SMART Blog

Tip of the Week: Annoyed By Fake Friend Requests on Facebook? Here’s an Easy Fix

Tip of the Week: Annoyed By Fake Friend Requests on Facebook? Here’s an Easy Fix

Have you ever received Facebook requests from people you don’t know? While it might be tempting to give them the benefit of the doubt -- after all, maybe they know a friend of yours -- it’s best to keep strangers off of your page when you can. In order to give your page the flexibility to accept friend requests from people you may know and protect it from strangers, you can implement a “follow” feature, and limit who can send you friend requests.

Sharing this information with your employees is also a great way to protect them from accidentally accepting friend requests from strangers who may be hackers in disguise. Scam artists can create new accounts and use them to send out mass friend requests for potential attacks on user credentials or sensitive information, so it’s best to stay safe and avoid these.

First, you need to log into your Facebook account. If you’re doing this from your desktop, click on the little down-arrow in the top-right corner of Facebook. Click on Settings, which will be down toward the bottom.

This opens up the General Account Settings page. In the left column, you’ll see several sub-categories for Facebook’s settings. Click on Privacy first.

Under the Privacy Settings and Tools page, you’ll see various sections dedicated to who can see what you post on Facebook. The option you are looking for is under the Who can contact me? Section. Here, you’ll want to click Edit and change the setting to Friends of friends. This means that only people who are friends with someone on your current friends list will be able to send you a request. You should still be able to extend the invitation to others, though.

Now, let’s say that you want to give people another option to see what you post, even if they aren’t currently friends of yours. Maybe you have articles about your industry that you’d like to share, but you don’t want to make everything that you post available for all to see. In a situation like this, you can scroll down to Public Posts in the left column. This opens up the Public Post Filters and Tools page. Under the section Who Can Follow Me, select Public. This allows you to set the status of your posts to either Public for Followers, or Friends for Friends only.

Of course, a healthy dose of skepticism should always be used when dealing with social media, as people can masquerade under false identities easily. For more information about how to keep your organization secure, reach out to SMART Services at 586 258-0650 .

Let Smart Services position your agency for tomorrow’s technological challenges. For more than 25 years, Smart Services has helped agencies across the U.S. face a changing environment by providing innovative technology solutions that allow agencies to focus on growing their business. MyAgency Cloud, our complete cloud solution, covers all your technology needs in the cloud or at your agency. In today’s competitive environment, it’s time to make your agency technology a strategic asset, instead of a liability. Let us show you how. To learn more, please call our expert agency technology advisor at 586-258-0650.

 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Saturday, January 19 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Device Security Take Your Agency to the Next Level Files hacker Business Intelligence Ransomware Camera Alexa for Business Unified Threat Management Tip of the Week Tech Tip Memory Co-Managed Services Phishing Scam Cost Management Sync Access Benefits PDF Printer Wireless Charging Managed Service Connectivity Data Backup Browser Best Practices Storage Encryption Alert BYOD Blogging Doug Vanni Managed IT Services Productivity Private Cloud Dark Web Saving Money Recovery Business Continuity Evernote IT consulting Data Theft Users Streaming Media holidays Apple Chevy HHR Fraud Backup Distributed Denial of Service Security Cameras Mobile Device Administration SharePoint Websites Co-managed IT App Monitoring Remote Workers Information Technology Proactive IT Cameras Privacy MySalesResults Chrome Office 365 Telephone Systems Microsoft Outlook 2007 Technology Document Management Audit Virtualization Regulations Cybersecurity Phone System Tablet History Updates Customer Relationship Management Computing Credit Cards Work/Life Balance Hard Drives Lifestyle Administrator Passwords iPad IoT Presentation Network Security Debate Cloud Comparison Windows Ink In the News Google Maps Google Managing Stress Firewall Budget Best Available Battery Gifts Employer Employee Relationship Media Consumption Data website Emergency Wiring Instant Messaging Travel Word Extreme Technology Makeover Teamwork Samsung HBO Redundancy VPN Vendor Management Saving Time MAIA Computer Screen Mirroring Charger Display Best Practice Data Loss Miscellaneous Smart Technology Microsoft Windows 7 Touchscreen spam Money Computer repair Cast Search Access Control Save Time Cortana Jerry Fetty Touchpad NFL Avoid Downtime Emails Data Protection Smartphone IIAI Programming Running Cable Managed Service Provider BDR Managed IT Paperless Office Business Management Scalability Windows 10s Network Congestion Wireless Technology Commerce Edge Admin Intranet hackers DDoS Holiday Law Enforcement Workplace Tips Vulnerability Gift Giving Licensing Projects Hybrid Cloud The Internet of Things Reliable Computing Wasting Time Laptop Mobile Software as a Service iPhone Update Peripheral App store End of Support 3D Printing Save Money Accessory WIndows Server 2008 Safety Youtube Testing social media WPA3 Financial Domains Employee-Employer Relationship Going Green iOS Books Jessica Stevenson Outlook WiFi Human Resources Web Design Google Assistant Printing IT Technicians Flexibility Virtual Desktop Marketing Information Kleinschmidt Insurance Office Bryant Caudill Android Analytics Collaboration Legal HaaS Backkup lunch and learn Entertainment Downtime Taxes Vendor Windows 10 Adobe Gadgets Legislation Remote Monitoring Sales Text Messaging GLAD email encryption Settings Remote Computing Bring Your Own Device Spyware Professional Services Social Sports Keyboard Mobile Device Management Compliance Hetrick and Associates Gamification Mobile Computing How To Virus Congratulations Work Station Innovation Printer Server Science Computer Fan Bloatware data backups IT Services Experience Wearable Technology Fax Server Health Wayne Joubert Windows 7 Regulation Two-factor Authentication Bandwidth SMART Services OneDrive Reputation Avoiding Downtime Value Video Games Content Filtering IT Solutions communications Branding User Language Maintenance Upgrade Help Desk Productivity Employer-Employee Relationship Identity Microsoft Outlook Computers Microsoft Office 2010 User Error Hyperlink Smart Tech Application SaaS Telephone MSP WIndows 7 Electronic Medical Records Unsupported Software Surge Protector Retail Mobile Office Trending Server Password Software SMARTweb Defense Risk Management Training Current Events Internet of Things Net Neutrality OneNote robot Mircrosoft Workers Meetings Financial Technology Managed IT Service Data Management HITECH Act Smartphones Identity Theft webinar FAQ Fun Scott White Social Networking Blockchain Automobile Back Up Data Security Near Field Communication Ciminal Proactive Unified Communications Hardware press release Facebook Colocation Patch Management Big Data Quick Tips Lithium-ion battery Amazon Prodcutivity Transportation Scam Webinar Tablets Hard Disk Drive Shadow IT Cleaning Computer Care Social Engineering Images Content Filter Antivirus Mobile Devices User Tips Advertising Identities Office Tips Efficiency Management Virtual Reality Biometrics Wi-Fi USB Analysis Windows 8 eWaste IT Support PowerPoint Hosted Solutions Windows 10 Upgrades Microsoft Root Cause Analysis Shortcut malware Microsoft Word IT Support ebay Keyboard Shortcuts Virtual Private Network Wireless Internet SMB Virtual Assistant Excel Company Culture Consultant Customer Service Network Operating Sysytem DocStar WannaCry Security Mobile Security Wireless Artificial Intelligence Applications Nokia Data Storage File Sharing Music Cloud Computing Cybercrime Internet Augmented Reality Data Recovery Buisness Disaster Recovery Google Drive Utility Computing Television Microsoft Office Wasting Money Business Computing Managed IT Services Uninterrupted Power Supply Tech Support Google Docs File Storage agency automation Steve Anderson Operating System Internet Exlporer Bluetooth Payroll Hosted Solution Business Technology Computer Accessories Disaster Applied TAM video IT Budget Humor Machine Learning Thank You Worker Commute Business Nanotechnology Specifications Solid State Drive VoIP Microblogging Telephony Phishing Conferencing Apps IT solutions Communication Hard Drive Mobility Black Market Computer Forensics automation Microsoft Excel Email Politics Small Business CrashOverride Data Privacy insurance IT Service Outsourced IT Government Online Currency Tutorial Students HIPAA Data Breach Mouse Hacking Inbound Marketing Ubuntu Tech Term Windows Video Surveillance Twitter Supercomputer Chromebook Personal Information Project Management ISP Chromecast Printers Education Networking Router IT Consultant IT Management Point of Sale Gmail Hiring/Firing Devices

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *