crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Facebook Makes Two-Factor Authentication Easier

If you use Facebook, you likely have a lot of personal information stored there. If you use it for your business, then your professional reputation also partially relies on what you put into the social network. If you aren’t protecting your Facebook account, you could be at risk for identity theft or worse. That’s why using two-factor authentication on your social media accounts is becoming more important than ever.

Facebook has had two-factor authentication available for a long time, but before recent changes, it required the user to provide a phone number. This made a lot of people not want to use the system. Moreover, the update comes months after Facebook admitted that they had a bug in their previous two-factor system, that was sending users who set up the security protocol SMS notifications. Users were getting their Facebook notifications from 362-65, the 2FA number they used. If a user replied, it would be posted to their profile page.

Now the social media giant will accept apps like Google Authenticator and Duo Security, and has refined the setup process making it much simpler for the average user to set up. This change comes at a great time, as SMS has been at the center of a good number of two-factor hacks. In other words, try to avoid using text messages for your two-factor authentication. Sure, it’s better than not having the additional layer of security, but a lot of recent cases have found that it’s not impossible for hackers to intercept your 2fa codes and use them to gain access to your accounts.

To set up 2FA for Facebook, follow these instructions:

  • Go to Settings
  • Click on “Security and Login”
  • Navigate to “Use two-factor authentication”
  • Select type of account you want to use to authenticate.

Two-factor authentication sets up an extra layer of security to protect your sensitive information against infiltration and theft. If you would like to learn more about two-factor authentication for your business, call Integrated Business Technologies today at (918) 770-8738.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 22 October 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Technology Tip of the Week Privacy Managed Service Provider Business Management Cloud Internet Business Computing Microsoft Best Practices Saving Money Productivity Workplace Tips IT Services Hosted Solutions Hackers Backup Email Malware Business Software Mobile Devices Data IT Support Hardware Small Business Network Communication Server Smartphones Computer VoIP Upgrade Business Continuity Google Windows Efficiency Disaster Recovery Mobile Device Management Innovation Virtualization Microsoft Office Miscellaneous Mobile Office Vendor Management Data Backup Tech Term Outsourced IT Gadgets Social Media Holiday Network Security BYOD User Tips Quick Tips Passwords Browser Android Smartphone Mobile Computing Bring Your Own Device Managed IT services Windows 10 Productivity Internet of Things WiFi Remote Monitoring Spam Best Practice The Internet of Things Data Recovery Ransomware Wireless Technology Remote Computing Artificial Intelligence Alert Data Management Save Money Users Trending Operating System Apple Encryption History Gmail Going Green Office Collaboration Firewall Customer Relationship Management Unified Threat Management Content Filtering Router Printer Tech Support Information Technology Current Events Big Data Cloud Computing Analytics Managed IT IT Solutions Lithium-ion Battery Facebook IT Consultant App IT Support Document Management Windows 8 Mobile Device Humor Employer-Employee Relationship Website Saving Time Paperless Office Avoiding Downtime Two-factor Authentication Maintenance Hard Drives Antivirus Applications Phishing Government Marketing Managed IT Services IT service Digital Payment Excel Chrome Compliance Business Growth VPN Wi-Fi Risk Management Bandwidth Project Management Customer Service Cybersecurity Hacking Computers Apps Application Phone System Virus Fax Server Automation Outlook Health Office Tips Retail Net Neutrality Running Cable Social Licensing File Sharing Inbound Marketing PowerPoint Managed Service Social Networking Regulations Files Tablet Office 365 Password iPhone Training Unified Communications Administration Presentation Augmented Reality Help Desk Data Security User Error Budget Co-Managed IT Proactive IT Computer Repair Healthcare Infrastructure Point of Sale Mouse Recovery Money Remote Workers Safety Specifications IBM Settings Cost Management Vulnerability Information Scam Wireless Save Time Data loss Blockchain Cybercrime HIPAA Wearable Technology BDR Conferencing Hiring/Firing Redundancy Display Alerts Machine Learning Statistics Flexibility Hosted Solution Internet Exlporer Storage Intranet Mobility Smart Technology Competition Data storage Business Intelligence Network Congestion Mobile Security Recycling IoT eWaste Robot Downtime Windows 10 Printing End of Support Search USB LiFi Piracy Tip of the week Virtual Desktop Business Owner Computing Sports Hacker User Programming Company Culture Analyitcs Twitter Education Refrigeration IT Consulting Disaster Identities Touchscreen Cables Patch Management Staff Modem Bookmarks Travel Software as a Service Backups CIO Cache Microsoft Excel Operations Politics Data Breach Digital Signature Solid State Drive Wires Cookies Favorites Meetings Technology Tips Legal Memory Management Laptop Virtual Private Network Telephony Technology Laws Alt Codes Scheduling Monitoring Nanotechnology Instant Messaging Comparison Documents YouTube Enterprise Resource Planning Halloween How To Permissions Entrepreneur IT Technicians Undo Unified Threat Management Typing PC Care MSP Screen Reader 5G Identity Theft Black Friday PDF Google Drive Value People How To eBay Mobile Scary Stories Assessment Fraud Mirgation Consulting Access Control Cryptocurrency Remote Support Leadership Proactive New Additions Smart Tech Cyber Monday Skype Google Docs Streaming Media Print Server Text Messaging Managing Stress IT Management Business Technology Managed Services Provider Domains Private Cloud SharePoint Bitcoin Work Station Remote Monitoring and Management Congratulations Connectivity Fun LinkedIn Law Firm IT communications Video Surveillance Macro Enterprise Content Management Network Management Word Migration E-Commerce Public Speaking Public Cloud Downloads Windows 8.1 Update Hacks WPA3 Cortana Distributed Denial of Service Best Available Networking Vulnerabilities Hotspot Chatbots Features Sync Multi-Factor Security Fleet Tracking Star Wars Knowledge Software Tips Managed IT Service Environment Gaming Console Virtual Reality Bluetooth Geography Language Identity Electronic Health Records Mobile Device Managment Google Calendar Online Currency Samsung Asset Tracking Utility Computing Experience Break Fix Troubleshooting Monitors Debate SaaS Techology Deep Learning Computer Accessories High-Speed Internet Server Management Computing Infrastructure Heating/Cooling Cyberattacks Legislation Consumers Google Wallet Crowdfunding OneNote Dark Web Writing Chromebook Disaster Resistance Development Cooperation Motherboard Read Only IP Address G Suite Drones Adminstration Employee-Employer Relationship 3D Buisness Hard Drive Data Warehousing Social Engineering

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...