSOR ID is currently making the rounds in the Google Play Store. The malware exploits the Accessibility Services in an Android device to evade detection by traditional security measures. This threat can put your data and business in jeopardy, so […]
By Apogee Compliance Group 03 Jun, 2020
Residential Wi-Fi connections are slower and less reliable than enterprise-grade ones. But now that more people have shifted to remote work, having a fast and stable wireless connection at home is more important than ever. What can you do to ensure you don’t suffer dropped Wi-Fi signals while you’re in a videoconference or finishing up […]
By Apogee Compliance Group 27 May, 2020
With the COVID-19 pandemic, many business owners are cutting costs and jeopardizing their organization’s efficiency as a result. If you want to avoid this outcome, you should invest in cloud technology. The cloud will not just help you save money, but it will also help your business run more efficiently. Ensuring continuity and efficiency with […]
By Apogee Compliance Group 25 May, 2020
Many small- to medium-sized business (SMB) owners never expect a major crisis to hit their company and are often caught flat-footed when it does. Such events can cause downtime, which can lead to lost revenue and reduced profits. In addition, SMBs that fail to recover quickly from disruption face the risk of losing their customers […]
By Apogee Compliance Group 20 May, 2020
When it comes to cybersecurity, you probably think of protecting computers, apps, or online databases first and printers last. Precisely because they’re overlooked in, printers can be exploited by hackers and used as a gateway to infiltrate your systems. Secure your networks against intruders by following these steps. What makes business printers vulnerable to cyberattacks? […]
Safeguarding your social media from hackers

Social media phishing is on the rise. Facebook is one of the most commonly impersonated brands in phishing attacks. Hackers now employ more sophisticated tactics, so you must strengthen your privacy settings to keep them away.

Lock screens exist for a reason

Lock all your computing devices as soon as you stop using them. This way, you are safe from the simplest hack of all: someone opening a browser on your computer that has your social media login saved. 

Strong passwords are never out of fashion

Unlocking your phone may be limited to a six-digit passcode, but you’ll need something much more complicated for your account password. Create a password that you don’t use for any other account because with the regular occurrence of data breaches, hackers probably already have a long list of your favorite passwords from other websites and platforms. 

It is best to use a password manager like an app or online service that allows you to generate and retrieve complex passwords.

You can also enable two-factor authentication, which requires a secondary verification step such as a code sent to your phone. Even if hackers have your password, they won’t be able to log in without your phone.

Make use of social media features

Facebook can help you keep tabs on who’s accessing your account and from where. Click on the down arrow located at the upper right corner of your Newsfeed and select Settings . Then click Security and Login to get more information. If you sense an imposter, click the right-hand icon so you can log out remotely or report the person.

From there, turn on Get alerts about unrecognized logins to get notifications via Facebook, Messenger, or email if someone is logged into your account from an unrecognized browser. Unfortunately, Twitter doesn’t have the same option (which makes two-factor authentication extremely necessary).

Hackers can also barge into your Facebook and Twitter accounts through third-party services that you’ve given access to your profiles, so make sure to double-check what you have approved.

  • Facebook: Go to Settings > Apps and Websites to view and manage outside service with access to your account
  • Twitter: Go to Settings and Privacy > Apps to check and edit the list

Lastly, be sure to check the permissions Facebook and Twitter have on your smartphone or tablet.

  • Android: Go to Settings > Apps > App permissions
  • iOS: Go to Settings > Privacy to manage which service can access which parts of your phone

Less personal info, fewer problems

These steps are just the beginning of what you should be doing. You should also limit the personal data you input into your social media accounts. Avoid oversharing.

By following these tips, you can prevent Facebook and Twitter hacking. 

Cybersecurity is a sprawling issue and social media privacy is such a small sliver of what you need to stay on top of. For 24/7 support, call our team of experts today.

By Apogee Compliance Group 01 Jul, 2020
The question of monitoring your employees’ computers is a tricky one. Some say such a practice is unethical. But it can also be a way to prevent data breaches. Find out the pros and cons of monitoring your employees’ online behavior by reading this blog. And should you decide your business needs employee monitoring, we […]
By Apogee Compliance Group 26 Jun, 2020
Advances in IT have transformed paper medical records into digital files that can easily be accessed and stored. Sadly, this development has also resulted in sensitive healthcare data, or personal health information (PHI), becoming a bigger target for hackers. Because of this, healthcare providers must remain vigilant against all forms of cyberattacks. From financial information […]
By Apogee Compliance Group 24 Jun, 2020
Cutting costs is great for business, but only if doing so does not result in lower-quality products or services. You can achieve this kind of compromise in your IT system, too. Instead of investing in expensive computer hardware, you can opt for affordable but powerful thin and zero clients. What are thin and zero clients? […]
By Apogee Compliance Group 17 Jun, 2020
Most people don’t question the padlock icon that sometimes appears in their web browser’s address bar. If you’re one of those who didn’t know, it’s a security feature that authenticates websites and protects the information users submit to them. Another indicator you’re in a secure site is the HTTP before the site’s URL. But why […]
By Apogee Compliance Group 15 Jun, 2020
IT services are more critical than ever before, proving their value in the face of a health crisis and the abrupt shift to remote working. Here are some ways managed IT services providers (MSPs) are helping small companies leverage technology to support their remote teams and go about business as usual. Providing infrastructure and service […]
By Apogee Compliance Group 10 Jun, 2020
If you have an Android device, be careful! An exceptionally dangerous Android malware known as DEFENSOR ID is currently making the rounds in the Google Play Store. The malware exploits the Accessibility Services in an Android device to evade detection by traditional security measures. This threat can put your data and business in jeopardy, so […]
By Apogee Compliance Group 03 Jun, 2020
Residential Wi-Fi connections are slower and less reliable than enterprise-grade ones. But now that more people have shifted to remote work, having a fast and stable wireless connection at home is more important than ever. What can you do to ensure you don’t suffer dropped Wi-Fi signals while you’re in a videoconference or finishing up […]
By Apogee Compliance Group 27 May, 2020
With the COVID-19 pandemic, many business owners are cutting costs and jeopardizing their organization’s efficiency as a result. If you want to avoid this outcome, you should invest in cloud technology. The cloud will not just help you save money, but it will also help your business run more efficiently. Ensuring continuity and efficiency with […]
By Apogee Compliance Group 25 May, 2020
Many small- to medium-sized business (SMB) owners never expect a major crisis to hit their company and are often caught flat-footed when it does. Such events can cause downtime, which can lead to lost revenue and reduced profits. In addition, SMBs that fail to recover quickly from disruption face the risk of losing their customers […]
By Apogee Compliance Group 20 May, 2020
When it comes to cybersecurity, you probably think of protecting computers, apps, or online databases first and printers last. Precisely because they’re overlooked in, printers can be exploited by hackers and used as a gateway to infiltrate your systems. Secure your networks against intruders by following these steps. What makes business printers vulnerable to cyberattacks? […]
More Posts
Share by: