Our Blog: Stuff we think you should know

Social Media Can Be a Great Business Tool, So Long as It’s Secured

Social Media Can Be a Great Business Tool, So Long as It’s Secured

There is no denying that social media is one of the most powerful communication tools of our time, especially for businesses trying to communicate with their clients and customers. However, while you will want to have an account for your business on social media, you might not want a presence of your own. Today, we’ll discuss this quandary, and how you can resolve it.

Most social media sites let you create an account to represent your business. However, Facebook and LinkedIn both require you to have a personal account before you can create a business page.

Just because you don’t want your own account shouldn’t mean that you have to forego supporting your business with these platforms. Therefore, we’re giving you the steps you need to hide your personal accounts from any other users, enabling you to maintain your own business’ presence.

Facebook
The first step is to create a personal profile. Unfortunately, Facebook does not allow Pages to be created by anyone without a personal profile. Once you have done so (and don’t feel obligated to provide any more data than absolutely necessary), the blue bar at the top of the page will feature a Create menu item. From its options, select Page. From there, you should select the Business or Brand option and fill in the requested information.

To hide the personal profile page, you created in order to make a business page, access your Settings via the drop-down arrow at the top-right of the window. From there, navigate to the Privacy sub-menu.

If you really want to lock down the account, set Who can see your future posts to Only me.
You can also limit past posts.

Under the How People Find and Contact You area, select Friends of Friends for Who can send you friend requests.
Set Who can see your friends list to Only Me.

Set Who can look you up using the email address you provided to Friends.

Set Who can look you up using the phone number you provided to Friends.

Uncheck the box on Do you want search engines outside of Facebook to link to your profile.

Then, click on the Timeline and Tagging option on the left.

Set Who can post on your timeline to Only me.

From there on, your Facebook account will only be seen by people you’ve added or accepted as Facebook friends.

LinkedIn
Like Facebook, you need to have an account to create your official business page on LinkedIn. Once you have set up an account, it is simple enough to create a business page by following the prompts provided after clicking Create a Company Page + in the nine-dot menu.

In order to hide your account, access your Settings & Privacy. Under Privacy, you will see an assortment of options, allowing very granular control over the information LinkedIn is able to share.

Social media can lend your company some invaluable visibility, even if you don’t want that kind of visibility for yourself. To find out how to ensure the security of other key portions of your business, make sure you subscribe to our blog!

How Good IT Makes It Seem Like You Don’t Need It
Tip of the Week: Don’t Get Faced by FaceTime
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, May 26 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Business Email Hackers User Tips Malware Computer Business Computing Microsoft Hosted Solutions Network Security Productivity Software Google Internet Tech Term Communication Mobile Devices Efficiency IT Services Data Small Business Backup Hardware Ransomware Workplace Tips Windows 10 Smartphone IT Support Android Microsoft Office Saving Money Productivity Cloud Computing Facebook Browser Data Recovery Managed IT Services Business Continuity Social Media Data Management Server Users Office 365 Upgrade Phishing Internet of Things Innovation Word Managed IT Services Mobile Device Gmail Windows Data Backup Smartphones Disaster Recovery Outsourced IT Windows 10 App Passwords Network Vulnerability Chrome Cybersecurity Artificial Intelligence Business Management Information Miscellaneous communications Remote Monitoring Managed Service Provider Employer-Employee Relationship VoIP Encryption IT Support Hacker Gadgets Managed Service Content Filtering Government Money Spam Website Big Data BYOD Applications Infrastructure Save Money Apple Virtual Reality Tip of the week Analytics Office Tips Display Avoiding Downtime Settings Employee-Employer Relationship Antivirus The Internet of Things Two-factor Authentication Virtualization Access Control Bandwidth Robot Printing YouTube Router Automation Education Risk Management Wireless Apps IT Management Firewall Maintenance Augmented Reality Customer Service WiFi Tablet Data storage Paperless Office Safety SaaS Solid State Drive Networking Office Company Culture Downtime Outlook Wireless Technology Recovery Holiday Unified Threat Management Hosted Solution Hard Disk Drive VPN Monitors Data Security HIPAA Data loss Business Technology Operating System Chromebook Development Virtual Private Network Search End of Support Computing Server Management IBM Password Mobile Security Document Management Touchscreen Google Drive Mobile Device Management Mouse Vendor Management Administration Hacking Telephone Systems Customer Relationship Management Wi-Fi LiFi Laptop Quick Tips Computers Scam Business Intelligence Storage Retail Presentation Blockchain Cost Management Halloween Troubleshooting VoIP Legal Undo Google Calendar Chatbots Cortana FinTech iOS How To Drones Marketing Printer Wearable Technology Fun Security Cameras Alt Codes Dark Data Net Neutrality Screen Reader Students WannaCry Going Green Social Engineering Application Computing Infrastructure Dongle Recycling Human Error IT service Heating/Cooling Smart Technology Motherboard Remote Computing Permissions Assessment Scary Stories Time Management Legislation Identity Update MSP Scalability Social IP Address Cybercrime PowerPoint Firefox Managing Stress Managed Services Cabling Typing FCC Smart Tech Mixed Reality Alerts Service Level Agreement Digital Payment eWaste Device BDR Servers Deep Learning Humor Distributed Denial of Service Fraud Internet Exlporer Politics Sports LED Network Management Comparison Knowledge Migration Hacks Connectivity Mobile Office Onboarding Techology Budget Hard Drives SharePoint Collaboration Cables Laptops Managed IT Cryptocurrency Title II Slack Data Breach Digital Lenovo How To Licensing Private Cloud Continuity Mobility Google Maps Bring Your Own Device sip Managed IT Service Modem Value Tech Support Smart Office Co-Managed IT Specifications Compliance Experience Unified Communications Charging Mail Merge Online IoT Computer Care Running Cable Digital Signage Unified Threat Management Refrigeration Downloads IT Technicians File Sharing Wires Software as a Service Disaster Shortcut Bitcoin Network Congestion User Monitoring Hard Disk Drives Spyware Superfish Information Technology Cooperation Virtual Desktop Solar Print Toner Statistics Best Practice telephony Public Speaking Break Fix Cookies Samsung Address Writing Hotspot Professional Services Websites Identity Theft Buisness Work Content Google Docs Competition Black Friday Regulations Messaging Microsoft Excel Star Wars Training Lithium-ion battery Desktop User Error Multi-Factor Security Mirgation IT solutions Voice over Internet Protocol Entertainment Uninterrupted Power Supply Patch Management Windows 8 Spying Solid State Drives Google Wallet Staff Automobile Shortcuts Bluetooth Business Growth Dark Web Nanotechnology G Suite Corporate Profile Current Events Language USB 5G Optimization Streaming Cyber Monday Social Networking Analysis Employee-Employer Relationships Gadget Staffing Motion Sickness Taxes 3D Printing Personal Information Administrator Crowdsourcing Emergency Machine Learning IT Budget Web Server GPS Printers IT Consultant Unsupported Software Computer Repair Relocation Processors Cameras Tracking Meetings Cleaning Mobile Data Health Domains Alert CCTV Emoji Webcam Windows 7 Work/Life Balance Electronic Medical Records Error Mobile Computing Black Market Point of Sale Regulation Law Enforcement Physical Security Travel CrashOverride Upgrades Notifications Botnet Supercomputer Twitter