After recent high-profile hacks, breaking into Twitter accounts is starting to look like child's play. The company is responding with improved authorization methods to check changes are made by the legitimate owner of an account. 

True Tweets or Twaddle?

When a hacked account and a fake post can cause brief chaos on Wall Street, you know its time to improve security on Twitter accounts. News-breaking accounts are top targets for hackers or the politically motivated, and most have been broken into over Twitter's short history. 

So, following on from the likes of Google and Microsoft, Twitter will ramp up its access protection, to stop attempts to break into accounts, change passwords and other methods of compromising an account. Using two-step authentication requires a change to be approved by the user at a different point of contact, be it via entering a code sent to a mobile via SMS, different email account or other form. 

It also asks for extended verification when the user logs in from a new machine, device or an off-the-radar location. Twitter has been testing its new system extensively and will be releasing it into the wild soon for users. While the change might mildly inconvenience users of multiple devices or the well-traveled, a little extra security is a valuable addition to the service compared to the chaos and pain that can be caused.

Learning Opportunities

Security Isn't A Dirty Word 

While it is all too easy to be relaxed about security, once you've got that PC firewall and anti-virus software running, the huge number of different services and accounts that users own can make thinking about securing your digital footprint a headache. That's particularly true of mobile users who assume their device is secure and their social media services with it. 


An example of a two-factor security SMS from Google

With the main services upping their security, that at least will help the majority of users will be a little safer and even enterprises and media types will be better protected from the more intensive attempts to break into them.