Alltech IT Solutions Blog

Facebook Privacy a Concern, Part II

Facebook Privacy a Concern, Part II

If you haven’t read part one of our Facebook privacy blog, it wouldn’t hurt for you to go back and read that one first. Today, we will be building off of that blog, teaching people how to properly configure their accounts to give them the best chance to lock down their private information.

Of course, Facebook, being one of the predominant web-based services in the world, has a checkered history when it pertains to individual’s privacy. In fact, I think a fair share of its ongoing troubles when it comes to individual privacy have a lot to do with their overwhelming success.

Therefore, knowing how to protect yourself by taking control of your personal information on Facebook is a good start. Today, we provide an excellent starting point for anyone who doesn’t understand Facebook’s privacy settings, and who hasn’t used two-factor authentication yet.

Let’s get started by logging into Facebook on a computer, not a mobile device. 

Making Sense of Facebook’s Security and Privacy Options

Once you’ve logged into, you’ll want to click the little down arrow on the top right of the page. In that menu click on Settings. This can get a little confusing, so if you ever need to start from the beginning know that using the little down arrow can bring you back. 

Verify the General Account Settings are Correct

Firstly, you will want to make sure that you own and control all of the email accounts tied to your Facebook account. If you used an old email address (that you can’t get into), you’ll have a hard time getting back into the account if something were to happen. 

Security and Login - Find Out Where You’ve Logged into Facebook

Click Security and Login on the right.

Facebook will show you all of the devices you are currently logged into. Some of these will be a surprise. It will show you where your device was last used, the device that was used, and the browser type if applicable. You’ll want to think about all the devices you’ve accessed your Facebook on before jumping to the conclusion that you’ve been hacked. The longer you have been an active user, the more devices you’ve accessed your Facebook on; and, if you haven’t logged out of the account on that device it will show up here.

If you do see something suspicious, change your password (directions below). From this screen you can also log any device out of your Facebook account by selecting the three-dot icon that corresponds to the device in question. It’s a good idea to keep your Facebook profile logged out on devices you don’t actively use.

Take a Moment to Change Your Password

While there--especially if you think any of these devices are remotely suspicious--change your password. It won’t take long to do it and you will wish you did the minute your Facebook friends are getting spammed with phishing messages. 

To accomplish this, just click on the down arrow on the top right of Facebook, going to Settings, and clicking Security and Login.

It is important to never use the same password for two different accounts online.

How to Enable Two-Factor Authentication

Underneath the password options are the settings on how to set up two-factor authentication (2fa). This feature adds additional security to your account in the manner of adding a separate device. Select Use two-factor authentication and click edit. Facebook will take you to a page that walks you through setting it up. From there, click Get Started.

You will be given two Security Methods. Before choosing an option, you should understand both.

Option 1 - Authentication App - This option will allow you to use a third-party app to authenticate your identity as the owner. Popular authentication apps include Google Authenticator, Last Pass Authenticator, or Duo Mobile. Using the authentication app option is a bit more secure, but it does require you to have access to the mobile device that the authenticator app is installed on. 

To set this up, open your authentication app on your mobile device. It makes the most sense to use the authenticator app that you use for other accounts, but if you don’t have one, and you have a Google account, use Google Authenticator. 

Then, from Facebook on your computer (see the above screenshot), select Authentication App and click Next.

Facebook will present you with a QR code to scan. In your Authenticator App, add a new account (typically there is a + icon to tap) and scan the QR code. Once scanned, the app will generate a 6-digit number to use. Facebook will ask for a Confirmation Code. Type in the six-digit number and you’ll be set.

Option 2 - Text Message - The second option sends a code via text message to your mobile device. Make sure that you enter the correct number. This method may not be as secure as using an authentication app, but for practical purposes it will do. 

Configuration is simple. Once you have chosen Text Message and click Next, Facebook will text you a code. Type that code into Facebook and voila, you are in.

Depending on the option you choose, Facebook will walk you through the next steps to verify and enable two-factor.

Add a Backup
One you’ve successfully set up two-factor authentication, Facebook will provide you with an option to Add a Backup. If you choose to set up two-factor with an Authentication App then Facebook will allow you to set Text Message 2FA as a backup, and vice versa. It’s not a bad idea to set up the other method as well, just in case.

Nowadays, a lot of online accounts offer 2FA. Some of the most recognizable ones will give you a backup option to get into your account if your primary 2FA account isn’t available. 

Facebook also lets you grab Recovery Codes (Google also does this, so if you have a Google account or use Gmail, it’s a good idea to get all of this set up over there as well).

Back on the Two-Factor Settings page, under Add a Backup, there is an option for Recovery Codes.

Click Setup, and Facebook will pop up a window telling you about recovery codes and click Get Codes.

At this time, Facebook will provide you with 10 recovery codes. You can use them in an emergency to get back into your account. These codes are just single use 2FA codes, so you’ll need to know your password and one of these codes to get back into your account. Since these codes can only be used once, you can request 10 new codes at any time by returning to the Two-Factor Settings page. Keep these codes in a safe place to ensure your account isn’t accessed by anyone else.

Setting Up Extra Security

If you go back to the Security and Login area of the settings menu, scroll down to Setting Up Extra Security.

This area allows you to set alerts when a new device or browser is used to log into your Facebook. The menu allows you to define additional email addresses. You can also have those notifications sent to you via Facebook Messenger, SMS, or as a Facebook notification. 

