One of the first steps you should do after building your TAK environment is to secure your TAK Server and its clients. This is not a definitive guide on how to secure your environment but should serve as a reference and starting point if you're just getting started.
Security, Vulnerabilities, and Exploits
A friend's account on Facebook is compromised and the attacker attempts to use my phone number to reset "his" account. This is an attacker's way of compromising your account. Be mindful and watchful of these social media engineering exploits on unsuspecting victims.