Cyber Awareness & Protection
Understand modern cyber threats, social media risks, account compromise, and the best practices to protect your digital identity and reputation.
Facebook Security
Account Cloning
Cloning occurs when someone creates a fake Facebook profile using your photos and information to impersonate you.
- Friends receive requests/messages you didn’t send
- Duplicate profiles with your photos appear
- You are tagged in suspicious posts you didn’t make
Steps to Protect Yourself
- Enable Two-Factor Authentication (2FA)
- Report fake accounts immediately
- Inform your friends to avoid interacting with the fake account
- Change password and review login alerts
- Limit visibility of personal info & friends list
Hacking Detection
- Unrecognized login alerts
- Messages sent without your knowledge
- Password no longer works
Protection Steps
- Change your password immediately
- Enable 2FA
- Check connected apps and remove suspicious ones
- Alert friends if suspicious messages were sent
Instagram Security
Account Compromise
- Login alerts from unknown locations
- Posts or messages you didn’t send
- Password reset emails you didn’t request
Protection Steps
- Enable Two-Factor Authentication
- Check connected apps & revoke unknown access
- Use a strong, unique password
- Monitor login activity regularly
Impersonation
Someone may create a fake account using your photos.
- Report impersonating accounts to Instagram
- Notify your followers if needed
- Document evidence for proof
WhatsApp Security
Account Hijacking
- Unrecognized login on another device
- Messages sent without your knowledge
Recovery & Protection
- Use 2-step verification in WhatsApp
- Do not share verification codes with anyone
- Monitor linked devices regularly
- Log out from unknown sessions immediately
Telegram Security
- Enable Two-Step Verification
- Review active sessions and terminate unknown ones
- Be cautious with unknown links in groups/channels
X (Twitter) Security
- Check for suspicious login activity
- Enable 2FA and login verification
- Monitor mentions for impersonation attempts
- Report cloned accounts immediately
Google Accounts & Gmail
- Check recent security activity
- Enable 2FA and backup codes
- Recover hacked accounts using Gmail recovery process
- Do not reuse passwords across platforms
General Online Security
- Create strong, unique passwords
- Use password managers
- Recognize phishing attempts
- Limit personal info shared online
- Regularly audit privacy settings
- Monitor online reputation