facebook linkedin twitter

Tip of the Week: How to Leverage 2FA on Facebook

Tip of the Week: How to Leverage 2FA on Facebook

If you’re like its over 2.19 billion other active users, Facebook has quite a bit of your personal information stored in it, and the risks that this implies only grow if your business is also represented on the social network. If your account isn’t protected as much as it could be, you could find yourself at risk of identity theft or other crimes. This is why we recommend activating two-factor authentication on Facebook.

Two-factor authentication (or 2FA) has actually been available on Facebook for quite some time. However, before a few much-needed changes were made recently, there were a few drawbacks to using it. First and foremost, the user needed to provide Facebook with their phone number, which many people didn’t really want to do. This wasn’t helped by the fact that, just a few months before the changes were made, Facebook announced that their previous 2FA system had a bug. This bug caused any replies to mobile Facebook notifications from 362-65 (the 2FA number Facebook would use) to post on the user’s profile page.

Now, Facebook plays nice with applications like Google Authenticator and Duo Security, and has made the setup process much more utilizable for the average user. The timing on this change couldn’t be better, either, as quite a few two-factor authentication hacks have surfaced from the weaker SMS-based 2FA - meaning that your best move is to avoid using texts to enable your 2FA permissions. Admittedly, an extra layer of security isn’t a bad thing to have, but there’s evidence that hackers have the capability to snatch your 2FA codes to access your accounts.

Setting up 2FA for Facebook is pretty straightforward:

  • Access Settings
  • Navigate to Security and Login’
  • Select Use two-factor authentication
  • Choose the account you want to use as your authenticator.

2FA is just an extra piece of security to keep your information safe. To learn more about your options, call Computerware today at (703) 821-8200.

