Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Keep a Facebook Friend From Viewing a Post You Don’t Want Them to See

Tip of the Week: How to Keep a Facebook Friend From Viewing a Post You Don’t Want Them to See

The advantage of Facebook is also its disadvantage: the fact that you’ve likely got a large variety of people on your friends list. While this works out great for networking, it may mean holding back on posting a personal opinion if it isolates or offends someone you’re friends with. To get around this social dilemma, Facebook allows you to hide your status from one or more friends. Here’s how to do it.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Email Computer Workplace Tips Phishing Hosted Solutions IT Services Users Collaboration Mobile Device Workplace Strategy Ransomware Small Business Quick Tips Cybersecurity Microsoft Communication Passwords Data Backup Saving Money Smartphone Backup Managed Service Android Business Management VoIP Smartphones Mobile Devices communications Upgrade Disaster Recovery Browser Social Media Data Recovery Managed IT Services Microsoft Office Windows Current Events Productivity Remote Network Tech Term Internet of Things AI Facebook Automation Artificial Intelligence Cloud Computing Covid-19 Holiday Gadgets Remote Work Miscellaneous Server Managed Service Provider Information Outsourced IT Training Employee/Employer Relationship Encryption Spam Compliance Windows 10 Office Data Management Business Continuity Government Bandwidth Blockchain Virtualization Business Technology Wi-Fi IT Support Windows 10 Vendor Apps Two-factor Authentication Mobile Office Data Security Gmail Budget BYOD Apple App Employer-Employee Relationship Managed Services Voice over Internet Protocol Networking Mobile Device Management Chrome HIPAA WiFi Applications Access Control Tip of the week Computing Hacker Conferencing Information Technology Avoiding Downtime Marketing Office 365 How To BDR Storage Password Bring Your Own Device Router Big Data Virtual Private Network Health Help Desk Operating System Computers Risk Management Retail Healthcare Website Managed IT Services Office Tips Analytics Augmented Reality Patch Management Microsoft 365 Save Money Remote Monitoring Vulnerability End of Support The Internet of Things Solutions Vendor Management Physical Security Social Display Printer Going Green Paperless Office Windows 11 Infrastructure Monitoring 2FA Customer Service Cybercrime Excel Document Management Remote Workers Telephone Scam Data loss Cooperation Free Resource Project Management Firewall Windows 7 Telephone System Multi-Factor Authentication Mobility Robot Cost Management Safety Sports Mouse IT Management VPN Employees Meetings Administration Integration User Tip Modem Computer Repair Mobile Security Processor Holidays Customer Relationship Management Data Storage Settings Printing Wireless Smart Technology Supply Chain Content Filtering Video Conferencing Hacking Machine Learning Managed Services Provider Presentation Saving Time YouTube Virtual Machines Professional Services Cryptocurrency Wireless Technology Managed IT Service Maintenance Antivirus Downloads Virtual Desktop iPhone Licensing Data storage LiFi Entertainment Word Vulnerabilities Data Privacy Outlook Money Images 101 Humor Hacks Organization Entrepreneur Scary Stories Travel Social Networking Legislation Shortcuts Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Fun Ransmoware Wearable Technology Memory Vendors Deep Learning Content Remote Working Undo Health IT Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Unified Threat Management Directions Videos Education Assessment Electronic Health Records Permissions Workforce Wasting Time Threats Mobile Computing Trend Micro Specifications Security Cameras Workplace Strategies Network Congestion User Error Microchip Internet Exlporer Software as a Service Search Fraud Meta Username Managing Costs Amazon Application Best Practice Buisness Point of Sale eCommerce Black Friday SSID Virtual Assistant Outsource IT IBM Legal IT solutions Database Surveillance Business Growth Network Management Tech Support IT Technicians Virtual Machine Environment Media Proxy Server Reviews Cookies Cyber Monday Medical IT Monitors Cortana Hotspot Transportation Small Businesses Tactics Development Alt Codes Websites Mirgation Hypervisor Displays Competition Shopping Downtime Nanotechnology Optimization PowerPoint Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Hosted Solution Addiction Typing Management PCI DSS Chatbots Navigation Lenovo Gig Economy Screen Reader Distributed Denial of Service Workplace Writing Knowledge Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Google Drive User Service Level Agreement Internet Service Provider Server Management Regulations Compliance Private Cloud Identity Evernote Paperless Superfish Bookmark Identity Theft Smart Tech Memes 5G Co-managed IT Experience Twitter Alerts SQL Server Technology Care IP Address Google Docs Unified Communications Download Net Neutrality Bitcoin Financial Data Running Cable Error History Business Communications Google Wallet Browsers Smartwatch Connectivity IT Break Fix Scams Social Engineering Remote Computing Azure Hybrid Work Recovery Upload Procurement Hard Drives Windows 8 Social Network Telework Laptop Cyber security Multi-Factor Security Tech Human Resources Domains Drones CES Tablet IoT Communitications Dark Web Cables Alert Trends Supply Chain Management Refrigeration Managed IT Customer Resource management FinTech Halloween File Sharing Regulations Google Calendar Term Google Apps Dark Data Public Speaking Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance How To Notifications Staff Value Business Intelligence Lithium-ion battery Gamification Flexibility

Blog Archive