Home Page Navigation Contents Contact Sitemap Search

Insta­gram Settings

Insta­gram offers a mul­ti­tude of con­fig­u­ra­tion options. It is not always easy to keep track of all the var­ious set­tings offered and to select the best set­tings for your pur­poses. Our check­list is meant to assist you to pro­tect your account and all your pub­lished infor­ma­tion in the best pos­sible way.

We have tried to draw up as uni­ver­sally applic­able a set of instruc­tions for pri­vate users as pos­sible. Nev­er­the­less, the indi­vidual con­fig­u­ra­tion options and set­tings may differ in spe­cific cases. This check­list refers to the Insta­gram set­tings avail­able as of 27th July 2021 as dis­played in a desktop com­puter browser.

As a rule, the set­tings described here are auto­mat­i­cally adopted in the Insta­gram app. Depending on your smart­phone and oper­ating system though, there may be some addi­tional set­tings in the app which are not dis­cussed here.

To dis­play your account set­tings in Insta­gram, click the pro­file symbol at the top of the page and select “set­tings” from the menu.

Edit pro­file

Cat­e­goryOur rec­om­men­da­tion
NameDepending on your require­ments and con­text of the account
User­nameDepending on your requirements
Web­siteDepending on your requirements
BioDepending on your requirements
Email addressUse a free address without any indi­ca­tion of your iden­tity (e.g.ferrari397@gmail.com).
Phone numberOption­ally, you can also reg­ister a mobile number, which will then be required for log-in con­fir­ma­tions as necessary.
GenderDepending on your requirements
Sim­ilar account suggestionsUntick „Include your account when rec­om­mending sim­ilar accounts that people might want to follow.“

Change pass­word

Manage your pass­words out­side of Insta­gram, for instance using a pass­word manager.

Apps and Websites

Reg­u­larly close ses­sions you no longer need.

E-Mail and SMS

Cat­e­goryOur rec­om­men­da­tion
Sub­scribe to:Depending on your requirements

Push noti­fi­ca­tions

Cat­e­goryOur rec­om­men­da­tion
LikesDepending on your requirements
Com­mentsDepending on your requirements
Com­ment likesDepending on your requirements
Likes and com­ments on photos of youDepending on your requirements
Accepted follow requestsDepending on your requirements
Insta­gram Direct requestsDepending on your requirements
Insta­gram DirectDepending on your requirements
RemindersDepending on your requirements
First posts and storiesDepending on your requirements
Video view countsDepending on your requirements
Sup­port requestsOn
Live videosDepending on your requirements

Manage con­tacts

Don’t use, “Remove All” if necessary.

Pri­vacy and security

Cat­e­goryOur rec­om­men­da­tion
Account pri­vacyTick „Pri­vate account“
Activity statusUntick „Show activity status“
Story sharingUntick „Allow sharing“ 
Com­mentsDepending on your requirements
Photos of YouAdd man­u­ally
Account dataDepending on your requirements
Two-factor authen­ti­ca­tionRec­om­mended. The authen­tifi­ca­tion app is prefer­able to SMS.
Data down­loadDepending on your requirements
Pri­vacy and secu­rity helpDepending on your requirements

Login activity

Reg­u­larly check your log-ins.

Emails from Instagram

If you sus­pect phishing, you can check here whether an e-mail has actu­ally come from Insta­gram or not.

What else would you like to learn about security when e-banking?

Reg­ister for a course now
and learn more:

Basic course

Find out about cur­rent Internet threats and some easy pro­tec­tive mea­sures, and how to securely use e-banking.

fur­ther information

Prac­tical course

Prac­tice the most impor­tant mea­sures for your com­puter and e-banking secu­rity on com­puters pro­vided by us.

fur­ther information

Online course for the under-30s

Learn how to use your smart­phone securely. Next to basics, we will show you what you should know about social media, clouds, mobile banking and mobile payments.

fur­ther information

Course for SMEs

Is your organ­i­sa­tion suf­fi­ciently secure? Learn which mea­sures you can take to sig­nif­i­cantly strengthen your organisation’s IT security.

fur­ther information

Send this to a friend