<?xml version="1.0" encoding="UTF-8"?><feed
	xmlns="http://www.w3.org/2005/Atom"
	xmlns:thr="http://purl.org/syndication/thread/1.0"
	xml:lang="en-US"
	>
	<title type="text">David Strom | The Verge</title>
	<subtitle type="text">The Verge is about technology and how it makes us feel. Founded in 2011, we offer our audience everything from breaking news to reviews to award-winning features and investigations, on our site, in video, and in podcasts.</subtitle>

	<updated>2022-01-15T13:30:00+00:00</updated>

	<link rel="alternate" type="text/html" href="https://www.theverge.com/author/david-strom" />
	<id>https://www.theverge.com/authors/david-strom/rss</id>
	<link rel="self" type="application/atom+xml" href="https://www.theverge.com/authors/david-strom/rss" />

	<icon>https://platform.theverge.com/wp-content/uploads/sites/2/2025/01/verge-rss-large_80b47e.png?w=150&amp;h=150&amp;crop=1</icon>
		<entry>
			
			<author>
				<name>David Strom</name>
			</author>
			
			<title type="html"><![CDATA[Why you might want a secure file-sharing service now that you’re working from home]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/22867623/file-share-secure-work-from-home-how-to-cloud" />
			<id>https://www.theverge.com/22867623/file-share-secure-work-from-home-how-to-cloud</id>
			<updated>2022-01-15T08:30:00-05:00</updated>
			<published>2022-01-15T08:30:00-05:00</published>
			<category scheme="https://www.theverge.com" term="How to" /><category scheme="https://www.theverge.com" term="Tech" /><category scheme="https://www.theverge.com" term="Work anywhere" />
							<summary type="html"><![CDATA[When we were all at the office, many of us were connected to the office network. We didn&#8217;t need to give sharing files much thought.&#160;But now that we&#8217;re scattered across the landscape, securely sharing important files can take careful planning. Here&#8217;s why you might want to use powerful file-sharing services to share sensitive files safely, [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="Illustration by Samar Haddad / The Verge" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/23132694/VRG_ILL_4947_How_to_securely_share_files.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>When we were all at the office, many of us were connected to the office network. We didn&rsquo;t need to give sharing files much thought.&nbsp;But now that we&rsquo;re scattered across the landscape, securely sharing important files can take careful planning. Here&rsquo;s why you might want to use powerful file-sharing services to share sensitive files safely, so you can collaborate better no matter where you&rsquo;re working.</p>

<p>Probably the easiest way to share a file is to just attach a document to an email, or to a Slack or other instant message. But either way invites trouble on several fronts. If you rely too much on your email or messaging system, your poorly archived files could become available to prying hackers with phishing lures. If you&rsquo;re sharing traditional documents that way, you could also quickly find yourself playing the &ldquo;who has the most current version&rdquo; game. It&rsquo;s hard to keep track of updates when multiple people are working on the same document, spreadsheet, or presentation.</p>
<figure class="wp-block-pullquote alignleft"><blockquote><p>Google Drive and OneDrive have their flaws, too</p></blockquote></figure>
<p>While built-in collaboration tools like Google Workspace or Microsoft OneDrive (or something equivalent based on your email identity) can solve the version control problem &mdash; and might be your only option if your company insists &mdash; they can become cumbersome the moment your team expands beyond your office domain. You might inadvertently share the document with people who shouldn&rsquo;t see it, or lock someone out who needs access. The more convoluted you make your sharing situation, the greater the potential for a mistake where the world (or perhaps family members) gain access to your files. We&rsquo;ve all seen the news stories where a database or collection of documents fell into the wrong hands because someone failed to apply the appropriate security. Some companies won&rsquo;t risk it: With one of my clients, I had to get a new email address on their domain to share their Google Docs.</p>

