Can someone, hackers, access your Tweeter without your knowledge? Can they post what you will find disgusting? Answers to these two questions are the same, and it is a YES.
If I am not wrong, you are aware that President Uhuru Kenyatta's social media accounts were compromised and later deactivated.
A statement from State House confirmed that indeed the accounts are not accessible after 'unknown' person(s) accessed the accounts using fishy means, simply unauthorized access.
"On account of unauthorized access to the official social media handles of H.E the President of the Republic of Kenya, Uhuru Kenyatta. All official social media handles for the President have been temporarily suspended to allow for the necessary remedial measures to be undertaken," reads a tweet from the State House.
If the highest office in the country can be compromised, who are you to be ignorant?
These are the steps to secure your account;
1. Strong passwords
Use strong passwords and change them often, well if you change them after one month. A strong password should contain at least one number, symbol, uppercase letter, lowercase, and should have at least 10 characters. For example; "UhuruKenyattaismypassword", is very long indeed but not a strong one, a password should not be a name. A strong password might look like this; @Jsec&01KCekHS2I^CDJwilpid7G!!.
Use password management tools to keep your password secure, do not write them down. Tools are available on Play store, Appstore among others.
2. Use login verification
This is where you link your phone number with your tweeter in that anytime a password is changed you get notified.
3. Protect your phone
This is so important if your phone is not protected and easily accessed, one and mostly friends can access your social media accounts. Set a password for your phone.
4. Beware with phishing
This is where a hacker sends you bait traps in form of links where when clicked automatically installs tools that will spy on you and steal important information from your devices. The tools installed will act as a communication link between your device and the hacker.
5. Do not use one password
This is where one used one password on all of the accounts, Facebook, Tweeter, Instagram, etc. In the hacking world, this is said 'Target is too lazy to have each account with its own password" and 'risking all your eggs in one basket' in the literature world.