LinkedIn: 3 New Privacy Features That All Accounts Need

LinkedIn Login

Following major hacks and security breaches this past week including the iCloud photo leak and the Home Depot breach, LinkedIn has announced the introduction of 3 new tools designed to give users top security and control over their accounts in order to protect them from their accounts being accessed by unauthorised sources. These features are being rolled out globally however users are being asked to check their settings to assure the new features are live.

The 3 new security features are as follows:

1)      Device Logging

This new feature allows for users to see which devices they are logged in on, providing them with the ability to see if they are logged into a rogue account elsewhere. Users can then log out the other sessions, allowing them to kick off any device which may be connected without their authorisation. To access this feature, the user must open up the account settings option and then click “See Where You’re Logged In”. This feature is already available on the likes of Facebook and has already proved successful, so it’s about time other social networks followed by example and added this feature too.


2)      Export Data Archive

This feature allows users to download all of their account data including updates, activity, IP address records and their LinkedIn searches. This means that they will have full access to everything the account has done, meaning any unusual activity can instantly be identified and resolved. To access this feature, a user must go into the account settings option and click “Request An Archive Of Your Data.”


3)      Improved Automated Password Change Emails

The last but equally as important new LinkedIn security feature is the addition of extra information to the automated email users receive upon changing their password. In the past, the emails only told the user of their password change, however now this will include details of the date, time, device, operating system, IP address and approximate physical location of the password change, meaning anyone breaching an account can be traced and identified.

Leave a comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.