MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Annoyed By Fake Friend Requests on Facebook? Here’s an Easy Fix

Tip of the Week: Annoyed By Fake Friend Requests on Facebook? Here’s an Easy Fix

Have you ever gotten Facebook requests from strange people who you don’t know? While it might be tempting to give them the benefit of the doubt--after all, maybe they know a friend of yours--it’s best to keep strangers off of your page when you can. In order to give your page, the flexibility to accept friend requests from people you may know, and protect it from strangers, you can implement a “follow” feature, and limit who can send you friend requests.

Sharing this information with your employees is also a great way to protect them from accidentally accepting friend requests from strangers who may actually be hackers in disguise. Scam artists can create new accounts and use them to send out mass friend requests for potential attacks on user credentials or sensitive information, so it’s best to stay safe and avoid these in any way possible.

First, you need to log into your Facebook account. If you’re doing this from your desktop, click on the little down-arrow in the top-right corner of Facebook. Click on Settings, which will be down toward the bottom.

This opens up the General Account Settings page. In the left column, you’ll see several sub-categories for Facebook’s settings. Click on Privacy first.

Under the Privacy Settings and Tools page, you’ll see various sections dedicated to who can see what you post on Facebook. The option you are looking for is under the Who can contact me? Section. Here, you’ll want to click Edit and change the setting to Friends of friends. This means that only people who are friends with someone on your current friends list will be able to send you a request. You should still be able to extend the invitation to others, though.

Now, let’s say that you want to give people another option to see what you post, even if they aren’t currently friends of yours. Maybe you have articles about your industry that you’d like to share, but you don’t want to make everything that you post available for all to see. In a situation like this, you can scroll down to Public Posts in the left column. This opens up the Public Post Filters and Tools page. Under the section Who Can Follow Me, select Public. This allows you to set the status of your posts to either Public for Followers, or Friends for Friends only.

Of course, a healthy dose of skepticism should always be used when dealing with social media, as people can masquerade under false identities easily enough. For more information about how to keep your organization secure, reach out to MERIT Solutions at (757) 420-5150. your social media marketing partner


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 23 February 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Cloud Privacy Best Practices Business Computing Hackers Network Security Malware Software Internet Hosted Solutions Backup google Business Management Managed IT Services Productivity Microsoft Disaster Recovery Computer Business IT Support Mobile Devices Business Continuity Outsourced IT Windows 10 communications VoIP User Tips Hardware Innovation Productivity IT Services Email Cybercrime Data Backup Windows Mobile Device Management Mobility Managed IT Efficiency Cybersecurity Server Ransomware Apps Smartphone Saving Money browser Telephone Systems Small Business Data Recovery Save Money Operating System Hosted Solution Quick Tips Android Virtualization Law Enforcement Internet of Things Recovery VPN Data Security Microsoft Office Passwords Office 365 BYOD Data Password Holiday BDR Money Information Technology Chrome Smartphones Data Management Work/Life Balance Facebook Government Google Drive Hacking Avoiding Downtime Gadgets IT Support Alert Health Miscellaneous Managed Service Provider Computers Wireless Social upgrade Risk Management Best Practice Social Media Unsupported Software Phishing App Communication Cloud Computing Budget Data Breach Flexibility Shortcut User Error Wi-Fi Firewall Application Current Events Wireless Technology Audit Collaboration Automation Workplace Tips Telephony Personal Information Politics Two-factor Authentication Office tips Applications Private Cloud Social Engineering USB History Windows 10 Save Time Vulnerability Proactive IT search The Internet of Things Identity Theft Managed IT Services OneNote Artificial Intelligence Employer-Employee Relationship Cost Management Network Sports Data Loss Tech Support SaaS Marketing Hacker Google Docs Solid State Drive Samsung Antivirus Internet Exlporer Gmail Content Filtering Battery HaaS Update Data Protection Compliance IT solutions iPhone Redundancy DDoS Mobile Computing Transportation Project Management Automobile Commerce Robot Television Cortana Saving Time Cleaning Office Remote Computing Streaming Media End of Support Apple Computer Care Phone System WiFi Spam Legal Encryption Going Green Excel Users Bandwidth Blockchain Data Storage Humor Disaster eWaste Computer Accessories Data storage Identities Worker Commute Google Maps Specifications Running Cable Mobile Device Screen Mirroring Server 2008 Big Data Chromecast Devices Managing Stress Networking Sync Administration Ali Rowghani Dark Web Software as a Service Meetings Trending Sales Cast Books Emails Scalability Spyware Education Workers Adobe Colocation Hiring/Firing Hard Drives Vendor Management Settings Router Retail server installation dvd "cannot install required files" Files How To Benefits WannaCry Administrator Fraud Lithium-ion battery Updates Licensing stock Conferencing Unified Threat Management HBO Webinar Access Edge Microsoft Word Mobile Relocation tweet Microsoft Excel Training Entertainment Gifts Upgrades calculator Electronic Medical Records IT solutions Ciminal Point of Sale Professional Services Twitter File Sharing PDF Company Culture control HIPAA Black Market Consultant IT Management Windows 10s Smart Technology Nanotechnology Travel WSJ Storage Text Messaging Value Exchange Avoid Downtime Shadow IT Credit Cards Distributed Denial of Service WIndows Server 2008 altivista Hard Disk Drive Root Cause Analysis MSP Document Management Tablets SBS Experience FAQ Patch Management compaq Augmented Reality intranet NFL Lifestyle Wearable Technology Business Intelligence Laptop Touchscreen Uninterrupted Power Supply Video Games Virtual Reality Charger Outlook hp Scam IT budget Word Legislation Managed IT Service Touchpad domain Music Maintenance Wireless Charging Reputation iOS Advertising Employer Employee Relationship Windows Ink Comparison remote Analytics Device Security Instant Messaging Evernote Regulation Yahoo Keyboard Computer Fan Thank You Cache Monitors Congratulations Remote Monitoring Safety Emergency Worker CrashOverride

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...