<p>Besides Google Workspace and OneDrive, there are more than a dozen different providers of personal file-sharing services, including Dropbox, Box, and Apple&rsquo;s iCloud. Many of these are free or nearly so for minimal use. But if you are contemplating these services, everyone in your sharing circle should <a href="https://www.theverge.com/22215571/factor-authentication-2fa-apple-microsoft-google-how-to">use two-factor authentication (such as Authy)</a> to access them, not just a username and password. Even so, they&rsquo;re often second-rate when it comes to user experience (Dropbox&rsquo;s collaboration features can be confusing, iCloud and Windows have a complicated relationship, and Box&rsquo;s file preview feature doesn&rsquo;t do such a great job). They&rsquo;re adequate for single-use sharing or sharing files across your own devices, but they&rsquo;re  not my preferred solution.</p>

<p>Instead, you should consider an enterprise-grade cloud-based file-sharing service, one that adds more layers of protection by encrypting your data, and that has fine-tuned access control. Egnyte, SecureDocs, ShareFile, and SugarSync are just a few of the more popular services; here&rsquo;s a chart with a rough comparison of how much they cost and what they offer to start:</p>

<p>Regardless of which one you pick, here&rsquo;s what you should look for when researching a secure file-sharing service:</p>
<ul class="wp-block-list"><li><strong>Automatic file sync </strong>for all users on all devices, including integration with Windows Explorer and MacOS’s Finder, so you can browse shared directories and keep local copies for quick access. </li><li><strong>Support for Android, iOS, and web clients </strong>to browse shared directories and folders on the go as well.</li><li><strong>End-to-end encryption</strong>. If someone manages to download your files without your login, they shouldn’t be able to do anything with them. ShareFile also has an Outlook plug-in that encrypts your files as an extra feature. </li><li><strong>Additional login security</strong>. SecureDocs requires additional authentication by default for all of its logins, while the others I mention have it as an option. Setting this up is as simple as scanning a QR code into a smartphone app, as shown below:</li></ul><img src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/23171369/qr_code_authorization.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" alt="" title="" data-has-syndication-rights="1" data-caption="" data-portal-copyright="" /><ul class="wp-block-list"><li><strong>Easy-to-disable public sharing options</strong>, or that they make it difficult to inadvertently choose to share publicly.</li><li><strong>Customizable permissions and access rights</strong> to ensure that the right people are sharing the right file collections. Egnyte, for example, has numerous controls to add a password to your file, allow or disable downloads, and notifications, as you can see in the screenshot below:</li></ul><img src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/23146003/access_control_egynte.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" alt="" title="" data-has-syndication-rights="1" data-caption="" data-portal-copyright="" /><ul class="wp-block-list"><li><strong>Audit trails</strong> to figure out and fix when someone accidentally shares a file with the entire internet, or so you can quickly remove a shared file if it is no longer needed.</li></ul>
<p>Many of these products have free trials (of the ones I mention above, all but SugarSync don&rsquo;t require any payment details), and you can use those periods to evaluate them. Asking yourself these questions should also help you pick:</p>
<ul class="wp-block-list"><li><strong>Do you routinely share very large files</strong>, such as videos or illustrated PowerPoint documents? Some services place limits on individual files; SugarSync, for instance, has a limit on web client upload size.</li><li><strong>What other software tools work with the file-sharing service</strong>? Some (such as Egnyte) integrate with Salesforce, Google Workspace, and Slack, which makes sharing files easier to use as part of your normal workflows. Check the fine print if this is important to you.</li><li><strong>Do you need a room</strong>? Some services offer a common shared “data room” that can be the cloud equivalent of a shared network file server. ShareFile and SecureDocs both offer unlimited space for their shared rooms. Others, such as Egnyte, cap the room at 1TB, which is still a lot of storage if you’re not a video producer.</li><li><strong>What other specialized services do you need</strong>? Some services integrate with e-signature apps (ShareFile works with Citrix’s RightSignature), allow for custom workflows (like document approvals) and other tasks that can be real time-savers in a corporate environment.</li></ul>
<p>Using any enterprise sharing service will take some adjustment, but I feel they are worth the effort to gain additional peace of mind, better security, and collaborative features.</p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>David Strom</name>
			</author>
			
