Contact us today!
561-795-2000 
844-795-2001

FRS Pros Blog

FRS Pros has been serving the United States area since over a Decade, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Making Sense of Facebook’s Privacy Settings

Making Sense of Facebook’s Privacy Settings

We’ve been talking about Facebook quite a bit on our blog, and for good reason - we’re all concerned with our privacy, and Facebook has been notoriously front-and-center when it comes to Internet privacy. In this post we will break down Facebook’s privacy settings to help you gain control over your personal identity while using the social network.

Continue reading

Take Control Over Your Facebook Security Settings and 2FA

Take Control Over Your Facebook Security Settings and 2FA

Whether you love, hate, or are just indifferent about Facebook (no judgement here), it’s worth configuring and locking down your account to control what others can see about you.

Facebook is front and center when it comes to privacy-related issues worldwide, so in this blog we are going to discuss how you can take control of your personal information. This post will also serve as an excellent starting point for anyone who doesn’t understand 2-factor authentication.

Continue reading

Should Big Tech Be Reined In?

Should Big Tech Be Reined In?

It’s not a secret (well, not anymore) that the big tech companies have influence. These companies, that include Apple, Google, Amazon, and Facebook, have been in the spotlight more and more as the argument of data privacy has gotten louder and louder. Public sentiment is starting to blow back on their business model--and since, Yahoo, once the predominant name in Internet-based services, was broken up and sold to Verizon for cents on the dollar after being at the center of the largest data breach in recorded history--there have been rumblings that there has to be something done to protect the public from major publicly-traded technology companies that use individual’s data in ways that some deem unethical.

Continue reading

Social Media Can Help and Hurt Any Business

Social Media Can Help and Hurt Any Business

In many ways, social media is the defining characteristic of the information age. It has transformed the way people communicate, market their products and services, and it has brought a litany of issues into the public consciousness. On the other side of the coin, social media currently costs many business billions of dollars a year in lost productivity. Let’s take a look at the pros and cons of social media, and how your business can put yourself in a net-positive position regarding the technology.

Continue reading

Tip of the Week: Annoyed By Fake Friend Requests on Facebook? Here’s an Easy Fix

Tip of the Week: Annoyed By Fake Friend Requests on Facebook? Here’s an Easy Fix

Have you ever gotten Facebook requests from strange people who you don’t know? While it might be tempting to give them the benefit of the doubt--after all, maybe they know a friend of yours--it’s best to keep strangers off of your page when you can. In order to give your page, the flexibility to accept friend requests from people you may know, and protect it from strangers, you can implement a “follow” feature, and limit who can send you friend requests.

Continue reading

For Emergency Purposes Only: Users Can Now Activate Facebook’s Safety Check

For Emergency Purposes Only: Users Can Now Activate Facebook’s Safety Check

Since 2014, Facebook has quietly featured Safety Check, a crisis response tool that lets users in areas struck by natural disasters or other emergencies to confirm their safety on the social network. Originally, Facebook itself would have to activate a Safety Check, but that has changed--the power to activate a safety check is now in the hands of the stricken community.


One of the most devastating elements of any disaster is not knowing if affected friends and loved ones are safe. Safety Check is meant to reduce the fear of this unknown by giving users a simple way to confirm that they are okay, and to check in to make sure the people they cared about were safe as well. However, when Facebook retained total control over the tool’s activation, it was put into effect a total of 39 times worldwide between December of 2014 and December of 2015.

Unfortunately, this number is clearly far too low for a tool meant to chart disasters around the world. As a result, Facebook took steps to put the power to activate Safety Check in the hands of those who would need it most--the communities affected by the crisis in question.

Utilizing a two-step system, Facebook will first receive confirmation that an event is taking place through a network of third-party organizations, and then analyze the chatter put out by the community in the affected area to determine if Safety Check is warranted. This new, fully-automated process has been put to use 328 times since first being tested in June of 2016.

Disasters, unfortunately, are a terrible fact of life on this planet. It is difficult to be prepared for anything, but with tools like Facebook’s Safety Check, we can at least be informed that our loved ones are safe.

