Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Keep a Facebook Friend From Viewing a Post You Don’t Want Them to See

Tip of the Week: How to Keep a Facebook Friend From Viewing a Post You Don’t Want Them to See

The advantage of Facebook is also its disadvantage: the fact that you’ve likely got a large variety of people on your friends list. While this works out great for networking, it may mean holding back on posting a personal opinion if it isolates or offends someone you’re friends with. To get around this social dilemma, Facebook allows you to hide your status from one or more friends. Here’s how to do it.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Network Security Hardware User Tips Efficiency Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email Collaboration IT Services Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Saving Money Communication Cybersecurity Data Backup Smartphone Managed Service Productivity Upgrade Android VoIP Business Management Smartphones Data Recovery Mobile Devices communications Windows Disaster Recovery Browser AI Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Automation Artificial Intelligence Facebook Information Training Miscellaneous Covid-19 Gadgets Cloud Computing Holiday Server Managed Service Provider Remote Work Outsourced IT IT Support Compliance Encryption Spam Employee/Employer Relationship Office Windows 10 Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Blockchain Virtualization Wi-Fi Two-factor Authentication Mobile Office Data Security Vendor Apps Managed Services Voice over Internet Protocol Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking App Employer-Employee Relationship BYOD Hacker Access Control Avoiding Downtime Office 365 Conferencing Marketing How To WiFi BDR HIPAA Applications Computing Information Technology 2FA Computers Help Desk Health Analytics Website Office Tips Augmented Reality Healthcare Retail Storage Password Bring Your Own Device Managed IT Services Big Data Router Operating System Risk Management Virtual Private Network Printer Monitoring Paperless Office Excel Infrastructure Remote Workers Document Management Telephone Firewall Cooperation Free Resource Scam Data loss Project Management Windows 7 The Internet of Things Microsoft 365 Social Solutions Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime Physical Security Windows 11 Customer Service Display Presentation Data Storage Computer Repair Smart Technology Supply Chain Virtual Desktop Video Conferencing Data storage LiFi Wireless Technology Managed Services Provider Virtual Machines Professional Services Saving Time Outlook Managed IT Service Machine Learning Money Downloads Humor Word iPhone Licensing Maintenance Vulnerabilities Antivirus Entertainment Sports Data Privacy Mouse Safety Images 101 Administration Mobility Telephone System Multi-Factor Authentication Cost Management Robot Employees Settings Wireless Integration Printing Content Filtering IT Management Customer Relationship Management User Tip Modem Processor YouTube Meetings Mobile Security VPN Holidays Cryptocurrency Hacking Google Docs Unified Communications Experience Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint Bitcoin Network Management Shopping Running Cable Tech Support User Addiction Monitors Language Employer/Employee Relationships Outsourcing Google Wallet Navigation Management PCI DSS Chatbots Screen Reader Distributed Denial of Service Workplace Windows 8 IP Address Gig Economy Laptop Websites Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Drones Evernote Paperless SharePoint Regulations Compliance Electronic Medical Records Identity Smart Tech Memes Co-managed IT Bookmark Halloween Recovery Hard Drives Download Net Neutrality Writing Alerts SQL Server Technology Care Lenovo Business Communications Domains Financial Data Virtual Reality History Connectivity IT Break Fix Scams Hacks Server Management Browsers Smartwatch Scary Stories Private Cloud Identity Theft Refrigeration Upload Procurement Fun Azure Hybrid Work Superfish Multi-Factor Security Tech Human Resources Deep Learning Public Speaking Social Network Telework Twitter Cyber security IoT Communitications Dark Web Cables Lithium-ion battery CES Error Education Trends Supply Chain Management Social Engineering Entrepreneur Google Calendar Term Google Apps Customer Resource management FinTech Remote Computing Regulations Star Wars IT Assessment Microsoft Excel IT Maintenance Mobile Computing Data Analysis Tablet Undo Gamification Flexibility Search Staff Value Business Intelligence Legislation Shortcuts Best Practice Organization Alert Social Networking Smart Devices Dark Data Ransmoware Managed IT Fileless Malware Digital Security Cameras Buisness File Sharing Legal IT solutions Content Remote Working How To Wearable Technology Memory Vendors Comparison Google Play Be Proactive Business Growth Health IT Notifications Motherboard Data Breach Travel Application Assessment Electronic Health Records Permissions Workforce Directions Videos Techology Google Maps Cortana Wasting Time Threats Specifications Security Cameras Workplace Strategies Alt Codes IBM Trend Micro Downtime Unified Threat Management Internet Exlporer Software as a Service Fraud Meta Microchip Unified Threat Management Hosted Solution Username Managing Costs Amazon Black Friday SSID Typing eCommerce Database Surveillance Network Congestion Virtual Assistant Outsource IT Google Drive User Error Competition Knowledge IT Technicians Virtual Machine Environment Media Cookies Cyber Monday Medical IT Proxy Server Reviews Point of Sale Tactics Development 5G Hotspot Transportation Small Businesses

Blog Archive