			<title type="html"><![CDATA[How to recover when your Facebook account is hacked]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/22785819/facebook-hacked-security-privacy-recover" />
			<id>https://www.theverge.com/22785819/facebook-hacked-security-privacy-recover</id>
			<updated>2021-12-07T09:00:00-05:00</updated>
			<published>2021-12-07T09:00:00-05:00</published>
			<category scheme="https://www.theverge.com" term="Facebook" /><category scheme="https://www.theverge.com" term="How to" /><category scheme="https://www.theverge.com" term="Meta" /><category scheme="https://www.theverge.com" term="Security" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[Hopefully, the day will never come when you find your Facebook account has been hacked or taken over. It is an awful feeling, and I feel for you, for the world of hurt that you will experience in time and perhaps money to return your account to your rightful control.&#160; Let me take you through [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="Illustration by Ori Toor" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/23052938/VRG_Illo_4902_Security_Facebook.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>Hopefully, the day will never come when you find your Facebook account has been hacked or taken over. It is an awful feeling, and I feel for you, for the world of hurt that you will experience in time and perhaps money to return your account to your rightful control.&nbsp;</p>

<p>Let me take you through the recovery process. Afterward, I&rsquo;ll provide some proactive security pointers you can follow to prevent this awful moment from happening, or at least reduce the chances that it will.</p>
<h2 class="wp-block-heading" id="eVRnjo">Three ways you can lose control of your Facebook account</h2>
<p>There are actually three different possible scenarios.</p>

<p><strong>Scenario 1. You let a family member or friend &ldquo;borrow&rdquo; your Facebook account on your computer or phone.</strong> They proceed to consume content, post messages as you, or befriend random people. This happened to a friend of mine, who had a grandchild staying at her home for a week. The girl left town and left a mess behind on my friend&rsquo;s Facebook account. &ldquo;She didn&rsquo;t post anything to my account, but I had odd friend requests that I had to clean up. I decided to just quit using my account.&rdquo; This is more of a nuisance than a hack, but still annoying.</p>

<p><strong>Remedy</strong>: First, <a href="https://www.facebook.com/settings?tab=security">use Facebook&rsquo;s security page</a> to check and see where else your account is already logged in.</p>
<img src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/23019983/fb_where_you_are_logged_in.jpeg?quality=90&#038;strip=all&#038;crop=0,0,100,100" alt="" title="" data-has-syndication-rights="1" data-caption="" data-portal-copyright="" />
<p>This list should also remind you of all of the devices that you have used Facebook on in the past. I took this screenshot after I found (and then removed) an older Windows laptop that I hadn&rsquo;t used in years on the list. You&rsquo;ll also see an entry for my iPhone that is located somewhere in Indiana. I haven&rsquo;t visited that state in years, so sometimes the geo-location algorithms are a bit wonky. Even if your account isn&rsquo;t hacked, it is helpful to routinely check this screen to make sure you haven&rsquo;t enabled a login by mistake.</p>

<p>If you don&rsquo;t recognize (or don&rsquo;t use) any of the devices on this list, click on the three vertical dots on the right and force those machines to log out of your account. Next, change your password to something unique. Also, remember in the future to sign out of Facebook (and Messenger) before you loan your device to anyone.</p>

<p><strong>Scenario 2. Someone uses your photo and name and sets up a new account.</strong> Then they proceed to try to recruit your FB friends to their account.</p>

<p><strong>Remedy</strong>: There isn&rsquo;t much you can do about it, other than tell people you are still you and to ignore the imposter. This should be a warning when you receive a friend request from someone you think you have already befriended, or someone you haven&rsquo;t communicated with in years. A word to the wise: send them an email or text asking if the request is genuine.</p>

<p><strong>Scenario 3. The doomsday scenario</strong>. Someone guesses your account password and proceeds to lock you out of your account. This situation is the most dire, and fixing this will depend on what else you have linked to your Facebook account and how determined you are to get it back.</p>

<p>This happened to Elizabeth, a book author. She ended up working with two different friends who were IT professionals and a lawyer over the course of four months. She had two complicating factors that made recovering her account difficult.&nbsp;</p>

<p>First, she used Facebook ads to promote her books, so she had connected her login to her credit cards. This resulted in the hacker charging her card with their own ads to try to lure other victims to compromise themselves.&nbsp;</p>

<p>The second complication was that she was using her pen name and a random birthday date for her account. During the recovery process, Facebook asks that you scan your ID to verify who you are. When she told me this, I became concerned for myself. For years I prided myself on using January 1 as my Facebook &ldquo;birthday.&rdquo; Now she was telling me that I was setting myself up for trouble if someone hacked my account.</p>

