Twitter is gaining ground that is undoubted. And while it is true that the cloud of uncertainty continues to surround the 140-character social network as it moves hand in hand with Facebook towards constant interaction, it is also a reality that during this fiscal year 2011, in which the The real world has been transmitted at great speed and social networks have become the architects of the leap towards the real world of the movements that proclaim a better world, Twitter seems to have started the path to get out of its stagnation. Twitter has managed to delimit its role in the current ecosystem, a role that tells us about a free communication medium, a fundamental premise for new beginnings, in which content is the main food for users and for brands.
New functionalities that seek the efficiency of the actions of the brands, take another step in the complex path of understanding the social network and consolidate itself as a true efficient marketing machine.
Such has been its skin renewal that Twitter has also established itself as the best platform to maintain connectivity through the mobile Web, increasingly present, however, leaving aside the future that the microblogging social network holds. , it is essential to take into account the actions that minimize spam or imply a violation of security and privacy for those of us who interact on twitter. 1.-The first of them may seem common sense but it is not necessary to keep it in mind, it is essential that contact details as well as specifically – financial data, are only provided when a reliable contact has been established.two.-Keys Caution, This is a very sensitive issue since, as technological innovation increases, so do the bad practices of hackers. 3.-In the same way as in all social networks, the follow-up of other users on Twitter must be carried out following some basic premises tending to protection and security. Profiles on social networks must be configured in such a way that only those who are part of our network, have access to them. 4.-Be very careful with the SPAM, underlying the clearest cases of phishing, twitter makes it possible to report as spam all those direct messages (DMs) in which personal or financial data are requested.App downloads, it is essential that it be carried out through reliable brands or firms, this is another sensitive aspect of security on the Internet and very specifically on Twitter. 6.-The security and privacy requirements of the virtual environment are much more exhaustive due specifically due to the lack of physical and tangible contact with our interlocutor, it is not convenient to make tweets that contain private data.7.-Accesses, keys and passwords are recommended change them frequentlyThere is a critical point in Twitter that although it has staunch detractors, if we limit ourselves to the interaction of users, it can be of great relevance; While for brands, SMEs and microentrepreneurs, the maximum exposure generates trust, for users there are still some relevant steps in order to maintain security. 8.-We must bear in mind that in the past Twitter already faced problems of information leaks of its users, it is convenient to be vigilant and report these practices if we think that we may have been impersonated (Form to report DMs with spam support.twitter.com/forms).9.- If we want ethics We must deliver the same, twitter is designed to change a culture, respect for rules and users, they are essential to efficiently build a channel that has been transformed, in just five years, to a business model based on efficiency through of information, conversation and identification of trends. 10.-Twitter, like the rest of social networks, has become an additional intelligence through which instantaneous and global information is filtered, so that the exposure to all kinds of intentions is always latent.