SMART Blog

Smart Services has been providing independent agents with proactive, fast, and expert technology services since 1991.

Tip of the Week: Annoyed By Fake Friend Requests on Facebook? Here’s an Easy Fix

Tip of the Week: Annoyed By Fake Friend Requests on Facebook? Here’s an Easy Fix

Have you ever received Facebook requests from people you don’t know? While it might be tempting to give them the benefit of the doubt -- after all, maybe they know a friend of yours -- it’s best to keep strangers off of your page when you can. In order to give your page the flexibility to accept friend requests from people you may know and protect it from strangers, you can implement a “follow” feature, and limit who can send you friend requests.

0 Comments
Continue reading
Featured

Communities Can Now Activate Facebook’s Safety Check

Communities Can Now Activate Facebook’s Safety Check

Since 2014, Facebook has quietly offered Safety Check, a crisis response tool that lets users in areas struck by natural disasters or other emergencies to confirm their safety on the social network. Originally, Facebook itself had to activate a Safety Check, but that has changed; the power to activate a safety check is now in the hands of the stricken community.

0 Comments
Continue reading
Featured

Tip of the Week: How to Download Everything You’ve Posted to Facebook

Tip of the Week: How to Download Everything You’ve Posted to Facebook

If you’ve had your Facebook profile since the dawn of social media, chances are it’s accumulated an immense amount of personal information. While you might have felt uneasy handing over all of this data to Facebook, the company has made it surprisingly easy to take it back.

0 Comments
Continue reading

Tip of the Week: 4 Ways to Get a Handle on Social Media in the Workplace

Tip of the Week: 4 Ways to Get a Handle on Social Media in the Workplace

Social media may be a great way to connect with other professionals and communicate with your friends, but it can be dangerous if you have poor posting habits. Before you share something, think twice about whether it contains any sensitive information that could be risky to yourself and your business.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Settings Network Tech Term Data Recovery Vulnerability Meetings Intranet Taxes data backups Video Games Tablets Money Smart Tech Web Design Windows 10 Wiring IT Solutions Hetrick and Associates Gift Giving Save Money Distributed Denial of Service Gadgets Help Desk Android Search Two-factor Authentication Mircrosoft Apps MSP BDR WiFi Youtube Shadow IT Connectivity Accessory Remote Monitoring Data Breach Blockchain Administrator Jessica Stevenson Business Computing Text Messaging Google Docs Data Storage Entertainment Microsoft Office User Error Law Enforcement Programming Microsoft Word Instant Messaging File Storage Managed Service Information Privacy Internet Antivirus Memory Language Virus Automobile PowerPoint Emails Redundancy Computer Accessories E-Commerce Device Security SMB Scott White Surge Protector email encryption Encryption Going Green Printing Apple IT solutions Printers Mobile Device Saving Time Streaming Media User Workplace Tips Content Filter robot Office 365 Health Wireless Technology Laptop Training Artificial Intelligence IoT Google Assistant Adobe How To Cost Management HaaS Content Filtering Managed Service Provider Computer Forensics Google WannaCry Remote Computing WPA3 Avoiding Downtime Mouse Hard Drive Applied TAM SMART Services Windows Ink Chromebook Retail Co-Managed Services Sync Windows 8 Company Culture Transportation Recovery Buisness Testing Experience automation Quick Tips Router Software as a Service Bring Your Own Device Managed IT Updates Worker Commute Proactive IT Consultant Social Networking Employer-Employee Relationship Wi-Fi Point of Sale Customer Relationship Management Hyperlink In the News Online Currency Tech Tip Computer repair Music Amazon Identities Patch Management Saving Money History Hacking Wasting Money Computer Fan Fax Server Gamification Backup and Disaster Recovery Back Up Firewall Password hackers Touchpad Branding Scam Managed IT Service Cloud Projects Monitoring hacker Security Cameras Inbound Marketing WIndows Server 2008 Best Practices Root Cause Analysis Miscellaneous Personal Information ebay Microsoft Office 2010 Windows 10 Microsoft Outlook 2007 Computer Care Virtualization Travel Users Media Consumption Lifestyle Financial Technology Internet of Things SharePoint Images Take Your Agency to the Next Level Managing Stress Emergency Safety Samsung Value Project Management Supercomputer Alexa for Business Gmail Alert Wasting Time iPhone Payment Cards File Sharing Small Business Webinar Virtual Private Network Cast Telephone Systems Big Data Smartphone Augmented Reality Google Maps Marketing Smartphones VoIP Employee-Employer Relationship Access Bluetooth Flexibility Files Human Resources Bloatware agency automation Downtime Battery Microsoft Windows 10s Nanotechnology Commerce Wearable Technology Data Backup Students Mobile Computing Google Drive Employer Employee Relationship Facebook Audit Office Tips DDoS Virtual Reality Education Twitter OneDrive Telephony Vendor MySalesResults Productivity communications Hardware Keyboard GLAD Reputation SaaS Spyware IT Technicians Microsoft Excel Admin Network Security Internet Exlporer Work Station Printer End of Support holidays Work/Life Balance Browser Politics Teamwork Biometrics BYOD Compliance User Tips Chrome Windows 7 Humor lunch and learn Sales Debate Blogging Sports Touchscreen Mobile Office IT Budget Wireless Internet Wireless Word Trending Mobile Device Management Keyboard Shortcuts Running Cable IT Support IIAI IT Service Fraud Save Time Conferencing Chevy HHR Networking Electronic Medical Records App Mobile Security CrashOverride Consultant Access Control Best Available IT consulting SMARTweb Defense MAIA NFL Mobile Devices eWaste Upgrade Government Peripheral press release Operating System Mobility The Internet of Things 3D Printing Charger IT Support Cloud Computing Reliable Computing Applications webinar Productivity Windows Operating Sysytem Colocation Remote Workers Advertising Identity Theft Office IT Services Payroll Bandwidth Workers Devices Professional Services social media Tablet Risk Management Thank You Gifts WIndows 7 Near Field Communication Employee Communication Security Business Technology Jerry Fetty Ubuntu spam Presentation HITECH Act Managed IT Services Efficiency Social Technology video Prodcutivity Co-managed IT Storage Microsoft Windows 7 Specifications Collaboration Evernote Tech Support Current Events Social Engineering Hard Disk Drive Extreme Technology Makeover Hosted Solution Cybercrime Avoid Downtime iOS Administration Utility Computing Software Holiday Microblogging VPN Television Server Cameras Private Cloud Managed IT Services Backup Scalability Upgrades Ransomware Unified Threat Management Printer Server Legislation Virtual Assistant Email Cortana DocStar Data Privacy Chromecast Wireless Charging Lithium-ion battery Backkup Identity Financial Data Theft Net Neutrality Wayne Joubert Maintenance Data Loss Credit Cards Video Surveillance Phishing Scam Cleaning Unsupported Software Data Protection PDF Disaster Recovery FAQ Phishing Dark Web Unified Communications Analysis Hard Drives Document Management insurance HIPAA Fun Best Practice Business Intelligence Data Management Paperless Office Screen Mirroring Regulations Licensing Data Legal Vendor Management HBO Congratulations malware Application Virtual Desktop ISP Outlook Ciminal Customer Service iPad Proactive IT Hosted Solutions website Kleinschmidt Insurance Budget Disaster Display Solid State Drive Smart Technology Computing Edge Computer Tutorial Update Microsoft Outlook Data Security Phone System IT Management Passwords Hybrid Cloud Outsourced IT USB Computers Business Hiring/Firing Nokia Innovation Business Management Steve Anderson Black Market Science Camera Telephone Bryant Caudill Domains Analytics Network Congestion Cybersecurity Excel Books OneNote Websites Management Shortcut Information Technology Tip of the Week Uninterrupted Power Supply Regulation Doug Vanni Benefits Comparison Business Continuity App store Mobile Machine Learning

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *