Security Checkpoint Twitter Part 1

Twitter on Samsung tablet screen

Security Checkpoint – Twitter – is a new series of web videos where we go through and improve our digital privacy and security one step and one minute at a time. Because these are all great security and privacy practices you can follow along as Alan goes through his digital life and cleans up data and access.

security checkpoint on twitter

In this quick video we go through app sessions and user sessions. We apply the principles of least privilege by getting rid of app connections and logged in sessions that are no longer needed.

Follow along with the video in your own account at twitter.com

Over time we all add apps and accounts that we no longer use or care about. Let’s take care of those now on Twitter. Each one of these increases our cyber attack risk surface. It’s a simple theory: any way that I can access my own accounts is also a potential opening for hackers.

Need help with your company’s cyber security? Contact us now to see how we can help!

If this post helped you improve your digital security and privacy please like, subscribe, and click the YouTube bell. You’ll be the first to know when we have more tips on Security Checkpoint for twitter and other digital services.