How to Set Up Your Twitter Profile as a Security Professional

How to Set Up Your Twitter Profile as a Security Professional

As the security industry slowly embraces the use of social media, more and more professionals like you are seeking to learn about the various platforms. One such platform is Twitter, a free communications tool that provides a quick, 140-character snapshot of your thoughts. This is a great way to communicate with end users, integrators and manufacturers within the security industry. Plus, as Security Today gears up to offer Twitter chats related to the industry, you’ll want to be fully involved in these discussions! You have a lot to learn, but first you must set up your Twitter profile to reflect you as a security professional.

Here’s how to set up a Twitter profile:

  1. Go to www.twitter.com.
  2. Look for the box that has “New to Twitter? Sign up” in it. How to Set Up Your Twitter Profile as a Security Professional
  3. Enter your full name, email and a unique, hard-to-guess password using letters, numbers and symbols.
  4. Click the gold color “Sign up for Twitter” button.
  5. When you click that button, you will be directed to a page that looks like this: How to Set Up Your Twitter Profile as a Security Professional
  6. Now it’s time to choose your username. This is known as your Twitter handle and it has the “@” symbol in front of it. It’s okay to be a little creative with your username, but take into consideration that you only have 140 characters per tweet, counting your username. Also, you are representing yourself as a professional, so avoid using anything that could seem improper.
  7. For security purposes, make sure the little box in front of “Keep me signed-in on this computer.” and “Tailor Twitter based on my recent website visits.” does NOT have check marks.
  8. Finally, click the gold “Create my account” button.

And, there you have it…your very own Twitter account! Congratulations!

Next, I’ll be explaining how to spruce up your Twitter profile to enhance your image as a security professional. Stay tuned!

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • Work Anywhere, Secure Everywhere: 2025 Tech Predictions

    Five years after the pandemic, organizations need a flexible work reset to stay productive and support any work arrangement. Despite the pandemic-fueled workplace shift that began five years ago, companies across industries and geographies continue to increase flexible work configurations. However, many tools adopted during COVID onset remain in place today, and they now need a reset to keep employees productive and secure regardless of location. Security leaders must re-evaluate existing practices and reinvest in zero trust security, passwordless environments, and automation adoption to improve efficiency and productivity. Read Now

  • Guiding Principles

    Construction sites represent a unique sector of perimeter security, especially amidst a steady increase in commercial construction. As in any security environment, assessing weaknesses and threats remains paramount and modern technology, coupled with sound access control principles, are critical in addressing vulnerabilities at even the most secure construction sites around the world. Read Now

  • Empowering 911

    In the wake of the tragic murder of UnitedHealth Group CEO Brian Thompson, media coverage flooded the airwaves with images, videos and detailed timelines of the suspect’s movements. While such post-incident analysis is not new, today’s 911 centers now have access to similar data in real-time. This technological evolution marks a pivotal transformation in emergency response, transitioning from analog calls to a digital ecosystem capable of saving more lives. Read Now

  • Security Industry Embraces Mobile Credentials, Biometrics and AI, New Trends Report From HID Finds

    As organizations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID. The comprehensive study gathered responses from 1,800 partners, end users, and security and IT personnel worldwide, and reveals a significant transformation in how businesses are approaching security, with mobile credentials and artificial intelligence emerging as key drivers of innovation. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.