(888) 995-1660

Symmetry Managed Services Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.
Subscribe to this list via RSS Blog posts tagged in Facebook

Making Sense of Facebook’s Privacy Settings

Posted by on in Best Practices

b2ap3_thumbnail_privacy_286476669_400.jpgWe’ve been talking about Facebook quite a bit on our blog, and for good reason - we’re all concerned with our privacy, and Facebook has been notoriously front-and-center when it comes to Internet privacy. In this post we will break down Facebook’s privacy settings to help you gain control over your personal identity while using the social network.

b2ap3_thumbnail_FB_286476710_400.jpgWhether you love, hate, or are just indifferent about Facebook (no judgement here), it’s worth configuring and locking down your account to control what others can see about you.

Facebook is front and center when it comes to privacy-related issues worldwide, so in this blog we are going to discuss how you can take control of your personal information. This post will also serve as an excellent starting point for anyone who doesn’t understand 2-factor authentication.

Should Big Tech Be Reined In?

Posted by on in Security

b2ap3_thumbnail_267112029_400.jpgIt’s not a secret (well, not anymore) that the big tech companies have influence. These companies, that include Apple, Google, Amazon, and Facebook, have been in the spotlight more and more as the argument of data privacy has gotten louder and louder. Public sentiment is starting to blow back on their business model--and since, Yahoo, once the predominant name in Internet-based services, was broken up and sold to Verizon for cents on the dollar after being at the center of the largest data breach in recorded history--there have been rumblings that there has to be something done to protect the public from major publicly-traded technology companies that use individual’s data in ways that some deem unethical.

Tagged in: Data Facebook Security

Social Media Can Help and Hurt Any Business

Posted by on in Business

b2ap3_thumbnail_social_help_hurt_400.jpgIn many ways, social media is the defining characteristic of the information age. It has transformed the way people communicate, market their products and services, and it has brought a litany of issues into the public consciousness. On the other side of the coin, social media currently costs many business billions of dollars a year in lost productivity. Let’s take a look at the pros and cons of social media, and how your business can put yourself in a net-positive position regarding the technology.

b2ap3_thumbnail_network_of_facebook_friends_400.jpgHave you ever gotten Facebook requests from strange people who you don’t know? While it might be tempting to give them the benefit of the doubt--after all, maybe they know a friend of yours--it’s best to keep strangers off of your page when you can. In order to give your page, the flexibility to accept friend requests from people you may know, and protect it from strangers, you can implement a “follow” feature, and limit who can send you friend requests.

