{"id":128260,"date":"2023-06-21T11:27:47","date_gmt":"2023-06-21T11:27:47","guid":{"rendered":"https:\/\/www.phorest.com\/?p=128260"},"modified":"2023-06-21T13:06:16","modified_gmt":"2023-06-21T13:06:16","slug":"two-factor-authentication-explained","status":"publish","type":"post","link":"https:\/\/www.phorest.com\/gb\/blog\/two-factor-authentication-explained\/","title":{"rendered":"Protecting Your Instagram &#038; Facebook From Hackers: Two-Factor Authentication Explained"},"content":{"rendered":"\n<p>Do you use Instagram and Facebook to promote your business every week? What would you do if these advertising platforms were suddenly taken away from you? Have you ever worried about your Instagram account being hacked or stolen by someone else?&nbsp;<\/p>\n\n\n\n<p>We all have heard horror stories of businesses that have <a href=\"https:\/\/www.phorest.com\/blog\/5-ways-to-improve-your-salons-social-media-presence\/\" target=\"_blank\" rel=\"noreferrer noopener\">amassed an online following <\/a>and then suddenly lose control of their account to hackers and cannot get it back, no matter how hard they\u2019ve tried. Sadly, due to a rise in online hacking and security breaches, this is becoming more common.&nbsp;<\/p>\n\n\n\n<p>It is essential to be proactive. Take the necessary precautions now to protect yourself from hackers and prevent the worst-case scenario from happening to your business.&nbsp; Two-factor authentication is one of the main ways you can secure your <a href=\"https:\/\/www.phorest.com\/blog\/the-salon-owners-guide-to-social-media\/\" target=\"_blank\" rel=\"noreferrer noopener\">social media<\/a> accounts.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>But wait, what is two-factor authentication, and why do you need it?<\/strong><\/h2>\n\n\n\n<p>Two-factor authentication, also known as 2FA, is a security process that adds an extra layer of security to your social media accounts. Two-factor authentication drastically reduces the chances of fraud, page loss, or identity theft. When you have 2FA&nbsp; switched on, it makes it harder for a hacker to access your social media account, information and followers. Let\u2019s take Instagram, for example.&nbsp;<\/p>\n\n\n\n<p>When you log into Instagram from a new device, you are required to enter your username and password. However, if you have 2FA turned on, you are also required to enter a unique code sent to your phone, typically via text message or an authentication app, to log in successfully. This way, even if a hacker manages to steal your password\/login details, they still can&#8217;t access your account without the second piece of information (the unique code).<\/p>\n\n\n\n<p>If you have yet to turn on two-factor authentication, you are putting your accounts at risk every day. You might think you\u2019re safe from hackers because you have a strong and complex password, but this is far from the truth. Yes, passwords do protect your account to a certain degree, but they\u2019re far from perfect and can also be compromised through no fault of your own.\u00a0 Hackers can still use a variety of intricate tactics to steal your account information, gain access to your social media pages and take full control of your accounts. Two-factor authentication helps to prevent this by requiring the unique code sent to your device to access your account, making it much more difficult for a hacker to break in.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Another benefit of using 2FA is that it can notify you if someone else is trying to log into your account. <\/h3>\n\n\n\n<p>If you receive a code without having tried to log in yourself, it&#8217;s a red flag that someone else is attempting to access your account unauthorised. You can then change your password and take the necessary steps to secure your account to prevent further unauthorised access attempts.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/d2dfxqxblmblx4.cloudfront.net\/wp-content\/uploads\/2023\/06\/21111208\/Twitter-Post_Blog-Image-PHORESTDUBLINEDIT-234-1024x576.jpg\" alt=\"\" class=\"wp-image-128242\" srcset=\"https:\/\/d2dfxqxblmblx4.cloudfront.net\/wp-content\/uploads\/2023\/06\/21111208\/Twitter-Post_Blog-Image-PHORESTDUBLINEDIT-234-1024x576.jpg 1024w, https:\/\/d2dfxqxblmblx4.cloudfront.net\/wp-content\/uploads\/2023\/06\/21111208\/Twitter-Post_Blog-Image-PHORESTDUBLINEDIT-234-300x169.jpg 300w, https:\/\/d2dfxqxblmblx4.cloudfront.net\/wp-content\/uploads\/2023\/06\/21111208\/Twitter-Post_Blog-Image-PHORESTDUBLINEDIT-234-768x432.jpg 768w, https:\/\/d2dfxqxblmblx4.cloudfront.net\/wp-content\/uploads\/2023\/06\/21111208\/Twitter-Post_Blog-Image-PHORESTDUBLINEDIT-234.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How to set up 2FA on Instagram:<\/strong><\/h2>\n\n\n\n<p>Setting up two-factor authentication on Instagram is really easy. Simply go to your profile, click on the three lines in the top right corner, select <strong>&#8220;Settings,&#8221;<\/strong> and then &#8220;<strong>Security.<\/strong>&#8221; From there, choose <strong>&#8220;Two-Factor Authentication&#8221;<\/strong> and follow the prompts to enable it for your account.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How to set up 2FA on Facebook:<\/strong><\/h2>\n\n\n\n<p>Log into your Facebook account and click on the arrow pointing down in the top right corner of the page. Select <strong>&#8220;Settings and Privacy&#8221;<\/strong> from the dropdown menu, then click <strong>&#8220;Security and Login.&#8221;<\/strong> Scroll down until you see the <strong>&#8220;Two-Factor Authentication&#8221;<\/strong> option and click &#8220;Edit.&#8221; Choose your preferred authentication method and follow the prompts to enable it for your account.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">And that&#8217;s it! It really is that simple. <\/h3>\n\n\n\n<p>With two-factor authentication enabled on your account, you can rest easy knowing that your information is much safer. But please remember to be mindful of who has access to your business accounts and never share your password or authentication code with anyone you don\u2019t trust. Unfortunately, hacking threats are even more severe and complex today. The more security-conscious every member of your team is, the harder it becomes for hackers to target them. Remember that Instagram\/Facebook will never call or email you asking for your login details or 2FA codes.&nbsp;<\/p>\n\n\n\n<p>So why not add that extra layer of security and take a few minutes to enable two-factor authentication on your Instagram &amp; Facebook accounts today? Remind your staff to be mindful of scams and encourage them to enable 2FA on their accounts &#8211; it is available for both personal and business pages. <br><br>Better safe than sorry!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Do you use Instagram and Facebook to promote your business every week? What would you do if these advertising platforms were suddenly taken away from you? Have you ever worried about your Instagram account being hacked or stolen by someone else?&nbsp; We all have heard horror stories of businesses that have amassed an online following &hellip; <a href=\"https:\/\/www.phorest.com\/gb\/blog\/two-factor-authentication-explained\/\">Continued<\/a><\/p>\n","protected":false},"author":40084,"featured_media":128237,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1247,1276],"tags":[12273,12271,12274,12272,1310],"class_list":["post-128260","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-online-social","category-social-media-online-social","tag-2fa-gb","tag-hacks-gb","tag-password-gb","tag-security-gb","tag-social-media-gb"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Protecting Your Instagram &amp; Facebook From Hackers: Two-Factor Authentication Explained | Phorest<\/title>\n<meta name=\"description\" content=\"Be proactive to avoid the worst-case scenario. Here&#039;s how to set up two-factor authentication to protect your social media from hackers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.phorest.com\/gb\/blog\/two-factor-authentication-explained\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting Your Instagram &amp; Facebook From Hackers: Two-Factor Authentication Explained | Phorest\" \/>\n<meta property=\"og:description\" content=\"Be proactive to avoid the worst-case scenario. Here&#039;s how to set up two-factor authentication to protect your social media from hackers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.phorest.com\/gb\/blog\/two-factor-authentication-explained\/\" \/>\n<meta property=\"og:site_name\" content=\"Phorest\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/phorestsalonsoftware\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-21T11:27:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-21T13:06:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/d2dfxqxblmblx4.cloudfront.net\/wp-content\/uploads\/2023\/06\/21111144\/Twitter-Post_Blog-Image-PHORESTBRIS_004-150x150.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Eilish Boyle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/d2dfxqxblmblx4.cloudfront.net\/wp-content\/uploads\/2023\/06\/21111144\/Twitter-Post_Blog-Image-PHORESTBRIS_004-150x150.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@thephorestword\" \/>\n<meta name=\"twitter:site\" content=\"@thephorestword\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eilish Boyle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.phorest.com\/gb\/blog\/two-factor-authentication-explained\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.phorest.com\/gb\/blog\/two-factor-authentication-explained\/\"},\"author\":{\"name\":\"Eilish Boyle\",\"@id\":\"https:\/\/www.phorest.com\/gb\/#\/schema\/person\/18986b708c123a645ef1be7ab988841a\"},\"headline\":\"Protecting Your Instagram &#038; Facebook From Hackers: Two-Factor Authentication Explained\",\"datePublished\":\"2023-06-21T11:27:47+00:00\",\"dateModified\":\"2023-06-21T13:06:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.phorest.com\/gb\/blog\/two-factor-authentication-explained\/\"},\"wordCount\":773,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.phorest.com\/gb\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.phorest.com\/gb\/blog\/two-factor-authentication-explained\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/d2dfxqxblmblx4.cloudfront.net\/wp-content\/uploads\/2023\/06\/21111144\/Twitter-Post_Blog-Image-PHORESTBRIS_004.jpg\",\"keywords\":[\"2FA\",\"hacks\",\"password\",\"security\",\"social media\"],\"articleSection\":[\"Online &amp; Social\",\"Social Media\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.phorest.com\/gb\/blog\/two-factor-authentication-explained\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.phorest.com\/gb\/blog\/two-factor-authentication-explained\/\",\"url\":\"https:\/\/www.phorest.com\/gb\/blog\/two-factor-authentication-explained\/\",\"name\":\"Protecting Your Instagram & Facebook From Hackers: Two-Factor Authentication Explained | Phorest\",\"isPartOf\":{\"@id\":\"https:\/\/www.phorest.com\/gb\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.phorest.com\/gb\/blog\/two-factor-authentication-explained\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.phorest.com\/gb\/blog\/two-factor-authentication-explained\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/d2dfxqxblmblx4.cloudfront.net\/wp-content\/uploads\/2023\/06\/21111144\/Twitter-Post_Blog-Image-PHORESTBRIS_004.jpg\",\"datePublished\":\"2023-06-21T11:27:47+00:00\",\"dateModified\":\"2023-06-21T13:06:16+00:00\",\"description\":\"Be proactive to avoid the worst-case scenario. Here's how to set up two-factor authentication to protect your social media from hackers.