Managed Services Can Provide a Lot of Value
Why Managed Services Are a Great Option for Small ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, February 16, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Software Business Management Hackers Microsoft Data Workplace Tips Managed Service Provider Backup Productivity Hardware Business Email Network Security Saving Money Malware Hosted Solutions IT Services Efficiency IT Support Google Small Business Computer Quick Tips Mobile Devices Smartphones User Tips Innovation Gadgets Business Continuity Microsoft Office Disaster Recovery VoIP Network Android Social Media Data Backup Collaboration Mobile Office Virtualization Server Productivity Communication Smartphone Mobile Device Management Miscellaneous Data Recovery Ransomware Windows 10 Upgrade Tech Term communications Windows IT Support Unified Threat Management Passwords Holiday Facebook Remote Monitoring Operating System Vendor Management Apps Cybersecurity Mobile Computing Managed IT services BYOD Remote Computing Automation Users BDR Phishing WiFi Mobile Device Analytics Marketing The Internet of Things Firewall Outsourced IT History Data Management Apple Browser Alert Artificial Intelligence Internet of Things Save Money Managed IT Services App IT Consultant Big data Encryption Content Filtering Going Green Gmail Office Bring Your Own Device Bandwidth Maintenance Antivirus Printer Cloud Computing Spam Office 365 Health Lithium-ion Battery Two-factor Authentication Best Practice Information Technology Saving Time Outlook Windows 8 Cybercrime Help Desk Business Technology Wireless Technology Managed IT Search Cost Management Virus Tech Support Windows 10 Hiring/Firing Hard Drives Budget Phone System Training Computers IBM Access Control VPN Travel Recovery Employer-Employee Relationship Update Blockchain Healthcare Hacking Money Document Management Legal Running Cable Networking Proactive IT Customer Service Regulations Twitter Website Intranet Government SaaS Information Augmented Reality Education It Management Hard Drive PowerPoint Risk Management Mobility Law Enforcement Humor Administration Compliance Data storage Save Time Applications Managed Service Computer Repair Machine Learning Social Networking Social Current Events Telephone Systems Excel Wireless Paperless Office DDoS Customer Relationship Management Sports Computing File Sharing Disaster Fax Server Hosted Solution Data Security End of Support Google Maps Robot Word Patch Management Securty Value Social Engineering Password Cortana Data Loss Solid State Drive Business Intelligence Scam Digital Payment Hacker Flexibility Black Market Router Downtime Data Breach Avoiding Downtime Cryptocurrency Digital Comparison Tablet Project Management Laptop iPhone User Websites Business Growth Company Culture Microchip Taxes Pain Points Cleaning Specifications Safety Start Menu Tech Terms Monitors Mouse Virtual Desktop Mobile Technology Office Tips Distributed Denial of Service Statistics User Error Software as a Service Monitoring Documents Programming Co-managed IT Heating/Cooling Entertainment Network Congestion Public Cloud Uninterrupted Power Supply YouTube Unified Communications Settings Storage Bitcoin Management Identity Theft Lifestyle Gaming Console Streaming Media Data Protection Retail Vulnerabilities Webcam IT service Politics Cooperation Text Messaging eWaste Virtual Reality Net Neutrality Emails Automobile Vendor Chromebook Chrome Bluetooth Redundancy Computing Infrastructure Hack Processors How To Download Evernote Private Cloud Inbound Marketing Computer Accessories USB Presentation Google Docs Trending Telephony Experience Conferencing Tech Data Warehousing Multi-Factor Security Cost Worker Software License Trends Access Advertising Flash Devices Skype Reading Samsung Voice over Internet Protocol Emergency Hard Drive Disposal CIO Fraud Tactics Archive Fileless Malware Computer Care Windows XP UTM Content Digital Signature Employer Employee Relationship Modem Microsoft Excel Staffing Google Wallet G Suite Proxy Server Hacks Physical Security Term Google Drive Windows Server 2008 Upselling Society Legislation Point of Contact Error Webinar Electronic Medical Records Licensing Displays IT Plan Enterprise Resource Planning Teamwork Botnet Directions Spyware Mobile Payment Accountants A.I. Relocation Tablets Recording Vulnerability Video Surveillance Micrsooft email scam Addiction Banking Electricity Printing Saving ZTime Multi-factor Authentication SSID Drones PDF Sync Dark Web Connected Devices Best Available Keyboard Notifications CCTV Processing Windows 7 Wireless Headphones Telephone Analytic Health IT Migration Recycling Business Metrics Computer Malfunction Managed IT Service cache Television Harddrive Permissions Language Equifax Fleet Tracking Product Reviews Domains Reliable Computing Debate Network Management WannaCry Downloads Device security MSP Public Speaking Best Practives GPS Read In Internet of Things Bookmark Writing Desktop Finance Shortcut Google Play Time Management Freedom of Information Music Nanotechnology Social Network Corporate Profile External Harddrive switches Microserver Motion Sickness Processor Assessment SharePoint Startup Asset Tracking Troubleshooting Scalability Upgrades Business Cards Device Management Service Level Agreement Entrepreneur Google Calendar Thin CLient LiFi Username HIPAA Business Managemenet Messenger Tracking Medical IT Tip of the week 3D Ebay Unified Threat Management Backup and Disaster Recovery Content Management Environment Browsers Gamification Competition Get More Done Rental Service Meetings Security Cameras Touchscreen News Screen Reader Customer Resource management Electronic Payment User Tip VoIP Smart Phones Turn Key Web Server Navigation Consultation Work/Life Balance Smart Tech Distribution Business Owner Printer Server Cabling Knowledge Deep Learning Piracy Upload online Currency Technology Tips Leadership Visible Light Communication Memory HTML IP Address Trojan Books Workers Professional Services Virtual Assistant Adminstration Pirating Information Fiber-Optic Database Wi-Fi Administrator Data Analysis Audit IT consulting Mobile Security LinkedIn Application Supercomputer GDPR Fake News Telephone System Human Resources Organize Regulation Productuvuty CrashOverride 3D Printing Managing Stress Printers Capital