facebook linkedin twitter

Computerware Blog

Tip of the Week: How to Block Annoyances from Facebook

Tip of the Week: How to Block Annoyances from Facebook

Facebook is a great tool to connect with people in both your personal and professional life, but having a business page on Facebook can attract a lot of attention--and it’s not necessarily wanted in certain cases. For example, what if someone started slinging expletives at your page without your consent? This doesn’t just hurt your feelings; it makes you look bad. This week’s tip is dedicated to blocking unwanted content on your Facebook page.

It should be noted, however, that any steps you take below will require administrative access to a Facebook Page.

Use a Profanity Filter

A profanity filter does exactly what it sounds like it does. Facebook has created tiers of words and phrases that it deems offensive, giving organizations the ability to block them from appearing on a page. This keeps your page looking as professional as possible. To enable this setting, you must access your business page’s Settings. From here, navigate through General > Profanity Filter. You’ll see options for Off, Medium, and Strong. Once you’ve selected your preferred strength, you should save your changes.

Basically, Facebook will block any words or phrases that have been deemed offensive by the page’s manager, preventing comments or posts that use such language from being posted.

Blocking Specific Words

Not all offensive or vulgar words will be stopped by the filter, which is why Facebook gives you the option to block specific words on a page. You can turn this on by accessing your page’s Settings > General > Page Moderation. You can then input words that you don’t want to see on the page, separated by a comma. Be sure to consider alternative spellings of the word, as well as all of the tenses, too. Of course, this will be an ongoing process, but at least Facebook gives this option.

For more tips and tricks, be sure to subscribe to our blog.

What Happens When Your Microsoft Office 365 Subscr...
Data Backup Carries Powerful Value