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.phorest.com\/gb\/blog\/two-factor-authentication-explained\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.phorest.com\/gb\/blog\/two-factor-authentication-explained\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.phorest.com\/gb\/blog\/two-factor-authentication-explained\/#primaryimage\",\"url\":\"https:\/\/d2dfxqxblmblx4.cloudfront.net\/wp-content\/uploads\/2023\/06\/21111144\/Twitter-Post_Blog-Image-PHORESTBRIS_004.jpg\",\"contentUrl\":\"https:\/\/d2dfxqxblmblx4.cloudfront.net\/wp-content\/uploads\/2023\/06\/21111144\/Twitter-Post_Blog-Image-PHORESTBRIS_004.jpg\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.phorest.com\/gb\/blog\/two-factor-authentication-explained\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.phorest.com\/gb\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protecting Your Instagram &#038; Facebook From Hackers: Two-Factor Authentication Explained\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.phorest.com\/gb\/#website\",\"url\":\"https:\/\/www.phorest.com\/gb\/\",\"name\":\"Phorest\",\"description\":\"Salon Software for Hair, Beauty, Barber &amp; Spa Businesses\",\"publisher\":{\"@id\":\"https:\/\/www.phorest.com\/gb\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.phorest.com\/gb\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.phorest.com\/gb\/#organization\",\"name\":\"Phorest Salon Software\",\"url\":\"https:\/\/www.phorest.com\/gb\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.phorest.com\/gb\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/d2dfxqxblmblx4.cloudfront.net\/wp-content\/uploads\/2019\/10\/24141402\/phorest-acorn-logo1.png\",\"contentUrl\":\"https:\/\/d2dfxqxblmblx4.cloudfront.net\/wp-content\/uploads\/2019\/10\/24141402\/phorest-acorn-logo1.png\",\"width\":201,\"height\":202,\"caption\":\"Phorest Salon Software\"},\"image\":{\"@id\":\"https:\/\/www.phorest.com\/gb\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/phorestsalonsoftware\",\"https:\/\/x.com\/thephorestword\",\"https:\/\/instagram.com\/phorest_salon_software\",\"https:\/\/www.linkedin.com\/company\/phorest?trk=company_name\",\"https:\/\/www.pinterest.com\/phorestss\/\",\"https:\/\/plus.google.com\/u\/0\/b\/101418954139594616916\/101418954139594616916\/posts\/p\/pub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.phorest.com\/gb\/#\/schema\/person\/18986b708c123a645ef1be7ab988841a\",\"name\":\"Eilish Boyle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.phorest.com\/gb\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/d2dfxqxblmblx4.cloudfront.net\/wp-content\/uploads\/2023\/05\/24085204\/Eilish-150x150.png\",\"contentUrl\":\"https:\/\/d2dfxqxblmblx4.cloudfront.net\/wp-content\/uploads\/2023\/05\/24085204\/Eilish-150x150.png\",\"caption\":\"Eilish Boyle\"},\"description\":\"Eilish Boyle is Phorest Salon Software\u2019s Global Social Media Strategy Manager. She is passionate about all things Marketing and Social Media with experience executing dynamic marketing campaigns across a variety of industries. Eilish has a proven track record of refining content strategy and using social media to enhance campaign performance. A former Marketing Manager for one of Ireland's leading online beauty stores, Eilish now oversees all things Social Media at Phorest and contributes to the Phorest blog with tips and tricks to help salon and spa owners elevate their social media presence.