Skip to content

PlexTrac recognized in 2025 Gartner® Magic Quadrant for Exposure Assessment Platforms

Learn more >>

Authored by: PlexTrac Author

Posted on: October 17, 2019

How to Prevent a Facebook Hack

Once you have mitigated the damage from the Facebook attack, it is time to prevent a recurrence. It’s useful to first understand how your account was “hacked” in the first place. The two most common ways that the attacker gained access to your credentials are:

 

How a Hacker Compromised Your Account

1) You gave them to the attacker. You may have received a malicious message from a “hacked” account belonging to one of your friends, clicked the link, and been deceived by a fake login page.

2) You were using the same username and password combination for your Facebook account that you use on other sites. Your credentials for the other site were compromised, and the attacker simply tried them on Facebook and got lucky.

 

How to Prevent Further Attacks

If you unwittingly gave the attacker your credentials (option 1), then the fix to prevent recurrence is easy: Don’t click on links in messages. But since you probably will anyway, at least heed this important rule: Never, ever enter a username and password into a website that appears after you click a link. 

If your account was compromised because you re-used credentials, consider this a wakeup call to start practicing better cyber hygiene in your life. Get yourself a password vault to facilitate using long, strong and unique passwords for all of your online accounts. You can read all about the goodness of password vaults in my article here: https://www.badgerinfosec.com/blog/do-this-now-password-vaults

 

PlexTrac Author
PlexTrac Author At PlexTrac, we bring together insights from a diverse range of voices. Our blog features contributions from industry experts, ethical hackers, CTOs, influencers, and PlexTrac team members—all sharing valuable perspectives on cybersecurity, pentesting, and risk management.

Liked what you saw?

We’ve got more content for you

Bridging Red and Blue Teams With Automated Pentest Delivery

Bridging Red and Blue Teams With Automated Pentest Delivery

For decades, security programs have been shaped by a familiar dynamic: red team versus blue team. Red teams think like attackers, probing systems through attack simulation to uncover weaknesses. Blue teams defend, detect, and respond, working to validate vulnerabilities, remediate risk, and keep the business running. In theory, this tension is healthy. In practice, it often creates friction.
The Most Popular Penetration Testing Tools in 2026

The Most Popular Penetration Testing Tools in 2026: 30 Products to Support Your Pentesting Efforts This Year

Penetration testing is a crucial part of cybersecurity and involves finding and exploiting vulnerabilities in networks, applications, systems, or physical environments before the bad actors can. Penetration testing also plays a key role in continuous threat exposure management. Point-in-time testing is no longer enough, and continuous penetration testing is key to effectively identifying and mitigating...

The Operational Gap Between Pentest Reports and Real Remediation

Most security teams invest in pentesting with the expectation that it will lead to real risk reduction. Skilled testers identify meaningful attack paths, validate impact, and provide remediation guidance that is technically sound. In most organizations, the quality of the pentest itself is not the problem. The friction starts after the report is delivered. Security...

Request a Demo

PlexTrac supercharges the efforts of cybersecurity teams of any size in the battle against attackers.

See the platform in action for your environment and use case.