SMART Blog

Smart Services has been providing independent agents with proactive, fast, and expert technology services since 1991.

Tip of the Week: Annoyed By Fake Friend Requests on Facebook? Here’s an Easy Fix

Tip of the Week: Annoyed By Fake Friend Requests on Facebook? Here’s an Easy Fix

Have you ever received Facebook requests from people you don’t know? While it might be tempting to give them the benefit of the doubt -- after all, maybe they know a friend of yours -- it’s best to keep strangers off of your page when you can. In order to give your page the flexibility to accept friend requests from people you may know and protect it from strangers, you can implement a “follow” feature, and limit who can send you friend requests.

0 Comments
Continue reading
Featured

Communities Can Now Activate Facebook’s Safety Check

Communities Can Now Activate Facebook’s Safety Check

Since 2014, Facebook has quietly offered Safety Check, a crisis response tool that lets users in areas struck by natural disasters or other emergencies to confirm their safety on the social network. Originally, Facebook itself had to activate a Safety Check, but that has changed; the power to activate a safety check is now in the hands of the stricken community.

0 Comments
Continue reading
Featured

Tip of the Week: How to Download Everything You’ve Posted to Facebook

Tip of the Week: How to Download Everything You’ve Posted to Facebook

If you’ve had your Facebook profile since the dawn of social media, chances are it’s accumulated an immense amount of personal information. While you might have felt uneasy handing over all of this data to Facebook, the company has made it surprisingly easy to take it back.

