CSO - Just a day after security firm Sophos publicly took Facebook to task for lacking important security features, the social network has added some new security elements in what it says is an effort to "make Facebook a more trusted environment."
In a blog post this week, Arturo Bejar, a director of engineering with Facebook, explained the new upgrades. The most noteworthy feature in the announcement is the introduction of two-factor authentication. According to the blog post, users who turn on the new feature will be asked to enter a code anytime the user tries to log into Facebook from a new device.
Bejar also said the network was "improving" on its already introduced HTTPS feature, which was announced in January.
Also see: 10 security reasons to quit Facebook
"We're improving HTTPS so if you start using a non-HTTPS application on Facebook, we automatically switch your session back to HTTPS when you're finished," explained Bejar.
However, some security professionals, such as Sophos' Graham Cluley, argue HTTPS should be on all the time. In his open letter to Facebook, he noted the feature is turned off by default, which means many users are not even aware that it is possible to enable it.
"Worse, you only commit to provide a secure connection 'whenever possible,'" Cluley said."Facebook should enforce a secure connection all the time, by default. Without this protection, your users are at risk of losing personal information to hackers. "
The other new features were announced last month at a White House conference on bullying prevention and address many of the concerns and issues around teen use of the network. They include a newly-redesigned Family Safety Center where parents and teens can find articles and videos on safety and privacy. Facebook will also be providing a free, downloadable guide for teachers, written by safety experts Linda Fogg Phillips, B.J. Fogg and Derek Baird.
Lastly, Facebook has added a new social reporting tool that allows people to notify a member of their community, in addition to Facebook, when they see something they don't like.
"Safety and child psychology experts tell us that online issues are frequently a reflection of what is happening offline." Bejar said. "By encouraging people to seek help from friends, we hope that many of these situations can be resolved face to face. The impact has been encouraging, and we're now expanding social reporting to other major sections of Facebook, including Profiles, Pages and Groups."
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts