Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Control Your Profile, Part II

Control Your Profile, Part II

In part one of this series we started to go through Facebook privacy failings, but we didn’t really give you any information you can use. For part two, we have decided to take you through some security setting for Facebook. 

Facebook has over two billion users, and as a result, it has its fair share of privacy snafus. While they do (finally) make available all of a person’s Facebook information, their strategies to success are important reasons why there are so many privacy concerns throughout the online world. 

Making it a priority to know how to take control over your personal information on Facebook is a good place to start. Let’s run through Facebook’s privacy settings, and get you set up with two-factor authentication.

Let’s start from a PC. Head over to facebook.com and log in.

Making Sense of Facebook’s Security and Privacy Options

Once you’re logged in to facebook.com, you’ll want to click the little down arrow on the top right of the page. In that menu click on Settings. This can get a little confusing, so if you ever need to start from the beginning know that using the little down arrow can bring you back. 

Make Sure the General Account Settings are Right

You will want to verify that you own and control all of the email accounts tied to your Facebook account. If you used an old email address (that you can’t get into), you’ll have a hard time getting back into the account if something were to happen. 

Security and Login - Find Out Where You’ve Logged into Facebook

Click Security and Login on the right.

On this screen, you can see all the devices your Facebook account is currently signed into. You will be confused why there are so many, but think about it: how long have you been using Facebook? For many people it’s not out of line to suggest that they are on their fourth or fifth phone since first using the Facebook app. This means that these devices will show up. You don’t use a Nokia Lumia 920 any longer? Not many people do. Facebook gives you the option to sign out of any of these devices by accessing the three-dot icon next to the device’s name. 

It’s a good practice to keep your account logged out on devices you don’t typically use to access Facebook. If you see any suspicious devices among your list of approved devices, you will immediately need to change your password (directions below).

Change Your Password

Changing your password regularly is a good idea, but you definitely don’t want to use the same password over multiple accounts. To do so here, you will want to click on the down arrow on the top right of Facebook, going to Settings, and clicking Security and Login.

How to Enable Two-Factor Authentication

If you haven't heard of two-factor authentication, it is the practice of setting your account up with an additional layer of security. To get started, select Use two-factor authentication and click edit. Click Get Started.

A screen will pop up that gives you two Security Methods. Before choosing an option, you should understand both.

Option 1 - Authentication App - Clicking on this option will allow you to use a third-party app to authenticate your identity. Popular authentication apps include Google Authenticator, Last Pass Authenticator, or Duo Mobile. Using the authentication app option is more secure than option 2, but it does require you to have access to the mobile device that the authenticator app is installed on. 

To set this up, open your authentication app on your mobile device. It makes the most sense to use the authenticator app that you use for other accounts, but if you don’t have one, and you have a Google account, use Google Authenticator. 

Then, from Facebook on your computer (see the above screenshot), select Authentication App and click Next.

Facebook will present you with a QR code to scan. In your Authenticator App, add a new account (typically there is a + icon to tap) and scan the QR code. Once scanned, the app will generate a six-digit number to use. Facebook will ask for a Confirmation Code. Type in the six-digit number and you’ll be set.

Option 2 - Text Message - Option number two sends a code via text message to your mobile device. Make sure that you enter the correct number. This method may not be as secure as using an authentication app, but for practical purposes it will do. 

Select the Text Message option and click Next, Facebook will text you a code. Type that code into Facebook and voila, you are in.

Depending on the option you choose, Facebook will walk you through the next steps to verify and enable two-factor.

Add a Backup Plan
Once you’ve set up your method, Facebook will provide you with an option to Add a Backup. If you chose to set up two-factor with an Authentication App then Facebook will allow you to set Text Message 2FA as a backup, and vice versa. It’s not a bad idea to set up the other method as well, just in case.

Nowadays, a lot of online accounts offer 2FA, but Facebook also lets you have Recovery Codes (Google also does this, so if you have a Google account or use Gmail, it’s a good idea to get all of this set up over there as well).

Back on the Two-Factor Settings page, under the Add a Backup, there is an option for Recovery Codes.

Click Setup, and Facebook will pop up a window telling you about recovery codes and click Get Codes.

At this time, Facebook will provide you with 10 recovery codes. You can use them in an emergency to get back into your account. These codes are just single-use 2FA codes, so you’ll need to know your password and one of these codes to get back into your account. Since these codes can only be used once, you can request 10 new codes at any time by returning to the Two-Factor Settings page. Keep these codes in a safe place to ensure your account isn’t accessed by anyone else.

Setting Up Extra Security

If you go back to the Security and Login area of the settings menu, scroll down to Setting Up Extra Security.

This area allows you to set alerts when a new device or browser is used to log into your Facebook. The menu allows you to define additional email addresses. You can also have those notifications sent to you via Facebook Messenger, SMS, or as a Facebook notification. 

Below that option, you can choose 3 to 5 Friends to Contact if you get locked out of your Facebook account. If you choose this option, you will want to make sure that you only list people that you trust. If they are like-minded about their own privacy, the better off you will be.

This is admittedly a lot to take in, but setting up two-factor authentication and having control over who can access your Facebook account will go a long way toward securing your Facebook experience. You’ll still be inundated with stupid memes, but at least your personal data will remain secure. 

Check back for part three of our Facebook privacy series and leave any thoughts you may have in the comments section below. 