0 Comments
Continue reading

Tip of the Week: 4 Ways to Get a Handle on Social Media in the Workplace

Tip of the Week: 4 Ways to Get a Handle on Social Media in the Workplace

Social media may be a great way to connect with other professionals and communicate with your friends, but it can be dangerous if you have poor posting habits. Before you share something, think twice about whether it contains any sensitive information that could be risky to yourself and your business.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tutorial Specifications Language Managed Service HITECH Act Colocation Management Upgrade Network Recovery Memory Ciminal Access App store Telephony Mircrosoft Windows Ink Data Private Cloud Lifestyle hacker SMB OneNote Domains Miscellaneous Computer Fan Innovation ebay Scalability Sync Fun Virus Gifts End of Support Camera History video WiFi robot Conferencing Going Green Near Field Communication Social Networking Passwords Hacking Inbound Marketing Law Enforcement Unsupported Software Hetrick and Associates Prodcutivity Telephone Systems Data Loss Virtual Assistant WIndows 7 IT Support Business Intelligence Battery Microsoft Office 2010 Paperless Office Windows Safety Doug Vanni The Internet of Things Wasting Money Sports Mobile Device Gamification Proactive IT Chrome Online Currency Smart Tech Server iOS Ubuntu IT Support Update Root Cause Analysis Branding Router Dark Web Music Best Practices communications Cortana Customer Relationship Management Device Security NFL IT Technicians Programming Identity Theft Proactive Touchpad Computing Data Management agency automation Automobile Evernote Emergency MSP Remote Workers Kleinschmidt Insurance Save Money Co-Managed Services Charger Company Culture Images Websites Current Events Managed IT Services Sales Touchscreen Browser Cybersecurity Wi-Fi Cleaning Holiday Reputation Audit Outlook Apps Data Security Mobile Security Files Avoiding Downtime Professional Services Adobe Collaboration Employee-Employer Relationship Experience holidays Mobile Devices FAQ Managing Stress BDR Ransomware Android Windows 8 Data Theft Computer repair Office Tips Operating System VoIP Information Microsoft Windows 7 CrashOverride Benefits Connectivity Artificial Intelligence Employer Employee Relationship Google Maps Blogging Intranet Streaming Media Hosted Solution Students Compliance BYOD GLAD Data Storage Google Drive Telephone Software as a Service Chromebook PowerPoint Business Technology Business Legislation Best Available Value Hosted Solutions Augmented Reality Electronic Medical Records IT Services automation Video Surveillance Gmail Presentation Screen Mirroring Tip of the Week website Information Technology Wayne Joubert Bluetooth Gift Giving Testing App Big Data Customer Service Instant Messaging Wireless Technology Solid State Drive Google Docs OneDrive Surge Protector IT consulting Apple Meetings Social Engineering Disaster Commerce Microsoft Word Workplace Tips Gadgets Keyboard Shortcuts Efficiency Trending Identity Remote Computing Personal Information Tech Tip Administrator Managed IT Teamwork Lithium-ion battery Mobile Office Phishing Scam Outsourced IT Computer Software Edge PDF Laptop Users Bloatware Help Desk Small Business Vulnerability Phishing Tablet Chromecast Health Reliable Computing Wasting Time Mouse Remote Monitoring Shortcut Virtualization Hard Drives Save Time Productivity MySalesResults Tech Term 3D Printing Peripheral IT Consultant Mobile Device Management Internet Exlporer Scott White Computers Work Station Mobile User Tips HaaS Saving Time Shadow IT SMART Services Bandwidth Application Network Security Retail Government Regulation Microblogging HBO press release Twitter Smartphones Point of Sale Scam Office 365 Net Neutrality Virtual Reality Applied TAM Steve Anderson Distributed Denial of Service Microsoft Office Payroll In the News Extreme Technology Makeover Microsoft Outlook Cost Management Backup Bring Your Own Device Administration IT Service Legal Saving Money Travel Tablets Video Games Phone System Printers Jerry Fetty Hiring/Firing Updates Hard Drive Training Wiring Jessica Stevenson Employer-Employee Relationship User VPN Hybrid Cloud Printer Microsoft Excel ISP Vendor Management How To Congratulations Cloud Computing lunch and learn SMARTweb Defense Managed IT Services Password Access Control hackers Humor Comparison Unified Threat Management Taxes Hardware Windows 7 Word insurance Fax Server Thank You Windows 10 Accessory webinar Mobility Science Windows 10s Transportation Flexibility Supercomputer Firewall Avoid Downtime Television Webinar Text Messaging Fraud Financial Network Congestion Data Backup Storage Two-factor Authentication Wireless Alexa for Business File Storage Black Market Amazon Work/Life Balance Document Management Wireless Charging Budget Printer Server Nokia Excel DocStar Cybercrime USB Google Assistant File Sharing MAIA Managed IT Service User Error Consultant Microsoft Upgrades Advertising Spyware Business Management Technology Entertainment Networking Projects Windows 10 Chevy HHR Internet of Things Privacy Disaster Recovery Computer Accessories Data Breach HIPAA Productivity WIndows Server 2008 Business Continuity Admin Money IT Budget Antivirus DDoS Best Practice Data Protection IIAI IT Management Unified Communications Communication eWaste Education Financial Technology Blockchain Analysis Media Consumption Take Your Agency to the Next Level Microsoft Outlook 2007 Politics Patch Management Monitoring Project Management Keyboard Human Resources Display Content Filtering Settings SaaS Internet malware Computer Forensics Content Filter Maintenance Vendor Managed Service Provider Samsung Identities Web Design Data Privacy Marketing Devices WPA3 Office Operating Sysytem Email WannaCry Google Uninterrupted Power Supply Youtube Emails Encryption Security Credit Cards Alert Computer Care Smart Technology spam Facebook Worker Commute Redundancy Licensing IT solutions email encryption Business Computing IoT Backkup Wearable Technology Analytics Biometrics data backups Social Cloud Bryant Caudill iPhone Debate Nanotechnology Books Hard Disk Drive Data Recovery Cameras Tech Support Workers Virtual Desktop Buisness Quick Tips Risk Management iPad Printing Back Up Cast Wireless Internet Co-managed IT social media Running Cable Utility Computing Mobile Computing Hyperlink IT Solutions Search SharePoint Regulations Smartphone Applications

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *