Alltech IT Solutions Blog

Facebook Privacy a Concern, Part II

Facebook Privacy a Concern, Part II

If you haven’t read part one of our Facebook privacy blog, it wouldn’t hurt for you to go back and read that one first. Today, we will be building off of that blog, teaching people how to properly configure their accounts to give them the best chance to lock down their private information.

Of course, Facebook, being one of the predominant web-based services in the world, has a checkered history when it pertains to individual’s privacy. In fact, I think a fair share of its ongoing troubles when it comes to individual privacy have a lot to do with their overwhelming success.

Therefore, knowing how to protect yourself by taking control of your personal information on Facebook is a good start. Today, we provide an excellent starting point for anyone who doesn’t understand Facebook’s privacy settings, and who hasn’t used two-factor authentication yet.

Let’s get started by logging into Facebook on a computer, not a mobile device. 

Making Sense of Facebook’s Security and Privacy Options

Once you’ve logged into, you’ll want to click the little down arrow on the top right of the page. In that menu click on Settings. This can get a little confusing, so if you ever need to start from the beginning know that using the little down arrow can bring you back. 

Verify the General Account Settings are Correct

Firstly, you will want to make sure that you own and control all of the email accounts tied to your Facebook account. If you used an old email address (that you can’t get into), you’ll have a hard time getting back into the account if something were to happen. 

Security and Login - Find Out Where You’ve Logged into Facebook

Click Security and Login on the right.

Facebook will show you all of the devices you are currently logged into. Some of these will be a surprise. It will show you where your device was last used, the device that was used, and the browser type if applicable. You’ll want to think about all the devices you’ve accessed your Facebook on before jumping to the conclusion that you’ve been hacked. The longer you have been an active user, the more devices you’ve accessed your Facebook on; and, if you haven’t logged out of the account on that device it will show up here.

If you do see something suspicious, change your password (directions below). From this screen you can also log any device out of your Facebook account by selecting the three-dot icon that corresponds to the device in question. It’s a good idea to keep your Facebook profile logged out on devices you don’t actively use.

Take a Moment to Change Your Password

While there--especially if you think any of these devices are remotely suspicious--change your password. It won’t take long to do it and you will wish you did the minute your Facebook friends are getting spammed with phishing messages. 

To accomplish this, just click on the down arrow on the top right of Facebook, going to Settings, and clicking Security and Login.

It is important to never use the same password for two different accounts online.

How to Enable Two-Factor Authentication

Underneath the password options are the settings on how to set up two-factor authentication (2fa). This feature adds additional security to your account in the manner of adding a separate device. Select Use two-factor authentication and click edit. Facebook will take you to a page that walks you through setting it up. From there, click Get Started.

You will be given two Security Methods. Before choosing an option, you should understand both.

Option 1 - Authentication App - This option will allow you to use a third-party app to authenticate your identity as the owner. Popular authentication apps include Google Authenticator, Last Pass Authenticator, or Duo Mobile. Using the authentication app option is a bit more secure, but it does require you to have access to the mobile device that the authenticator app is installed on. 

To set this up, open your authentication app on your mobile device. It makes the most sense to use the authenticator app that you use for other accounts, but if you don’t have one, and you have a Google account, use Google Authenticator. 

Then, from Facebook on your computer (see the above screenshot), select Authentication App and click Next.

Facebook will present you with a QR code to scan. In your Authenticator App, add a new account (typically there is a + icon to tap) and scan the QR code. Once scanned, the app will generate a 6-digit number to use. Facebook will ask for a Confirmation Code. Type in the six-digit number and you’ll be set.

Option 2 - Text Message - The second option sends a code via text message to your mobile device. Make sure that you enter the correct number. This method may not be as secure as using an authentication app, but for practical purposes it will do. 

Configuration is simple. Once you have chosen Text Message and click Next, Facebook will text you a code. Type that code into Facebook and voila, you are in.

Depending on the option you choose, Facebook will walk you through the next steps to verify and enable two-factor.

Add a Backup
One you’ve successfully set up two-factor authentication, Facebook will provide you with an option to Add a Backup. If you choose to set up two-factor with an Authentication App then Facebook will allow you to set Text Message 2FA as a backup, and vice versa. It’s not a bad idea to set up the other method as well, just in case.

Nowadays, a lot of online accounts offer 2FA. Some of the most recognizable ones will give you a backup option to get into your account if your primary 2FA account isn’t available. 

Facebook also lets you grab Recovery Codes (Google also does this, so if you have a Google account or use Gmail, it’s a good idea to get all of this set up over there as well).

Back on the Two-Factor Settings page, under Add a Backup, there is an option for Recovery Codes.

Click Setup, and Facebook will pop up a window telling you about recovery codes and click Get Codes.

At this time, Facebook will provide you with 10 recovery codes. You can use them in an emergency to get back into your account. These codes are just single use 2FA codes, so you’ll need to know your password and one of these codes to get back into your account. Since these codes can only be used once, you can request 10 new codes at any time by returning to the Two-Factor Settings page. Keep these codes in a safe place to ensure your account isn’t accessed by anyone else.

Setting Up Extra Security

If you go back to the Security and Login area of the settings menu, scroll down to Setting Up Extra Security.

