4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Annoyed By Fake Friend Requests on Facebook? Here’s an Easy Fix

Tip of the Week: Annoyed By Fake Friend Requests on Facebook? Here’s an Easy Fix

Have you ever gotten Facebook requests from strange people who you don’t know? While it might be tempting to give them the benefit of the doubt--after all, maybe they know a friend of yours--it’s best to keep strangers off of your page when you can. In order to give your page, the flexibility to accept friend requests from people you may know, and protect it from strangers, you can implement a “follow” feature, and limit who can send you friend requests.

Sharing this information with your employees is also a great way to protect them from accidentally accepting friend requests from strangers who may actually be hackers in disguise. Scam artists can create new accounts and use them to send out mass friend requests for potential attacks on user credentials or sensitive information, so it’s best to stay safe and avoid these in any way possible.

First, you need to log into your Facebook account. If you’re doing this from your desktop, click on the little down-arrow in the top-right corner of Facebook. Click on Settings, which will be down toward the bottom.

This opens up the General Account Settings page. In the left column, you’ll see several sub-categories for Facebook’s settings. Click on Privacy first.

Under the Privacy Settings and Tools page, you’ll see various sections dedicated to who can see what you post on Facebook. The option you are looking for is under the Who can contact me? Section. Here, you’ll want to click Edit and change the setting to Friends of friends. This means that only people who are friends with someone on your current friends list will be able to send you a request. You should still be able to extend the invitation to others, though.

Now, let’s say that you want to give people another option to see what you post, even if they aren’t currently friends of yours. Maybe you have articles about your industry that you’d like to share, but you don’t want to make everything that you post available for all to see. In a situation like this, you can scroll down to Public Posts in the left column. This opens up the Public Post Filters and Tools page. Under the section Who Can Follow Me, select Public. This allows you to set the status of your posts to either Public for Followers, or Friends for Friends only.

Of course, a healthy dose of skepticism should always be used when dealing with social media, as people can masquerade under false identities easily enough. For more information about how to keep your organization secure, reach out to 4IT at 305-278-7100.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 19 November 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Backup Hackers Productivity Hosted Solutions Business Management Managed Service Provider Google Malware IT Services Business Efficiency Windows IT Support Disaster Recovery Innovation Hardware Business Continuity Workplace Tips VoIP User Tips Saving Money Computer Virtualization Upgrade Miscellaneous Windows 10 Mobile Device Management Mobile Devices Data Server Network Security Mobile Computing Alert Email Communication Network Save Money Microsoft Office Quick Tips Small Business communications Smartphone Going Green Mobile Office Information Technology Social Media Smartphones BYOD Apps Health Android Office Browser Managed IT Services Gadgets Outsourced IT Application Operating System Ransomware Chrome Disaster Tablet Productivity WiFi Managed IT Holiday Firewall Avoiding Downtime Mobility Spam Best Practice BDR Risk Management Data Management Search Cybercrime Telephone Systems Cybersecurity The Internet of Things Passwords Remote Computing Unified Threat Management IT Solutions Hard Drives Hacking Saving Time History Remote Monitoring Employer-Employee Relationship VPN Apple Budget Facebook Automation Vendor Management Content Filtering Office Tips Data Backup Money Proactive IT User Error Phishing iPhone Password Customer Relationship Management Collaboration Hosted Solution Computers Wireless Technology Law Enforcement Data Recovery Recovery Phone System Big Data Marketing Analytics Encryption Gmail Router Antivirus Humor Government Administration Shortcut Social Wearable Technology Lithium-ion battery Maintenance PowerPoint Virus Telephony Current Events Work/Life Balance Vulnerability Office 365 Printer Bring Your Own Device USB Personal Information SaaS Outlook Point of Sale Audit IT COnsultant HaaS Computer Repair Wireless App Data Security Unsupported Software Business Intelligence Cost Management Google Drive Cloud Computing Intranet Save Time Bandwidth Social Engineering Printer Server Laptop Data Protection OneNote Users Private Cloud Windows 8 Education Trending Net Neutrality Tech Support Politics Excel Transportation Fax Server Help Desk Workplace Robot Computer Care Battery Streaming Media Travel Uninterrupted Power Supply Automobile End of Support online currency Update Customer Service Biometrics Retail Virtual Reality Internet Exlporer Meetings Social Networking Internet of Things Identity Theft Solid State Drive Efficency Sports IT Support Instant Messaging Emails Flexibility Windows 10 HIPAA Entertainment Benefits Computer Accessories DDoS Samsung Wi-Fi Display Mouse Emergency Compliance Artificial Intelligence Applications Augmented Reality Paperless Office Network Congestion Data Storage Two-factor Authentication hacker Managing Stress Dark Web IT Security Value Computing Microsoft Excel Screen Mirroring Cleaning Cameras Experience User Science Keyboard Avoid Downtime File Sharing Nokia Cast Virtual Desktop Presentation Music Bluetooth Windows 10s Best Available Nanotechnology Hiring/Firing systems IT Technicians Data storage Books Tablets SharePoint Twitter Hard Disk Drive Root Cause Analysis Smart Technology Video Games hack HBO Surge Protector Document Management Data Breach Advertising NFL Teamwork Television best practices CrashOverride Busines Continuity Legal 3D Printing Cortana Touchpad IT Management Networking Mobile Device Near Field Communication Managed Security Word data breach Settings Hard Drive Scam Legislation ISP WIndows Server 2008 Human Resources IT consulting Windows Ink Running Cable risk management Uograde Images Employer Employee Relationship Worker Commute Programming Operating Sysytem Blogging Patch Management Reliable Computing PDF Google Maps Files Commerce Bloatware Scalability Website Regulation Safety Text Messaging Software as a Service Chromecast How To OneDrive Sync Branding Upgrades iOS Wiring Amazon Data Loss Distributed Denial of Service Administrator Co-managed IT Information Managed IT Service Training Colocation Adobe Managed IT Services Consultant WIndows 7 Debate Computer Fan Storage The Blindside Of Inbound Marketing Google Docs eWaste Access Lifestyle Company Culture Regulations Black Market Ebay Licensing Touchscreen Shadow IT Relocation Mobile Domains IT solutions Professional Services Tutorial Buisness Gift Giving Taxes Youtube Microblogging Comparison Supercomputer Electronic Medical Records Sales Specifications IT Budget Managed Service Provder Webinar Reputation IT service Webinar