<p>She eventually got her password reset, but almost immediately the hacker reset and took over her account again. &ldquo;I tried to get someone at Facebook to help me, but I couldn&rsquo;t get anyone on the phone,&rdquo; she told me. Before the pandemic, the company had a special phone hotline for industry insiders, &ldquo;but this was discontinued,&rdquo; she said. She had more success blocking the credit card charges by phoning her bank. &ldquo;I was trying to be a step ahead of the hacker, and losing sleep. My whole life was put on hold as I tried to deal with the situation. I got no work done for months. I ended up changing my passwords on more than 30 different accounts.&rdquo;</p>

<p><strong>Possible remedies:</strong> if you find yourself in this last situation, you have three basic choices:</p>

<p>1.	<strong>Now would be a good time to leave Facebook</strong>. The trouble is, you have someone who is pretending to be you, and could leverage your identity into criminal and uncomfortable situations. Not to mention that they could try to leverage bank accounts that are linked to your account or open up credit cards in your name. (More on that in a moment.)</p>

<p>2.	<strong>Try to reinstate your account on your own</strong>, using <a href="https://www.facebook.com/hacked">Facebook&rsquo;s own obscure and oftentimes contradictory steps</a>. That is the way most people I know have tried. However, you will find out very quickly that there is no easy way to do this. You have to communicate with Facebook support through someone else&rsquo;s account, which seems somewhat contradictory, so hopefully your spouse or friend is willing to lend a hand. (Don&rsquo;t be tempted to set up a second account, because that could result in both of your accounts eventually being canceled.) Then you have to choose one of several options (finding an unauthorized post, an account that uses your own name and/or photos) and enter the rabbit hole to recover your account.&nbsp;</p>
<img src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/23019990/Screen_Shot_2021_11_16_at_4.53.54_PM.png?quality=90&#038;strip=all&#038;crop=0,0,100,100" alt="" title="" data-has-syndication-rights="1" data-caption="" data-portal-copyright="" />
<p>If you use Facebook as a means to log into other internet services, you will have to disconnect these links &mdash; otherwise a hacker can then compromise these other accounts. If, like Elizabeth, you have connected your credit card or other financial accounts, you will have to contact these institutions and get these charges rescinded. Start by trying to use Facebook from other devices you have previously used: perhaps the hacker hasn&rsquo;t automatically logged you out.</p>

<p>3.	<strong>Use a third-party recovery service</strong>, such as <a href="https://hacked.com/how-to-recover-a-hacked-facebook-account/">Hacked.com</a>. This will cost you $249, but the company will be persistent and if they can&rsquo;t help you, they will refund your fee. You also get a year&rsquo;s digital protection plan included that normally sells separately for $99. If you have a complex situation like Elizabeth (connected finances, non-matching birthday), I recommend using this path.&nbsp;</p>

<p>But make sure you aren&rsquo;t employing some random hacker who might be taking your money and doing nothing else. I spoke to Hacked.com founder Jonas Borchgrevink, who outlined the various sequences of steps that his staffers try in a <a href="https://www.washingtonpost.com/technology/2021/09/29/hacked-social-media-account/">recent Washington Post article</a>. And he confirmed that if you are using a different name from what is shown on your ID, it is almost impossible to recover your account.</p>
<h2 class="wp-block-heading" id="74SQYZ">Proactive security measures</h2>
<p>If you haven&rsquo;t been hacked (yet) and are getting somewhat uncomfortable reading this, here are some steps to take to secure your Facebook account, or to at least reduce your pain points if it does happen. Start by doing at least one of them today, and make sure you take care of all of the items as soon as possible.</p>

