articles

How to Protect Yourself on Social Media

Protect
Written by bheru lal gaderi

Twitter, Whatsapp etc. have become part of your life. Here you have to take special steps to Protect yourself.

Twitter

protect

 

Start Login Verification for your Twitter Account you can also protect yourself. Sign in with Twitter on the computer and go to Settings. Click Security and Privacy Settings there. Email ID must be confirmed before using login verification. From time to time, checking the app on the settings page should keep checking. It shows you which one can use your Twitter profile.

Read also – How to build your social media presence-Complete guide

Instagram

protect

For protect yourself on instagram Make your account private. Only those people will be able to see and follow your photos, which you will be approving yourself. Apart from this, you can also activate manual photo tagging. Go to the Instagram profiles section and tap on the photo of you. Select the Tagging option by tapping on the menu button. You can choose ‘Menu Menly’.

Read also – Social Media Share 8 Things you should remove

Gmail

protect

Google can protect a Gmail account with two-factor authentication feature. If you feel any another person accessing your Gmail account, check your account activity. In the inbox, a button called Last Account Activity will appear on the lower right side. Click on it and Gmail will show account activity of your browser, time and location. If uncommon, click ‘Sign Out of All Other Web Sessions’ and change the password.

Read also – How to Generate Traffic from Social Media

Whatsapp

Protect

Whatsapp has brought end-to-end encryption to secure your chats. After turning it on, staff members at WhatSpeap also can not read your chats. Trouble occurs when your phone is lost. Secure the pin of whatsapp before your personal data is handled by the thief. For this, you have to download the second app. If the phone is stolen, with your WhatsApp account. Then immediately issue the new SIM and register your Whatsapp account on any other device. Your account will be deactivated, on the phone stolen from it.

In this way, you can secure yourself on various social media platforms and avoid any problems that may arise.

Read also – Difference Between the Features of Android and iOS

Facebook Comments

About the author

bheru lal gaderi

Hello! My name is Bheru Lal Gaderi, a full time internet marketer and blogger from Chittorgarh, Rajasthan, India. Shouttermouth is my Blog here I write about Tips and Tricks,Making Money Online – SEO – Blogging and much more. Do check it out! Thanks.