How to choose who sees your photos on Facebook
- 18 August, 2010 03:17
QUESTION: I signed up for a Facebook account and uploaded some photos to my profile. I was soon contacted out of the blue by someone I didn't want to hear from and who I didn't know could see my photos and profile. I've been told that I should stop using Facebook, but will I still be able to see my photos if I cancel my account, and how can I make sure no one else can see them?
ANSWER: Facebook is perfectly safe, provided that you make use of its privacy settings, so only the people you know can see your profile.
Log into your Facebook account and click Account in the top-right corner. Choose Privacy Settings from the drop-down menu, then click Custom, Customise settings.
The next page lists each section of your profile and lets you choose who is able to see it - everyone, friends of friends, friends only or a select group of people. We recommend choosing friends only for each option. This way, you can ignore requests from people you don't want to contact.
From now on, anyone who wants to see your photos or get in touch with you will need to request you as a friend.
See also: How to use Facebook safely
See also: How much is your Facebook profile worth?
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
How the Cloud Changes the Game for Line of Business Managers in Midsize Companies
It can be argued that what distinguishes midsize businesses most from large and small companies is not size, but attitude. While attitude alone cannot mitigate the challenges faced by midsize businesses, technology can help. And no technology offers more promise than the cloud. This paper, explores midsize business challenges from the perspective, not of the IT department, but of the line of business managers they support. Read on.
Spear-Phishing Email: Most Favored APT Attack Bait
This research paper presents findings on APT-related spear phishing from February to September 2012. We analysed APT-related spear-phishing emails collected throughout this period to understand and mitigate attacks. The information we gathered not only allowed us to obtain specific details on spear phishing but also on targeted attacks. We found, for instance, that 91% of targeted attacks involve spear-phishing emails, reinforcing the belief that spear phishing is a primary means by which APT attackers infiltrate target networks.
ESG Whitepaper: Integrated Computing Platform Survey
Data centres, servers, storage and more are being combined for simplified management and cost savings. In this survey, ESG looks at the current and future trends surrounding today’s integrated computing solutions. Download to find out how organisations are more likely to see commit IT budgets to the purchase of integrated solutions. Read more.