This area allows you to set alerts when a new device or browser is used to log into your Facebook. The menu allows you to define additional email addresses. You can also have those notifications sent to you via Facebook Messenger, SMS, or as a Facebook notification. 

Below that option, you can choose 3 to 5 Friends to Contact if you get locked out of your Facebook account. If you choose to configure this option, you’ll want to ensure that you only give people you trust, and who cares about their own security access. If you don’t have that, it’s okay to turn off this option.

This is a lot, but setting up two-factor authentication and having control over who can access your Facebook account will go a long way toward securing your experience. Our suggestion is to use multi-factor authentication where you can to keep your identity secure online. 

Check back for part three of our Facebook privacy series and leave any thoughts you may have in the comments section below.

Facebook Privacy a Concern, Part III
Facebook Privacy a Concern, Part I


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, December 15 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Work/Life Balance Website Authentication File Management A.I. IT Support Analytics Spam Blocking Net Neutrality Eliminating Downtime Printing Paperless Office IT Management Leadership Mobile Office Safety Data Recovery SSD Patch Management Touchscreen Hard Drives Hard Drive Telephone System Microsoft Applications Risk Management Comparison Tech Support DDoS Managed IT Service Workplace Tips Microsoft Office 365 Virtual Private Network Spotify Alerts Outlook Database Gaming Console Regulation OneNote Microsoft Teams Spyware Windows 10 Troubleshooting Business Intelligence Health Outsourced IT Wearables Settings Analysis Windows XP Staff Remote Computing Mobile Security Best Practices Payment Cards Data Management Proactive IT Certification Upgrade Customer Service Millennials Managed IT Trends Movies News Multi-Factor Authentication Law Enforcement Backup iPhone Multi-Factor Security Internet of Things Dongle Freedom of Information Data Backup Batteries Mobile Device PowerPoint Internet Disaster Recovery Websites Computers Inventory Windows Security Cameras Remote Monitoring and Management Ink Hardware Managing Stress Hiring/Firing Unified Communications Display Access Control VoIp Sales Windows Server 2008 R2 BYOD Gmail Sports Wireless Charging Downloads disposal Email Politics Customer Relationship Management Threats Miscellaneous Hosted Solution eWaste Facebook Data Protection Spam Worker Save Money Employer Employee Relationship G Suite Wireless Internet Artificial Intelligence Battery Going Green IaaS Healthcare Mobile Device Management Hackers Maintenance Microsoft Office Data Google Maps Two-factor Authentication Dark Web Apps Chrome Printer Server HP Phone System Networking Yahoo Connectivity Scam Hard Disk Drive User Security Physical Security Internet Explorer Processors Financial VPN Access Encryption Remote Support Shortcut Hybrid Cloud E-Commerce Hacking eCommerce Thank You Network Files Tip of the Week IT Support Money Video Games Content Filtering Updates Vendor Management Threat Retail Human Resources Vulnerability Phishing Smartphones Vendor CrashOverride Specifications Automobile Remote Monitoring Google Drive User Tips Cortana Printer Employer-Employee Relationship Telephony Bitcoin HIPAA GDPR Video Virtualization Budget Congratulations Big Data Cost Management Fleet Management Managed Service Provider Television Google Social Network Conferencing Biometrics Tip of the week Project Management User Tip Processor Webcam Licensing Update Gadgets Scheduling Technology Tips Router Security Data Security Cloud Computing Travel Passwords Benchmarks Smartphone Voice over Internet Protocol Environment Bring Your Own Device Mobility Business Computing Information Paste Avoiding Downtime Apple Credit Cards The Internet of Things Machine Learning Tech Terms Saving Money Edge Medical IT Innovation Dark Data Quick Tips Operating System Copy Streaming Media Storage Amazon Telephone Systems Alert Synergy Virus Document Management Insurance Social Media Android WiFi Reporting Electronic Health Records Scams Help Desk How To Malware File Sharing Network Attached Storage Office VoIP Cryptocurrency Virtual Assistant Computer Care Software instant Messaging Current Events Communication Paper Digital Users Small Business Education Cybercrime Productivity HaaS e-waste Marketing Cabling Chrome OS Office Tips Ransomware Plug-In Computer Privacy Cables Tablet Live Streaming Browser Vulnerabilities IT budget Time Management National Security Data Breach Managed IT Services Hacker Cloud Business Payment Search Tactics Lead Generation Taskbar BDR WannaCry Technology Online Shopping Printers Entertainment Antivirus Excel Employee-Employer Relationship Cleaning Emoji Laptop Error Wi-Fi Government Instagram Wireless Telecommuting Productivity Recycling RAM Staffing Emergency Company Culture Backup and Disaster Recovery Hosted Solutions Holidays WhatsApp Remote Control Voice over IP Business Technology Employees Autocorrect Communications Profitability Windows 7 Twitter Unified Threat Management Botnet Office 365 Collaboration Business Management Blockchain Automation Gadget Recovery App Windows 10 Server Management Samsung Efficiency Holiday Distribution Personal Information Smart Technology Value Email Management SaaS Managed Service Mobile Devices Cybersecurity Tech Term Training Managed IT Services Authorization Bandwidth Network Security Compliance Server Business Continuity Scalability Telecommute Word Solid State Drive IT Services Information Technology Knowledge Managed Services Provider Password Workers Data loss