Tip of the Week: How to Leverage 2FA on Facebook

Tip of the Week: How to Leverage 2FA on Facebook

If you’re like its over 2.19 billion other active users, Facebook has quite a bit of your personal information stored in it, and the risks that this implies only grow if your business is also represented on the social network. If your account isn’t protected as much as it could be, you could find yourself at risk of identity theft or other crimes. This is why we recommend activating two-factor authentication on Facebook.

Two-factor authentication (or 2FA) has actually been available on Facebook for quite some time. However, before a few much-needed changes were made recently, there were a few drawbacks to using it. First and foremost, the user needed to provide Facebook with their phone number, which many people didn’t really want to do. This wasn’t helped by the fact that, just a few months before the changes were made, Facebook announced that their previous 2FA system had a bug. This bug caused any replies to mobile Facebook notifications from 362-65 (the 2FA number Facebook would use) to post on the user’s profile page.

Now, Facebook plays nice with applications like Google Authenticator and Duo Security, and has made the setup process much more utilizable for the average user. The timing on this change couldn’t be better, either, as quite a few two-factor authentication hacks have surfaced from the weaker SMS-based 2FA - meaning that your best move is to avoid using texts to enable your 2FA permissions. Admittedly, an extra layer of security isn’t a bad thing to have, but there’s evidence that hackers have the capability to snatch your 2FA codes to access your accounts.

Setting up 2FA for Facebook is pretty straightforward:

  • Access Settings
  • Navigate to Security and Login’
  • Select Use two-factor authentication
  • Choose the account you want to use as your authenticator.

2FA is just an extra piece of security to keep your information safe. To learn more about your options, call Computerware today at (703) 821-8200.

Managed Services Can Provide a Lot of Value
Why Managed Services Are a Great Option for Small ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, August 16, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Software Business Computing Microsoft Hackers Backup Productivity Managed Service Provider Workplace Tips Data Hardware Saving Money Business Malware Email IT Services IT Support Hosted Solutions Network Security Google Efficiency Small Business Smartphones User Tips Quick Tips Gadgets Mobile Devices Business Continuity Computer Disaster Recovery Microsoft Office Mobile Office Virtualization Network Android Innovation Mobile Device Management VoIP Social Media Server Miscellaneous Smartphone Windows 10 Ransomware Upgrade Unified Threat Management Windows Collaboration Communication Remote Monitoring Operating System Managed IT services Data Backup Holiday Data Recovery Mobile Computing Passwords BYOD Remote Computing Tech Term WiFi Vendor Management Cybersecurity IT Support Apps Facebook communications The Internet of Things Marketing Apple Users Analytics Automation History BDR Firewall Productivity Alert Data Management Internet of Things Save Money Mobile Device Artificial Intelligence IT Consultant Phishing Outsourced IT Managed IT Services App Maintenance Content Filtering Going Green Office Health Bring Your Own Device Big data Spam Gmail Bandwidth Cybercrime Printer Encryption Best Practice Information Technology Virus Lithium-ion Battery Tech Support Cost Management Wireless Technology Budget Antivirus Search Outlook Windows 8 Hiring/Firing Hard Drives Browser Managed IT Employer-Employee Relationship Computers Travel Hacking IBM Update Office 365 Phone System Help Desk Two-factor Authentication Money Document Management Recovery Data storage Humor Saving Time VPN Intranet Education Networking Access Control Legal Regulations Risk Management Training It Management Business Technology Save Time SaaS Administration Customer Service Hard Drive Law Enforcement Government Website Compliance Proactive IT Windows 10 Running Cable Cloud Computing Project Management iPhone Social Networking Word Flexibility Black Market Excel Twitter Password Laptop Cortana Applications Business Growth Hacker Customer Relationship Management Machine Learning Augmented Reality Telephone Systems PowerPoint Data Security Paperless Office Current Events User Business Intelligence Patch Management Blockchain Computing Digital Payment File Sharing Disaster End of Support Data Loss Hosted Solution Downtime Wireless Robot Comparison Tablet Mobility Securty DDoS Fax Server Social Engineering Data Breach Avoiding Downtime Company Culture Solid State Drive Computer Repair Computing Infrastructure Hack Healthcare Bluetooth Digital Websites How To Statistics Retail Pain Points Programming eWaste Start Menu Download Tech Terms Cryptocurrency Network Congestion Private Cloud Value Mobile Technology Google Docs Software as a Service Telephony Experience Monitors Uninterrupted Power Supply Taxes Cleaning Streaming Media Distributed Denial of Service Processors Office Tips Bitcoin USB Gaming Console YouTube Net Neutrality Data Protection Presentation Public Cloud Text Messaging User Error Chrome Unified Communications Settings Webcam Co-managed IT Sports Identity Theft Monitoring Virtual Desktop Specifications Safety Social Router Computer Accessories Scam Google Maps Documents Virtual Reality Redundancy Management Heating/Cooling IT service Politics Lifestyle Automobile Inbound Marketing Trending Emails Storage Mouse Chromebook Vulnerabilities Archive Virtual Assistant Best Available Keyboard LiFi Skype Messenger Device security Technology Tips Tracking MSP Nanotechnology Fake News Rental Service Desktop Audit Meetings Finance Domains Microserver Deep Learning Business Cards Web Server Service Level Agreement Public Speaking Work/Life Balance Point of Contact Startup Data Warehousing Cabling Asset Tracking Get More Done Wi-Fi Unified Threat Management Emergency Administrator Backup and Disaster Recovery Hard Drive Disposal Shortcut Visible Light Communication Memory Access Books Workers Username Screen Reader Microsoft Excel Entrepreneur IT consulting Printer Server Computer Care Supercomputer Gamification Troubleshooting Upselling Turn Key Environment Video Surveillance Trojan Recycling Microchip Piracy Upload HIPAA Analytic Google Drive Smart Tech Windows Server 2008 Worker Distribution Fiber-Optic Vulnerability Database Competition Advertising Flash Saving ZTime Organize Product Reviews Spyware Reading HTML Mobile Payment Samsung Managed Service Electronic Payment CIO Read G Suite Conferencing Windows XP Electricity Mobile Security Printing Employer Employee Relationship Business Owner Staffing Google Wallet Displays Debate Hacks Software License Physical Security Trends IP Address Society Harddrive Multi-Factor Security Windows 7 Licensing Cost GPS Device Management Banking Fraud Botnet Tactics Application cache Relocation Devices Television Tablets Human Resources Micrsooft Content Management Sync External Harddrive Webinar Business Managemenet WannaCry UTM Downloads Content Drones Error Corporate Profile Notifications IT Plan CCTV Enterprise Resource Planning Time Management Legislation Freedom of Information 3D Ebay online Currency Business Metrics email scam Computer Malfunction Addiction Digital Signature Permissions Language Thin CLient Assessment Reliable Computing Accountants SharePoint A.I. In Internet of Things Tip of the week Teamwork Smart Phones Multi-factor Authentication Google Calendar Information Entertainment Touchscreen Wireless Headphones News switches Writing LinkedIn VoIP Migration Connected Devices Music PDF Upgrades Adminstration Pirating Information Best Practives Knowledge Motion Sickness Network Management Leadership Consultation Scalability Equifax Evernote Fleet Tracking Capital 3D Printing Productuvuty Managing Stress Regulation CrashOverride