Fuse Networks Blog

Tip of the Week: How to Block Annoyances from Facebook

Tip of the Week: How to Block Annoyances from Facebook

Facebook is a great tool to connect with people in both your personal and professional life, but having a business page on Facebook can attract a lot of attention--and it’s not necessarily wanted in certain cases. For example, what if someone started slinging expletives at your page without your consent? This doesn’t just hurt your feelings; it makes you look bad. This week’s tip is dedicated to blocking unwanted content on your Facebook page.

It should be noted, however, that any steps you take below will require administrative access to a Facebook Page.

Use a Profanity Filter

A profanity filter does exactly what it sounds like it does. Facebook has created tiers of words and phrases that it deems offensive, giving organizations the ability to block them from appearing on a page. This keeps your page looking as professional as possible. To enable this setting, you must access your business page’s Settings. From here, navigate through General > Profanity Filter. You’ll see options for Off, Medium, and Strong. Once you’ve selected your preferred strength, you should save your changes.

Basically, Facebook will block any words or phrases that have been deemed offensive by the page’s manager, preventing comments or posts that use such language from being posted.

Blocking Specific Words

Not all offensive or vulgar words will be stopped by the filter, which is why Facebook gives you the option to block specific words on a page. You can turn this on by accessing your page’s Settings > General > Page Moderation. You can then input words that you don’t want to see on the page, separated by a comma. Be sure to consider alternative spellings of the word, as well as all of the tenses, too. Of course, this will be an ongoing process, but at least Facebook gives this option.

For more tips and tricks, be sure to subscribe to our blog.

What Happens When Your Microsoft Office 365 Subscr...
Data Backup Carries Powerful Value


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, May 25 2019

Captcha Image

Newsletter Sign Up

  • No-Spam Guarantee: We hate spam as much or more than you do and will NEVER rent, share or give your information away to anyone else. We will only use your information to communicate with you direct, and you can also remove yourself from our list at any time with a simple click..
  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Tip of the Week Security Technology Best Practices Business Computing Tech Term Network Security Innovation Privacy User Tips Hackers Data Android Productivity Computer Data Backup Software Efficiency Collaboration IT Support Data recovery Cybersecurity Hosted Solutions Email Communication Business Management Google Social Media Hardware Internet Communications Mobile Device Smartphone Phishing Small Business Malware IT Services Office 365 Backup Artificial Intelligence VoIP Mobile Devices Facebook Microsoft Office Cost Management Business Technology Managed Service Business Cloud Computing Access Control Smartphones Blockchain Information Automation Cloud Two-factor Authentication Cybercrime Network Applications Apps Browser Vulnerability Users Ransomware Holiday Scam Saving Money Mobile Device Management Data Security Workplace Tips Windows 10 Microsoft Passwords Internet of Things Vulnerabilities BDR Maintenance Google Maps Social Engineering Remote Monitoring Government Websites Update App Outsourced IT Networking Managed IT services Gmail Saving Time Bitcoin Upgrade Cooperation Apple Server Downloads Data Breach Analytics Virtual Assistant Printer Tech Terms Document Management Vendor Conferencing Mobility Healthcare Augmented Reality Disaster Recovery Hacking Bandwidth Alert Data loss Patch Management Quick Tips IT Management Fuse Networks Navigation Computing Infrastructure Devices Accountants Encryption Vendor Management Professional Services Cryptocurrency Big Data Laptop Cleaning BYOD Fileless Malware Hard Drive Disposal Tactics Electronic Medical Records User Tip SSID Freedom of Information Website Bookmark Solutions Customer Service Backup and Disaster Recovery Error Google Play SharePoint Downtime Miscellaneous Legislation Trends Computer Care Virtualization Compliance Training Voice over Internet Protocol Desktop Computers Legal Directions email scam HTML Addiction Comparison News Mobile Technology Browsers Integration Digital Spam Multi-factor Authentication Twitter Telephone Knowledge Google Calendar Health IT Security Cameras project management Piracy Gamification Screen Reader Evernote Business Cards Regulations Equifax Service Level Agreement NCSAM iPhone Windows 10 Nanotechnology Law Enforcement Cost eWaste VPN Specifications Medical IT Fake News Virtual Reality Transportation Device security Social Network Social Money Software License Emails Monitoring Cortana Startup Going Green IT Retail Excel Antivirus Operating System Travel WiFi Microchip Robot Data Protection Machine Learning Television Proxy Server Data Management Microsoft Excel Company Culture Managed Service Provider Unified Communications Entertainment Private Cloud Paperless Office Customer Resource management Business Continuity Google Docs Sports Router Bluetooth Tip of the week Management Disaster Tech Download Audit Support Windows 7 Username Processor Network Management Mouse Help Desk PowerPoint Identity Theft Productivity Wireless Headphones Content Printing Data Analysis Gadgets Hard Drive Budget Database Telephone System Modem Distributed Denial of Service Information Technology Microsoft 365 Managed IT Services Mobile Security Chromebook Computing Emergency Term Upload CIO Employer-Employee Relationship IP Address Employer/Employee Relationships Mobile Office Hard Drives Printers Domains Wireless Search Regulation Public Speaking Presentation Wi-Fi Lithium-ion battery Managing Stress Tech Support Wireless Technology 5G IBM Safety Multi-Factor Security Hiring/Firing Marketing Hacker The Internet of Things Avoiding Downtime Customer Relationship Management Competition Fun