312-253-4321    Get SUPPORT

Alchetec Blog

Facebook Makes Two-Factor Authentication Easier

Facebook Makes Two-Factor Authentication Easier

If you use Facebook, you likely have a lot of personal information stored there. If you use it for your business, then your professional reputation also partially relies on what you put into the social network. If you aren’t protecting your Facebook account, you could be at risk for identity theft or worse. That’s why using two-factor authentication on your social media accounts is becoming more important than ever.

Facebook has had two-factor authentication available for a long time, but before recent changes, it required the user to provide a phone number. This made a lot of people not want to use the system. Moreover, the update comes months after Facebook admitted that they had a bug in their previous two-factor system, that was sending users who set up the security protocol SMS notifications. Users were getting their Facebook notifications from 362-65, the 2FA number they used. If a user replied, it would be posted to their profile page.

Now the social media giant will accept apps like Google Authenticator and Duo Security, and has refined the setup process making it much simpler for the average user to set up. This change comes at a great time, as SMS has been at the center of a good number of two-factor hacks. In other words, try to avoid using text messages for your two-factor authentication. Sure, it’s better than not having the additional layer of security, but a lot of recent cases have found that it’s not impossible for hackers to intercept your 2fa codes and use them to gain access to your accounts.

To set up 2FA for Facebook, follow these instructions:

  • Go to Settings
  • Click on “Security and Login”
  • Navigate to “Use two-factor authentication”
  • Select type of account you want to use to authenticate.

Two-factor authentication sets up an extra layer of security to protect your sensitive information against infiltration and theft. If you would like to learn more about two-factor authentication for your business, call Alchetec today at 312-253-4321.

A Short History of Data Backup and Storage
How To Get Rid of Those Pesky Extra Cables
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, August 22 2018

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy IT Services Malware Business Computing Network Security Managed IT Services Email Software Productivity Hackers Outsourced IT Internet Data Backup Hosted Solutions Microsoft Data Ransomware IT Support Backup Tech Term Data Recovery Mobile Devices Computer Business Continuity Innovation Business Hardware Small Business Cloud Computing IT Support Data Management Smartphone Productivity Google Android User Tips Internet of Things Managed IT Paperless Office Communication Remote Monitoring Managed Service Provider Cybersecurity Windows 10 VoIP BYOD Browser Disaster Recovery Applications Office 365 Artificial Intelligence Social Media Smartphones Encryption Facebook Passwords Business Management Mobile Device Efficiency Server Save Money Infrastructure SaaS Tip of the week Saving Money Telephone Systems Unified Threat Management Managed IT Services Recovery Wi-Fi Holiday Risk Management Government Compliance Phishing Document Management Data Storage Work/Life Balance Data Security Regulations IT Service Windows Router Firewall Training Data loss Managed Service File Sharing Bandwidth Hosted Solution Robot Password BDR Antivirus Two-factor Authentication Storage Vulnerability Gmail App IT Management Employer-Employee Relationship Money Word Project Management Virtualization Collaboration Chrome Going Green Network Virtual Reality Windows 10 Vendor Management Workplace Tips Big Data Smart Technology Business Technology Website Digital Payment Miscellaneous Identity Theft Flexibility Upgrade HIPAA Licensing Assessment Computing Tablet Wireless Internet Exlporer Bring Your Own Device Alert Patch Management Office Mobile Device Management Blockchain IoT Outlook Automation Computers Upgrades Samsung Uninterrupted Power Supply Redundancy Files Mobile Security Mobility How To Help Desk Network Management Maintenance Scam Analytics How To Chromebook Server Management VPN Politics Apps Twitter Monitors Health Quick Tips The Internet of Things Microsoft Office Virtual Private Network Unified Communications Remote Computing Customer Relationship Management Electronic Medical Records Data Warehousing Smart Tech Computer Care WannaCry Wires Google Drive Automobile Wearable Technology Enterprise Content Management Taxes Hard Disk Drive Firefox Emoji Computing Infrastructure Management Remote Workers Statistics SharePoint Network Congestion Identity Mail Merge Net Neutrality Cost Management Spyware WPA3 Technology Laws Humor IT Solutions Processors Customer Service Shortcut Software as a Service End of Support Legal Law Enforcement Microsoft Excel Connectivity Avoiding Downtime Techology Cortana USB Vulnerabilities Education Personal Information Distributed Denial of Service Modem Lenovo Printing Alerts Enterprise Resource Planning Information Bluetooth Downloads Spam Disaster Address Update Hard Drive Fleet Tracking Heating/Cooling Unified Threat Management Office Tips Technology Tips Gadget WiFi VoIP Time Management Disaster Resistance IT Technicians Geography Software Tips Virus Managed IT Service Cookies Consultation Superfish Cooperation Mobile Apple Monitoring Multi-Factor Security Social Networking Cache Asset Tracking Servers User Error Mouse Permissions Star Wars GPS YouTube MSP Proactive IT Unsupported Software Black Market Mirgation High-Speed Internet Google Calendar Display Computer Repair Crowdsourcing Break Fix Nanotechnology 3D Printing Augmented Reality Staff Company Culture Google Maps Hacking Notifications Tech Support Black Friday Motherboard Travel Botnet Wireless Technology Hotspot Recycling Supercomputer OneNote Printer Dark Data Development History Comparison Social Engineering Sports Safety Fraud Utility Computing Tracking Settings Proactive Touchscreen IT Consulting Mobile Data Physical Security IBM Migration Content Filtering Trending Legislation Hacker Dark Web Screen Reader Corporate Profile Networking Business Growth Communications Operations Managing Stress Social Gadgets Cyber Monday Mobile Computing Solid State Drive Machine Learning Language eWaste IT Budget Employee-Employer Relationship Websites Access Control Chatbots G Suite Cables Cabling Specifications Search Telephony Healthcare Digital Remote Monitoring and Management Data Breach IP Address Downtime Users Relocation Mobile Office Staffing Sync IT Consultant Private Cloud Domains CrashOverride Regulation Mobile Device Managment Hiring/Firing Error Public Speaking Administrator Cybercrime Presentation Fun Lithium-ion battery Information Technology Public Cloud 5G Marketing Cleaning Hacks Budget Motion Sickness Emergency Hard Drives Competition