crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Facebook Makes Two-Factor Authentication Easier

If you use Facebook, you likely have a lot of personal information stored there. If you use it for your business, then your professional reputation also partially relies on what you put into the social network. If you aren’t protecting your Facebook account, you could be at risk for identity theft or worse. That’s why using two-factor authentication on your social media accounts is becoming more important than ever.

Facebook has had two-factor authentication available for a long time, but before recent changes, it required the user to provide a phone number. This made a lot of people not want to use the system. Moreover, the update comes months after Facebook admitted that they had a bug in their previous two-factor system, that was sending users who set up the security protocol SMS notifications. Users were getting their Facebook notifications from 362-65, the 2FA number they used. If a user replied, it would be posted to their profile page.

Now the social media giant will accept apps like Google Authenticator and Duo Security, and has refined the setup process making it much simpler for the average user to set up. This change comes at a great time, as SMS has been at the center of a good number of two-factor hacks. In other words, try to avoid using text messages for your two-factor authentication. Sure, it’s better than not having the additional layer of security, but a lot of recent cases have found that it’s not impossible for hackers to intercept your 2fa codes and use them to gain access to your accounts.

To set up 2FA for Facebook, follow these instructions:

  • Go to Settings
  • Click on “Security and Login”
  • Navigate to “Use two-factor authentication”
  • Select type of account you want to use to authenticate.

Two-factor authentication sets up an extra layer of security to protect your sensitive information against infiltration and theft. If you would like to learn more about two-factor authentication for your business, call Integrated Business Technologies today at (918) 770-8738.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 18 December 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Tip of the Week Privacy Managed Service Provider Business Management Internet Cloud Business Computing Best Practices Microsoft Saving Money Productivity Workplace Tips IT Services Hosted Solutions Hackers Backup Malware Email Business Software Data Mobile Devices Hardware IT Support Network Small Business Server Smartphones Communication Upgrade VoIP Computer Business Continuity Efficiency Mobile Device Management Innovation Google Windows Data Backup Disaster Recovery Microsoft Office Virtualization Outsourced IT Tech Term Social Media Holiday Miscellaneous Network Security Mobile Office Vendor Management Productivity Gadgets User Tips Quick Tips Passwords BYOD Mobile Computing Browser Android Smartphone Remote Monitoring Internet of Things Data Recovery WiFi Bring Your Own Device Managed IT services Windows 10 The Internet of Things Operating System Ransomware Spam Best Practice Users Data Management Collaboration Save Money Trending Wireless Technology Apple Remote Computing Artificial Intelligence Alert Office Customer Relationship Management Unified Threat Management Content Filtering Encryption Going Green History Gmail Firewall Big Data App Analytics Cloud Computing IT Solutions Lithium-ion Battery Managed IT Facebook IT Consultant Router Antivirus Printer Tech Support IT Support Managed IT Services Current Events Information Technology Maintenance Hard Drives Two-factor Authentication Windows 8 Applications Phishing Document Management Humor Mobile Device Saving Time Wi-Fi Bandwidth Avoiding Downtime Employer-Employee Relationship Website Customer Service Paperless Office Phone System Outlook Health Marketing Automation Excel Office Tips Healthcare Retail Government IT service Compliance Digital Payment Chrome VPN Business Growth Risk Management Apps Application Virus Hacking Project Management Cybersecurity Computers Fax Server Co-Managed IT Unified Communications Downtime Administration Augmented Reality Windows 10 Presentation Budget Data Security Computer Repair Proactive IT Point of Sale Scam Infrastructure Recovery Inbound Marketing Mouse Money Running Cable Social Net Neutrality Licensing Vulnerability Wireless File Sharing Information PowerPoint Blockchain Regulations Managed Service Social Networking BDR Training Tablet Files Help Desk Office 365 iPhone User Error Password Competition Business Intelligence Remote Monitoring and Management Storage Mobility Smart Technology Robot Network Congestion Recycling Mobile Security eWaste Printing End of Support IoT LiFi Computing Search Virtual Desktop USB Piracy Tip of the week Business Owner Sports Hacker User Programming Twitter Company Culture Analyitcs Education Safety Specifications Settings Remote Workers IBM Cost Management Cybercrime Save Time Data loss Wearable Technology Conferencing HIPAA Hiring/Firing Alerts Display Redundancy Flexibility Hosted Solution Statistics Machine Learning Data storage IT Management Internet Exlporer Intranet communications LinkedIn Hacks Congratulations Managed Services Provider Fun Private Cloud SharePoint Word Law Firm IT Video Surveillance Connectivity Authorization Enterprise Content Management Network Management Public Speaking Electronic Medical Records Business Technology Windows 8.1 Update Best Available WPA3 Migration E-Commerce Cortana Public Cloud Downloads Distributed Denial of Service Employees Vulnerabilities Hotspot Networking Environment Fleet Tracking Adminstration Chatbots Features Knowledge Sync Multi-Factor Security Software Tips Managed IT Service Monitors Bluetooth 3D Star Wars Zero-Day Threat Samsung Geography Language Virtual Reality Online Currency Deep Learning Troubleshooting Google Wallet Debate Asset Tracking Identity Electronic Health Records Experience Mobile Device Managment Google Calendar Backup and Disaster Recovery Break Fix Heating/Cooling Writing Computer Accessories Utility Computing Crowdfunding High-Speed Internet Server Management Computing Infrastructure SaaS Techology Consumers Drones OneNote Cyberattacks Legislation Human Error Dark Web Social Engineering Buisness Development Scheduling Cooperation IP Address Chromebook Disaster Resistance Identities Backups Employee-Employer Relationship Motherboard Read Only G Suite Hard Drive Permission Data Warehousing Refrigeration Disaster CIO Touchscreen Cables Patch Management Staff IT Consulting Solid State Drive Travel Software as a Service Legal Modem Bookmarks Cache Test Microsoft Excel Digital Signature Alt Codes Memory Wires Operations Politics Data Breach Laptop Meetings Technology Tips Cookies Favorites Management RMM YouTube Documents Typing Virtual Private Network Telephony Technology Laws Halloween Comparison Entrepreneur Google Drive Nanotechnology Instant Messaging Enterprise Resource Planning Tech Terms Macro PC Care How To Permissions Undo How To PDF Cryptocurrency Value People MSP IT Technicians Monitoring 5G Unified Threat Management Scary Stories Identity Theft Black Friday Google Docs eBay Screen Reader Finance Remote Support Mobile Theft Leadership Assessment Fraud Skype Bitcoin Streaming Media Proactive New Additions Mirgation Consulting Access Control Cyber Monday Print Server Gaming Console Text Messaging Smart Tech Authentication Work Station Managing Stress Financial Domains

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code