TSA PreCheck Touchless ID And The Privacy Tradeoff

TSA PreCheck Touchless ID And The Privacy Tradeoff

Social media loves a shortcut, and right now the shortcut getting all the love is TSA PreCheck Touchless ID. Skip the ID handoff at security checkpoints, look at a camera, keep moving. I get why that sounds great, especially with shutdown-related delays turning some airport lines into frustrating security wait times.

Still, convenience is never free. My security mindset and my past work with Homeland Security make me look at programs like this a little differently. As of March 2026, Touchless ID is a free add-on for TSA PreCheck members, it works with participating airlines, and it’s available at more than 60 participating airports. That’s useful. It’s also a moment worth pausing on, because when biometric systems become normal, we rarely get less of them later.

What TSA PreCheck Touchless Actually Does, And Why So Many Travelers Love It

At the basic level, TSA PreCheck Touchless ID is simple. If I already have TSA PreCheck, a participating airline account with my valid passport stored in the airline app, and I opt in, I can use a touchless security lane at some airports. Then, instead of handing over my physical ID and mobile boarding pass, I look at a camera for identity verification and move through faster.

TSA’s own Touchless ID page says the TSA PreCheck Touchless ID program is optional and tied to participating carriers. As of spring 2026, TSA says it’s rolling out to 65 airports. Right now, the hype makes sense because regular security lines feel rougher than usual, and any promise of less waiting gets attention fast.

The Convenience Pitch Is Easy To Understand

If you travel often and opt in, this is an easy sell. Parents are juggling kids, bags, snacks, and phones. Business travelers are trying to make a connection. Everyone else is tired, late, or standing behind someone repacking a carry-on like they’re moving apartments.

So yes, I understand the buzz. A face scan feels easier than digging through a backpack for a license and phone. During the current funding lapse, that pitch gets even stronger because staffing pressure and longer waits make any faster option look smarter.

Busy airport security checkpoint contrasts crowded regular lines of frustrated travelers with an empty touchless lane using facial recognition cameras, modern terminal with bright lighting.

Touchless Still Means Biometric Collection

Here’s the part I don’t want people to blur out. This is facial identification technology, folks! Not magic. Not a harmless shortcut. A camera captures my face and matches it against data already tied to my identity, including passport information and airline records.

That matters because the privacy issue starts the second my face becomes part of the checkpoint routine. Even if the facial scan is quick, and even if the traveler experience feels smooth, my body becomes the credential.

Recent reporting from FedScoop on TSA’s planned biometric collection changes suggests the agency is looking at broader changes around collection, storage, and reuse. That doesn’t mean every scary outcome is already here. It does mean I should stop pretending this is only about shaving a minute off a line.

When my face becomes the ticket, the system starts asking me to trust more than the line speed.

My Big Concern, We Keep Trading Privacy For Speed

Stress changes how people choose. When a line is wrapped around the terminal, most folks aren’t thinking about privacy policy language. They’re thinking, “Please get me through this security lane.”

That’s normal. It’s also why convenience can become the perfect sales pitch for more data collection. The skeptical part of me, the little security superhero sense in my head, keeps coming back to the same point: once TSA PreCheck Touchless ID feels normal in one part of life, it gets easier to accept in the next.

Long Lines Make People Say Yes To Things They’d Normally Question

The current partial government shutdown adds pressure. TSA officers are still working, but the strain is obvious. Real-time reporting says resignations, unscheduled leave, and staffing problems have pushed wait times higher at a bad moment for travelers.

I’m not claiming the shutdown exists to push TSA PreCheck Touchless ID. I am saying it creates the perfect mood for adoption. When people feel squeezed, they accept tools they might question under calmer conditions, which is why more travelers opt in during these stressful times.

That’s why I think this moment matters. Convenience in a crisis has a way of becoming policy by habit.

Optional Today Does Not Always Mean Limited Tomorrow

I’ve watched plenty of programs start narrow and voluntary, then expand over time. That’s the plain-English version of function creep. A tool begins with one use, then picks up more uses, more sharing, and more expectations.

That risk feels more real after reports like USA Today’s coverage of TSA seeking broader biometric data use for PreCheck travelers. When I read stories like that, I start asking boring but important questions. Who gets access? How long do policies stay the same? What happens when a nice opt in option becomes the default lane everyone’s nudged toward?

Carriers like American Airlines, Delta Air Lines, United Airlines, Southwest Airlines, and Alaska Airlines are currently testing these features, often linking the biometric data to your frequent flyer profile or rewards account.

I’m not anti-tech here. I’m anti-sleepwalking.

If The Government Keeps Getting Hacked, Why Would I Want More Sensitive Data In The System

This is where the privacy concern turns into a security concern. No agency can promise perfect protection forever. That’s not cynicism. That’s basic cyber reality.

Biometric data is different from a password. If someone steals my password, I change it. If someone steals a faceprint, fingerprint, or related identity marker like travel documents, I don’t get a reset button. That makes biometric systems higher stakes by design.

Even if TSA limits what it stores from a TSA PreCheck Touchless ID scan at security checkpoints, the larger identity chain still depends on government systems, airline systems for check-in and bag drop, and vendor systems holding sensitive data like Known Traveler Numbers (KTN). That chain only needs one weak link.

Abstract digital visualization of a government data breach with glowing red network lines, breaking locks on servers, and biometric face scans floating into dark cyberspace.

### The OPM Hack Showed How Bad A Government Breach Can Get

The clearest warning sign is still the 2015 OPM breach. Attackers tied to China compromised the Office of Personnel Management and exposed about 21.5 million records. That included background investigation files, Social Security numbers, and fingerprints for 5.6 million people. The Washington Post’s reporting on the Chinese breach of OPM remains one of the clearest reminders of how serious that incident was.

That case matters here for one reason above all: the government has already lost biometric data before. Once fingerprints leaked in that breach, those people couldn’t swap in a fresh set like a new password.

SolarWinds Proved Foreign Adversaries Can Sit Inside Federal Systems For Months

Then came SolarWinds in 2020, which showed a different kind of danger. In that case, attackers linked to Russia slipped malicious code into trusted software updates. Multiple federal agencies got exposed because the supply chain itself became the entry point.

If that sounds scary, it should. It means even systems that look normal and approved can become the problem. NPR’s breakdown of the SolarWinds attack is still a solid read because it shows how long sophisticated actors can stay inside government-related environments before anyone notices.

And this isn’t old history I can shrug off. In March 2026, CNN reported on an FBI investigation into suspicious cyber activity on a critical surveillance network. Different case, same lesson. Government systems remain targets, and state-backed attackers keep hunting for openings.

A Smarter Way To Think About TSA Touchless Before I Opt In

Some travelers will look at this tradeoff and say, “Worth it.” Fair enough. I’m not here to make that choice for anyone. I’m here to say the choice should be made with eyes open.

Before I opt in, I want answers to a few simple questions. What data is used, like my Known Traveler Number or valid passport details? Who stores it? How long is it kept? What happens after a breach? Is the time I save in the security lane worth the privacy cost I might carry for years?

Person at airport kiosk thoughtfully reading phone screen about privacy terms before opting into biometric scan, relaxed pose with hand on chin, modern airport with blurred security line.

### Fast Security Lines Shouldn’t Turn Off My Critical Thinking

I use the same mindset here that I use when I teach people to spot captive portal attacks on airport Wi-Fi. Travel stress makes people click, tap, and agree too fast, especially during check-in or bag drop via the airline app with a mobile boarding pass. Attackers know that. Big systems benefit from that too.

So I slow down. I look for the TSA PreCheck symbol. I read the terms. I carry my physical ID anyway. I remind myself that privacy lost for convenience is hard to win back, even with a linked rewards account.

I’m Not Saying Never, I’m Saying Ask Better Questions

There’s also an important distinction people miss. Not all biometric tech works the same way. With biometric authentication without data sharing, like many passkey setups on your own device, your face or fingerprint often stays local and simply unlocks a cryptographic key. That’s a different model from face matching at a checkpoint tied to broader identity systems.That difference is huge!

I can be pro-efficiency and still demand hard limits, tight retention rules, strong oversight, and plain-English transparency during enrollment. Those things aren’t anti-progress. They’re the minimum.

The hype around TSA PreCheck Touchless ID makes sense, especially when airport lines are ugly, and the shutdown is making travel more frustrating at participating airports, from bag drop to the dedicated lane. Still, my cybersecurity brain keeps coming back to the same problem: every new layer of biometric identity like TSA PreCheck Touchless ID brings new privacy and breach risk with it, even when using the airline app.

I’m not against moving faster through the airport. I’m against giving up more than I realize just to save a few minutes. Before you opt in to these programs, ask those key questions. Then opt in with confidence if the answers satisfy you.

Unmasking the Threat: The Rise of Malware in Android Apps

Unmasking the Threat: The Rise of Malware in Android Apps

In the ever-evolving landscape of cybersecurity, Android users face a new challenge: a surge in malicious applications. Recent findings by McAfee have unearthed a concerning trend of malware-infected Android apps, Xamalicious malware, potentially compromising the security of over 327,000 devices. This alarming revelation calls for an immediate response from Android users, especially those who have downloaded any of the identified apps from Google Play.

The Unseen Enemy: Xamalicious Malware

McAfee’s discovery of the malware, dubbed Xamalicious, reveals a sophisticated attack strategy. These apps, built using Xamarin, a .NET framework, have been lurking undetected, exploiting the complexities of APK file build processes. The malware authors have skillfully combined obfuscation techniques and custom encryption to evade detection while exfiltrating data and communicating with their command-and-control servers.

The Mechanics of the Malware

Once installed, these apps attempt to gain accessibility privileges through social engineering tactics. The most concerning aspect is the potential installation of a second-stage payload. This payload can take full control of the device, functioning like spyware or a banking trojan, operating without user interaction. Additionally, some apps, like Cash Magnet, engage in ad fraud by automatically clicking ads and installing other applications, misleading users with the promise of redeemable retail gift cards

The Global Impact and Response

The scope of this Xamalicious malware outbreak is not limited geographically, with significant activities reported in the US, Brazil, Argentina, UK, Spain, and Germany. Google’s response to McAfee’s report was prompt, resulting in the removal of these apps from the Google Play Store. However, the risk persists for users who have already installed these apps.

A Closer Look at the Affected Apps

Here is a detailed list of the apps identified by McAfee, along with their download statistics:
1. Essential Horoscope for Android (100,000 downloads)
2. 3D Skin Editor for PE Minecraft (100,000 downloads)
3. Logo Maker Pro (100,000 downloads)
4. Auto Click Repeater (10,000 downloads)
5. Count Easy Calorie Calculator (10,000 downloads)
6. Sound Volume Extender (5,000 downloads)
7. LetterLink (1,000 downloads)
8. NUMEROLOGY: PERSONAL HOROSCOPE &NUMBER PREDICTIONS (1,000 downloads)
9. Step Keeper: Easy Pedometer (500 downloads)
10. Track Your Sleep (500 downloads)
11. Sound Volume Booster (100 downloads)
12. Astrological Navigator: Daily Horoscope & Tarot (100 downloads)
13. Universal Calculator (100 downloads)

Protecting Yourself: Steps to Take

1. Immediate Uninstallation: If you have any of these apps installed, uninstall them without delay.
2. Regular Updates: Keep your Android OS and apps updated.
3. Download Wisely: Only install apps from trusted sources.
4. Stay Informed: Regularly check for security updates and alerts.
5. Use Security Software: Install reliable antivirus software on your device.

