{"id":297,"date":"2018-06-24T11:26:30","date_gmt":"2018-06-24T05:56:30","guid":{"rendered":"https:\/\/www.techandtrain.com\/blog\/?p=297"},"modified":"2025-10-22T14:55:34","modified_gmt":"2025-10-22T09:25:34","slug":"facebook-privacy-security-tips","status":"publish","type":"post","link":"https:\/\/www.techandtrain.com\/blog\/2018\/06\/facebook-privacy-security-tips\/","title":{"rendered":"Facebook Privacy &#038; Security tips"},"content":{"rendered":"<p>Many of us use Facebook for various reasons like socializing on the internet, managing and participating in groups, creating and managing company pages, keeping in touch with friends and colleagues, sharing our updates &amp; pictures, etc. But many don&#8217;t pay attention to privacy and security aspects of using Facebook.<\/p>\n<p>Here are some pointers on what areas of privacy &amp; security you should be looking at in Facebook. This post does not give you what setting \/ configuration you should be keeping \/ selecting rather it makes you aware about those settings and you should select \/ configure the option based on your requirements.<\/p>\n<ul>\n<li>Explore OTP \/ Two factor authentication using mobile \/ smartphone number \/ authentication app<\/li>\n<li>Explore notifications over email &amp; mobile<\/li>\n<li>Explore options for your Cover &amp; Profile picture &#8211; there is option to show your Profile picture to only your friends or network<\/li>\n<li>Check whether your default posts are Public \/ shown to friends \/ shown to friends of friends \/ shown to friends except acquaintances<\/li>\n<li>Check the type of groups you join: Public \/ Closed \/ Secret<\/li>\n<li>Explore the privacy options like LIMIT YOUR OLD POSTS, Who can search you by email \/ phone, Who can see your friends list, etc.<\/li>\n<li>Explore the options for people to Tag you in their posts<\/li>\n<li>Explore the option to create custom username<\/li>\n<li>Check the Location History option<\/li>\n<li>Check which profiles in your network are Inactive \/ Spam \/ Without data \/ Suspect \/ Unknown. It&#8217;s best to remove them from your network by clicking UNFRIEND. Stay in touch with them over other mediums like Skype, LinkedIn, WhatsApp, SMS, Email, Signal, Google Hangout, etc.<\/li>\n<li>Check the Apps &amp; Website integration under Settings<\/li>\n<li>Check the locations from where you are logged in under settings<\/li>\n<li>Check your public posts by logging out &amp; checking your profile or using the VIEW AS option under your profile<\/li>\n<li>Check the setting whether search engines should link to your profile under privacy<\/li>\n<li>Check the information in your profile added under ABOUT and who it is visible to on all sections and details of profile &#8211; Friends \/ Friends of Friends \/ Public \/ etc.<\/li>\n<li>Check manage sections option in your profile and check privacy options for each of those sections<\/li>\n<li>Check your advertisement preferences<\/li>\n<li>Check the options which show your relationship with others under profile &#8211; whether it&#8217;s only shown to you, friends or friends of friends or public<\/li>\n<li>Set up Trusted Contacts to recover your account<\/li>\n<li>For your Facebook Mobile App check what permissions it has been given by the operating system (Android or iOS) under App permissions and review them based on your need<\/li>\n<li>Check the people who are added as ADMIN for your company page if you manage one<\/li>\n<li>There are a host of other options in settings for company pages too from which you can manage options like &#8211; from which country the visitors can see the page, whether tagging is allowed, age profile of your visitors, etc. If you are managing a company page you should explore them too<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Many of us use Facebook for various reasons like socializing on the internet, managing and participating in groups, creating and [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":298,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[11],"tags":[64,66,9,12,65],"class_list":["post-297","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-social-media","tag-facebook","tag-privacy","tag-security","tag-social-media","tag-tips"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/06\/Facebook.jpg?fit=1920%2C1275&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7do02-4N","jetpack-related-posts":[{"id":1494,"url":"https:\/\/www.techandtrain.com\/blog\/2025\/10\/cyber-security-notes-for-2025-part-4\/","url_meta":{"origin":297,"position":0},"title":"Cyber Security notes for 2025 &#8211; Part 4","author":"Neil Harwani","date":"October 22, 2025","format":false,"excerpt":"Further to my four Cyber Security notes here: Information security tips while working with digital sources and internet | LinkedIn Security tips for Google Drive & Android | LinkedIn Facebook Privacy & Security tips | LinkedIn Post on patterns, anti-patterns & randomness in Cyber Security | LinkedIn Below I am\u2026","rel":"","context":"In &quot;Cyber Security&quot;","block_context":{"text":"Cyber Security","link":"https:\/\/www.techandtrain.com\/blog\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/10\/CyberSecurity5.jpg?fit=1200%2C1200&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/10\/CyberSecurity5.jpg?fit=1200%2C1200&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/10\/CyberSecurity5.jpg?fit=1200%2C1200&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/10\/CyberSecurity5.jpg?fit=1200%2C1200&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/10\/CyberSecurity5.jpg?fit=1200%2C1200&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1242,"url":"https:\/\/www.techandtrain.com\/blog\/2024\/04\/cyber-security-tips-for-portals-generated-by-chatgpt-gemini-part-1\/","url_meta":{"origin":297,"position":1},"title":"Cyber security tips for Portals &#8211; Generated by ChatGPT &amp; GEMINI &#8211; Part 1","author":"Neil Harwani","date":"April 8, 2024","format":false,"excerpt":"Cyber security is a critical concern for portal applications, which often serve as gateways to a wide range of resources and services. Here are some vital tips to enhance the cyber security posture of portal applications: 1. Use Strong Authentication Mechanisms: Implement multi-factor authentication (MFA) to add an extra layer\u2026","rel":"","context":"In &quot;Cyber Security&quot;","block_context":{"text":"Cyber Security","link":"https:\/\/www.techandtrain.com\/blog\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/04\/CyberSecurity.png?