4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Annoyed By Fake Friend Requests on Facebook? Here’s an Easy Fix

Tip of the Week: Annoyed By Fake Friend Requests on Facebook? Here’s an Easy Fix

Have you ever gotten Facebook requests from strange people who you don’t know? While it might be tempting to give them the benefit of the doubt--after all, maybe they know a friend of yours--it’s best to keep strangers off of your page when you can. In order to give your page, the flexibility to accept friend requests from people you may know, and protect it from strangers, you can implement a “follow” feature, and limit who can send you friend requests.

Sharing this information with your employees is also a great way to protect them from accidentally accepting friend requests from strangers who may actually be hackers in disguise. Scam artists can create new accounts and use them to send out mass friend requests for potential attacks on user credentials or sensitive information, so it’s best to stay safe and avoid these in any way possible.

First, you need to log into your Facebook account. If you’re doing this from your desktop, click on the little down-arrow in the top-right corner of Facebook. Click on Settings, which will be down toward the bottom.

This opens up the General Account Settings page. In the left column, you’ll see several sub-categories for Facebook’s settings. Click on Privacy first.

Under the Privacy Settings and Tools page, you’ll see various sections dedicated to who can see what you post on Facebook. The option you are looking for is under the Who can contact me? Section. Here, you’ll want to click Edit and change the setting to Friends of friends. This means that only people who are friends with someone on your current friends list will be able to send you a request. You should still be able to extend the invitation to others, though.

Now, let’s say that you want to give people another option to see what you post, even if they aren’t currently friends of yours. Maybe you have articles about your industry that you’d like to share, but you don’t want to make everything that you post available for all to see. In a situation like this, you can scroll down to Public Posts in the left column. This opens up the Public Post Filters and Tools page. Under the section Who Can Follow Me, select Public. This allows you to set the status of your posts to either Public for Followers, or Friends for Friends only.

Of course, a healthy dose of skepticism should always be used when dealing with social media, as people can masquerade under false identities easily enough. For more information about how to keep your organization secure, reach out to 4IT at 305-278-7100.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 26 July 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft Internet Business Computing software Backup Hackers Hosted Solutions Productivity Business Management Managed Service Provider Malware Business Google Efficiency IT Services Innovation Windows IT Support Workplace Tips Disaster Recovery Hardware Saving Money Miscellaneous VoIP Windows 10 Business Continuity Computer Upgrade Virtualization Mobile Devices Data Mobile Device Management Server Mobile Computing User Tips Save Money Network Security Communication Network Quick Tips Alert Social Media Smartphones BYOD Going Green Mobile Office Email Information Technology Microsoft Office communications Office Smartphone Health Apps Small Business Gadgets Android Application Ransomware Operating System Avoiding Downtime Managed IT Services Outsourced IT Disaster Tablet Browser Firewall The Internet of Things WiFi Remote Computing Unified Threat Management IT Solutions Productivity Passwords BDR Search Risk Management Mobility Holiday Chrome Facebook Telephone Systems Employer-Employee Relationship Hard Drives Spam Budget Managed IT Saving Time Vendor Management Automation Hacking Best Practice Data Management Remote Monitoring History Password Cybercrime Hosted Solution Big Data Apple Recovery Marketing Cybersecurity Office Tips Wireless Technology Customer Relationship Management VPN PowerPoint Phishing Money Virus Printer Computers Telephony USB Content Filtering Analytics Phone System Bring Your Own Device Gmail Router Proactive IT Law Enforcement User Error Lithium-ion battery Humor Collaboration Administration Antivirus Wearable Technology iPhone Social Maintenance Current Events Education Trending Net Neutrality Wireless Users Social Engineering Google Drive Cloud Computing Windows 8 Tech Support Save Time Private Cloud Encryption Government App Work/Life Balance Cost Management Point of Sale IT COnsultant Intranet Office 365 Bandwidth Printer Server Computer Repair HaaS Laptop OneNote Business Intelligence Battery Biometrics Robot Social Networking Computer Care Retail Virtual Reality Automobile Display Unsupported Software Meetings End of Support Augmented Reality Emails Internet Exlporer Paperless Office Instant Messaging HIPAA Entertainment Internet of Things Outlook Fax Server Benefits Identity Theft Workplace DDoS Data Protection Computer Accessories Solid State Drive Flexibility Streaming Media Mouse Network Congestion Uninterrupted Power Supply online currency Help Desk Samsung IT Support Two-factor Authentication Managing Stress SaaS Audit hacker Efficency Personal Information Shortcut Transportation Update Customer Service Website Data Storage Teamwork Music Hard Drive Busines Continuity Hiring/Firing Dark Web Screen Mirroring Networking Near Field Communication Data storage OneDrive Books Uograde Images Amazon Co-managed IT Smart Technology Data Backup Video Games Cast Human Resources Document Management IT consulting Running Cable Data Breach Windows 10s Advertising Nanotechnology Legal Data Security Reliable Computing Touchpad Ebay Mobile Device Computing Managed Security Hard Disk Drive Scam Root Cause Analysis Bloatware HBO Wiring best practices Information Sports Employer Employee Relationship CrashOverride IT Management Branding Worker Commute Operating Sysytem Debate Distributed Denial of Service data breach PDF Compliance Files Settings Scalability Twitter WIndows 7 eWaste Safety risk management Text Messaging Inbound Marketing Regulations Chromecast Surge Protector How To Upgrades Television Wi-Fi 3D Printing Emergency Windows 10 Excel Artificial Intelligence Nokia Value Cameras Administrator Training Commerce Consultant Applications User Colocation The Blindside Of Vulnerability Science Black Market Presentation Access ISP Company Culture Data Recovery Virtual Desktop Touchscreen Bluetooth Politics Best Available IT Technicians IT Security iOS Travel Programming Blogging Cleaning Managed IT Service SharePoint Experience Managed IT Services Keyboard Computer Fan Avoid Downtime Buisness Webinar Microblogging Youtube IT solutions Sales Managed Service Provder Lifestyle Webinar Taxes Tutorial Supercomputer Electronic Medical Records WIndows Server 2008 IT Budget Storage IT service Reputation Domains Gift Giving Shadow IT Relocation