Our Blog: Stuff we think you should know

Social Media Can Be a Great Business Tool, So Long as It’s Secured

Social Media Can Be a Great Business Tool, So Long as It’s Secured

There is no denying that social media is one of the most powerful communication tools of our time, especially for businesses trying to communicate with their clients and customers. However, while you will want to have an account for your business on social media, you might not want a presence of your own. Today, we’ll discuss this quandary, and how you can resolve it.

Most social media sites let you create an account to represent your business. However, Facebook and LinkedIn both require you to have a personal account before you can create a business page.

Just because you don’t want your own account shouldn’t mean that you have to forego supporting your business with these platforms. Therefore, we’re giving you the steps you need to hide your personal accounts from any other users, enabling you to maintain your own business’ presence.

The first step is to create a personal profile. Unfortunately, Facebook does not allow Pages to be created by anyone without a personal profile. Once you have done so (and don’t feel obligated to provide any more data than absolutely necessary), the blue bar at the top of the page will feature a Create menu item. From its options, select Page. From there, you should select the Business or Brand option and fill in the requested information.

To hide the personal profile page, you created in order to make a business page, access your Settings via the drop-down arrow at the top-right of the window. From there, navigate to the Privacy sub-menu.

If you really want to lock down the account, set Who can see your future posts to Only me.
You can also limit past posts.

Under the How People Find and Contact You area, select Friends of Friends for Who can send you friend requests.
Set Who can see your friends list to Only Me.

Set Who can look you up using the email address you provided to Friends.

Set Who can look you up using the phone number you provided to Friends.

Uncheck the box on Do you want search engines outside of Facebook to link to your profile.

Then, click on the Timeline and Tagging option on the left.

Set Who can post on your timeline to Only me.

From there on, your Facebook account will only be seen by people you’ve added or accepted as Facebook friends.

Like Facebook, you need to have an account to create your official business page on LinkedIn. Once you have set up an account, it is simple enough to create a business page by following the prompts provided after clicking Create a Company Page + in the nine-dot menu.

In order to hide your account, access your Settings & Privacy. Under Privacy, you will see an assortment of options, allowing very granular control over the information LinkedIn is able to share.

Social media can lend your company some invaluable visibility, even if you don’t want that kind of visibility for yourself. To find out how to ensure the security of other key portions of your business, make sure you subscribe to our blog!

How Good IT Makes It Seem Like You Don’t Need It
Tip of the Week: Don’t Get Faced by FaceTime


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, March 25 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Privacy Hackers Business Malware User Tips Computer Business Computing Network Security Productivity Internet Google Microsoft Tech Term Software Hosted Solutions Mobile Devices Efficiency IT Services Communication Small Business Backup Windows 10 Hardware Ransomware Smartphone Data IT Support Android Microsoft Office Saving Money Workplace Tips Productivity Managed IT Services Cloud Computing Browser Business Continuity Data Management Data Recovery Server Windows Managed IT Services Upgrade Data Backup Innovation Gmail Internet of Things Facebook Users App Outsourced IT Phishing Word Windows 10 Office 365 Passwords Smartphones Disaster Recovery VoIP Remote Monitoring Artificial Intelligence Encryption Social Media Chrome Mobile Device Employer-Employee Relationship Vulnerability Cybersecurity communications Business Management Managed Service Provider IT Support Infrastructure Spam Applications Website BYOD Money Office Tips Network Hacker Content Filtering Managed Service Tip of the week Big Data Information Miscellaneous Apple Government Analytics Display Router Customer Service IT Management Robot Printing Automation Maintenance Settings Employee-Employer Relationship Two-factor Authentication Virtual Reality Bandwidth Firewall Tablet YouTube Paperless Office Antivirus Save Money WiFi Risk Management Avoiding Downtime The Internet of Things Wireless Access Control Data storage Virtualization Virtual Private Network Customer Relationship Management Recovery Chromebook Wi-Fi Server Management Outlook Laptop Monitors Augmented Reality Touchscreen Mobile Security Business Intelligence Document Management Telephone Systems Safety Apps Operating System Downtime Company Culture Quick Tips End of Support Computing Hosted Solution Scam Hacking Password Google Drive Mouse Vendor Management SaaS Networking Search Education Presentation Development LiFi Computers VPN IBM Unified Threat Management Data Security Holiday Storage Office Retail Administration HIPAA Wireless Technology Data loss Business Technology Mobile Device Management Gadgets Digital Payment Virtual Desktop Alerts Service Level Agreement Wires Software as a Service Legal Distributed Denial of Service Network Management Digital Signage Internet Exlporer Managed IT Solar Print Toner Drones Comparison Techology Monitoring Politics Alt Codes Dark Data Buisness Fraud Google Maps Work Content Collaboration Going Green Social Engineering IT solutions SharePoint Digital Lenovo Messaging Lithium-ion battery Title II Connectivity Desktop Social Licensing Mail Merge Voice over Internet Protocol Entertainment Managed IT Service Modem Value Hard Drives Disaster Shortcut Shortcuts Specifications Compliance Unified Threat Management Spying Tech Support Typing 5G Statistics Optimization Streaming File Sharing Cortana Downloads IT Technicians Spyware Superfish Analysis Computer Care Deep Learning Humor Halloween Online IoT Troubleshooting Hacks Fun Cooperation Address FinTech iOS Samsung Break Fix Cookies Hotspot Professional Services Refrigeration Uninterrupted Power Supply Patch Management Security Cameras Budget Black Friday Regulations User User Error Websites Identity Theft Cryptocurrency Bluetooth Recycling Human Error How To Multi-Factor Security Mirgation Public Speaking Training Bring Your Own Device sip Scary Stories Microsoft Excel Star Wars Automobile Staff Competition Corporate Profile MSP Scalability G Suite IP Address Cybercrime Dark Web Nanotechnology Network Congestion Language USB Solid State Drive Managing Stress Managed Services Cyber Monday Social Networking VoIP PowerPoint Bitcoin eWaste Device Information Technology Knowledge Google Calendar Chatbots How To Best Practice telephony Sports Blockchain Cost Management Heating/Cooling LED Writing Printer Wearable Technology WannaCry Migration Google Docs Mobile Office Net Neutrality Screen Reader IT service Windows 8 Computing Infrastructure Dongle Undo Hard Disk Drive Cables Laptops Remote Computing Smart Technology Motherboard Time Management Onboarding Cabling Continuity Mobility Update Google Wallet Experience Unified Communications Legislation Identity Firefox Slack Business Growth Permissions Assessment Marketing BDR Servers Smart Office Co-Managed IT Current Events Charging Running Cable FCC Smart Tech Application Relocation Processors Cameras Meetings 3D Printing Tracking Health Regulation Cleaning Private Cloud Alert CCTV Emoji Webcam Unsupported Software Electronic Medical Records Domains Work/Life Balance Error Black Market Point of Sale Mobile Data Travel CrashOverride Law Enforcement Printers Notifications Twitter Botnet Supercomputer Motion Sickness Gadget Staffing Personal Information Administrator Mobile Computing Emergency Crowdsourcing Taxes IT Budget Web Server Physical Security Machine Learning Upgrades GPS Computer Repair Windows 7 IT Consultant