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/04\/CyberSecurity.png?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/04\/CyberSecurity.png?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/04\/CyberSecurity.png?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/04\/CyberSecurity.png?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":141,"url":"https:\/\/www.techandtrain.com\/blog\/2018\/03\/information-security-tips-while-working-with-digital-sources-and-internet\/","url_meta":{"origin":297,"position":2},"title":"Information security tips while working with digital sources and internet","author":"Neil Harwani","date":"March 30, 2018","format":false,"excerpt":"Setup OTP and recovery emails for all your accounts Check permissions that various apps have on your phone When you get an option - TRUST THIS DEVICE in Gmail or similar accounts, only select this option on your personal devices not public devices Keep your desktop, laptop & mobiles password\u2026","rel":"","context":"In &quot;Cyber Security&quot;","block_context":{"text":"Cyber Security","link":"https:\/\/www.techandtrain.com\/blog\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/03\/Security.png?fit=991%2C720&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/03\/Security.png?fit=991%2C720&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/03\/Security.png?fit=991%2C720&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/03\/Security.png?fit=991%2C720&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":1449,"url":"https:\/\/www.techandtrain.com\/blog\/2025\/05\/what-analytics-can-we-run-for-a-biometric-solution-and-its-associated-portal-part-1collated-with-help-of-ai\/","url_meta":{"origin":297,"position":3},"title":"What analytics can we run for a biometric solution and it&#8217;s associated portal? &#8211; Part 1(Collated with help of AI)","author":"Neil Harwani","date":"May 30, 2025","format":false,"excerpt":"Running analytics for a biometric solution and its associated portal involves monitoring both technical performance and user interaction, along with security and compliance metrics. Below is a categorized list of analytics you can track: \ud83d\udd10 1. Biometric System Analytics These metrics assess how the biometric engine performs: Enrollment Metrics Total\u2026","rel":"","context":"In &quot;Biometrics&quot;","block_context":{"text":"Biometrics","link":"https:\/\/www.techandtrain.com\/blog\/category\/biometrics\/"},"img":{"alt_text":"Image credit: www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/05\/Biometrics-1.jpg?fit=1200%2C720&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/05\/Biometrics-1.jpg?fit=1200%2C720&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/05\/Biometrics-1.jpg?fit=1200%2C720&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/05\/Biometrics-1.jpg?fit=1200%2C720&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/05\/Biometrics-1.jpg?fit=1200%2C720&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1541,"url":"https:\/\/www.techandtrain.com\/blog\/2026\/04\/dimensions-for-artificial-intelligence-genai-llms-deep-learning-neural-networks-data-science-to-ponder-on-part-1-assisted-by-ai-chatgpt\/","url_meta":{"origin":297,"position":4},"title":"Dimensions for Artificial Intelligence \/ GenAI \/ LLMs \/ Deep Learning \/ Neural Networks \/ Data Science to ponder on &#8211; Part 1-Assisted by AI &#8211; ChatGPT","author":"Neil Harwani","date":"April 17, 2026","format":false,"excerpt":"\ud83e\udde0 1. Model Performance & Quality Beyond accuracy: Precision \/ Recall \/ F1-score ROC-AUC Calibration (probability correctness) Generalization ability Robustness (noise, adversarial inputs) Stability (variance across runs) Overfitting \/ Underfitting control Latency (response time) Throughput (requests per second) \u2696\ufe0f 2. Responsible AI \/ Ethics Along with fairness, bias, explainability, interpretability:\u2026","rel":"","context":"In &quot;AIML&quot;","block_context":{"text":"AIML","link":"https:\/\/www.techandtrain.com\/blog\/category\/aiml\/"},"img":{"alt_text":"Image credit: www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2026\/04\/Dimensions.jpg?fit=640%2C360&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2026\/04\/Dimensions.jpg?fit=640%2C360&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2026\/04\/Dimensions.jpg?fit=640%2C360&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":1380,"url":"https:\/\/www.techandtrain.com\/blog\/2024\/11\/web-portal-commerce-cyber-forensics\/","url_meta":{"origin":297,"position":5},"title":"Web portal &amp; commerce cyber forensics","author":"Neil Harwani","date":"November 24, 2024","format":false,"excerpt":"For this discussion, we will refer the top open-source products like Liferay, Drupal, WordPress, etc. and one proprietary portal like SharePoint which has good documentation. Home - Liferay WordPress.com: Build a Site, Sell Your Stuff, Start a Blog & More Drupal - Open Source CMS | Drupal.org Microsoft SharePoint Online\u2026","rel":"","context":"In &quot;Cyber Forensics&quot;","block_context":{"text":"Cyber Forensics","link":"https:\/\/www.techandtrain.com\/blog\/category\/cyber-forensics\/"},"img":{"alt_text":"Credits: www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/interface.png?fit=1200%2C801&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/interface.png?fit=1200%2C801&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/interface.png?fit=1200%2C801&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/interface.png?fit=1200%2C801&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/interface.png?fit=1200%2C801&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/297","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/comments?post=297"}],"version-history":[{"count":6,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/297\/revisions"}],"predecessor-version":[{"id":304,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/297\/revisions\/304"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/media\/298"}],"wp:attachment":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/media?parent=297"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/categories?post=297"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/tags?post=297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}