facebook linkedin twitter

Tip of the Week: How to Leverage 2FA on Facebook

Tip of the Week: How to Leverage 2FA on Facebook

If you’re like its over 2.19 billion other active users, Facebook has quite a bit of your personal information stored in it, and the risks that this implies only grow if your business is also represented on the social network. If your account isn’t protected as much as it could be, you could find yourself at risk of identity theft or other crimes. This is why we recommend activating two-factor authentication on Facebook.

Two-factor authentication (or 2FA) has actually been available on Facebook for quite some time. However, before a few much-needed changes were made recently, there were a few drawbacks to using it. First and foremost, the user needed to provide Facebook with their phone number, which many people didn’t really want to do. This wasn’t helped by the fact that, just a few months before the changes were made, Facebook announced that their previous 2FA system had a bug. This bug caused any replies to mobile Facebook notifications from 362-65 (the 2FA number Facebook would use) to post on the user’s profile page.

Now, Facebook plays nice with applications like Google Authenticator and Duo Security, and has made the setup process much more utilizable for the average user. The timing on this change couldn’t be better, either, as quite a few two-factor authentication hacks have surfaced from the weaker SMS-based 2FA - meaning that your best move is to avoid using texts to enable your 2FA permissions. Admittedly, an extra layer of security isn’t a bad thing to have, but there’s evidence that hackers have the capability to snatch your 2FA codes to access your accounts.

Setting up 2FA for Facebook is pretty straightforward:

  • Access Settings
  • Navigate to Security and Login’
  • Select Use two-factor authentication
  • Choose the account you want to use as your authenticator.

2FA is just an extra piece of security to keep your information safe. To learn more about your options, call Computerware today at (703) 821-8200.

Managed Services Can Provide a Lot of Value
Why Managed Services Are a Great Option for Small ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, December 16, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Software Business Computing Business Management Hackers Microsoft Workplace Tips Data Backup Managed Service Provider Productivity Hardware Saving Money Business Email Malware Network Security IT Services IT Support Hosted Solutions Efficiency Google Small Business Computer Smartphones Quick Tips User Tips Mobile Devices Gadgets Business Continuity Disaster Recovery Innovation Microsoft Office Mobile Office Android Virtualization Network Social Media VoIP Mobile Device Management Collaboration Data Backup Server Smartphone Communication Miscellaneous Upgrade Data Recovery Ransomware Tech Term Windows 10 Productivity IT Support Unified Threat Management Windows Remote Monitoring Operating System Passwords Mobile Computing Managed IT services BYOD Cybersecurity Remote Computing Vendor Management Holiday BDR communications WiFi Apps Facebook Users The Internet of Things Automation Marketing Analytics History Phishing Apple Firewall Mobile Device Outsourced IT Data Management Managed IT Services Browser Alert Save Money Internet of Things Big data Encryption App IT Consultant Artificial Intelligence Bandwidth Bring Your Own Device Maintenance Printer Antivirus Spam Health Content Filtering Gmail Going Green Office Help Desk Cost Management Wireless Technology Managed IT Tech Support Search Virus Business Technology Office 365 Hiring/Firing Budget Hard Drives Two-factor Authentication Saving Time Best Practice Information Technology Lithium-ion Battery Cloud Computing Windows 8 Outlook Cybercrime Hacking Training Money Document Management Blockchain Phone System Computers VPN Travel IBM Recovery Employer-Employee Relationship Update Law Enforcement Access Control Humor Save Time Administration Compliance It Management Data storage Information Proactive IT Running Cable Hard Drive Legal Customer Service Networking Regulations Windows 10 Intranet Government Website Education Applications SaaS Managed Service Risk Management Cortana Value Securty Password Business Intelligence Machine Learning Telephone Systems Solid State Drive Digital Payment Hacker Data Security Downtime Flexibility Black Market Cryptocurrency Patch Management Comparison Tablet Avoiding Downtime File Sharing User Laptop Data Loss Company Culture Business Growth Computer Repair Social Networking Google Maps iPhone Wireless Current Events Mobility Healthcare Data Breach Social Engineering DDoS Digital Paperless Office Project Management Twitter Excel Websites Sports Computing Disaster Customer Relationship Management End of Support Word Augmented Reality Hosted Solution Fax Server PowerPoint Robot IT service Net Neutrality Telephony Conferencing Uninterrupted Power Supply Chrome Microchip Taxes Text Messaging Webcam Distributed Denial of Service Bitcoin Processors Bluetooth Monitoring Data Protection Router Computer Accessories USB Public Cloud Presentation Trending Inbound Marketing Management Google Docs Identity Theft Mouse Virtual Desktop Experience Scam Specifications Safety Social Cleaning Redundancy Vulnerabilities Monitors Documents Pain Points Statistics Politics Office Tips Virtual Reality Programming Evernote Co-managed IT Emails Heating/Cooling User Error Network Congestion Automobile Entertainment Chromebook Storage YouTube Vendor Unified Communications Settings Computing Infrastructure Hack Start Menu Tech Terms Streaming Media How To Mobile Technology Download Lifestyle Private Cloud Retail eWaste Gaming Console Software as a Service Mobile Security Google Drive Windows Server 2008 Supercomputer Shortcut Debate Navigation Telephone System Best Practives Harddrive switches Writing Spyware Device Management Mobile Payment Entrepreneur GPS Data Analysis Multi-Factor Security Cost Music Vulnerability Worker Troubleshooting Software License Trends Printing Content Management Environment Devices Microserver Business Managemenet Reading Samsung HIPAA External Harddrive Fraud Tactics Upgrades Electricity Electronic Payment UTM Content LiFi Windows 7 Employer Employee Relationship Competition Tech G Suite cache Television online Currency Hacks Physical Security 3D Ebay Fileless Malware Legislation Error Get More Done Licensing Business Owner Thin CLient IT Plan Enterprise Resource Planning WannaCry Downloads Printer Server Banking Botnet Proxy Server Accountants A.I. Work/Life Balance Turn Key Relocation Tablets Smart Phones IP Address email scam Addiction Deep Learning Human Resources Electronic Medical Records Multi-factor Authentication Visible Light Communication Memory Time Management Freedom of Information LinkedIn Application Term Corporate Profile Trojan Sync IT consulting Assessment SharePoint Organize Notifications CCTV Adminstration Pirating Information Directions Wireless Headphones Telephone Leadership Migration Connected Devices Google Calendar Archive Business Metrics Computer Malfunction Dark Web Equifax Fleet Tracking Tip of the week Skype Reliable Computing Network Management Health IT Device security MSP Advertising Flash Touchscreen News Digital Signature CIO VoIP In Internet of Things Finance Windows XP Consultation Teamwork Managed IT Service Nanotechnology Social Network Staffing Google Wallet Knowledge Point of Contact Desktop Technology Tips Webinar Motion Sickness Bookmark Startup Asset Tracking Society Virtual Assistant Scalability Business Cards Service Level Agreement Displays PDF Upselling Username Fake News Messenger Tracking Unified Threat Management Backup and Disaster Recovery Micrsooft Audit Gamification Recycling Data Warehousing Rental Service Meetings Best Available Keyboard Video Surveillance Processor Screen Reader Customer Resource management Drones Analytic Access Web Server Browsers Smart Tech Distribution Emergency Hard Drive Disposal Product Reviews Cabling Domains Saving ZTime Piracy Upload Wi-Fi Read Administrator User Tip HTML Permissions Language Microsoft Excel Books Workers Public Speaking Fiber-Optic Database Computer Care Managing Stress Printers Regulation 3D Printing CrashOverride Processing Capital Productuvuty

toner1