4 Step to Recover Hacked Twitter (Nonhle Thema and @TherealTolAssMo READ This)



"Phishing is the most common method used to break into Twitter and steal credentials. They're extremely simple hacks that can cause extreme havoc," Johnson says. "It only takes one simple hack to create a world of problems.

If you or your business falls victim to a social media hack, here are four things you should do to recover from it and ensure it doesn't happen again.

1. Regain Control of Your Account


If your Twitter account has been compromised, the first thing you need to do is change your password immediately, Johnson says. Do this by clicking on the gear icon in the top-right of your screen and select Settings. Click "Password" from the menu on the left and enter in your new password.
If your account has been suspended because Twitter suspects you were hacked, visit support.twitter.com/forms/hacked to fill out a form that will help you regain access.

Because third-party apps that have access to your Twitter account can be a reason why your account was compromised, Johnson recommends revisiting this list and removing any unnecessary applications.

To see which apps have access to your account, visit your Settings page and click "Apps" from the menu on the left. Revoke access to applications you are unfamiliar with or are no longer using.

2. Delete Posts and Inform Your Audience


Once you've regained control of your account, remove the tweets that the hacker posted. Do this by navigating to your profile, hovering over the offending tweet and clicking "Delete."

Johnson says it's also important to inform your stakeholders of the situation to let them know what happened and that it's under control.

"Time is of the essence. Be sure to rebroadcast the issue on every channel available to you," he says. "Post a message on your website's homepage, tweet it, post it on Facebook and other social media sites. This ensures they know about the problem and it reduces the damage."

3. Review Your Social Media Process


Johnson says that because social media can feel both familiar and simple, users in charge of maintaining an account can be lulled into a false sense of security. This is why after an incident—or at any other time—it's a good idea to review and amend your processes for and use of sites such as Twitter.

"Setting up a process for using social media may seem contrary since it should be raw and transparent, but when you're representing a company, it pays to think about what the process around it looks like," Johnson says.

Start by involving your chief security officer or chief privacy officer in a conversation to examine procedures and to look for areas in which you can improve, he suggests.

For example, Johnson says: "Because are people associated with these tweets, if a hacker can figure out who's tweeting—their email address, for example—they can figure out how to phish."

4. Preach and Teach Online Safety


Johnson says that anyone who is involved in a business' social media efforts should receive training not only on how to use it effectively, but on the security risks and how to recognize them.

"Phishing attacks are easy to see through if you take the time and know what you're looking for," he says. "These sorts of things are trainable."

Post a Comment

0 Comments