Below that option, you can choose 3 to 5 Friends to Contact if you get locked out of your Facebook account. If you choose to configure this option, you’ll want to ensure that you only give people you trust, and who cares about their own security access. If you don’t have that, it’s okay to turn off this option.

This is a lot, but setting up two-factor authentication and having control over who can access your Facebook account will go a long way toward securing your experience. Our suggestion is to use multi-factor authentication where you can to keep your identity secure online. 

Check back for part three of our Facebook privacy series and leave any thoughts you may have in the comments section below.

Facebook Privacy a Concern, Part III
Facebook Privacy a Concern, Part I


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, August 05 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Ink User Security Customer Relationship Management instant Messaging Tech Term Networking Unified Threat Management Windows 10 Retail Router Scalability Smart Technology Internet Explorer Co-Managed IT SaaS Remote Backup and Disaster Recovery Chrome eWaste Threats Virtual Assistant Word Efficiency Scam Analysis Technology Tips Covid-19 Hybrid Cloud Leadership Security Cameras Productivity Vulnerability Employees VoIP Eliminating Downtime SSD Environment Trends Smartphones Gadget Antivirus CrashOverride IT Services Innovation Collaboration Network Workers Hard Drives Backup Printer Server Going Green Software Data Backup Compliance e-waste Social Media Profiles Mobile Yahoo Microsoft Office BYOD Mobile Security Applications Digital Telephone Systems Credit Cards Printer Wireless Charging Phone System Office Excel Managing Stress Avoiding Downtime Social Network PowerPoint Remote Control Internet Government Downloads Recycling Shortcut Gaming Console National Security Business Continuity Hardware Users Server Management Remote Computing Specifications Display Computers Management Analytics Online Shopping Artificial Intelligence File Sharing BDR Cortana Settings Encryption Regulation The Internet of Things Knowledge Malware Lead Generation Cloud Computing Microsoft Marketing Employer Employee Relationship Productivity Data Protection Fleet Management Education Gmail Virtualization Personal Information Managed IT Service Apps Inventory Processor Internet of Things iPhone Business Intelligence Document Management Technology Managed Services Provider Battery Remote Support Value Android Chrome OS Printers Hacking Gadgets Password Human Resources Browser Biometrics Outsourced IT Microsoft Teams Project Management Politics Vendor Management Spam Blocking Threat Entertainment Spotify Regulations Compliance Certification Money Smartphone Computer Care Employer-Employee Relationship Passwords A.I. Multi-Factor Authentication Customer Service Remote Workers Remote Monitoring and Management Profitability Upgrade Office 365 Tech Support WiFi Millennials Tech Terms Dark Data Memes Alerts Managed IT Services Proactive IT User Tip Telephony Business Technology Files Voice over Internet Protocol Websites Paper Licensing WhatsApp Sports Amazon Website Apple Cables Shadow IT VPN Humor Touchscreen Content Filtering Telecommute Save Money Unified Communications Travel Printing Safety Google Mobility Machine Learning Hard Drive DDoS Phishing Tip of the Week Bitcoin Physical Security Sales Cryptocurrency Streaming Media Payment Cards Electronic Health Records Update IT Congratulations Information Technology File Management Paste Communication Two-factor Authentication Connectivity Managed Service Cost Management Maintenance App IaaS Vendor Data Recovery Authentication Recovery Holiday IT Management News Virus Data Security Cybercrime Remote Working Tip of the week Movies Copy Tactics Server Remote Monitoring Access Cleaning Miscellaneous Current Events Hosted Desktop IT budget Live Streaming Data loss Conferencing Emergency Cloud Video Office Tips Outlook Patch Management Taskbar Hiring/Firing Operating System IT Support Holidays Small Business Synergy Hosted Solution Business Law Enforcement Big Data Saving Money Windows 7 Mobile Office G Suite Telecommuting Benchmarks Comparison Staff Workplace Tips Email Employee-Employer Relationship Google Maps RAM Video Games Autocorrect Database Firewall Email Management Twitter Hackers Time Management Work/Life Balance Error Alert Emoji PCI DSS Worker Distribution User Tips Business Computing Insurance Telephone System Risk Management Quick Tips Business Management Disaster Recovery Cybersecurity Blockchain GDPR Thank You Hard Disk Drive Edge Managed IT Services Batteries Hosted Solutions Ransomware E-Commerce Laptop Wearables Windows XP Virtual Private Network Mobile Device Spam Financial Automobile Network Attached Storage Hacker Help Desk OneNote eCommerce Staffing Wi-Fi Facebook Storage Scheduling Microsoft Office 365 Instagram VoIp Dongle Botnet Webcam disposal Television Solid State Drive Virtual Reality Wireless Internet Data Health Cabling Spyware Authorization Vulnerabilities Plug-In HaaS Healthcare Troubleshooting Communications Updates Search Medical IT Mobile Devices Windows 10 Best Practices Computer Net Neutrality Automation Reporting Freedom of Information Payment Tablet Information Managed Service Provider Dark Web Security Meetings Windows Data Management Samsung Voice over IP Bandwidth Training Company Culture IT Support Managed IT Privacy How To Multi-Factor Security Windows Server 2008 R2 Mobile Device Management Scams Paperless Office Wireless WannaCry Data Breach HP Network Security Bring Your Own Device Access Control Processors HIPAA Remote Work Budget Google Drive