Remember when a few high profile Twitter accounts started tweeting out visibly phoney cryptocurrency tweets? Well, there’s an update on the matter; Twitter headquarters are getting to the bottom of the Twitter security breach and have released the following information:

  • 130 accounts were targets
  • 45 accounts had tweets sent out by hackers
  • 36 account’s DM’s were accessed
  • 8 accounts had ‘Your Twitter Data’ archive downloaded – none of these is verified accounts

The forensic investigation is still underway, and Twitter HQ is in communication with directly affected account owners. More details will be shared as the investigation progresses.  


High profile Twitter accounts reportedly got hacked on Wednesday the 15th of July and sent out a spree of bizarre cryptocurrency tweets. The hackers targeted the accounts of Kim Kardashian West, Kanye West, Bill Gates, Elon Musk and Barack Obama, among others. The hacking of these accounts raises a few eyebrows, to say the least, seeing that the United States is heading for a presidential election soon.

Twitter released a statement saying that the hackers obtained employees credentials and hijacked the accounts. Web security has never been more crucial; at a time where users get current news and updates on global issues on Twitter, a security breach of this magnitude can have serious implications. 

Not only do security breaches put companies in compromised positions, but it also wastes valuable time and resources in fixing an avoidable problem.

Twitter now needs to confront serious issues about its security. As a small business owner, you should also take your web security seriously and take the necessary precautions. We have a few tips that will help you prevent as well as recover from security contravention.

Get full visibility of your entire organization

A clear picture of what’s happening in your business will inform how you move in terms of preparing as well as responding to attacks. This is the most important aspect of getting your cyber resilience up to par. Have full knowledge of the following:

  • All the users;
  • Various devices
  • Plus, the applications that are connected to your environment

Practice good cyber hygiene

Practising good cyber hygiene means that you have a full view of your entire organization and you prioritize web security, plus implore best practices when it comes to cyber hygiene. Here are a few factors to consider when speaking to cyber hygiene in your business:

  • Keeping operating systems updated
  • Having active firewalls
  • Ensuring all antivirus, malware and spam ware protection is properly installed
  • Having strong passwords and enabling two-factor authentication
  • Teach your employees about cybersecurity, our malware detectors are good at spotting and removing malware from your website
  • Having private professional emails also helps in limiting the number of spam and phishing. Try our Pro Email solution.

 Plan your recovery and test out your plan

This is a crucial step in a good cyber resilience plan. Plan out your recovery and have regular drills to test out your plan. The plan needs to also restore any lost data and services during a cyberattack.

The ability to restore processes and resume business as quickly as possible will save your business a lot of money and will gain the trust of your customers. A business cyber resilience ultimate depends on how quickly you can detect a breach, implement a plan and resume operations.

Watch our web security webinar below: