(888) 995-1660

Symmetry Managed Services Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.
Subscribe to this list via RSS Blog posts tagged in Facebook

Should Big Tech Be Reined In?

Posted by on in Security

b2ap3_thumbnail_267112029_400.jpgIt’s not a secret (well, not anymore) that the big tech companies have influence. These companies, that include Apple, Google, Amazon, and Facebook, have been in the spotlight more and more as the argument of data privacy has gotten louder and louder. Public sentiment is starting to blow back on their business model--and since, Yahoo, once the predominant name in Internet-based services, was broken up and sold to Verizon for cents on the dollar after being at the center of the largest data breach in recorded history--there have been rumblings that there has to be something done to protect the public from major publicly-traded technology companies that use individual’s data in ways that some deem unethical.

Tagged in: Data Facebook Security

Social Media Can Help and Hurt Any Business

Posted by on in Business

b2ap3_thumbnail_social_help_hurt_400.jpgIn many ways, social media is the defining characteristic of the information age. It has transformed the way people communicate, market their products and services, and it has brought a litany of issues into the public consciousness. On the other side of the coin, social media currently costs many business billions of dollars a year in lost productivity. Let’s take a look at the pros and cons of social media, and how your business can put yourself in a net-positive position regarding the technology.

b2ap3_thumbnail_network_of_facebook_friends_400.jpgHave you ever gotten Facebook requests from strange people who you don’t know? While it might be tempting to give them the benefit of the doubt--after all, maybe they know a friend of yours--it’s best to keep strangers off of your page when you can. In order to give your page, the flexibility to accept friend requests from people you may know, and protect it from strangers, you can implement a “follow” feature, and limit who can send you friend requests.

b2ap3_thumbnail_facebook_security_check_400.jpgSince 2014, Facebook has quietly featured Safety Check, a crisis response tool that lets users in areas struck by natural disasters or other emergencies to confirm their safety on the social network. Originally, Facebook itself would have to activate a Safety Check, but that has changed--the power to activate a safety check is now in the hands of the stricken community.

social_network_security_400.jpgSocial media may be a great way to connect with other professionals and communicate with your friends, but it can be dangerous if you have poor posting habits. Before you share something, think twice about whether it contains any sensitive information that could be risky to yourself and your business.

Tag Cloud

Education Accessory Criminal Root Cause Analysis Miscellaneous Two-factor Authentication Politics Networking Display Unified Threat Management Bandwidth Worker Commute Blockchain Holiday Retail HBO Collaboration Mobile Device 5G PowerPoint Wireless Internet Users Comparison Tablets Tablet Benefits Google Maps Business Strategy Data Backup Computing Mobile Device Management Device security Work/Life Balance Current Events Branding Keyboard Shortcuts Electronic Medical Records HaaS Employee-Employer Relationship Microsoft Best Available Tech Support Windows 10 IT solutions Fax Server Threats Projects project management Computers Upgrade Wireless Outsourced IT Server Unsupported Software Wi-Fi Recovery FAQ Smartphone Employer-Employee Relationship Managing Stress Wasting Time Netflix Training Customer Service Data recovery Marketing User Tips File Sharing Browser Spam Best Practices Remote Monitoring SaaS Instant Messaging IT Management Information Virtual Assistant Data Security Update Internet of Things Microsoft Word User Social Media Telephone Text Messaging Samsung Identity Theft Windows Patch Management Search History Lithium-ion battery The Internet of Things Benchmarks Human Resources Computer Forensics Sports Gifts Solid State Drive Managed IT Data loss Gmail Transportation Regulations BDR Memory Government Windows Server 2008 OneNote Hosted Solutions Social Hiring/Firing Encryption Wireless Technology Save Time Applications Hardware Compliance Cost Management Google Cast Printer Server Financial Windows 10s Storage Computer Workplace Tips Tip of the Week Privacy iPhone Managed IT Services Antivirus User Error Hybrid Cloud Office 365 Hard Disk Drive Presentation Admin Chrome Alert Consultant Meetings Tech Term Commerce Emergency Malware Gamification Google Docs Cameras Audit Cloud Computing Access Control Cleaning Money Network Security Distributed Denial of Service Mobile Devices Fraud Office Tips Paperless Office Payment card Legislation Workers Computer Best Practice Scams Hard Drives Internet Tips Tip of the Week DDoS Maintenance Google Drive Identity CrashOverride Windows Ink Camera Printer Devices Hackers Computer Care Administrator Music Development Going Green Value Excel IT Support Server Maintenance Computer Accessories Scalability Digital Signage E-commerce Alexa for Business Backup Evernote VPN Windows 7 Internet Exlporer NFL Virtual Reality Streaming Media Testing Proactive Conferencing Avoiding Downtime Biometrics Google Assistant Customer Relationship Management Managed Service Provider Microsoft Office Edge communications Communication Sales Budget Hacking iOS Relocation Facebook Machine Learning Cloud Managed Service Windows 10 Science Battery Chromebook Big Data Access Security Data Theft Saving Time Laptop Risk Management Safety Uninterrupted Power Supply Processor Mobility Telephony Smartwatch Android Payroll Employee Screen Mirroring Workplace IT Support Efficiency VoIP Nanotechnology Proactive IT Robot Experience Technology Data Breach Innovation Application Hacker Computer Fan Shortcut Automation Investment Flexibility Email Augmented Reality Books Licensing Operating System Vendor Management Worker Firewall Gadgets Word Humor Charger App Router Data storage WiFi Ransomware How To Employer/Employee Relationship Business Business Technology Touchscreen Network WannaCry webinar Telephone Systems OneDrive Thank You Apps Workplace Tips Running Cable Sync YouTUbe Mobile Computing Vendor eWaste Data Management Micrsosoft Language Remote Computing Cybersecurity Data Saving Money Outlook Black Market Trending Files Office SharePoint Adobe Updates Cybercrime Apple Automobile Private Cloud Company Culture Small Business Advertising Wearable Technology Mouse Peripheral USB Productivity Hard Drive Microsoft Excel Network Congestion Virtual Private Network Teamwork Wireless Charging Hyperlink Network Secuirty Reputation Virus BYOD Business Management Mobile Office ROI Administration Bring Your Own Device Remote Workers Congratulations Co-Managed Services Phising SSID Software as a Service Bluetooth Vulnerability Near Field Communication IT budget Bloatware Disaster Information Technology Smart Technology Emails Data Privacy IT Services Television Voice over Internet Protocol Identities Phone System Websites Password Manager Myths PDF Printing Smartphones Cortana Software Data Storage Regulation Save Money Mobile Security Virtualization Medical IT Artificial Intelligence IT Services IT Support Scam Amazon Health Scam Video Games Analytics Payment Cards Data Protection Settings Keyboard Windows Server 2008 R2 Entertainment Passwords Productivity intranet Social Engineering App store Quick Tips Tip of the Week End of Support Travel Upgrades Business Continuity Touchpad Managed IT services Hosted Solution Break/Fix Business Intelligence Law Enforcement Downtime Business Computing IT consulting Disaster REcovery Chromecast WIndows 7 Password PC Management Credit Cards Phishing Personal Information Spyware Legal Sabotage

Mobile? Grab this Article!

QR-Code

Support Options

  • Phone Support >

    You're human, and your support should be too. Speak to a support team member on the phone now!

    Help Desk: (866) 520-6414

    Phone: (888) 995-1660

  • Ticket By Email >

    Send an email to the Help Desk to create a ticket automatically and communicate with your team or any member.

    Submit A Ticket

  • Ticket By Portal >

    Create and manage tickets via our secure online Help Desk Portal. (Members Only Requires login)

    Enter Support Portal

  • 1