Tip of the Week: Annoyed By Fake Friend Requests on Facebook? Here’s an Easy Fix

Tip of the Week: Annoyed By Fake Friend Requests on Facebook? Here’s an Easy Fix

Have you ever received Facebook requests from people you don’t know? While it might be tempting to give them the benefit of the doubt -- after all, maybe they know a friend of yours -- it’s best to keep strangers off of your page when you can. In order to give your page the flexibility to accept friend requests from people you may know and protect it from strangers, you can implement a “follow” feature, and limit who can send you friend requests.

Sharing this information with your employees is also a great way to protect them from accidentally accepting friend requests from strangers who may be hackers in disguise. Scam artists can create new accounts and use them to send out mass friend requests for potential attacks on user credentials or sensitive information, so it’s best to stay safe and avoid these.

First, you need to log into your Facebook account. If you’re doing this from your desktop, click on the little down-arrow in the top-right corner of Facebook. Click on Settings, which will be down toward the bottom.

This opens up the General Account Settings page. In the left column, you’ll see several sub-categories for Facebook’s settings. Click on Privacy first.

Under the Privacy Settings and Tools page, you’ll see various sections dedicated to who can see what you post on Facebook. The option you are looking for is under the Who can contact me? Section. Here, you’ll want to click Edit and change the setting to Friends of friends. This means that only people who are friends with someone on your current friends list will be able to send you a request. You should still be able to extend the invitation to others, though.

Now, let’s say that you want to give people another option to see what you post, even if they aren’t currently friends of yours. Maybe you have articles about your industry that you’d like to share, but you don’t want to make everything that you post available for all to see. In a situation like this, you can scroll down to Public Posts in the left column. This opens up the Public Post Filters and Tools page. Under the section Who Can Follow Me, select Public. This allows you to set the status of your posts to either Public for Followers, or Friends for Friends only.

Of course, a healthy dose of skepticism should always be used when dealing with social media, as people can masquerade under false identities easily. For more information about how to keep your organization secure, reach out to SMART Services at 586 258-0650 .

Let Smart Services position your agency for tomorrow’s technological challenges. For more than 25 years, Smart Services has helped agencies across the U.S. face a changing environment by providing innovative technology solutions that allow agencies to focus on growing their business. MyAgency Cloud, our complete cloud solution, covers all your technology needs in the cloud or at your agency. In today’s competitive environment, it’s time to make your agency technology a strategic asset, instead of a liability. Let us show you how. To learn more, please call our expert agency technology advisor at 586-258-0650.