In conclusion, the discovery of Xamalicious in Android apps serves as a stark reminder of the relentless evolution of cyber threats. Staying vigilant and informed is our best defense against these invisible adversaries. By taking proactive steps and fostering a culture of cybersecurity awareness, we can safeguard our digital lives against such insidious threats.

Raising Cyber-Smart Kids

Raising Cyber-Smart Kids

We all know that raising kids is a skill, but how much more complicated is it now with kids using technology so soon? Young children play on cell phones and hand-held electronics as soon as two years of age or younger. Parents are guilty of using their phones for Netflix, Disney, and whatever else may entertain their children while they, the parents, are trying to get things accomplished. We have discussed this commonality throughout numerous articles with Dale Dumbs IT Down

With all this technology and information on the internet, how can we keep our kids safe and make sure they become cyber-smart? This is not an easy discussion, so we hope this article provides some useful ideas to help you talk to your kids and discuss the importance of cybersecurity and being cyber-smart. Much like we mentioned in How to Teach Your Kids About CyberSecurity and Games, we’ll discuss different ways to help encourage online safety and smart internet practices. 

Raising Cybersmart Kids 

It all starts with the conversations at home. Parents and guardians have the opportunity to provide the best knowledge and education for their children. Unfortunately, schools, daycares, etc., might not share similar philosophies for education or cyber awareness. We stress the conversations at home and encourage you to do what is best for your family. Luckily, there is a plethora of websites (like ours), programs, and games dedicated to helping families raise cyber-smart kids. 

Knowledge is Power

Safer Internet Day (SID) is February 7th, 2023. This organization promotes global education and resources for a safer internet, encouraging people to participate while bringing others together to make the most of the internet’s potential. Their slogan: “Together for a better internet” focuses on their mission of continually promoting safe internet practices. The European Union initially created SID in 2004, and since then, it has grown globally, working with other countries to promote cybersecurity and cyber awareness. Each year, this organization focuses on content and themes our children are experiencing such as cyber bullying, scams, predators, etc. 

LEARN: SID Resources

This global organization works within its network with a larger global resource called INHOPE, which is a European network aiming to help prevent child sexual abuse and materials. INHOPE offers hotlines to protect children from online enticement by predators. Raising our kids to be cyber smart includes identifying what online threats are like sexual enticement, predators, etc. It’s not an easy conversation; however, it’s vital to our children’s online safety. As we shared previously, there are multiple safety apps to help protect our children from unwanted content and to protect them in an emergency. However, acknowledging the threats and teaching our youth is how we can make a difference. 

DISCOVER: Parental Supervision

The National Center for Missing and Exploited Children (NCMEC) discusses the various dangers of online predators and provides resources for parents and guardians. To keep our children safe and cyber-smart, they need to be aware of all the issues out there. Online enticement and sextortion are real issues affecting our youth regularly. Online victimization is the biggest threat to our children. This is where it’s crucial to inform our children of the scary possibilities of online conversations, image sharing, information and identity sharing, and more. We discussed the benefits of Google Family Link in regards to monitoring your children’s online presence and content. Although you can monitor much of your children’s information, as we said before, their schools, friends, etc. might not be as cyber smart or as cyber aware as you’d like. 

TRENDING: North Dakota & Cyber Defense

Cyber Legends

Cyber Legends is a cyber safety and educational online game for kids. The concept is that kids can learn to be cyber smart through the online game and storyline. The plot contains the evil Lord Hacker and evil robots who are causing destruction and mayhem. Station 66 needs help to fight off the evildoers. Kids can pick and choose their characters, gear, and more while exploring Station 66 and avoiding the evil Lord Hacker. 

You can create an account as a parent or guardian to monitor and learn what your children learn. You can set up your kid’s accounts, pick a plan, and start the journey. The cyber educational game is free but offers educators various plans annually per teacher, school, or district. The hope is that this game is introduced in elementary schools, teaching these school-age kids how to protect themselves and others against cyberbullying, stalking, and more. Game designers created various characters and activities to help keep kids cyber-aware and cyber-smart. 

