Twitter will now prompt high-profile political accounts to Improve security


Twitter will begin nudging high-profile governmental accounts to ramp up their login security ahead of the 2020 US election.

In a blog article, the business announced a select group of Congress members, police officers, information outlets, and even individual journalists will soon start getting notifications, prompting them to strengthen their password if needed and activate two-factor authentication.

Also read: What Is The Importance Of Security Testing For Web And Mobile Apps

“Starting today, these accounts will be advised via an in-app telling from Twitter of a number of the first account security measures we will be requiring or strongly recommending going forward,” the firm said in a statement. “While we are requiring a few reports do this given the special sensitivities of this election period.”

Twitter iterates the security measures it’s pushing to high profile safety accounts are already readily available to anybody on the stage, so if you are concerned about being a target, you can also take advantage of those features.

In the event the heightened security measures fall short, though, Twitter is also actively working on enhancing the account recovery process with fresh features to respond rapidly to questionable activity and expedited recovery service to ensure issues are resolved in a timely manner.

Written by
Arpit Singhal

I love working with Blogging and doing it the right way. #1goal: Keeping it as simple as possible for viewers.

Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Articles

Data Breaches

Preventing Data Breaches: A Guide for Businesses

Data breaches are a grim reality that can wreak havoc on the...

Modern Cybersecurity

Beyond Prevention: The Role of DDR in Modern Cybersecurity Strategies

In today’s connected world, businesses have to deal with massive volumes of...

Vendor Risk

Vendor Risk Scorecards: Developing a Comprehensive Assessment System

In today’s interconnected business landscape, organizations rely heavily on third-party vendors to...

Security Risk Registers

Continuous Improvement of Security Risk Registers: Strategies for Iterative Enhancements

In the dynamic landscape of cybersecurity, the importance of robust security risk...