Control Your Profile, Part III
What Does It Mean to Plan for the Worst?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, August 04 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.centraltechnologysolutions.com/

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Productivity Cloud Hosted Solutions Data Privacy IT Services Network Security Data Backup Email Malware Internet Hackers IT Support Software Efficiency Business Outsourced IT Innovation Microsoft Data Recovery Computer Hardware Mobile Devices Productivity Managed IT Services Small Business Upgrade Business Continuity IT Support Google Cloud Computing Backup Cybersecurity Collaboration Ransomware Phishing Smartphone Tech Term User Tips Communication Disaster Recovery Managed IT Services Workplace Tips Business Management Managed Service Provider Windows 10 VoIP Internet of Things Mobile Device Smartphones Managed Service Android Paperless Office Remote Monitoring Social Media Data Management Quick Tips Network Facebook Browser Encryption Managed IT Saving Money communications Artificial Intelligence Server Save Money Windows 10 Office 365 Windows Business Technology Virtualization BDR Miscellaneous Covid-19 Help Desk Wi-Fi Risk Management BYOD Compliance Passwords Holiday Document Management Automation Mobile Device Management Users Training Remote Work Healthcare Apps Health Office Vendor Management App Windows 7 Government Microsoft Office Password Big Data Unified Threat Management Data Security Analytics Recovery Laptops Chrome Firewall Avoiding Downtime Bandwidth Applications Robot Bring Your Own Device Going Green Gmail Employer-Employee Relationship Storage Data loss Vulnerability Blockchain Apple Hosted Solution Website IT Management Redundancy Tip of the week Mobility Money File Sharing Computing Data storage Scam Telephone Systems Antivirus Content Filtering Two-factor Authentication SaaS Project Management Regulations Information Technology Infrastructure Wireless Information Computers Processor Politics Remote Computing Unified Communications Access Control Settings Work/Life Balance Company Culture RMM Flexibility Downtime Customer Service Social Proactive Virtual Reality Machine Learning Employee-Employer Relationship Software as a Service Tablet Router Maintenance Budget VPN Meetings Files IT Service Printing OneDrive Hard Drive Operating System Customer Relationship Management IoT Virtual Private Network Gadgets Internet Exlporer Tech Support Network Management Professional Services Managed Services HIPAA Electronic Health Records Google Drive Assessment Server Management Cooperation Monitoring Digital Payment How To Employees How To Samsung Spam Mobile Security Websites Identity Theft Business Growth Uninterrupted Power Supply YouTube Recycling Licensing Chromebook Consultation Remote Worker WiFi Mobile Computing Utility Computing Mobile Office Consulting Hacker Word Search Solid State Drive Administration Current Events Social Network LiFi Augmented Reality Managed Services Provider Wireless Technology Legal Education Dark Web Upgrades Twitter The Internet of Things Remote Monitoring and Management Management Data Storage File Management IT solutions Display Payment Cards Remote Workers End of Support Smart Technology Net Neutrality Patch Management Bitcoin Time Management Networking Sports Co-Managed IT Monitors Data Breach Private Cloud Electronic Medical Records Mouse Alert Outlook Fleet Tracking Procurement Wireless Internet Business Telephone Comparison Identity Mobile Favorites Social Engineering Cabling USB Windows 8 Save Time Cookies Test Mobile Data Disaster Trending Manufacturing Optimization Google Calendar Cache Identities Security Cameras User Management Technology Laws Transportation Mobile VoIP Star Wars Mail Merge Biometric Managed IT Service San Diego High-Speed Internet Point of Sale Virtual Assistant Vendor Asset Tracking Dark Data Personal Information Google Wallet VoIP Sponsor Employer/Employee Relationships IT Assessment Specifications Cybercrime Conferencing Safety Touchscreen Techology Permissions Nanotechnology Telephony MSP Hard Disk Drives Virtual Machines Legislation IT Technicians Peripheral Sync Cyberattacks Hard Drives Google Docs Lenovo Batteries Humor Statistics Cyber security SharePoint Staff Public Cloud Address Projects Gamification Break Fix Social Networking Law Enforcement Development Zero-Day Threat Notifications Disaster Resistance Wasting Time Smart Devices Unified Threat Management Hotspot Botnet OneNote Drones Digital Obstacle Proactive Maintenance Digitize Black Friday Roanoke — Central Technology Solutions Managing Stress Travel Instant Messaging Black Market Backups Fraud Screen Reader Tech Terms Deep Learning Solid State Drives Credit Cards Mirgation eWaste PCI DSS Mobile Device Managment Read Only Writing Software Tips Emoji Superfish ROI Bluetooth Teamwork Downloads Outsource IT Automobile Network Congestion Computer Care Return on Investment Motherboard Gadget Cables Backup and Disaster Recovery Proactive IT Database Sensors User Error Language Computer Repair Alt Codes Spyware Course Database Management Shadow IT Virtual Desktop Cyber Monday technology services provider Enterprise Content Management Finance Smart Tech GPS Theft Physical Security Shortcut Options Holidays Migration Retail Cortana Cryptocurrency Notes 3D Printing Shared resources Windows Server 2008 Operations Cost Management Laptop E-Commerce Firefox Active Directory Data Warehousing Wires Human Error Heating/Cooling IT Consulting Voice over Internet Protocol Computing Infrastructure Connectivity Supercomputer Typing GDPR Outsourcing Technology Assurance Group ’s 18 Crowdsourcing Vulnerabilities Authentication Processors Hacks WPA3 Office Tips Tracking Financial Best Practice WannaCry 5G IT Technology Tips Chatbots Enterprise Resource Planning CRM G Suite Bookmarks History PowerPoint Value of Managed Services Taxes Permission Unsupported Software Virus Hacking Multi-Factor Security Wearable Technology Remote Working Features Google Maps Update Windows Server Marketing Microsoft Excel Modem Servers Telephone Buisness Printer Alerts IT Budget Video Conferencing Distributed Denial of Service Annual Convention Geography Authorization Regulation IT Consultant Error Students Web Server Cameras Motion Sickness Hard Disk Drive Printers Administrator CCTV Relocation Emergency CrashOverride Webcam