4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Annoyed By Fake Friend Requests on Facebook? Here’s an Easy Fix

Tip of the Week: Annoyed By Fake Friend Requests on Facebook? Here’s an Easy Fix

Have you ever gotten Facebook requests from strange people who you don’t know? While it might be tempting to give them the benefit of the doubt--after all, maybe they know a friend of yours--it’s best to keep strangers off of your page when you can. In order to give your page, the flexibility to accept friend requests from people you may know, and protect it from strangers, you can implement a “follow” feature, and limit who can send you friend requests.

Sharing this information with your employees is also a great way to protect them from accidentally accepting friend requests from strangers who may actually be hackers in disguise. Scam artists can create new accounts and use them to send out mass friend requests for potential attacks on user credentials or sensitive information, so it’s best to stay safe and avoid these in any way possible.

First, you need to log into your Facebook account. If you’re doing this from your desktop, click on the little down-arrow in the top-right corner of Facebook. Click on Settings, which will be down toward the bottom.

This opens up the General Account Settings page. In the left column, you’ll see several sub-categories for Facebook’s settings. Click on Privacy first.

Under the Privacy Settings and Tools page, you’ll see various sections dedicated to who can see what you post on Facebook. The option you are looking for is under the Who can contact me? Section. Here, you’ll want to click Edit and change the setting to Friends of friends. This means that only people who are friends with someone on your current friends list will be able to send you a request. You should still be able to extend the invitation to others, though.

Now, let’s say that you want to give people another option to see what you post, even if they aren’t currently friends of yours. Maybe you have articles about your industry that you’d like to share, but you don’t want to make everything that you post available for all to see. In a situation like this, you can scroll down to Public Posts in the left column. This opens up the Public Post Filters and Tools page. Under the section Who Can Follow Me, select Public. This allows you to set the status of your posts to either Public for Followers, or Friends for Friends only.

Of course, a healthy dose of skepticism should always be used when dealing with social media, as people can masquerade under false identities easily enough. For more information about how to keep your organization secure, reach out to 4IT at 305-278-7100.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 24 January 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Hackers Backup Productivity Hosted Solutions Business Management Managed Service Provider Google Malware IT Services Business Efficiency IT Support Windows Innovation Disaster Recovery Hardware Business Continuity Workplace Tips VoIP User Tips Saving Money Mobile Devices Computer Virtualization Upgrade Windows 10 Miscellaneous Network Security Mobile Device Management Data Server Email Mobile Computing communications Alert Communication Save Money Network Microsoft Office Quick Tips Small Business Smartphone Social Media Going Green Information Technology Mobile Office Smartphones BYOD Health Android Apps Office Managed IT Services Outsourced IT Operating System Application Chrome Ransomware Browser Gadgets Disaster Mobility Holiday Firewall Tablet The Internet of Things Avoiding Downtime WiFi Productivity Managed IT Cybersecurity Cybercrime Risk Management Telephone Systems Data Recovery Remote Computing History Unified Threat Management IT Solutions Data Backup Spam BDR Best Practice Passwords Data Management Search VPN Employer-Employee Relationship Budget Facebook Remote Monitoring Automation Hard Drives Saving Time Apple Hacking Vendor Management Marketing Password Collaboration Hosted Solution Computers Wireless Technology iPhone Money Customer Relationship Management Recovery Phone System Big Data Content Filtering Office Tips Proactive IT Law Enforcement User Error Phishing Office 365 Telephony Humor Administration Vulnerability Current Events Wearable Technology Maintenance PowerPoint Printer Virus USB Analytics Encryption Gmail Router Government Antivirus Shortcut Work/Life Balance Bring Your Own Device Social Lithium-ion battery Printer Server Point of Sale Social Engineering Laptop IT COnsultant OneNote Politics Computer Repair Personal Information Education Trending Private Cloud Net Neutrality Wireless Unsupported Software Tech Support Cloud Computing Google Drive Users Outlook Save Time SaaS Windows 8 Audit Data Protection HaaS Data Security App Cost Management Business Intelligence Intranet Bandwidth Emergency Artificial Intelligence Virtual Reality Help Desk IT Support Applications Meetings Efficency Windows 10 hacker Instant Messaging Emails Transportation HIPAA Entertainment Computer Care Battery Benefits Robot DDoS Computer Accessories Display Automobile Social Networking End of Support Mouse Compliance Redundancy Augmented Reality Data Storage Paperless Office Two-factor Authentication Internet Exlporer Managing Stress Fax Server Excel Internet of Things Workplace Identity Theft Solid State Drive Streaming Media Flexibility Sports Uninterrupted Power Supply online currency Travel Update Customer Service Samsung Network Congestion Biometrics Retail Wi-Fi WIndows Server 2008 Busines Continuity Windows Ink Training risk management Networking Administrator Near Field Communication Colocation ISP Consultant Patch Management The Blindside Of Google Maps Company Culture Nokia Black Market Human Resources Access IT consulting Programming Blogging Touchscreen Commerce Running Cable Regulation IT Security Software as a Service Cleaning Reliable Computing Website Experience Sync Keyboard Avoid Downtime Bloatware Data Loss iOS OneDrive Managed IT Service Music Adobe Hiring/Firing Managed IT Services Amazon Co-managed IT Google Docs Computer Fan Branding Data storage Distributed Denial of Service Books Licensing Smart Technology Video Games Hard Drive WIndows 7 Microsoft Excel Lifestyle Dark Web Document Management eWaste Advertising Storage Ebay Inbound Marketing Screen Mirroring Data Breach Uograde Legal Images Computing Regulations File Sharing Mobile Device Touchpad Value Cast Managed Security Scam Windows 10s Cameras User systems Nanotechnology Science Tablets Employer Employee Relationship Hard Disk Drive Virtual Desktop Presentation Operating Sysytem Best Available hack Root Cause Analysis Worker Commute Bluetooth IT Technicians PDF Wiring Twitter HBO NFL Information best practices Scalability Files Cortana Surge Protector CrashOverride SharePoint IT Management Safety Debate Text Messaging Television Word data breach How To Chromecast 3D Printing Legislation Upgrades Settings Teamwork Evernote Comparison Gift Giving Workers Specifications Updates Shadow IT Relocation Conferencing Microsoft Word Gifts Device Security Webinar Devices Microblogging Youtube Credit Cards Mobile IT solutions Spyware IT service Sales FAQ Professional Services Managed Service Provder Taxes Domains Webinar Charger Tutorial Supercomputer Electronic Medical Records Wireless Charging IT Budget WannaCry Buisness Reputation