You Aren't Using These 10 Simple Security Settings


What's This?


Bolt-thumbnail

Online security isn't just a good idea anymore — it's an essential safety measure for anyone using the web.


In 2012, Wired senior tech reporter Mat Honan lost more than a year's worth of pictures of his newborn daughter after his Google and Amazon accounts were hacked. Earlier in 2013, the Syrian Electronic Army allegedly hacked the Twitter accounts of The Financial Times , E! Online and The Associated Press.



In response to such attacks, Internet companies are increasingly moving toward two-step verification policies. This feature, also known as "two-factor authentication," requires a user to enter a security code in addition to her password when logging in from an unrecognized device. The security code is usually sent via text to her mobile device.


The tips below explain how to set up two-step verification on your most-used online applications. We've also included a few supplemental tips to maximize your online security.


Facebook


1. Login Approval

Login Approval is Facebook's version of two-step verification. To enable Login Approval, go to Settings > Security > Login Approvals and enter your cellphone number. Once you've enabled the function, Facebook texts you a security code every time someone tries to access your account from an unknown browser.


Login Approvals


Enabling Login Approval will affect apps that require your Facebook login, like Skype, Xbox or Spotify. To generate an app-specific password, type the name of the app into the "Generate app password" field. You'll only need to enter your app-specific password once.


Twitter


2. Set Up Two-Step Verification

Twitter recently implemented the two-step verification option after a slew of high-profile Twitter hacks earlier in 2013.


To set up two-step verification on Twitter, click the Gear icon in the top-right corner to access the Settings menu. Scroll down until you see "Account security" and check the box that says "Require a verification code when I sign in."


Before you set up two-step verification on Twitter, you must confirm your email address and add a phone number to your account.


Twitter will send you a text message that says, "Twitter can send verification codes to this device!" to verify your phone number. The next time you log in, Twitter sends a six-digit verification code to that number.


Once you've enabled login verification, you'll need to generate a temporary password to access Twitter on other devices, such as your tablet or smartphone, or for second-party apps like TweetDeck, Medium and RebelMouse. Twitter generates one temporary password for all Twitter-connected apps, but this password expires within an hour.


3. Delete Stored Location Information

By default, Twitter doesn't attach location information to your tweets. However, once you've enabled location information on your tweets, Twitter continues to store that data.


If Twitter's stored location information worries you, delete it. Go to Account > Tweet location. Uncheck "add a location to my Tweet" and click "Delete all location information."


Delete all info4. Be Wary of Phishing Schemes

When phishing, hackers attempt to trick users into entering their account names and passwords on fake login landing pages. Whenever you enter your account information, make sure the login page is actually part of Twitter (or any other trusted site or network, for that matter).


Twitter


Some login URLs will look trustworthy, but aren't actually associated with the site they're claiming to represent. For example, do not click or enter information on sites like the following:




  • http://twitter.example.com




  • http://twitter.photobucket.example.com




  • http://twitter.com@example.com




LinkedIn


5. Set Up Two-Step Verification

By enabling two-step verification on LinkedIn, you lower the chances of someone accessing your professional information. Access the Account & Settings tab by rolling your mouse over to your profile icon in the top-right corner of the screen. Select "Privacy & Settings." Click on the Account tab, then on the link that says "Manage security settings."


LinkedIn


Evernote


6. Set Up Two-Step Verification

Most active Evernote users organize their personal and professional lives on the app, so two-step verification is especially important.


In the video below, Seth Hitchings, Evernote's VP of platform strategy, explains how to set up two-step verification.


Two-step verification is only available to Evernote Premium and Business users, although its website indicates the company may roll it out to a wider audience soon.


7. Review Your Access History

Evernote also makes it easy to keep track of your account activity. The Access History feature shows every time someone accesses your Evernote account. Access History details the date, physical location and the IP address used to access the account.


Google


8. Set Up Two-Step Verification

To set up two-step verification on your Google account, click the gear icon in the top-right corner of Gmail. Select Settings > Accounts > Change account settings and click on the link that says "Google Account settings." In the left-hand column, click Security and select the second option: "Enabling two-step verification."


9. Control App Access

If you choose to share your Gmail information with a third-party site, that site can see your email address, your name, your country of residence, what language you speak, your Gmail contacts, Gmail calendar and Picasa Web Albums.


You can revoke these privileges on the same page on which you enable two-step verification. From the Security page, click the "Review permissions" link. A separate tab will pop open with a list of apps that currently have access to your information.


Google Account


Apple


10. Set Up Two-Step Verification

To set up two-step verification on your Apple account, open the My Apple ID page. Click "Manage your Apple ID," then "Password and Security." Select the "Get Started" option and follow the onscreen instructions.


Apple will send you an email in three days, with instructions on how to finalize the two-step verification. Apple also sends you a 14-digit Recovery Key, which you can use to regain your account if you ever lose access to your devices or forget your password.


Do you use two-step verification? Why or why not? Let us know in the comments section below.


Homepage image courtesy of Flicker, Alexandre Dulaunoy


Topics: apps, Apps and Software, Mobile, security, Social Media, Tech




0 comments: