301-571-5040    Get SUPPORT

Washington Works Blog

Facebook Makes Two-Factor Authentication Easier

Facebook Makes Two-Factor Authentication Easier

If you use Facebook, you likely have a lot of personal information stored there. If you use it for your business, then your professional reputation also partially relies on what you put into the social network. If you aren’t protecting your Facebook account, you could be at risk for identity theft or worse. That’s why using two-factor authentication on your social media accounts is becoming more important than ever.

Facebook has had two-factor authentication available for a long time, but before recent changes, it required the user to provide a phone number. This made a lot of people not want to use the system. Moreover, the update comes months after Facebook admitted that they had a bug in their previous two-factor system, that was sending users who set up the security protocol SMS notifications. Users were getting their Facebook notifications from 362-65, the 2FA number they used. If a user replied, it would be posted to their profile page.

Now the social media giant will accept apps like Google Authenticator and Duo Security, and has refined the setup process making it much simpler for the average user to set up. This change comes at a great time, as SMS has been at the center of a good number of two-factor hacks. In other words, try to avoid using text messages for your two-factor authentication. Sure, it’s better than not having the additional layer of security, but a lot of recent cases have found that it’s not impossible for hackers to intercept your 2fa codes and use them to gain access to your accounts.

To set up 2FA for Facebook, follow these instructions:

  • Go to Settings
  • Click on “Security and Login”
  • Navigate to “Use two-factor authentication”
  • Select type of account you want to use to authenticate.

Two-factor authentication sets up an extra layer of security to protect your sensitive information against infiltration and theft. If you would like to learn more about two-factor authentication for your business, call Washington Works today at 301-571-5040.

A Short History of Data Backup and Storage
How To Get Rid of Those Pesky Extra Cables


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, February 18 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Malware Productivity Hackers Email Software Network Security Business Tech Term Hosted Solutions Internet Computer Data Data Backup Mobile Devices Managed IT Services IT Support Ransomware User Tips Backup Data Recovery Google Efficiency Cloud Computing Innovation Microsoft Small Business Outsourced IT Productivity Hardware Managed Service Provider Business Management IT Services Smartphone Paperless Office Office 365 Collaboration Android Social Media Business Continuity Workplace Tips Encryption Data Management Browser Save Money Managed IT Services Remote Monitoring Smartphones Windows 10 Windows 10 Communication Bandwidth Government Employer-Employee Relationship Holiday Phishing Server Disaster Recovery Communications Apps Infrastructure Tip of the week BDR Scam Antivirus Internet of Things App Cybersecurity Vulnerability IT Management BYOD Upgrade Work/Life Balance VoIP Facebook Information Artificial Intelligence Wi-Fi Unified Threat Management Healthcare Document Management Passwords How To Applications Network SaaS Windows Vendor Management Mobile Device Customer Relationship Management Big Data Hosted Solution Office Compliance Blockchain Saving Money Password Quick Tips Maintenance Word Money Politics Chromebook Managed Service Virtual Reality Two-factor Authentication Chrome File Sharing Automation Risk Management Professional Services Meetings Tech Support Alert Botnet Health Mobile Security Management Hacker Automobile Microsoft Office Patch Management Samsung Smart Technology Machine Learning Electronic Medical Records Physical Security Twitter Tablet Identity Theft Computing Router Website Point of Sale Data loss Bring Your Own Device Telephone Systems Robot G Suite How To Remote Monitoring and Management Recovery Gmail VPN Employees Social Private Cloud Computer Care Remote Workers Data Security Wireless Firewall Remote Computing Regulations Business Technology Mobile Device Management IoT Downtime Company Culture Server Management Storage Taxes Virtual Private Network Training Websites Access Control HIPAA Staffing VoIP Monitoring Techology Licensing WannaCry High-Speed Internet Shortcut Finance Cyber Monday Motherboard Wasting Time Firefox Asset Tracking Superfish Tech Terms Cost Management Cybercrime Hard Disk Drive Enterprise Content Management Bluetooth IBM Bookmarks Cortana Black Market Mouse Identity ROI Microsoft Excel Screen Reader Administrator The Internet of Things Cyberattacks Emoji SharePoint Financial Law Enforcement CCTV Spyware MSP Address Human Error Crowdsourcing USB Avoiding Downtime Consulting Cooperation Webcam Monitors Gadgets Development Budget Authentication Education OneNote Theft Hotspot Assessment Unified Communications Favorites Notes Smart Tech Disaster Enterprise Resource Planning Heating/Cooling Files Downloads IT Technicians Procurement Gadget Proactive Permission Personal Information Distributed Denial of Service Dongle WiFi Time Management Managed Services Provider Update Unified Threat Management Staff Users Cables Authorization Relocation Cleaning Employee-Employer Relationship Networking Legal Language Internet Exlporer Travel Customer Service Project Management Comparison PowerPoint Connectivity Uninterrupted Power Supply Mobile Supercomputer Servers Read Only Multi-Factor Security Mirgation Security Cameras Test Managed IT Service Modem Service Level Agreement GPS Network Management E-Commerce User Error YouTube Wires Notifications Sports Computing Infrastructure Value Motion Sickness Vulnerabilities Managed IT Spam Conferencing IT Solutions Specifications Virtual Assistant RMM Computer Repair Permissions IT Budget Virtualization Google Calendar Printing Analytics WPA3 Break Fix Cookies Office Tips IT Support Utility Computing Tracking Touchscreen Features Printer Wearable Technology Web Server Settings Zero-Day Threat Error Google Drive Search Alerts Corporate Profile Geography Outlook Instant Messaging Upgrades Processors Black Friday Social Networking Software as a Service Fleet Tracking Lenovo Operating System Fraud Star Wars Solid State Drive Managing Stress Digital Payment Statistics Help Desk Legislation Chatbots Remote Worker IT Consultant Dark Web Nanotechnology Cabling Electronic Health Records Augmented Reality Cameras Digital Mail Merge Backup and Disaster Recovery Wireless Technology 5G Safety Marketing Competition Hiring/Firing CrashOverride IP Address Fun Miscellaneous Emergency Mobile Office Domains Printers Public Speaking Hard Drives Presentation Lithium-ion battery Regulation