As we discussed before, teaching our kids to be cyber-smart can be challenging, especially when it comes to online enticement and sextortion. Cyber Legends even has a Digital Health Consent for parents and educators to learn how to approach sexual content in the digital world through various situations in Cyber Legends. Parents have a dashboard where they can see these or any other lectures beforehand. 

Cyber Legends provides a safe space for kids and families to learn about being cyber smart and cybersecurity without the added stress. This platform can help back the conversations you’re having at home, bringing attention to the “forever” system the world wide web created while keeping the atmosphere friendly. Use Cyber Legends as another way to provide a defensive educational opportunity to your children so they can understand the repercussions of technology. 

We know that being a parent has many challenges, and we have a lot on our plates. However, it’s up to us to stay in the know about the issues the internet, apps, and games might have. Raising your kids to be cyber smart is raising your kids as cyber aware, cyber secure, and safe from predators. 

Have you read our article on Spotify and porn? Check out How Your Kids Can Access Porn Through Your Spotify. Who would have even imagined? This is why we do what we do as parents. 

RELATED: The Journal

Are Hackers In Your Phone?

Are Hackers In Your Phone?

It feels like there’s a new scam or a new way for hackers to gain access to our information daily. Unfortunately, we cannot even keep up with the new ways, but we can try and inform our readers of what we hear. If you’re unsure of if someone has scammed you or is trying to scam you, there are a few ways of checking to see if you have a hacker in your phone stealing your information. 

Are Hackers In Your Phone?

Believe it or not, hackers will select certain phone operating systems over others like Androids over iPhone due to an open system versus a closed system. Wanna guess which one is open? If you’re an Android user, you already are at a bigger threat level than those that use Apple products. Now Apple users, you are still on a threat level no matter your systems, as hackers do not care one way or another. It’s just whether it’s easier or not and what precautions you need to take. 

Once upon a time, we avoided the internet on our devices because we were so nervous about predators and hackers. Now, we are constantly exposed to hacker attempts regardless of the internet. Almost every single app on your phone can be used to track you and your information. Even Google is guilty of tracking our information. Much like mega social media ruler, TikTok, who has been under legal scrutiny across the nation, no app is safe. There’s simple hacking from someone taking your phone and knowing the password to more advanced hacking like installing stalker software aka stalkerware. 

TRENDING: TikTok and National Security Concerns

Hacker Red Flags

If you’re concerned about your information, here are some of the red flags to see if a hacker is in your phone. If your battery is draining more quickly than usual, then you might have malware running in the background using your data. Most cell phone providers offer apps to show your bill and data usage. You can check to see where your data is and reassess whether you might have a hacker in your phone. Another hacker red flag is spam pop-ups when you’re using your browsers. Often, we can set our settings to block cookies or pop-ups, but if you have a hacker using malware in your phone, you might have more issues. Make sure you know exactly what sites you’re visiting and double-check your security settings. If your phone keeps shutting down, is working slowly, or doing strange things, it’s probably a hacker. Updates often provide us phone users with faster interfaces, so if your phone is still struggling, then you need to check if you have malware or a virus. 

LEARN: Top Security Threats–Reader’s Digest

How To Remove Hackers From Your Phone

We’ve established the signs a hacker might be in your phone, so now let’s talk about how you can remove them. One of the easiest ways to remove a hacker from your phone is to change all your passwords on your accounts and social media apps. Changing passwords can greatly reduce the chances of hackers stealing your information. If you’re interested in stellar passwords, check out our Best Tips For Making Passwords Strong And More Secure for the best information.

After you’ve changed your passwords, you’ll want to make sure all those accounts like Gmail, Facebook, Instagram, and others all have the Two-Factor Authentication system. As a refresher, setting your 2FA up means that when you log into one of your accounts, there is a secondary method to verify that you are the right person logging into the account. You can set this up with your email, your phone number as a call or text, and even a special code per account. If you need to learn how to set up your two-factor authentication on your social media accounts, read up on Setting Up 2FA or What Is Two Factor Authentication.  

