Exit Click to leave site immediately

Guide to securing Twitter

If technology is being used against you, use this website to secure your tech. Learn about technology-facilitated abuse.

Note that depending on your devices/updates, the steps below may vary.

Caution

Remember, depending on whether or not you are living with the person who is harming you, you may choose to take different steps. Control and coercion make some of these steps impossible or not safe. Read these cautions before taking action.

Secure your tech

Twitter security guide

Download pdf

Before downloading a PDF

If you think someone is accessing your phone or computer, please do not download this PDF: Read this guide without downloading it and use a safe phone or computer.
Download PDF
Step 1: Check account logins & sessions
Step 2: Verify your phone and email
Step 3: Change password
Step 4: Set up two-factor authentication
Step 5: Turn off location
Step 6: Block or mute people
Step 7: Photo tagging
Step 8: Direct messages and notifications

Tech safety tool

Secure your tech through our interactive tool. Click below to access videos in four languages.

Tech safety tool

Supporting survivors

Learn about how to support someone experiencing technology-facilitated abuse.

Supporting survivors

Learn about tech

Visit this Glossary to learn more about technology.

Use our Glossary