4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Annoyed By Fake Friend Requests on Facebook? Here’s an Easy Fix

Tip of the Week: Annoyed By Fake Friend Requests on Facebook? Here’s an Easy Fix

Have you ever gotten Facebook requests from strange people who you don’t know? While it might be tempting to give them the benefit of the doubt--after all, maybe they know a friend of yours--it’s best to keep strangers off of your page when you can. In order to give your page, the flexibility to accept friend requests from people you may know, and protect it from strangers, you can implement a “follow” feature, and limit who can send you friend requests.

Sharing this information with your employees is also a great way to protect them from accidentally accepting friend requests from strangers who may actually be hackers in disguise. Scam artists can create new accounts and use them to send out mass friend requests for potential attacks on user credentials or sensitive information, so it’s best to stay safe and avoid these in any way possible.

First, you need to log into your Facebook account. If you’re doing this from your desktop, click on the little down-arrow in the top-right corner of Facebook. Click on Settings, which will be down toward the bottom.

This opens up the General Account Settings page. In the left column, you’ll see several sub-categories for Facebook’s settings. Click on Privacy first.

Under the Privacy Settings and Tools page, you’ll see various sections dedicated to who can see what you post on Facebook. The option you are looking for is under the Who can contact me? Section. Here, you’ll want to click Edit and change the setting to Friends of friends. This means that only people who are friends with someone on your current friends list will be able to send you a request. You should still be able to extend the invitation to others, though.

Now, let’s say that you want to give people another option to see what you post, even if they aren’t currently friends of yours. Maybe you have articles about your industry that you’d like to share, but you don’t want to make everything that you post available for all to see. In a situation like this, you can scroll down to Public Posts in the left column. This opens up the Public Post Filters and Tools page. Under the section Who Can Follow Me, select Public. This allows you to set the status of your posts to either Public for Followers, or Friends for Friends only.

Of course, a healthy dose of skepticism should always be used when dealing with social media, as people can masquerade under false identities easily enough. For more information about how to keep your organization secure, reach out to 4IT at 305-278-7100.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 21 September 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Best Practices Privacy Microsoft Business Computing Internet software Backup Hackers Hosted Solutions Productivity Business Management Managed Service Provider Malware IT Services Business Google Efficiency Windows Innovation Disaster Recovery IT Support Hardware Business Continuity Workplace Tips Computer VoIP Saving Money Miscellaneous Virtualization User Tips Upgrade Windows 10 Mobile Devices Data Mobile Device Management Server Mobile Computing Network Security Email Alert Save Money Microsoft Office Communication Network Quick Tips communications Social Media Smartphones Information Technology BYOD Going Green Mobile Office Smartphone Health Android Apps Small Business Office Outsourced IT Operating System Chrome Application Browser Ransomware Gadgets Productivity Managed IT Services Firewall Disaster Avoiding Downtime Tablet Search Passwords Managed IT Holiday The Internet of Things Remote Computing Risk Management Cybercrime Unified Threat Management Mobility IT Solutions Spam Telephone Systems WiFi BDR Automation Hacking Vendor Management Best Practice Cybersecurity Data Management Facebook Remote Monitoring Hard Drives History Employer-Employee Relationship Saving Time Budget Apple Collaboration Office Tips Marketing VPN Wireless Technology Law Enforcement Phishing Password Big Data Hosted Solution Computers Customer Relationship Management Proactive IT Recovery Phone System User Error Lithium-ion battery Bring Your Own Device Antivirus Shortcut Current Events Social Humor Administration Office 365 Printer Wearable Technology iPhone USB Content Filtering Telephony Maintenance PowerPoint Analytics Gmail Router Virus Money Windows 8 Cost Management Data Recovery Cloud Computing Google Drive Intranet Bandwidth Save Time Printer Server Laptop HaaS OneNote Data Backup Business Intelligence Point of Sale Education Trending Work/Life Balance IT COnsultant Net Neutrality Computer Repair Social Engineering Tech Support Outlook Encryption Private Cloud Wireless Users Government App Unsupported Software Mouse End of Support Compliance online currency Vulnerability Two-factor Authentication Internet Exlporer Managing Stress Excel SaaS Internet of Things Audit Data Storage Identity Theft Data Protection Solid State Drive Efficency Network Congestion Flexibility Travel Help Desk Update Customer Service Samsung Biometrics Retail Display Wi-Fi Emergency Virtual Reality Augmented Reality Meetings Applications Paperless Office hacker Instant Messaging Personal Information Emails Fax Server Transportation Social Networking HIPAA Entertainment Workplace IT Support Computer Care Benefits Battery Robot Computer Accessories Streaming Media DDoS Uninterrupted Power Supply Automobile Regulation Twitter Distributed Denial of Service Books Smart Technology Video Games Surge Protector Document Management WIndows 7 Advertising Inbound Marketing Sync Television eWaste Data Breach iOS Legal Regulations 3D Printing Managed IT Service Mobile Device Touchpad Managed Security Wiring Value Adobe Managed IT Services Computer Fan Scam Information Cameras ISP User Debate Science Licensing Dark Web Employer Employee Relationship Virtual Desktop Presentation Sports Operating Sysytem Programming Screen Mirroring Blogging Bluetooth Worker Commute Best Available PDF IT Technicians Scalability Files Cast Website SharePoint Safety Text Messaging Windows 10s Nanotechnology Nokia How To Chromecast OneDrive Data Security Upgrades Teamwork Artificial Intelligence Busines Continuity Tablets Amazon Hard Disk Drive Root Cause Analysis Co-managed IT Training Networking Near Field Communication Administrator Colocation HBO Consultant The Blindside Of NFL best practices CrashOverride Company Culture Human Resources Black Market IT consulting Access IT Management Ebay Touchscreen Running Cable Politics IT Security Word Computing data breach Settings Cleaning Reliable Computing WIndows Server 2008 Experience Keyboard Bloatware Avoid Downtime Hard Drive risk management Patch Management Music Hiring/Firing Uograde Images Windows 10 Commerce Branding Data storage Sales Managed Service Provder Webinar Storage IT service Taxes Gift Giving Domains Webinar Supercomputer Electronic Medical Records Mobile IT solutions IT Budget Professional Services Buisness Reputation Lifestyle Shadow IT Relocation Windows Ink Microblogging Youtube Tutorial