MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Annoyed By Fake Friend Requests on Facebook? Here’s an Easy Fix

Tip of the Week: Annoyed By Fake Friend Requests on Facebook? Here’s an Easy Fix

Have you ever gotten Facebook requests from strange people who you don’t know? While it might be tempting to give them the benefit of the doubt--after all, maybe they know a friend of yours--it’s best to keep strangers off of your page when you can. In order to give your page, the flexibility to accept friend requests from people you may know, and protect it from strangers, you can implement a “follow” feature, and limit who can send you friend requests.

Sharing this information with your employees is also a great way to protect them from accidentally accepting friend requests from strangers who may actually be hackers in disguise. Scam artists can create new accounts and use them to send out mass friend requests for potential attacks on user credentials or sensitive information, so it’s best to stay safe and avoid these in any way possible.

First, you need to log into your Facebook account. If you’re doing this from your desktop, click on the little down-arrow in the top-right corner of Facebook. Click on Settings, which will be down toward the bottom.

This opens up the General Account Settings page. In the left column, you’ll see several sub-categories for Facebook’s settings. Click on Privacy first.

Under the Privacy Settings and Tools page, you’ll see various sections dedicated to who can see what you post on Facebook. The option you are looking for is under the Who can contact me? Section. Here, you’ll want to click Edit and change the setting to Friends of friends. This means that only people who are friends with someone on your current friends list will be able to send you a request. You should still be able to extend the invitation to others, though.

Now, let’s say that you want to give people another option to see what you post, even if they aren’t currently friends of yours. Maybe you have articles about your industry that you’d like to share, but you don’t want to make everything that you post available for all to see. In a situation like this, you can scroll down to Public Posts in the left column. This opens up the Public Post Filters and Tools page. Under the section Who Can Follow Me, select Public. This allows you to set the status of your posts to either Public for Followers, or Friends for Friends only.

Of course, a healthy dose of skepticism should always be used when dealing with social media, as people can masquerade under false identities easily enough. For more information about how to keep your organization secure, reach out to MERIT Solutions at (757) 420-5150.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 20 July 2017
If you'd like to register, please fill in the username, password and name fields.

Tag Cloud

Security Tip of the Week Cloud Technology Privacy Business Computing Best Practices Hackers Malware Backup Hosted Solutions Internet Software Network Security Productivity Computer Windows 10 google Microsoft Business Disaster Recovery Business Continuity Innovation Managed IT Services VoIP IT Support IT Services Hardware Business Management Mobile Devices Mobility Efficiency Outsourced IT Saving Money communications Save Money Productivity Windows Ransomware Mobile Device Management Telephone Systems Quick Tips Apps User Tips Smartphone Server Operating System Hosted Solution Cybercrime Law Enforcement Information Technology Passwords Recovery Password Small Business Email Managed IT Android Virtualization Data BDR Money VPN Facebook browser Budget Wireless upgrade Social Hacking Avoiding Downtime BYOD Cybersecurity Communication Health Miscellaneous Computers Private Cloud Office tips Work/Life Balance Government Social Media Firewall Application Current Events Gadgets Smartphones Workplace Tips Data Management Office 365 Unsupported Software Cloud Computing USB Save Time Chrome Google Drive Automation search Telephony App Alert Managed Service Provider Robot Samsung Flexibility Applications History Audit End of Support Remote Computing Wi-Fi Best Practice Internet of Things Gmail Antivirus The Internet of Things Humor Disaster Update Battery HaaS Saving Time Employer-Employee Relationship DDoS Office Personal Information Holiday Computer Care Network Cleaning Automobile Television Users Social Engineering Hacker Internet Exlporer Solid State Drive Streaming Media Microsoft Office Wireless Technology WiFi Risk Management Going Green Bandwidth Mobile Computing Identity Theft Transportation Worker Commute Marketing Ali Rowghani Unified Threat Management Big Data Trending Nanotechnology Managed IT Service User Error Managing Stress Webinar Training Upgrades Uninterrupted Power Supply Books Scalability Artificial Intelligence Root Cause Analysis Laptop Data Storage Proactive IT server installation dvd "cannot install required files" Compliance Education Router IT solutions stock Company Culture Touchpad Consultant How To Augmented Reality Screen Mirroring Reputation Smart Technology Advertising Windows 10s tweet Value Two-factor Authentication Content Filtering Spam Cast calculator Entertainment IT solutions Hard Disk Drive Data storage Twitter OneNote Touchscreen control Electronic Medical Records Data Security Administration Chromecast Point of Sale HIPAA Windows 10 WSJ Meetings Phishing Sports Exchange Black Market HBO Colocation Distributed Denial of Service altivista Scam Tech Support Politics Avoid Downtime Hard Drives Vulnerability Settings Managed IT Services Files SBS Shadow IT Data Protection Administrator compaq Employer Employee Relationship Lithium-ion battery Document Management Experience iOS Apple IT Support Wearable Technology Data Breach Keyboard Relocation Access hp Computer Accessories Mobile Device Phone System Video Games Computer Fan Commerce Emails domain Shortcut Virtual Reality iPhone Cost Management Music Legal PDF Dark Web Data Recovery remote Hiring/Firing Encryption eWaste Yahoo Vendor Management SaaS Analytics Text Messaging Data Backup Business Intelligence Running Cable Server 2008 Benefits Instant Messaging

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

No comments yet.