MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Annoyed By Fake Friend Requests on Facebook? Here’s an Easy Fix

Tip of the Week: Annoyed By Fake Friend Requests on Facebook? Here’s an Easy Fix

Have you ever gotten Facebook requests from strange people who you don’t know? While it might be tempting to give them the benefit of the doubt--after all, maybe they know a friend of yours--it’s best to keep strangers off of your page when you can. In order to give your page, the flexibility to accept friend requests from people you may know, and protect it from strangers, you can implement a “follow” feature, and limit who can send you friend requests.

Sharing this information with your employees is also a great way to protect them from accidentally accepting friend requests from strangers who may actually be hackers in disguise. Scam artists can create new accounts and use them to send out mass friend requests for potential attacks on user credentials or sensitive information, so it’s best to stay safe and avoid these in any way possible.

First, you need to log into your Facebook account. If you’re doing this from your desktop, click on the little down-arrow in the top-right corner of Facebook. Click on Settings, which will be down toward the bottom.

This opens up the General Account Settings page. In the left column, you’ll see several sub-categories for Facebook’s settings. Click on Privacy first.

Under the Privacy Settings and Tools page, you’ll see various sections dedicated to who can see what you post on Facebook. The option you are looking for is under the Who can contact me? Section. Here, you’ll want to click Edit and change the setting to Friends of friends. This means that only people who are friends with someone on your current friends list will be able to send you a request. You should still be able to extend the invitation to others, though.

Now, let’s say that you want to give people another option to see what you post, even if they aren’t currently friends of yours. Maybe you have articles about your industry that you’d like to share, but you don’t want to make everything that you post available for all to see. In a situation like this, you can scroll down to Public Posts in the left column. This opens up the Public Post Filters and Tools page. Under the section Who Can Follow Me, select Public. This allows you to set the status of your posts to either Public for Followers, or Friends for Friends only.

Of course, a healthy dose of skepticism should always be used when dealing with social media, as people can masquerade under false identities easily enough. For more information about how to keep your organization secure, reach out to MERIT Solutions at (757) 420-5150.

e-max.it: your social media marketing partner
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 22 November 2017
If you'd like to register, please fill in the username, password and name fields.

Tag Cloud

Security Tip of the Week Cloud Technology Privacy Best Practices Business Computing Hackers Malware Software Hosted Solutions Backup Network Security google Internet Productivity Disaster Recovery Computer Microsoft Business Continuity Managed IT Services Windows 10 VoIP Business IT Support Innovation IT Services Outsourced IT User Tips Hardware Mobile Devices Business Management communications Managed IT Mobility Productivity Ransomware Efficiency Email Smartphone Windows Mobile Device Management Telephone Systems Server Small Business Save Money Cybercrime Saving Money Android Virtualization Apps Law Enforcement Cybersecurity Operating System Data Backup Hosted Solution Quick Tips Microsoft Office Passwords browser BYOD Data Password BDR Data Recovery Money Information Technology Chrome Recovery VPN Government Office 365 Google Drive Hacking Avoiding Downtime Wireless Health Miscellaneous Managed Service Provider Computers Unsupported Software Social upgrade Cloud Computing Budget Work/Life Balance Communication Smartphones Data Management Facebook Personal Information Automation Politics Telephony Alert Gadgets Workplace Tips USB Save Time Holiday Applications Private Cloud Office tips Risk Management Phishing Proactive IT Best Practice Social Media Managed IT Services search Shortcut App Wi-Fi Firewall Application Data Security Current Events Audit HaaS Hacker Internet Exlporer Solid State Drive Compliance Wireless Technology Gmail Data Protection Automobile IT Support Update iPhone Commerce Mobile Computing IT solutions Saving Time Transportation Cleaning DDoS Office Windows 10 Computer Care Robot Phone System History Television Social Engineering Vulnerability End of Support Remote Computing Users Encryption Spam Apple Identity Theft Streaming Media Internet of Things Artificial Intelligence Data Storage WiFi Flexibility The Internet of Things Humor Disaster Going Green Bandwidth Cost Management Employer-Employee Relationship SaaS Network Sports Samsung Antivirus Content Filtering User Error Battery Google Docs Lithium-ion battery HBO Webinar Training Administrator Entertainment Electronic Medical Records Mobile server installation dvd "cannot install required files" Upgrades stock Point of Sale Microsoft Excel IT solutions Relocation Company Culture Access HIPAA Black Market Professional Services Collaboration Consultant tweet Smart Technology File Sharing Avoid Downtime IT Management Windows 10s Value Shadow IT Travel Nanotechnology PDF calculator Two-factor Authentication Twitter Document Management Storage WIndows Server 2008 Hard Disk Drive control Experience Tablets Root Cause Analysis Text Messaging WSJ Cortana Video Games Patch Management Exchange Virtual Reality NFL Distributed Denial of Service Augmented Reality altivista Business Intelligence Touchscreen Scam Lifestyle Music Legal Outlook SBS Laptop Uninterrupted Power Supply Word compaq Managed IT Service Employer Employee Relationship Legislation Analytics Excel Wearable Technology iOS Touchpad Keyboard Instant Messaging Windows Ink hp Reputation Computer Accessories Worker Commute Comparison Big Data Regulation Computer Fan Advertising domain Mobile Device Managing Stress Google Maps OneNote Screen Mirroring Data Breach Specifications Books Scalability Sync Dark Web remote Data storage Yahoo Hiring/Firing Education Software as a Service eWaste Meetings Router Cast Emails Administration Vendor Management Chromecast Sales How To Adobe Running Cable Server 2008 Ali Rowghani Benefits Data Loss Settings Trending Marketing Colocation Retail Tech Support Licensing Hard Drives Unified Threat Management Files Monitors Thank You Remote Monitoring Safety Congratulations Emergency Worker CrashOverride WannaCry Cache

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...