301-571-5040    Get SUPPORT

Washington Works Blog

Facebook Makes Two-Factor Authentication Easier

Facebook Makes Two-Factor Authentication Easier

If you use Facebook, you likely have a lot of personal information stored there. If you use it for your business, then your professional reputation also partially relies on what you put into the social network. If you aren’t protecting your Facebook account, you could be at risk for identity theft or worse. That’s why using two-factor authentication on your social media accounts is becoming more important than ever.

Facebook has had two-factor authentication available for a long time, but before recent changes, it required the user to provide a phone number. This made a lot of people not want to use the system. Moreover, the update comes months after Facebook admitted that they had a bug in their previous two-factor system, that was sending users who set up the security protocol SMS notifications. Users were getting their Facebook notifications from 362-65, the 2FA number they used. If a user replied, it would be posted to their profile page.

Now the social media giant will accept apps like Google Authenticator and Duo Security, and has refined the setup process making it much simpler for the average user to set up. This change comes at a great time, as SMS has been at the center of a good number of two-factor hacks. In other words, try to avoid using text messages for your two-factor authentication. Sure, it’s better than not having the additional layer of security, but a lot of recent cases have found that it’s not impossible for hackers to intercept your 2fa codes and use them to gain access to your accounts.

To set up 2FA for Facebook, follow these instructions:

  • Go to Settings
  • Click on “Security and Login”
  • Navigate to “Use two-factor authentication”
  • Select type of account you want to use to authenticate.

Two-factor authentication sets up an extra layer of security to protect your sensitive information against infiltration and theft. If you would like to learn more about two-factor authentication for your business, call Washington Works today at 301-571-5040.

A Short History of Data Backup and Storage
How To Get Rid of Those Pesky Extra Cables


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, December 16 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Business Computing Privacy Malware Hackers Business Email Network Security Software Productivity Tech Term Internet Hosted Solutions Data Backup Computer Data Mobile Devices Managed IT Services Backup IT Support Data Recovery Microsoft Ransomware User Tips Productivity Google Efficiency Managed Service Provider IT Services Smartphone Outsourced IT Innovation Business Continuity Social Media Hardware Workplace Tips Android Encryption Cloud Computing Business Management Windows 10 Collaboration Paperless Office Communication Small Business Browser Remote Monitoring Office 365 Data Management Save Money Smartphones Server Disaster Recovery Managed IT Services Bandwidth Government Windows 10 Work/Life Balance BDR Facebook Antivirus App Cybersecurity Vulnerability IT Management Wi-Fi Healthcare Unified Threat Management Phishing Artificial Intelligence BYOD Infrastructure Tip of the week Applications Saving Money Money Upgrade Mobile Device Chromebook Scam Virtual Reality Managed Service Internet of Things Information VoIP Holiday Risk Management How To Compliance Two-factor Authentication Blockchain Passwords Politics Maintenance SaaS Word Apps File Sharing Chrome Document Management Hosted Solution Office Customer Relationship Management Employer-Employee Relationship Big Data Password Network Windows Patch Management Machine Learning Remote Workers Vendor Management Smart Technology Identity Theft Wireless Point of Sale Data loss Mobile Device Management Automation Telephone Systems G Suite Router How To Alert VPN Computer Care Firewall Health Gmail Taxes Quick Tips Data Security Downtime Business Technology Regulations Samsung Server Management Tech Support Virtual Private Network Storage Training Physical Security Twitter IoT Electronic Medical Records Hacker Websites Computing Communications Robot Meetings HIPAA Botnet Recovery Remote Monitoring and Management Website Automobile Remote Computing Mobile Security Monitors SharePoint Vulnerabilities Conferencing Education Virtualization Avoiding Downtime Microsoft Excel Screen Reader Computer Repair Gadget WPA3 RMM Company Culture Cooperation Tablet Zero-Day Threat WiFi Upgrades Processors Disaster Heating/Cooling Utility Computing Hotspot Features Assessment Spam Search Downloads Geography IT Technicians Instant Messaging Relocation Cleaning Time Management Smart Tech Travel Networking Distributed Denial of Service Fleet Tracking Operating System Supercomputer Unified Threat Management Managing Stress Staff Help Desk Comparison Backup and Disaster Recovery GPS Uninterrupted Power Supply Servers Language Electronic Health Records Internet Exlporer YouTube Multi-Factor Security High-Speed Internet Mirgation Finance Private Cloud Cortana Black Market Network Management Professional Services Monitoring Connectivity Motion Sickness Enterprise Content Management Bookmarks Emoji Managed IT Service Asset Tracking Modem Tech Terms Augmented Reality IT Budget Crowdsourcing Managed IT User Error Web Server Analytics Specifications MSP Human Error Office Tips Tracking Management Computing Infrastructure Cyberattacks Value Settings Google Calendar Development Authentication Error IT Support Touchscreen USB Permissions Consulting IBM Outlook Printer Unified Communications Wearable Technology Favorites IT Consultant Google Drive Break Fix OneNote Cookies The Internet of Things Theft Digital Payment Personal Information Corporate Profile Cameras Update Financial Lenovo Black Friday Proactive Social Networking Permission Microsoft Office Solid State Drive Statistics Enterprise Resource Planning Alerts Gadgets Files Budget Digital Mail Merge Legislation Cables Chatbots Authorization Staffing Cabling Dongle Fraud Managed Services Provider Star Wars Legal WannaCry Shortcut Access Control Bring Your Own Device Project Management VoIP Techology Dark Web Employee-Employer Relationship Nanotechnology Cybercrime Law Enforcement CCTV Firefox Superfish Cyber Monday Motherboard Test Administrator Social Notifications Hard Disk Drive Bluetooth Mobile Licensing Users Read Only Spyware Address Mouse Wires Identity Employees IT Solutions Service Level Agreement E-Commerce Cost Management Customer Service Webcam Sports Mobile Office Hard Drives Domains Printers CrashOverride Public Speaking Emergency Regulation Presentation Lithium-ion battery Wireless Technology 5G Safety Marketing Hiring/Firing Competition Fun IP Address Procurement Miscellaneous