<p>1. <strong>Set up additional login security on your Facebook account. </strong>Facebook offers you a set of confusing choices, but the one that I recommend is to <a href="https://www.theverge.com/22215571/factor-authentication-2fa-apple-microsoft-google-how-to">use a two-factor authenticator app</a> such as Google Authenticator. (You can start at <a href="https://www.facebook.com/security/2fac/settings">this Facebook page</a>.)</p>
<img src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/23019987/fb_mfa.jpeg?quality=90&#038;strip=all&#038;crop=0,0,100,100" alt="" title="" data-has-syndication-rights="1" data-caption="" data-portal-copyright="" />
<p>Two-factor authentication (also known as 2FA) uses an Android or iOS smartphone app as part of the login process. After you supply your username and password, Facebook asks you to type in a series of six numbers that are generated by the app. These numbers change every minute, so you need your phone nearby when you log in. If you want extra credit, take the time to enable this second factor method on your other accounts, including any banks and credit card companies that support this method (sadly, too few do).</p>

<p>Elizabeth was using a less secure method for her second factor: sending the six numbers as a text message to her phone. You can read more about <a href="https://blog.strom.com/wp/?p=5572">why this isn&rsquo;t my preference</a>.</p>

<p>2. <strong>Check to see if you have any payment methods configured on Facebook.</strong> While preparing for this article, I was surprised to find my PayPal address linked to my Facebook account &mdash; and I thought I was being careful about my Facebook security. There are two places to check. First, there is the page that shows if you have <a href="https://secure.facebook.com/facebook_pay/?referrer=settings">set up any credit cards to make direct payments</a> to individuals or causes, called Facebook Pay. Go to this other link to <a href="https://www.facebook.com/ads/manager/account_settings/account_billing/?act=46577174&amp;pid=p1&amp;page=account_settings&amp;tab=account_billing_settings">remove any ad payment methods</a>. If you are running any ad campaigns on your business, you will have to stop them first.&nbsp;</p>

<p>3. <strong>Remove connected apps and websites. </strong>If you have signed on to third-party apps using your Facebook credentials, now is the time to review and remove them (you can <a href="https://www.facebook.com/settings?tab=applications&amp;ref=settings">find the appropriate page here</a>). The same is true with removing any <a href="https://www.facebook.com/settings?tab=business_tools&amp;ref=settings">business integrations</a>. You take a small hit in not being able to automatically log into these other services, but you also protect yourself if your account has been compromised.</p>

<p>If you have a Facebook business page, you should have at least two people who have admin rights to this page. (Go to Page Settings &gt; Page Roles.) If your business account is hacked and you are the sole admin, it will be next to impossible to get it recovered. This contact should also have second factor authentication turned on.</p>

<p>4. <strong>Check your account&rsquo;s email contacts </strong>(<a href="https://www.facebook.com/settings?tab=account&amp;section=email&amp;view">using this Facebook page</a>). You should have at least a second contact email (or more) that Facebook can use to send you notifications in case your main email address becomes compromised. Of course, use different passwords with these different email accounts.</p>

<p>I know, this seems like a lot of work, and there are a lot of places in the Facebook settings pages that you will have to visit and pay attention to. And chances are, the links provided above might not work in the future, as Facebook likes to make changes to its settings.&nbsp;</p>

<p>If these activities to make yourself more secure haven&rsquo;t gotten you frustrated, you might want to continue improving your security. I recommend either the <a href="https://www.withjumbo.com/">Jumbo smartphone app</a> for iOS and Android, or <a href="https://www.avast.com/en-us/avast-one">Avast One</a> (available on Windows, Mac, iOS, and Android). Either can help walk you through the numerous steps to secure your Google, Twitter, and other accounts.</p>
<h2 class="wp-block-heading" id="cGBnJb">Parting words of wisdom</h2>
<p><strong>Think before you click.</strong> If you get a message from what looks like a social media company saying that your account has been compromised, don&rsquo;t follow any links or call any phone numbers in the message. This could be a lure from a hacker. Instead, navigate to the site or use its own app directly.</p>

<p><strong>Be aware of things that seem unusual</strong>. Keep an eye out for messages you didn&rsquo;t send, posts you didn&rsquo;t create, or purchases you didn&rsquo;t make. These could be tells that someone has guessed your password or compromised your account. If you are lucky, it might be an errant teen using one of your computers.</p>

<p class="has-end-mark">As Elizabeth told me, &ldquo;Being hacked is like getting a digital tattoo &mdash; everyone can see the after-effects of your poor choices.&rdquo;&nbsp;&nbsp;</p>
						]]>
									</content>
			
					</entry>
	</feed>
