Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 3 Facebook Security Tips to Protect You and Your Friends

b2ap3_thumbnail_facebook_security_400.jpgWith social media playing such an important role in everyone’s day-to-day lives, one has to wonder to what degree this affects the security of online accounts and profiles. Social media might have revolutionized the way we communicate with others, but it’s also revolutionized the way that hackers stalk their victims. How vulnerable are you and the people you love when it comes to your Facebook settings?

Imagine this worst-case scenario. Hackers can impersonate your friends or the people you trust easily enough. If your profiles are set to public, nothing is stopping them from browsing your personal information (phone number, email, address), posts on your wall, pictures, videos, and more. This is all information that helps hackers determine how and when they will target you, or worse, the people you know.

The unique issue with social media attacks is that hackers can take advantage of both digital and physical variables in their favor, making it extra important that you take the proper precautions with your approach to social media. To avoid these unnerving possibilities, try these three tips to lock down your Facebook account.

Use the Privacy Checkup Shortcut
Upon clicking the padlock icon in the top-right corner of Facebook (near your notifications), you’ll notice that there’s a new feature called privacy shortcuts. These allow you to quickly and efficiently access some of Facebook’s best privacy and security features. By clicking on the Privacy Checkup button, a friendly bipedal blue dinosaur will guide you through a short process. You can set your default post status (public, private, etc), the apps that have access to your account, and certain parts of your profile information. You can then choose to view your profile as either one of your friends, or a stranger, to see if the changes you made were to your specifications.

The privacy shortcuts also provide you with opportunities to access other settings, like who can contact you via inbox or friend request, and how you can get someone to leave you alone. At the bottom of the drop-down, you can access even more privacy settings.

Enable Login Notifications
You probably know someone who has had their Facebook account hacked. This happens because people are unaware that their accounts have been compromised. Facebook has a measure dedicated to informing you of when someone logs into your account, and from where. You can receive these notifications either through your Facebook notification bar, email, or text messaging.

Facebook also allows you to see where your account is currently logged in, as well as the last location the device connected from. This includes device, operating system, and physical location, effectively allowing you to eliminate suspicious activity before too much damage is done. Click End Activity, which will give them the boot and give you some time to change your password.

Take Advantage of Two-Factor Authentication
Facebook has two-factor authentication, too, which uses a PIN sent to your smartphone to act as an additional login credential. You can also access the Code Generator application on your mobile phone, which gives you a security code that lets you access your account. This helps keep your account open to you, and only you.