Delete any questionable apps or downloads on your phone. If you’re not sure what something is, or you don’t use it frequently, consider removing it from your cell phone. Often, users need to go into their settings and phone system to see files or to see all their downloads. Hackers can sneak malware into everything from PDF files to images and more. If you’re not using it, then it doesn’t need to exist. This will also free up space on your phone, helping the operating system run more smoothly. If it doesn’t? Then you have a hacker in your phone. 

DISCOVER: Hacking Humans–Podcasts

How To Keep Hackers Away

Besides keeping the above tips in check, you’ll want to start some good digital habits. For example, make sure you’re not using unsecured wifi or open hotspots when using your phone. The same rule applies to your Bluetooth, as hackers can connect to your phone using wifi, hotspots, and your Bluetooth connections. If you’re out and about, needing to charge your phone, you need to be careful about using charging stations or charging cords. These are often unmonitored and very tempting to hackers. The next time you’re at the airport, it might be smarter to just go buy a new charger at that little convenience store on the corner of the terminal. 

If you’re on your home network, then we recommend firewalls and security systems. Much like you’d want to protect your family with locks on the doors or a security system for intruders, you’ll want to secure your family’s personal and private digital information. Check out our suggestion for Monitoring Your Home Network and learn more about protecting your digital footprint. We also suggest getting a VPN router to keep your home network and information secure, preventing hackers from stealing your info. Learn about the Best VPN Routers.

Maintaining a safe and secure digital life is challenging. Hackers are determined to get into your phone and other devices, steal your information, and cause chaos. Use these tips to find, remove, and prevent hackers from scamming your and your loved ones. 

RELATED: South Dakota Gov. Phone Hacked

The Top iPhone Security Settings You Need To Configure NOW!

The Top iPhone Security Settings You Need To Configure NOW!

iPhones are incredibly powerful and versatile devices, but they can also be vulnerable to malicious attacks if the proper security measures aren’t taken. I’m floored at how many parents I know that buy their kids new phones and just hand them to their children with no caution or security measures put in place. Parents of iPhone users need to take the time to set up their kids’ phones properly in order to keep them safe from any potential threats because there are a LOT out there. 

And these easy iPhone security settings aren’t just for kids either. I also see adults get their new iPhones and just go at it with no proper security measures. Here are some of the most important security settings you should set up right away on your iPhone.

Disable Location Services

Location services allow apps and websites to track your location, which can be a huge privacy intrusion. You can prevent this by disabling location services for all apps on your iPhone. Go into Settings > Privacy > Location Services and toggle the switch off. You can also disable location services for specific apps or allow them only when using the app (in other words, not tracking you in the background). 

DISCOVER: Update Your Phone’s iOS Right Now For Screen Time Security

This is important because many apps contain targeted ads that use geolocation data in order to show relevant content based on where you are located. I prefer to enable this on an app-by-app basis because I do want Maps to use my location, but only while I’m using it.  

Enable Mail Privacy Protection

This security feature is one of my favorites for the iPhone. Essentially, what mail privacy does is hide your IP address from senders. This makes it nearly impossible to track your activity and location from your device. So, why should you enable mail privacy protection on your iPhone? Well, it’s all about ensuring that the mail sent and received on your device stays secure! Having mail privacy protection enabled guarantees an extra layer of security for your sensitive mail, making sure only you have access to its contents. 

TRENDING: Our Bluetooth Tracker Review

Additionally, mail privacy protection can also help reduce spam mail since it filters out suspicious links and malicious content hiding within emails. All you need to do is go to Settings > Mail > Privacy Protection and enable Protect Mail Activity.

Enable Screen Time Restrictions

Screen Time is a great tool that allows parents to control how much time their children spend on their phones each day. I know adults that enable it for themselves as well to help keep them on task. You can limit certain apps and even block access completely after a certain amount of time has passed each day. 

LEARN MORE: How To Set Up Screen Time For Families

To enable Screen Time restrictions, go into Settings > Screen Time and follow the directions from there. It’s also important to make sure that your child doesn’t have access to any passwords or passcodes that would allow them to bypass these restrictions once enabled.

Turn Off Siri Suggestions

Siri Suggestions is an optional feature that allows Siri to suggest contacts and other information based on what it knows about you. While this feature can be helpful, it could also potentially reveal sensitive information about your device if someone were able to gain access to the phone without permission. To turn off Siri Suggestions, go into Settings > Siri & Search and toggle off the “Suggestions” switch at the top of the screen.

RELATED: Do Not Plug This OMG Cable Into Your Device!

Enable Find My App

One of the best security settings for the iPhone is the Find My feature. Find My for iPhones is the ultimate tool for your digital life: you know that everything important to you is kept safe and sound. With features like location tracking and lost device alerts, it’s basically like having a personal assistant in your back pocket. Find My for iPhones is a great security tool, making it easy to find your device or a family member’s if it’s ever lost or stolen.

Don’t Allow Apps To Track You

There are lots of great reasons not to allow apps to track you on your iPhone. It not only keeps your personal data much more secure, but it also gives you peace of mind knowing that no app is snooping around in your life without your permission. Not only that, not allowing apps to track you means extra protection against ads popping up out of nowhere. 

BOOKMARK THIS: Stop Your Phone’s App From Tracking You

Some people like to be hit with personalized ads because they say it lends itself to a better user experience with their devices. But at what cost? Your personal data? Your privacy? Who needs that kind of intrusion? Bottom line, not allowing apps to track you is a must if you want to enjoy using your phone stress-free and get rid of any potential digital stalking attempts. Plus, who doesn’t love being in control?

Securing Your iPhone Is Really Easy

Keeping your iPhone as secure as possible doesn’t have to be complicated or time-consuming. Seriously, just a few simple steps will do wonders for protecting your digital privacy and ensuring your safety online with your devices. Be sure to disable location services, enable Screen Time restrictions, and turn off Siri Suggestions and all these other security features as soon as possible in order to help your iPhone stay secure! With these settings in place, you can rest assured knowing that your devices and personal data are protected from potential threats while still enjoying your device safely and responsibly.

Setting Up 2FA on Social Media Accounts

Setting Up 2FA on Social Media Accounts

If you’re into social media, have a social media account, or even if you have an email then you’ll want to know how to protect your account. Setting up two-factor authentication is the best way to keep your accounts safe. In other words, a 2FA prevents hackers from stealing your information and identity. 

What Is Two-Factor Authentication? 

If you remember from our previous article on two-factor authentication, there are a few ways 2FAs work. Most 2FAs have the option of your password and either a phone number backup or email backup in which your social media account will then verify your login via one of the mentioned backups. This is probably the most common way many users get back into their accounts when they forget their password or when they need to log in. You can receive a phone call or a text message with a security code if you chose to have your phone number as your second verification. If you choose your email as your 2FA, then the social media system will send you an email with a code or link to input. You can also choose to use a biometric established on your phone already (face recognition or fingerprint). These are security measures uniquely to you. 

Facebook 2FA

If you have a Facebook account, setting up your two-factor authentication is pretty easy. For any mobile device, the pathway to setting up your 2FA is the easy. You select your Facebook profile and the next screen shows the menu below. 

  • Select Settings & Privacy
  • A menu drops down for Settings
  • This screen will show your Profile, Account, Security, Ads, and Legal and Policies
  • Select Security which takes you to Security and Login.
  • You’ll see the Two-Factor Authentication
  • Next, will be the edit option which will prompt you to put in your current password and lead you to your 2FA settings. 
  • This page allows you to see if your 2FA is on, as well as what security methods you’ve selected. You can select a backup method as well, from security recovery codes and security keys. 

