Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Keep a Facebook Friend From Viewing a Post You Don’t Want Them to See

Tip of the Week: How to Keep a Facebook Friend From Viewing a Post You Don’t Want Them to See

The advantage of Facebook is also its disadvantage: the fact that you’ve likely got a large variety of people on your friends list. While this works out great for networking, it may mean holding back on posting a personal opinion if it isolates or offends someone you’re friends with. To get around this social dilemma, Facebook allows you to hide your status from one or more friends. Here’s how to do it.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud User Tips Network Security Hardware Internet Efficiency IT Support Malware Privacy Google Email Phishing Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Mobile Device Ransomware Quick Tips Workplace Strategy Microsoft Cybersecurity Small Business Passwords Data Backup Communication Smartphone Backup Saving Money Android Business Management Smartphones VoIP communications Upgrade Managed Service Mobile Devices Disaster Recovery Browser Data Recovery Managed IT Services Social Media Microsoft Office Windows Remote Tech Term Network Internet of Things Current Events Automation Artificial Intelligence Facebook Productivity Cloud Computing Covid-19 Gadgets AI Server Managed Service Provider Remote Work Miscellaneous Holiday Information Outsourced IT Employee/Employer Relationship Spam Encryption Office Windows 10 Compliance Training Data Management Business Continuity Government Blockchain Wi-Fi Windows 10 Business Technology Bandwidth Virtualization Mobile Office Two-factor Authentication Apps Data Security BYOD Vendor Mobile Device Management Gmail Chrome Budget Managed Services Voice over Internet Protocol Apple Networking Employer-Employee Relationship App Avoiding Downtime Computing Marketing Information Technology Applications Access Control Office 365 IT Support Tip of the week WiFi Conferencing How To BDR Hacker Operating System Website HIPAA Virtual Private Network Risk Management Router Health Office Tips Analytics Augmented Reality Help Desk Retail Storage Password Big Data Bring Your Own Device Managed IT Services Healthcare Computers Vendor Management Cybercrime Microsoft 365 Physical Security Solutions Display Printer Paperless Office Infrastructure Firewall Windows 11 2FA Document Management Monitoring The Internet of Things Excel Social Scam Data loss Remote Workers Telephone Going Green Patch Management Customer Service Cooperation Free Resource Save Money Project Management Remote Monitoring Windows 7 Vulnerability End of Support Telephone System Content Filtering Multi-Factor Authentication Mobility IT Management Wireless Technology Cost Management VPN YouTube Meetings Cryptocurrency Employees Computer Repair Word Integration Virtual Desktop User Tip Modem Data storage LiFi Processor Mobile Security Holidays Outlook Machine Learning Money Safety Data Storage Smart Technology Supply Chain Humor Video Conferencing Managed Services Provider Maintenance Saving Time Virtual Machines Professional Services Antivirus Sports Mouse Managed IT Service Downloads Administration iPhone Customer Relationship Management Licensing Entertainment Vulnerabilities Robot Data Privacy Hacking Images 101 Settings Presentation Printing Wireless Organization Social Networking Legislation Shortcuts Unified Threat Management Hosted Solution Typing Fileless Malware Digital Security Cameras Smart Devices Ransmoware Wearable Technology Memory Vendors IP Address Content Remote Working Network Congestion Health IT Knowledge Motherboard Data Breach Comparison Google Play Be Proactive Google Drive User Error Directions Videos Assessment Electronic Health Records Permissions Workforce Recovery Wasting Time Threats Point of Sale 5G Experience Hard Drives Trend Micro Specifications Security Cameras Workplace Strategies Google Docs Unified Communications Bitcoin Network Management Microchip Running Cable Tech Support Domains Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon Google Wallet Username Monitors Refrigeration eCommerce Black Friday SSID Windows 8 Laptop Websites Public Speaking Database Surveillance Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Media Drones Lithium-ion battery Proxy Server Reviews Electronic Medical Records Cookies Entrepreneur Cyber Monday Medical IT SharePoint Halloween Tactics Development Hotspot Transportation Small Businesses Mirgation Hypervisor Displays Lenovo Writing Shopping Virtual Reality Undo Nanotechnology Optimization PowerPoint Hacks Server Management Scary Stories Private Cloud Addiction Language Employer/Employee Relationships Outsourcing Chatbots Navigation Superfish Identity Theft Management PCI DSS Fun Deep Learning Gig Economy Twitter Screen Reader Distributed Denial of Service Workplace Error Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Social Engineering Application Identity Evernote Paperless Education Regulations Compliance Bookmark Remote Computing Smart Tech Memes Co-managed IT Mobile Computing IBM Download Net Neutrality Alerts SQL Server Technology Care Search History Business Communications Tablet Financial Data Best Practice Browsers Smartwatch Alert Connectivity IT Break Fix Scams Managed IT Buisness File Sharing Upload Procurement Dark Data Azure Hybrid Work How To Cyber security Multi-Factor Security Tech Human Resources Legal IT solutions Social Network Telework Business Growth CES Notifications Competition IoT Communitications Dark Web Cables Travel Trends Supply Chain Management Customer Resource management FinTech Cortana Regulations Google Calendar Term Google Apps Techology Google Maps Alt Codes Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Staff Value Business Intelligence Downtime Unified Threat Management Gamification Flexibility User

Blog Archive