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, May 22, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Software Business Management Hackers Data Microsoft Backup Workplace Tips Hardware Managed Service Provider Productivity Network Security Business Email Hosted Solutions Saving Money Malware IT Services Efficiency Google IT Support User Tips Small Business Computer Innovation Mobile Devices Smartphones Quick Tips Social Media Business Continuity Gadgets Microsoft Office Network Productivity VoIP Disaster Recovery Android Data Backup Communication Mobile Office Server Collaboration Virtualization Data Recovery Smartphone Upgrade IT Support Mobile Device Management communications Miscellaneous Phishing Cybersecurity Ransomware Windows 10 Tech Term Windows Unified Threat Management Facebook Vendor Management Holiday Operating System Passwords Apps Remote Monitoring Automation Managed IT services Analytics BYOD Remote Computing Mobile Computing BDR Users Mobile Device WiFi Internet of Things The Internet of Things Apple Marketing Data Management Outsourced IT History Artificial Intelligence Firewall Browser Save Money Alert Managed IT Services App Encryption IT Consultant Cloud Computing Big data Spam Bandwidth Maintenance Going Green Printer Two-factor Authentication Gmail Bring Your Own Device Health Help Desk Antivirus Office Windows 10 Office 365 Content Filtering Best Practice Information Technology Lithium-ion Battery Budget Virus Tech Support Managed IT Hiring/Firing Training Hard Drives Business Technology Saving Time Wireless Technology Cybercrime Search Cost Management Outlook Windows 8 Access Control Money IBM Customer Service Document Management It Management Blockchain Computers Recovery Healthcare Employer-Employee Relationship Phone System VPN Networking Travel Education Hacking Update Save Time Humor Law Enforcement Compliance Augmented Reality Data storage Running Cable PowerPoint Information Proactive IT Website Government File Sharing Administration Hard Drive Twitter Legal Intranet Mobility Password Regulations Applications Risk Management SaaS iPhone Managed Service Robot Digital Payment Telephony Router Excel Downtime User Securty Machine Learning Comparison Tablet Social Solid State Drive Customer Relationship Management Telephone Systems Data Security Wireless Company Culture Management DDoS Flexibility Computer Repair Black Market Social Networking Cryptocurrency Patch Management Data Loss Vulnerabilities Laptop Scam Business Growth Retail Google Maps Word Current Events Data Breach Social Engineering Cortana Value Project Management Digital Paperless Office Avoiding Downtime Hacker Sports Websites Computing Disaster Fax Server End of Support Business Intelligence Private Cloud Hosted Solution Presentation Software as a Service Uninterrupted Power Supply IT service Microchip Taxes Vulnerability Monitoring Specifications Safety Virtual Desktop Computer Accessories Distributed Denial of Service Bitcoin Trending Data Protection Documents Bluetooth Cooperation Windows 7 Vendor Entertainment Public Cloud Heating/Cooling Mouse Gaming Console Storage Statistics Text Messaging Webcam Programming Identity Theft Google Docs Network Congestion Experience Redundancy Monitors Cleaning User Error Office Tips Politics eWaste Co-managed IT Virtual Reality Emails Streaming Media Automobile Evernote Virtual Assistant YouTube Inbound Marketing Chromebook Unified Communications Settings Computing Infrastructure Hack Voice over Internet Protocol Distribution Net Neutrality Start Menu Tech Terms Processors How To Lifestyle Conferencing Mobile Technology USB Chrome Pain Points Download Cost IP Address Best Practives Business Managemenet Books Directions Workers Computer Care Software License Trends Permissions Language Content Management Wi-Fi Administrator Recording Microsoft Excel Multi-Factor Security Dark Web Supercomputer Fraud Tactics Human Resources SSID Google Drive Windows Server 2008 Devices Application Health IT Employee/Employer Relationship switches Writing Processing Worker Spyware Mobile Payment UTM Content Music Microserver online Currency Upselling Legislation Error Upgrades Video Surveillance Reading Managed IT Service Samsung Electricity Printing IT Plan Enterprise Resource Planning Logistics LinkedIn Bookmark Employer Employee Relationship email scam Addiction LiFi Saving ZTime G Suite Accountants A.I. Digital Signature Get More Done Hacks Physical Security Printer Server Google Play Licensing cache Television Multi-factor Authentication Teamwork Turn Key Wireless Headphones Telephone Trojan Deep Learning Skype Debate Relocation Processor Tablets WannaCry Downloads Migration Connected Devices Work/Life Balance Archive Harddrive Banking Botnet Microsoft 365 GPS Browsers Corporate Profile Network Management PDF Visible Light Communication Organize Memory Sync Medical IT Time Management Freedom of Information Equifax Fleet Tracking Notifications User Tip CCTV IT consulting Point of Contact External Harddrive Security Cameras Assessment SharePoint Device security MSP Best Available Keyboard Tip of the week Nanotechnology Social Network Domains Reliable Computing Navigation Google Calendar Desktop Finance Business Metrics Computer Malfunction Solutions CIO 3D Ebay Data Analysis VoIP Business Cards Service Level Agreement Advertising Flash Thin CLient In Internet of Things Professional Services Touchscreen News Startup Asset Tracking Public Speaking Knowledge Unified Threat Management Backup and Disaster Recovery Windows XP Webinar Smart Phones Analytic GDPR Consultation Username Shortcut Staffing Google Wallet Recycling Screen Reader Customer Resource management Troubleshooting Displays Product Reviews Scalability Tech Technology Tips Gamification Entrepreneur Society Motion Sickness Integration Micrsooft Adminstration Pirating Information Messenger Fileless Malware Tracking Audit Piracy Upload Environment Read Leadership Fake News Smart Tech HIPAA Rental Service Proxy Server Meetings Fiber-Optic Database Electronic Payment Modem Data Warehousing HTML Competition Drones Emergency Hard Drive Disposal Telephone System Business Owner Term Cabling Access Mobile Security Device Management Electronic Medical Records Web Server Transportation Productuvuty Regulation 3D Printing CrashOverride Printers Capital Managing Stress