If you’re on a desktop computer or laptop, here are the steps to setting up your 2FA. 

  • Go to your profile picture or hover over it on the right side of your screen. It will drop down a menu with Settings and Privacy. Selecting this option will add another menu where you can select Settings. This option will then load a new page for all settings and privacy information. On the left-hand side, you will see the option for Security and Login, which is the menu you’ll want to select for setting up your two-factor authentication. 
  • On the Security and Login page you’ll see sections for Recommended, Where You’re Logged in, Login, Two-Factor Authentication, Setting Up Extra Security, and Advanced setting options. 
  • In the Two-Factor Authentication, you’ll see an edit option. This option will prompt you to put in your current password and lead you to your 2FA settings. 
  • This page allows you to see if your 2FA is on, as well as what security methods you’ve selected. You can select a backup method as well, from security recovery codes and security keys. 

Whatever method you choose for your 2FA will heighten your account’s security and prevent your account from getting hacked. 

Instagram 2FA

Instagram and Facebook are similar platforms for security and two-factor authentication because they are owned jointly through Meta (AKA Mark Zuckerberg). Since they are both under the same company, you can use each account as another verification method for logging in. 

For mobile devices, you’ll select the three lines associated with your profile account either in the upper right corner or in the bottom left. 

  • The menu will pop up with another menu–select Settings
  • From there you’ll want to select Security 
  • Next, you will select Two-factor Authentication 
  • You can select login codes, an authentication app, WhatsApp, and text messages, as well as an option for additional methods and trusted devices. 

If your two-factor authentication is on, Instagram will let you know as you enter that setting. 

For home computers, your menu option will appear on the left side of the screen. It’s been a minute since I’ve even logged in on my laptop, so I was surprised at the display changes.

  • Lower left, select Menu which pops up a mini window
  • Then select Settings, which opens your Profile tab on the right 
  • Find Privacy and Security
  • Scroll down to Two-factor Authentication 

Instagram and Facebook both allow users to purchase on their apps. You can create and purchase advertising from Meta, for your personal and business use. Other businesses and merchandise shops can suggest products for users, and you can buy directly from these apps. That being said, you can add a credit or debit card to your account for these purchases. Tempting as that may be, it does come with the risk of someone hacking your account and using your credit cards. Setting up your 2FA helps reduce this risk, as you’ll know where you’re logged in and on what accounts. However, we also discuss Why You Need Notifications For All Your Credit Card Transactions, so if you need more reasons–be sure to check that out. 

TikTok 2FA

TikTok is another major social media outlet, and if you or your children are using this app, at the very least, set up the two-factor authentication setting. For your mobile devices, you’ll want to go to your profile and find the three lines for the menu option, probably in the upper right corner.

  • Select the Menu, which pulls up a mini window
  • Select the Settings and Privacy option
  • In the Account section, select the Security option
  • 2-step Verification is the last menu option
    • Here you can select from a text message, email, or password in which you will add your phone number, email, or input a password. 
    • If you selected the phone number or email, TikTok will send you a special code to verify your account choices. 

For desktop/laptop logins, you’ll hover over your profile in the right-hand corner, in which a menu will pop up.

  • Select Settings, which opens up an account screen
  • I’ll be completely honest–Privacy and Settings open but yields no way for me to even find a 2FA. 

This company has failed to adequately create a user-friendly desktop site and has failed in aiding in the privacy and well-being of its users. (TikTok isn’t Protecting your kids)

We’ll be honest, social media has pros and cons, and as a family, you get to choose what is best for you and your children. When it comes to the security of your accounts, having a two-factor authentication can help avoid hackers and spamming. You and your children’s safety is always at risk when getting on the internet. Use this as a guide to set up 2FAs on the most common social media sites like Facebook, Instagram, and TikTok

If you’re looking to monitor your children’s usage of any of these apps, make sure you check out our review of Google’s Family Link as a suggestion. You’ll find other features and benefits there as well. 

Pin It on Pinterest