\",\"sameAs\":[\"https:\/\/www.phorest.com\/\"],\"url\":\"https:\/\/www.phorest.com\/gb\/blog\/author\/eilish-boylephorest-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protecting Your Instagram & Facebook From Hackers: Two-Factor Authentication Explained | Phorest","description":"Be proactive to avoid the worst-case scenario. Here's how to set up two-factor authentication to protect your social media from hackers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.phorest.com\/gb\/blog\/two-factor-authentication-explained\/","og_locale":"en_GB","og_type":"article","og_title":"Protecting Your Instagram & Facebook From Hackers: Two-Factor Authentication Explained | Phorest","og_description":"Be proactive to avoid the worst-case scenario. Here's how to set up two-factor authentication to protect your social media from hackers.","og_url":"https:\/\/www.phorest.com\/gb\/blog\/two-factor-authentication-explained\/","og_site_name":"Phorest","article_publisher":"https:\/\/www.facebook.com\/phorestsalonsoftware","article_published_time":"2023-06-21T11:27:47+00:00","article_modified_time":"2023-06-21T13:06:16+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/d2dfxqxblmblx4.cloudfront.net\/wp-content\/uploads\/2023\/06\/21111144\/Twitter-Post_Blog-Image-PHORESTBRIS_004-150x150.jpg","type":"image\/jpeg"}],"author":"Eilish Boyle","twitter_card":"summary_large_image","twitter_image":"https:\/\/d2dfxqxblmblx4.cloudfront.net\/wp-content\/uploads\/2023\/06\/21111144\/Twitter-Post_Blog-Image-PHORESTBRIS_004-150x150.jpg","twitter_creator":"@thephorestword","twitter_site":"@thephorestword","twitter_misc":{"Written by":"Eilish Boyle","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.phorest.com\/gb\/blog\/two-factor-authentication-explained\/#article","isPartOf":{"@id":"https:\/\/www.phorest.com\/gb\/blog\/two-factor-authentication-explained\/"},"author":{"name":"Eilish Boyle","@id":"https:\/\/www.phorest.com\/gb\/#\/schema\/person\/18986b708c123a645ef1be7ab988841a"},"headline":"Protecting Your Instagram &#038; Facebook From Hackers: Two-Factor Authentication Explained","datePublished":"2023-06-21T11:27:47+00:00","dateModified":"2023-06-21T13:06:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.phorest.com\/gb\/blog\/two-factor-authentication-explained\/"},"wordCount":773,"commentCount":0,"publisher":{"@id":"https:\/\/www.phorest.com\/gb\/#organization"},"image":{"@id":"https:\/\/www.phorest.com\/gb\/blog\/two-factor-authentication-explained\/#primaryimage"},"thumbnailUrl":"https:\/\/d2dfxqxblmblx4.cloudfront.net\/wp-content\/uploads\/2023\/06\/21111144\/Twitter-Post_Blog-Image-PHORESTBRIS_004.jpg","keywords":["2FA","hacks","password","security","social media"],"articleSection":["Online &amp; Social","Social Media"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.phorest.com\/gb\/blog\/two-factor-authentication-explained\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.phorest.com\/gb\/blog\/two-factor-authentication-explained\/","url":"https:\/\/www.phorest.com\/gb\/blog\/two-factor-authentication-explained\/","name":"Protecting Your Instagram & Facebook From Hackers: Two-Factor Authentication Explained | Phorest","isPartOf":{"@id":"https:\/\/www.phorest.com\/gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.phorest.com\/gb\/blog\/two-factor-authentication-explained\/#primaryimage"},"image":{"@id":"https:\/\/www.phorest.com\/gb\/blog\/two-factor-authentication-explained\/#primaryimage"},"thumbnailUrl":"https:\/\/d2dfxqxblmblx4.cloudfront.net\/wp-content\/uploads\/2023\/06\/21111144\/Twitter-Post_Blog-Image-PHORESTBRIS_004.jpg","datePublished":"2023-06-21T11:27:47+00:00","dateModified":"2023-06-21T13:06:16+00:00","description":"Be proactive to avoid the worst-case scenario. Here's how to set up two-factor authentication to protect your social media from hackers.","breadcrumb":{"@id":"https:\/\/www.phorest.com\/gb\/blog\/two-factor-authentication-explained\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.phorest.com\/gb\/blog\/two-factor-authentication-explained\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.phorest.com\/gb\/blog\/two-factor-authentication-explained\/#primaryimage","url":"https:\/\/d2dfxqxblmblx4.cloudfront.net\/wp-content\/uploads\/2023\/06\/21111144\/Twitter-Post_Blog-Image-PHORESTBRIS_004.jpg","contentUrl":"https:\/\/d2dfxqxblmblx4.cloudfront.net\/wp-content\/uploads\/2023\/06\/21111144\/Twitter-Post_Blog-Image-PHORESTBRIS_004.jpg","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/www.phorest.com\/gb\/blog\/two-factor-authentication-explained\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.phorest.com\/gb\/"},{"@type":"ListItem","position":2,"name":"Protecting