One of the first steps you should take after building your TAK environment is to secure your TAK Server and its clients. This is not a definitive guide on securing your environment but serves as a reference and starting point if you've just started.
Security, Vulnerabilities, and Exploits
A friend's account on Facebook is compromised and the attacker attempts to use my phone number to reset "his" account. This is an attacker's way of compromising your account. Be mindful and watchful of these social media engineering exploits on unsuspecting victims.