Tag Cloud

Information Technology Smartwatch Windows 10 Microsoft Excel Data loss Robot Employee-Employer Relationship Internet Exlporer Audit Privacy Criminal Internet Smart Devices Paperless Office Financial Remote Monitoring Books Running Cable Camera Server Maintenance File Sharing Network Congestion Scalability Data Theft Tech Support Computer Fan Ransomware Hackers IT Support Internet of Things Peripheral Workplace Tips BYOD Passwords Thank You Chromebook User Alert Computer Care Chrome Network Secuirty Automobile Security Presentation Identities Social Media Remote Workers Bandwidth Testing App Fraud Keyboard SaaS CRM Business Computer Forensics Language DDoS Analytics Management Tips Tip of the Week Administration Advertising Travel Customer Relationship Management Google Drive Windows 10s Information Saving Time Excel Remote Computing Internet Service Provider Hardware SSID WiFi Identity Co-Managed Services Managed Service Spyware Payment card Mobile Device Amazon Uninterrupted Power Supply Storage communications Cloud Computing Best Available OneNote Training HIPAA Computer Accessories Office Tips FAQ WIndows 7 Chromecast Data recovery Big Data Relocation Hacking Users Nanotechnology Education Shortcut Vulnerability Smartphone Google End of Support Business Strategy PC Employee Hybrid Cloud Updates Data Security Cybersecurity Tablet Data Storage Private Cloud Office 365 NFL Consultant Bloatware Update Proactive Communitications Development Tech Term Collaboration Bluetooth Computer WannaCry Facebook Privacy Business Management Applications Settings eCommerce Windows 7 Charger Sports Virus Encryption Downtime Printers Electronic Medical Records Managing Stress Fiber Optics Microsoft Office Accessory Microsoft Word Music Myths project management VPN iPhone Vendor disaster Recover Admin Text Messaging E-commerce Saving Money Technology Virtual Assistant Mobile Office Mobile Devices Windows Server 2008 Phone System webinar Sync Hosted Desktop Printer Office Communication Google Maps Payment Cards Employer/Employee Relationship Upgrades Data Backup Smartphones Customer Service Medical IT IT budget Comparison Safety Video Games Antivirus Biometrics Payroll Processor Managed IT Services Holidays IT solutions Recovery SharePoint Vendor Management Small Business Software as a Service Virtual Reality Humor IT consulting Computers Distributed Denial of Service Managed IT Service Telephony Miscellaneous Mouse Worker Commute Value Workers Edge Memory Sabotage Credit Cards Automation Files Break/Fix Business Continuity Government Phishing User Error Network Benchmarks Television Battery Windows Server 2008 R2 Scams YouTUbe Windows Ink Wasting Time Access Upgrade Firewall Business Intelligence Phising Retail Mobile Device Management Cost Management Mobile Security Unsupported Software How To Data storage Disaster REcovery IT Services Hard Disk Drive Efficiency Flexibility Alexa for Business Mobility Branding Health Disaster Access Control Screen Mirroring Gmail Innovation IT Management Work/Life Balance ROI Save Money Investment Workplace Managed IT services Samsung Hosted Solution Going Green Application Cleaning Identity Theft Cameras Artificial Intelligence History Gamification Congratulations Telephone Bring Your Own Device Human Resources Emails Black Market Near Field Communication Conferencing Google Assistant Experience Managed Services Provider Commerce Data Protection Windows 10 Managed IT The Internet of Things Entertainment Managed Service Provider Tip of the Week Printer Server Google Docs PowerPoint Politics iOS Productivity Projects Computer Workplace Tips Tip of the Week Wireless Charging PDF Solid State Drive Wireless Internet Touchpad USB Gifts Productivity VoIP Machine Learning Computing Teamwork Android Worker Operating System Virtualization Risk Management AI Apps Wireless Technology Apple CrashOverride Smart Device Data Management Reputation Best Practices Backup Micrsosoft Legislation Copiers Microsoft Company Culture Troubleshooting Malware Net Neutrality Digital Signage Scam Wireless Cast Employer-Employee Relationship Tablets Unified Threat Management Current Events Password Manager Personal Information Administrator Cloud Root Cause Analysis Networking Devices Netflix Money Regulations Gadgets Quick Tips Touchscreen OneDrive Keyboard Shortcuts Facebook Business Technology Social Engineering Device security Data Privacy Wi-Fi Legal Instant Messaging Voice over Internet Protocol Blockchain Best Practice Proactive IT Evernote Two-factor Authentication App store Data Breach Remote Work Marketing IT Services IT Support Scam Router Hiring/Firing Virtual Private Network Laptop Data Browser Windows Regulation Augmented Reality Meetings Word Hacker Spam Maintenance Outsourced IT Printing Password intranet Fax Server Budget Law Enforcement Science Wearable Technology Cybercrime Business Computing Patch Management Hard Drives Hard Drive Streaming Media Search Software Benefits 5G Emergency Threats Licensing Sales HaaS Trending Hosted Solutions Server Display Mobile Computing Websites Outlook BDR Email Covid-19 Save Time Avoiding Downtime IT Support Compliance Adobe Transportation Telephone Systems Cortana Hyperlink Lithium-ion battery eWaste User Tips Inventory Social Smart Technology HBO Holiday Network Security

Mobile? Grab this Article!

QR-Code

Support Options

  • Phone Support >

    You're human, and your support should be too. Speak to a support team member on the phone now!

    Help Desk: (866) 520-6414

    Phone: (888) 995-1660

  • Ticket By Email >

    Send an email to the Help Desk to create a ticket automatically and communicate with your team or any member.

    Submit A Ticket

  • Ticket By Portal >

    Create and manage tickets via our secure online Help Desk Portal. (Members Only Requires login)

    Enter Support Portal

  • 1