How Should Business Owners Respond Appropriately t...
How Thinking Short Term About Technology Hurts You...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, March 26 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Social Engineering Patch Management lunch and learn Scalability Windows Chrome Comparison Small Business The Internet of Things Smart Technology Networking Touchpad Google Drive Co-managed IT Nokia Business Technology Regulation Two-factor Authentication Management Advertising Lithium-ion battery PowerPoint Admin Google Assistant Twitter Microsoft Outlook 2007 Virtual Assistant Tutorial Fax Server Best Practice Business Continuity Net Neutrality automation Save Time Hosted Solutions Virtual Private Network Chevy HHR ebay Personal Information Retail Wireless Encryption VPN webinar Business Management VoIP IT Technicians iPad Avoid Downtime Webinar In the News E-Commerce Company Culture hacker Benefits Project Management Phishing Scam Uninterrupted Power Supply Social Mobile Office Help Desk Value Internet of Things Virtualization Experience Apple File Storage Machine Learning Best Available Outlook Wasting Time Black Market Health Vendor Transportation Reliable Computing Outsourced IT Technology GLAD End of Support Maintenance Mobile Device Management Hyperlink Browser Inbound Marketing Apps Password Regulations Access Consultant Websites Computer Cloud Application Risk Management Virus PDF Computer Accessories Office 365 FAQ IT Budget Data Management Remote Workers Applications Facebook Updates Media Consumption Nanotechnology Passwords Audit Online Currency Sales Downtime Cameras Data Security Phone System File Sharing Gmail Virtual Reality BYOD Vendor Management Managed IT Printing Identity Theft How To Vulnerability Entertainment Medical IT Hiring/Firing Government Tech Tip holidays data backups Amazon Programming Colocation Evernote Fun Co-Managed Services Internet WIndows 7 Computer Forensics IT Support Current Events Conferencing Charger Hard Drive Money Network Security User Tips Network Business Computing Backup and Disaster Recovery Proactive IT Data CrashOverride Customer Service Streaming Media Word Identities Take Your Agency to the Next Level Wireless Charging Break/Fix Mobile Devices Antivirus Android Kleinschmidt Insurance Connectivity Mobility Phishing agency automation Memory Data Loss Electronic Medical Records Financial Technology Peripheral Firewall Financial Remote Computing Wireless Internet Data Backup Hybrid Cloud Meetings Monitoring Mobile DDoS Running Cable Microblogging Debate Network Congestion insurance Thank You DocStar Extreme Technology Makeover Save Money Keyboard Chromebook Testing Employer Employee Relationship Data Breach App store Bryant Caudill Sync Administrator Trending Upgrade Education MySalesResults Paperless Office Credit Cards Information Technology Update Data Protection Workplace Tips Flexibility Administration Microsoft Outlook Information Mouse SMB Keyboard Shortcuts Students Innovation Television Software as a Service Augmented Reality Remote Monitoring Alert Holiday IT Services Internet Exlporer Work/Life Balance Workers Best Practices Text Messaging Upgrades Managed IT Services Microsoft Word Politics Privacy Printers Buisness Windows 10 Books Productivity Touchscreen Cleaning spam WannaCry Worker Commute Document Management IT Support Windows Ink History Managed Service Windows 10 Camera Tech Term Branding Language Devices Chromecast Mobile Device Social Networking USB Projects Spyware Wireless Technology Search Marketing Specifications IT Solutions Users Applied TAM Distributed Denial of Service Analytics Data Storage IT Management eWaste Budget Music Compliance iPhone Content Filter Microsoft Office Doug Vanni Video Surveillance Law Enforcement Backkup Printer Unified Threat Management Commerce Windows 7 Presentation HBO Wi-Fi Images Server Cloud Computing Instant Messaging Mircrosoft Software IT Service Root Cause Analysis Cybersecurity Supercomputer Avoiding Downtime Blockchain video Video Games OneDrive Employee-Employer Relationship Gifts Automobile Training Smartphone Excel Security Identity Steve Anderson Ubuntu Storage Microsoft OneNote Bloatware Office Managed IT Services Adobe Disaster Cortana Productivity Blogging Human Resources MSP Science Unified Communications Gamification NFL Reputation Computers Gadgets Travel communications Hetrick and Associates Work Station Settings Recovery SharePoint Emergency Computer repair Operating Sysytem Computer Fan Ciminal WIndows Server 2008 SaaS Hard Disk Drive Cybercrime Samsung Collaboration IT Consultant Microsoft Excel SMARTweb Defense Accessory Backup Business Intelligence MAIA Windows 8 Windows 10s malware Tablets Employee Back Up Laptop Battery press release User Device Security Computer Care Hacking Legislation Hardware HIPAA Web Design Wearable Technology Hosted Solution Taxes Humor Access Control Shortcut Virtual Desktop Cast Congratulations Unsupported Software Private Cloud Domains Edge Google Sports Safety Analysis Payment Cards Fraud Communication Managed IT Service Solid State Drive Youtube Smartphones Customer Relationship Management Gift Giving Display website Bandwidth Mobile Security Licensing Artificial Intelligence Surge Protector Proactive IIAI Business Disaster Recovery Data Privacy WPA3 Telephone WiFi Quick Tips Email Content Filtering HITECH Act Screen Mirroring Computing Miscellaneous Printer Server BDR Data Theft IoT 3D Printing Bluetooth Router Intranet Telephone Systems Security Cameras email encryption Data Recovery Scott White hackers Big Data Smart Tech IT consulting social media Microsoft Windows 7 Ransomware HaaS robot Google Maps Saving Money Lifestyle Dark Web Tablet Operating System Jerry Fetty IT solutions Prodcutivity Teamwork App Shadow IT Tip of the Week User Error Point of Sale Professional Services Near Field Communication Cost Management Files Office Tips Managing Stress Employer-Employee Relationship Mobile Computing Wasting Money Google Docs Wiring Biometrics Telephony Utility Computing Redundancy Emails Going Green iOS Efficiency Microsoft Office 2010 Wayne Joubert Jessica Stevenson Managed Service Provider Bring Your Own Device Hard Drives SMART Services Tech Support ISP Alexa for Business Legal Scam Payroll Saving Time

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *