16.6 C
Nairobi
Tuesday, February 11, 2025

Why You Should Consider Moving to Kenya

Kenya is famous for its wildlife, vibrant culture, and stunning landscapes, making it a top travel destination. But beyond being a tourist hotspot, Kenya...

How Learned is Julius Malema? Here is His Education Background

Julius Sello Malema, born on March 3, 1981, in Seshego, Limpopo province, South Africa, is a fiery politician, activist and the leader of the...
HomeinstitutionsHow to Safeguard Your X Account from Cyber Attacks

How to Safeguard Your X Account from Cyber Attacks

JOIN WOK ON TELEGRAM

On Sunday, February 9, the Directorate of Criminal Investigations (DCI) experienced a security breach on its X social media account. Crypto scammers took control and posted misleading content about launching a blockchain project and offering cryptocurrency tokens for likes and retweets.

Within minutes, the agency announced that it had successfully regained control of its accounts, assuring the public that full access had been restored.

The breach served as a strong reminder that no one is immune to cyberattacks. Having your X account hacked poses serious risks, including identity theft, data breaches, financial losses, and the spread of harmful content under your name. It can damage your reputation, compromise your followers’ security, and be challenging to recover from.

To secure your X account, follow these simple steps to protect your data:

1. First, ensure that your account is protected by a strong, unique password. Ensure that it features a mix of letters, numbers, and symbols that will make it harder for hackers to guess.

See also  African Countries with The Best Education Systems

2. Activate two-factor authentication (2FA) for your account or, if you think you already have it on, check to make sure.

To confirm that you have two-factor authentication on, or to enable it for the first time, log into your X account, go to Settings and privacy, then Security and account access, Security, and then Two-factor authentication.

On that screen, you can choose between using two-factor authentication with a code-generating app or a physical security key. You can also generate backup codes for your account to log in to X even if you lose access to your second factor.

3. Ensure that no phone number is linked to your X account that could be exploited for account recovery.

See also  Peter Chege Muinami: Kikuyu Gospel Singer Who Owns Petanns Driving School

X uses phone numbers to verify high-profile accounts and offers an “Additional password protection” feature, requiring either the associated phone number or email to reset your password. To protect yourself from SIM-swap threats and the risks of text-based password resets, consider removing your phone number from the platform entirely.

4. Avoid clicking on suspicious links or sharing login details.

Be cautious of links in emails, messages, or posts that prompt you to log in. Hackers often use phishing links to impersonate legitimate organizations or individuals to trick people into sharing sensitive information.

5.Regularly review connected apps and revoke access to any unfamiliar ones.

Frequently review third-party apps linked to your X account and revoke access to any that appear suspicious or unnecessary to enhance security.

See also  Best Performing SDA Schools in Kenya

6. Keep your email account secure, as it’s often linked to password recovery.

Ensure the email linked to your X account has a strong password and 2FA enabled. A compromised email account can lead break-in attempts on your X account.

7. Update your password periodically and be cautious of phishing attempts disguised as legitimate X communications.

Stay vigilant for messages that claim to be from X support, especially those requesting your login details. Always verify the authenticity of such communications.

In response to the breach, the DCI initiated what they called a “scrupulous interrogation” into the crime, promising to bring the perpetrators to justice.

This follows recent cyberattacks on government agencies, including the Kenya Broadcasting Corporation (KBC) and the Business Registry Service, indicating a concerning rise in threats to state institutions.