Your Instagram &#038; Facebook From Hackers: Two-Factor Authentication Explained"}]},{"@type":"WebSite","@id":"https:\/\/www.phorest.com\/gb\/#website","url":"https:\/\/www.phorest.com\/gb\/","name":"Phorest","description":"Salon Software for Hair, Beauty, Barber &amp; Spa Businesses","publisher":{"@id":"https:\/\/www.phorest.com\/gb\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.phorest.com\/gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.phorest.com\/gb\/#organization","name":"Phorest Salon Software","url":"https:\/\/www.phorest.com\/gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.phorest.com\/gb\/#\/schema\/logo\/image\/","url":"https:\/\/d2dfxqxblmblx4.cloudfront.net\/wp-content\/uploads\/2019\/10\/24141402\/phorest-acorn-logo1.png","contentUrl":"https:\/\/d2dfxqxblmblx4.cloudfront.net\/wp-content\/uploads\/2019\/10\/24141402\/phorest-acorn-logo1.png","width":201,"height":202,"caption":"Phorest Salon Software"},"image":{"@id":"https:\/\/www.phorest.com\/gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/phorestsalonsoftware","https:\/\/x.com\/thephorestword","https:\/\/instagram.com\/phorest_salon_software","https:\/\/www.linkedin.com\/company\/phorest?trk=company_name","https:\/\/www.pinterest.com\/phorestss\/","https:\/\/plus.google.com\/u\/0\/b\/101418954139594616916\/101418954139594616916\/posts\/p\/pub"]},{"@type":"Person","@id":"https:\/\/www.phorest.com\/gb\/#\/schema\/person\/18986b708c123a645ef1be7ab988841a","name":"Eilish Boyle","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.phorest.com\/gb\/#\/schema\/person\/image\/","url":"https:\/\/d2dfxqxblmblx4.cloudfront.net\/wp-content\/uploads\/2023\/05\/24085204\/Eilish-150x150.png","contentUrl":"https:\/\/d2dfxqxblmblx4.cloudfront.net\/wp-content\/uploads\/2023\/05\/24085204\/Eilish-150x150.png","caption":"Eilish Boyle"},"description":"Eilish Boyle is Phorest Salon Software\u2019s Global Social Media Strategy Manager. She is passionate about all things Marketing and Social Media with experience executing dynamic marketing campaigns across a variety of industries. Eilish has a proven track record of refining content strategy and using social media to enhance campaign performance. A former Marketing Manager for one of Ireland's leading online beauty stores, Eilish now oversees all things Social Media at Phorest and contributes to the Phorest blog with tips and tricks to help salon and spa owners elevate their social media presence.","sameAs":["https:\/\/www.phorest.com\/"],"url":"https:\/\/www.phorest.com\/gb\/blog\/author\/eilish-boylephorest-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.phorest.com\/gb\/wp-json\/wp\/v2\/posts\/128260","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.phorest.com\/gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.phorest.com\/gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.phorest.com\/gb\/wp-json\/wp\/v2\/users\/40084"}],"replies":[{"embeddable":true,"href":"https:\/\/www.phorest.com\/gb\/wp-json\/wp\/v2\/comments?post=128260"}],"version-history":[{"count":2,"href":"https:\/\/www.phorest.com\/gb\/wp-json\/wp\/v2\/posts\/128260\/revisions"}],"predecessor-version":[{"id":128277,"href":"https:\/\/www.phorest.com\/gb\/wp-json\/wp\/v2\/posts\/128260\/revisions\/128277"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.phorest.com\/gb\/wp-json\/wp\/v2\/media\/128237"}],"wp:attachment":[{"href":"https:\/\/www.phorest.com\/gb\/wp-json\/wp\/v2\/media?parent=128260"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.phorest.com\/gb\/wp-json\/wp\/v2\/categories?post=128260"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.phorest.com\/gb\/wp-json\/wp\/v2\/tags?post=128260"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}