9
MEDIA LITERACY AND DIGITAL SECURITY
Twitter Best Practices
exposure to cyberattacks. Therefore, the need to mitigate and maintain the integrity of this information
has become a growing area of work for many public and private organizations.
This section provides an array of techniques and best practices to mitigate and counter the above-
mentioned challenges. However, it is important to keep in mind, when reading these recommendations,
the position you represent or are associated with. Some of the recommendations may not be applicable
to a public gure such as politicians, activists or other actors whose social media best practices are
subject to greater scrutiny. In this sense, the exercise of the rights of expression, assembly and protest
should, and must be, respected in the digital realm while ensuring safer practices of the internet.
Check Your Privacy Settings
Managing the privacy settings of social networks is one of the simplest forms a user can employ to
control the security and privacy of the devices and data. Prior to engaging in any social network, it
is crucial to thoroughly read the privacy agreements and check the settings when signing up.
Not only by reading the privacy agreements will the user become aware of what data is or is not
shared, but it also provides the option to select or deselect privacy, security or administrative
options to secure the account and device.
4
These are some general recommendations to keep in
mind to better manage the privacy settings of a social media account:
• Select who has viewing access to the past,
present and future social media activity (e.g.
Tweets, likes, etc.).
• Review what content can be added (i.e. tagged)
into an account when this is uploaded or posted
by other people.
• Review, understand and dene the audience
with whom content can be shared.
• Review, understand and determine the forms
through which other users can nd and connect
with your account.
• Review, understand and determine the amount
of personal information when blogging or posting
information online.
• Periodically monitor the security and login
information of the accounts and revise the
likelihood of any suspicious activity.
• Select a trustworthy backup, which could
detect or be alerted of any suspicious activity.
• Monitor if and what apps are able to access
any of your social media data and/or information,
especially in the background.
• Be mindful of the implications of including
location when posting content on line.
• Set up a two-factor authentication to log-in.
• Review the platform privacy policy to know
what data the services collect, with whom it is
shared, and select your preferences on both
these issues.