June 5, 2017 By Shane Schick 2 min read

Facebook is hoping to make adjusting security settings as easy for users as sharing photos, videos or liking their friends’ posts across the social networking service. Facebook said its team conducted research and found most people aren’t sure how their security settings work, or how to start improving the way they protect their personal information.

To address this security challenge, it has moved Trusted Contacts to the top of the security page, for instance, and renamed “login approvals” to the more commonly used “two-factor authentication.” Though it may sound like a more complex term for your average online user, many consumers have likely already been exposed to the concept of two-factor authentication for services they use at work. The International Business Times explained it means Facebook will use text messages that allow customers to approve a login with a verification code before anyone can access their account.

Given how many people are now using Facebook on a mobile device, SecurityWeek noted the company has also changed the “Where You’re Logged In” section of its security settings page. Login location, device, date and time are all laid out in a way that allows consumers to review these details at a glance rather than needing to hunt around for the information.

A New Standard for Security Settings

The changes to its security settings is just part of an ongoing effort by Facebook to encourage more proactive approaches to safeguarding personal data. As Engadget pointed out, Facebook created a set of interactive guides that were published in its Privacy Basics area earlier this year, which allow users to look at their preferences and make adjustments for particular kinds of posts and groups that see them.

BetaNews questioned whether the changes will boost the overall trust in Facebook among the public, but it’s clear the company is no longer leaving anything to chance. Instead, the design of the security setting pages will immediately advise account holders of the available options rather than expecting them to sift through the details themselves. For example, a “Recommended” box will offer suggestions to protect information based on a user’s habits.

Facebook has always been in the business of connecting friends, and it’s now making data protection a friendlier process.

More from

Cyberattack on American Water: A warning to critical infrastructure

3 min read - American Water, the largest publicly traded United States water and wastewater utility, recently experienced a cybersecurity incident that forced the company to disconnect key systems, including its customer billing platform. As the company’s investigation continues, there are growing concerns about the vulnerabilities that persist in the water sector, which has increasingly become a target for cyberattacks. The breach is a stark reminder of the critical infrastructure risks that have long plagued the industry. While the water utility has confirmed that…

What’s behind unchecked CVE proliferation, and what to do about it

4 min read - The volume of Common Vulnerabilities and Exposures (CVEs) has reached staggering levels, placing immense pressure on organizations' cyber defenses. According to SecurityScorecard, there were 29,000 vulnerabilities recorded in 2023, and by mid-2024, nearly 27,500 had already been identified.Meanwhile, Coalition's 2024 Cyber Threat Index forecasts that the total number of CVEs for 2024 will hit 34,888—a 25% increase compared to the previous year. This upward trend presents a significant challenge for organizations trying to manage vulnerabilities and mitigate potential exploits.What’s behind…

Quishing: A growing threat hiding in plain sight

4 min read - Our mobile devices go everywhere we go, and we can use them for almost anything. For businesses, the accessibility of mobile devices has also made it easier to create more interactive ways to introduce new products and services while improving user experiences across different industries. Quick-response (QR) codes are a good example of this in action and help mobile devices quickly navigate to web pages or install new software by simply scanning an image.However, legitimate organizations aren’t the only ones…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today