Securing social media accounts

DAR ES SALAAM: SOCIAL media refers to online platforms and applications that allow users to create, share and interact with content and connect with others. It enables communication, information exchange, entertainment and social networking in real time.

Common Types of Social Media Platforms include Facebook, WhatsApp, Instagram, X (Twitter), TikTok, LinkedIn and YouTube. We use social media for communication and social interaction.

It has enabled wider connectivity and revolutionised how Tanzanians communicate, especially across rural-urban divides and how News and information is disseminated and shared.

It has transformed business marketing and customer engagement, Education and Learning, Entertainment and Creativity, Activism and Civic Engagement.

Officials and Ministries use the platforms to share information and engage citizens. NGO’s and public health institutions use social media to promote awareness on issues like COVID-19, reproductive health and gender equality.

The impact of social media on Tanzanian society is significant and multifaceted, influencing communication, economy, politics, education and culture.

Social media is a powerful tool for empowerment, economic growth and civic engagement, but it also presents challenges related to misuse, regulation and digital literacy.

Balancing its benefits with responsible use is key for sustainable societal impact. Recently we have witnessed a growing trend of cyber attacks targeting social media accounts, be it personal accounts or business accounts.

Securing your social media accounts has therefore become essential in order to protect your identity, privacy and personal data.

Users of the social media need to ensure they use the platforms securely to be able to maximise the benefits derived from the opportunities presented by the social media. Here are the key steps you should take to enhance security while using your social media accounts:

1. Use Strong, Unique Passwords that are difficult for any one to guess and should not be shared.

You should keep your password very safe and no one else should have access to it.

A strong password should be long, made of at least twelve characters with a mix of letters, lower and upper cases, numbers, symbols and special characters.

Paraphrasing is the best way to create a combination of words that would be memorable to the user yet complex for the attacker to guess.

Example of paraphrasing is a combination of words such as “I love Tanzania forever”.

This can be converted to a password such as “1lT@ nz@4ever#”. Avoid reusing passwords across different accounts.

Use a password manager to store and generate strong passwords.

2. Enable Two-Factor Authentication (2FA) or Multi-Factor Authentication (MFA) across all your accounts.

This is a feature that is available on all social media platforms, emails and most applications. It breaks down the authentication process into a number of levels or layers to enhance account’s security.

Two levels are involved in the case of a Two-Factor Authentication (2FA) and more that two levels in the case of Multi-Factor Authentication (MFA).

Beyond User name and pass word, the system sends a random code or text to the user’s known mobile number that the user put in the application before he/ she can login to his/her account.

How to turn on 2FA for all social media platforms (Facebook, Instagram, Twitter/X, TikTok, etc.).

Once you have logged into the platform’s account, go to settings then to privacy and security. Use an authenticator app (like Google Authenticator or Authy) instead of SMS for added security.

3. Keep your Software Updated Software Applications are prone to bugs that can lead to security vulnerability. Security updates often fix known vulnerabilities. Update your social media apps and operating system regularly.

4. Be Wary of Phishing Attacks What is Phishing?

It’s a fraudulent practice of sending emails or other types of messages (SMS, WhatsApp text etc) purporting to be from reputable companies or persons in order to induce individuals to reveal their personal information such as passwords, bank account and mobile money account details.

They normally send links for the victims to click and provide their information. Don’t click on suspicious links or attachments in DMs or emails. Always doublecheck URLs and sender addresses.

5. Review Account Activity Regularly check login activity and sign out from unknown or unused devices.

Review permissions and connected apps revoke those you do not recognise.

6. Adjust Privacy Settings Limit who can see your posts, send you messages, or tag you.

Avoid sharing personal details like phone number, address, or birthdate publicly.

7. Use Trusted Devices and Networks

Avoid logging in on public computers or unsecured Wi-Fi. If you must, use a VPN for a secure connection.

8. Monitor for Unusual Behaviour If friends report strange messages or posts, check your account immediately.

Act quickly to reset your password and secure your account if hacked. In conclusion, it is better to be safe than sorry.

In cyber security we often say that there are only two types of people. The first person is the one that has already been attacked. The second person is the one that will be attacked.

So no one is spared. It is reported that more than 80 per cent of the cyber attacks are attributed to Human Factor.

Cyber criminals tend to exploit human weaknesses to pursue their mission. It therefore important to raise awareness amongst the social media users so as they act as the first line of defence in the efforts to curb the growing trend of cyber attacks.

The good news is that the solutions for addressing the security challenges across the social media platforms are already available and well embedded in the platforms. Users are encouraged to explore all the available security features and ensure that they are activated accordingly.

Lastly, developing countries are well positioned to learn from developed countries where these advancements in technology emanate from.

We are now a global village and have access to reports on cyber incidents that have happened elsewhere and get the lessons learnt and see how to avoid or prevent similar incidents in our context locally.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button