MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Annoyed By Fake Friend Requests on Facebook? Here’s an Easy Fix

Tip of the Week: Annoyed By Fake Friend Requests on Facebook? Here’s an Easy Fix

Have you ever gotten Facebook requests from strange people who you don’t know? While it might be tempting to give them the benefit of the doubt--after all, maybe they know a friend of yours--it’s best to keep strangers off of your page when you can. In order to give your page, the flexibility to accept friend requests from people you may know, and protect it from strangers, you can implement a “follow” feature, and limit who can send you friend requests.

Sharing this information with your employees is also a great way to protect them from accidentally accepting friend requests from strangers who may actually be hackers in disguise. Scam artists can create new accounts and use them to send out mass friend requests for potential attacks on user credentials or sensitive information, so it’s best to stay safe and avoid these in any way possible.

First, you need to log into your Facebook account. If you’re doing this from your desktop, click on the little down-arrow in the top-right corner of Facebook. Click on Settings, which will be down toward the bottom.

This opens up the General Account Settings page. In the left column, you’ll see several sub-categories for Facebook’s settings. Click on Privacy first.

Under the Privacy Settings and Tools page, you’ll see various sections dedicated to who can see what you post on Facebook. The option you are looking for is under the Who can contact me? Section. Here, you’ll want to click Edit and change the setting to Friends of friends. This means that only people who are friends with someone on your current friends list will be able to send you a request. You should still be able to extend the invitation to others, though.

Now, let’s say that you want to give people another option to see what you post, even if they aren’t currently friends of yours. Maybe you have articles about your industry that you’d like to share, but you don’t want to make everything that you post available for all to see. In a situation like this, you can scroll down to Public Posts in the left column. This opens up the Public Post Filters and Tools page. Under the section Who Can Follow Me, select Public. This allows you to set the status of your posts to either Public for Followers, or Friends for Friends only.

Of course, a healthy dose of skepticism should always be used when dealing with social media, as people can masquerade under false identities easily enough. For more information about how to keep your organization secure, reach out to MERIT Solutions at (757) 420-5150.

e-max.it: your social media marketing partner
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 22 September 2017
If you'd like to register, please fill in the username, password and name fields.

Tag Cloud

Security Tip of the Week Cloud Technology Business Computing Best Practices Privacy Hackers Malware Hosted Solutions Backup Software Internet Network Security Computer Disaster Recovery google Productivity Windows 10 Business Continuity Microsoft Managed IT Services Business IT Services VoIP Innovation IT Support Hardware Mobile Devices User Tips Outsourced IT communications Business Management Ransomware Mobility Productivity Windows Efficiency Email Server Cybercrime Saving Money Mobile Device Management Save Money Telephone Systems Managed IT Operating System Law Enforcement Apps Hosted Solution Quick Tips Smartphone Android Virtualization BDR Passwords browser Information Technology Password Recovery Small Business Microsoft Office Chrome BYOD Data Cybersecurity Health Miscellaneous Managed Service Provider VPN Money Computers Facebook Office 365 Budget Wireless Unsupported Software Social upgrade Hacking Avoiding Downtime Communication Alert Wi-Fi Firewall Application Private Cloud Office tips Applications Government Current Events Proactive IT Social Media Gadgets Workplace Tips Smartphones Data Management USB Save Time Risk Management Data Backup Cloud Computing search Google Drive App Automation Shortcut Telephony Work/Life Balance Cost Management Mobile Computing Transportation IT Support Robot Antivirus Samsung History End of Support Remote Computing Audit Battery HaaS Gmail Data Recovery Compliance Best Practice Internet of Things Personal Information Update Automobile The Internet of Things Humor IT solutions Disaster Spam Phishing DDoS Employer-Employee Relationship Saving Time Holiday Cleaning Data Storage Managed IT Services Office Network Computer Care Television Phone System Social Engineering Streaming Media Hacker Users Internet Exlporer Identity Theft Solid State Drive Wireless Technology WiFi Going Green Bandwidth Flexibility Books Scalability Hiring/Firing Data Protection Running Cable Education IT solutions Server 2008 Professional Services Collaboration Ali Rowghani Router Text Messaging Vendor Management SaaS Trending How To Windows 10s Benefits IT Management User Error Travel Nanotechnology Unified Threat Management Content Filtering Commerce Hard Disk Drive server installation dvd "cannot install required files" WIndows Server 2008 Training Tablets Uninterrupted Power Supply Entertainment Root Cause Analysis stock Laptop Upgrades Electronic Medical Records Point of Sale Windows 10 Patch Management Touchpad Company Culture NFL HIPAA Augmented Reality tweet Reputation Consultant Business Intelligence Black Market Touchscreen Vulnerability calculator Advertising Smart Technology Outlook Value Word Politics Twitter Avoid Downtime Two-factor Authentication Managed IT Service Shadow IT control Document Management iOS Data storage Excel Experience WSJ Administration Chromecast Exchange Computer Fan altivista Regulation Distributed Denial of Service Sports OneNote Video Games Colocation Screen Mirroring Virtual Reality Data Breach SBS Tech Support Dark Web compaq Hard Drives Scam Sync Files Music Meetings Apple Legal Administrator Cast Wearable Technology Lithium-ion battery Encryption Emails hp Employer Employee Relationship Adobe Analytics Settings Relocation Access Keyboard Data Security Instant Messaging Marketing domain Worker Commute Artificial Intelligence Computer Accessories Licensing Mobile Device Big Data iPhone HBO Managing Stress Webinar remote Yahoo PDF Mobile eWaste Remote Monitoring Thank You Congratulations Safety Emergency Windows Ink CrashOverride Worker WannaCry Cache Monitors

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...