crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Facebook Makes Two-Factor Authentication Easier

If you use Facebook, you likely have a lot of personal information stored there. If you use it for your business, then your professional reputation also partially relies on what you put into the social network. If you aren’t protecting your Facebook account, you could be at risk for identity theft or worse. That’s why using two-factor authentication on your social media accounts is becoming more important than ever.

Facebook has had two-factor authentication available for a long time, but before recent changes, it required the user to provide a phone number. This made a lot of people not want to use the system. Moreover, the update comes months after Facebook admitted that they had a bug in their previous two-factor system, that was sending users who set up the security protocol SMS notifications. Users were getting their Facebook notifications from 362-65, the 2FA number they used. If a user replied, it would be posted to their profile page.

Now the social media giant will accept apps like Google Authenticator and Duo Security, and has refined the setup process making it much simpler for the average user to set up. This change comes at a great time, as SMS has been at the center of a good number of two-factor hacks. In other words, try to avoid using text messages for your two-factor authentication. Sure, it’s better than not having the additional layer of security, but a lot of recent cases have found that it’s not impossible for hackers to intercept your 2fa codes and use them to gain access to your accounts.

To set up 2FA for Facebook, follow these instructions:

  • Go to Settings
  • Click on “Security and Login”
  • Navigate to “Use two-factor authentication”
  • Select type of account you want to use to authenticate.

Two-factor authentication sets up an extra layer of security to protect your sensitive information against infiltration and theft. If you would like to learn more about two-factor authentication for your business, call Integrated Business Technologies today at (918) 770-8738.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 17 August 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Technology Tip of the Week Privacy Business Management Managed Service Provider Internet Cloud Microsoft Best Practices Business Computing Saving Money Productivity IT Services Workplace Tips Hackers Backup Hosted Solutions Malware Email Software Mobile Devices Business IT Support Small Business Data Hardware Network Communication Server Smartphones Upgrade VoIP Windows Computer Business Continuity Google Efficiency Mobile Device Management Virtualization Microsoft Office Disaster Recovery Innovation Vendor Management Miscellaneous Mobile Office Gadgets Social Media Holiday Data Backup Tech Term Quick Tips Passwords Outsourced IT BYOD Android Smartphone User Tips Mobile Computing Network Security Bring Your Own Device Windows 10 Internet of Things Browser Managed IT services WiFi Spam Best Practice Remote Monitoring The Internet of Things Ransomware Remote Computing Users Data Recovery Alert Wireless Technology Data Management Trending Operating System Apple Artificial Intelligence Firewall History Gmail Unified Threat Management Save Money Going Green Content Filtering App Managed IT Customer Relationship Management Big Data Office Analytics Router IT Solutions Lithium-ion Battery Facebook Printer IT Consultant Tech Support Encryption Information Technology Current Events Document Management Cloud Computing Avoiding Downtime Paperless Office Maintenance Hard Drives Employer-Employee Relationship Productivity Applications IT Support Windows 8 Collaboration Two-factor Authentication Humor Saving Time Antivirus Application IT service Virus Mobile Device Digital Payment Chrome Business Growth VPN Fax Server Wi-Fi Risk Management Outlook Health Website Customer Service Hacking Computers Managed IT Services Marketing Phone System Excel Compliance Automation Cybersecurity Office Tips Retail Phishing Bandwidth Apps Running Cable Social Training Net Neutrality Licensing Data Security File Sharing PowerPoint User Error Social Networking Unified Communications Co-Managed IT Infrastructure Tablet Office 365 iPhone Password Government Managed Service Administration Augmented Reality Inbound Marketing Presentation Budget Project Management Computer Repair Proactive IT Regulations Recovery Mouse Money IoT Safety Specifications Hosted Solution IBM Settings Flexibility Cost Management Wireless Data storage Cybercrime Save Time Help Desk Tip of the week Wearable Technology Robot Hiring/Firing Printing Display Alerts End of Support LiFi Computing Statistics Intranet Business Intelligence Competition Network Congestion Vulnerability Recycling eWaste Downtime Data loss Blockchain Scam HIPAA BDR Search Virtual Desktop USB Piracy Redundancy Business Owner Files Sports Hacker User Point of Sale Programming Internet Exlporer Storage Twitter Mobility Smart Technology Company Culture Analyitcs Education Mobile Security Private Cloud Downloads Refrigeration Cryptocurrency Disaster WPA3 Touchscreen Networking Migration Distributed Denial of Service Google Docs Macro Vulnerabilities Windows 10 Hotspot Public Cloud Multi-Factor Security Bitcoin Digital Signature Fleet Tracking Chatbots Memory Star Wars Software Tips Managed IT Service communications Geography Language Laptop Sync Google Calendar Hacks Gaming Console Asset Tracking Identity Conferencing Utility Computing Break Fix Documents Entrepreneur High-Speed Internet Server Management Computing Infrastructure Halloween Techology PC Care Mobile Device Managment Legislation Undo OneNote Value People Healthcare Dark Web 5G PDF Development eBay Cooperation Scary Stories Virtual Reality Disaster Resistance Motherboard Leadership Employee-Employer Relationship Remote Support Streaming Media Hard Drive New Additions Data Warehousing Monitors Skype SaaS IT Consulting Deep Learning Adminstration Print Server Cables Text Messaging Patch Management Staff Modem G Suite Software as a Service Domains Google Wallet 3D Remote Workers Work Station Cache Congratulations Microsoft Excel Fun Writing LinkedIn Chromebook Data Breach Word Law Firm IT Wires Video Surveillance Operations Cookies Travel Technology Tips Public Speaking Drones Windows 8.1 Update Best Available Buisness Management Cortana Social Engineering Technology Laws Identities Virtual Private Network Nanotechnology Comparison Backups Environment CIO Scheduling Enterprise Resource Planning How To Permissions Knowledge Telephony Unified Threat Management Solid State Drive Bluetooth MSP IT Technicians Samsung Screen Reader Identity Theft Black Friday Legal Online Currency Troubleshooting Debate Mobile Assessment Fraud Experience Access Control Heating/Cooling Alt Codes Proactive Computer Accessories Mirgation Crowdfunding Smart Tech Cyber Monday Consumers YouTube Managing Stress IT Management Machine Learning SharePoint Typing Remote Monitoring and Management Business Technology Connectivity IP Address Google Drive Enterprise Content Management Network Management How To

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...