Security is more important than ever, especially when we’re all connected through the Internet. It’s important to always keep the security of both yourself, your friends, and family in mind, by spreading best practices related to security protocol. Share this article on Facebook to get the word out.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 14 March 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Google Business Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications Smartphones Communication Business Continuity IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Phishing Upgrade Managed IT Services Windows Outsourced IT Ransomware Data Backup Windows 10 Data Recovery Cloud Computing Office Server Save Money Passwords Windows 10 Virtualization Social Media Saving Money Gadgets Tech Term Holiday Chrome Automation Managed IT Services Managed Service Microsoft Office Computers Facebook Cybercrime Artificial Intelligence Operating System Internet of Things BYOD Mobile Device Management Health Networking Wi-Fi IT Support Hacking Telephone Systems Information Information Technology Remote Alert Managed Service Provider Covid-19 Spam Office 365 Router BDR Recovery Employer-Employee Relationship Bandwidth Social Engineering Mobility App History Mobile Computing Law Enforcement Application Human Resources Password Money Data Breach Remote Monitoring Big Data Encryption Applications Blockchain Paperless Office Office Tips How To Government Training VPN Private Cloud Data Storage Patch Management Managed IT Remote Computing Apps Mobile Office Data Security Flexibility Marketing Wireless WiFi Avoiding Downtime IT solutions Entertainment Gmail Website Budget Infrastructure Voice over Internet Protocol Settings Vulnerability Two-factor Authentication Bring Your Own Device Windows 7 Word Data Management Work/Life Balance Mouse Servers HaaS Google Drive HIPAA Sports Redundancy Risk Management Staff Hacker Software as a Service Keyboard Telephone System Machine Learning Connectivity The Internet of Things Remote Work Lithium-ion battery USB Save Time Conferencing Firewall Scam Virtual Reality Apple Cleaning Vendor Data Protection Managed Services Display Social Vendor Management End of Support User Error Education Physical Security Meetings Employee/Employer Relationship Safety RMM Current Events Excel PDF Virtual Assistant Computing Robot Telephony Authentication Unified Threat Management Biometrics Samsung Computer Accessories Proactive IT Virtual Desktop Best Practice Value Digital Signage Update DDoS YouTube Black Market Spam Blocking Electronic Medical Records Printer SharePoint Bluetooth Google Docs Hiring/Firing Identity Theft Document Management Procurement Net Neutrality Solid State Drive Workplace Strategy Wireless Technology Customer Service Downtime Environment How to Help Desk Fax Server IT Consultant Augmented Reality Printing Data storage Fraud Automobile Business Intelligence Humor SaaS Remote Worker Audit Managed Services Provider Worker Computing Infrastructure IT Management Cryptocurrency Database Going Green Botnet Network Congestion eWaste IT Plan Remote Workers Comparison Battery Processor CES Shadow IT Unsupported Software Legal Hard Drive Charger Content Management Wearable Technology Internet Exlporer Business Technology Retail Access Control Hard Drives Compliance OneNote Instant Messaging Computer Care Virus Smartwatch PowerPoint Windows Media Player Ergonomics Running Cable User Virtual Private Network Development Netflix OLED Memory Two Factor Authentication Workforce Relocation PCI DSS Root Cause Analysis Virtual Machine Cables Knowledge Employee Music 2FA HBO Fiber Optics Managing Stress Skype Project Management Messaging Nanotechnology Cabling Telecommuting Video Games Worker Commute Policy Data loss Hypervisor Cortana Cameras Leadership Digital Signature Science Troubleshooting Experience Dark mode Outlook Trend Micro Start Menu Warranty SMS Default App Scalability Business Owner Procedure Screen Mirroring HVAC Saving Time Loyalty Google Apps Analysis Google Search Books dark theme Distributed Denial of Service NarrowBand Frequently Asked Questions Shopping Customer Relationship Management Mobile Administrator AI Windows 10s Devices IT Infrastructure Analyitcs Search Printer Server iPhone FinTech Cast Enterprise Content Management Programming Bing webinar Accountants Emergency Tip of the week MSP Social Network Professional Services Microchip Public Cloud Thought Leadership Investment Employer Employee Relationship Credit Cards Files Employees Antivirus Password Management Employee/Employer Relationships Assessment Password Manager ISP Windows 8 Multi-Factor Security Windows 365 Chromecast Windows Server 2008 Tools Search Engine Video Conferencing IT service Twitter ROI Colocation Sales Uninterrupted Power Supply NIST Bitcoin Television Business Mangement Shortcuts Smart Tech Cryptomining Tablet Trending Point of Sale Personal Monitor Supply Chain Management Domains Addiction Amazon Monitoring Batteries Public Computer Recycling Digitize Maintenance Practices Transportation Windows 8.1 IaaS Regulations Wiring Reputation Streaming Media Computer Fan Cache Windows Server 2008 R2 Bloatware Consultant Rootkit Amazon Web Services Analytics Content Customer relationships Tech Support Safe Mode Criminal GDPR IT Assessment Workers Hosted Computing Manufacturing Tablets Benefits Techology Email Best Practices Laptop Customers FENG Wireless Internet Entrepreneur Best Available Online Shopping IBM Security Cameras Audiobook Computer Tips File Sharing Managed IT Service WIndows 7 Touchpad Flash Camera OneDrive Shortcut Inventory Biometric Security Smart Technology Specifications Virtual CIO Peripheral Wire Cost Management Evernote Supercomputer Travel Politics Advertising Digital Security Cameras Software Tips Using Data Social Networking Sync Printers Copiers Emails 5G Millennials Quick Tip Notifications Smart Office Wireless Charging

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code