Continue reading

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Network Security Productivity Business Computing Privacy Internet Hackers Software User Tips Microsoft Google Cloud Hardware Innovation Computer Business Management Data Efficiency Windows 10 Tech Term Email Smartphones Hosted Solutions Mobile Devices IT Services Communication Cybersecurity Data Backup IT Support Malware Android Smartphone Office 365 Data Recovery Business Upgrade Outsourced IT Backup Browser Internet of Things Gadgets Windows Small Business VoIP Disaster Recovery Workplace Tips Apps Phishing Users Communications Data Security Managed IT Services Automation Cloud Computing Cybercrime Information Business Continuity Saving Money Operating System Miscellaneous Ransomware Facebook Managed Service Mobile Device Management Network Alert OneNote Server Passwords Law Enforcement Social Media Employer-Employee Relationship Blockchain Two-factor Authentication Microsoft Office Vulnerability Money Collaboration Artificial Intelligence IT Support Best Practice Managed IT Health Applications Wireless Spam Chrome Holiday Virtualization Managed IT Services Networking Mobile Device Information Technology Windows 7 Word Patch Management Telephone Systems Project Management Tech Support Managed Service Provider Bandwidth Data Breach Router Unsupported Software Augmented Reality Password BYOD Quick Tips Access Control App Google Drive Settings Hacking Printing Windows 10 Gmail Bring Your Own Device Save Money Computers Retail Data Storage Data Loss Wireless Technology Conferencing Wi-Fi Robot Data Management Business Technology Audit Update Data Protection Wireless Charging Politics Meetings The Internet of Things Google Docs Shortcut Productivity Software as a Service Hard Drive Display VPN iPhone Devices Sports BDR Human Resources IT Management History Telephony Cost Management Payment Cards Marketing WannaCry Travel Commerce Hosted Solution Paperless Office Excel File Sharing Application Avoiding Downtime Mobility Search Fraud Encryption Mobile Security Mobile Office Safety Vendor Proactive IT Evernote SaaS Google Assistant User Error Risk Management Going Green Social Hybrid Cloud Touchscreen Budget Voice over Internet Protocol Government WiFi Cortana Windows 10s HBO Smart Devices Charger Entertainment Value Wasting Time Benchmarks Ciminal Keyboard Medical IT Holidays Data Theft Identity Theft Administrator Data Privacy Computer Care Nanotechnology Micrsosoft Device Security Amazon Downtime Screen Mirroring Humor Streaming Media Investment Net Neutrality Adobe Workers Lithium-ion battery Gamification Keyboard Shortcuts Unified Threat Management Managed IT Service Legislation Language Office Solid State Drive Personal Information Sabotage Troubleshooting Accessory Myths 5G Copiers Gifts Computing Vendor Management Access Root Cause Analysis Business Intelligence Windows Ink Virtual Assistant E-Commerce Emails Cast Scam Chromecast Testing Computer Fan Reputation ROI Licensing Updates Memory Upgrades Managed Services Provider Comparison YouTube Hard Disk Drive PC CRM Outlook Computer Forensics Peripheral Data storage Threats Microsoft Excel IT budget Education Inventory Credit Cards App store Samsung Internet Exlporer Chromebook Co-Managed Services Remote Computing Digital Signage Google Maps Spyware Alexa for Business Camera Windows Server 2008 R2 Microsoft Word Financial Payroll Facebook Privacy Specifications Virus Employees IT Solutions AI Legal Uninterrupted Power Supply Management Scams Antivirus Telephone Firewall Apple Employee Webinar Sales Proactive Projects Transportation Tablets Maintenance Security Cameras Consultant Laptop eCommerce OneDrive Private Cloud Smartwatch HIPAA Sync PowerPoint Admin Remote Monitoring Virtual Private Network Storage Social Engineering Battery Hosted Desktop FAQ DDoS Hyperlink Processor Edge Instant Messaging Hacker Files Break/Fix IT solutions Websites Recovery Identity Printers Development NFL eWaste Emergency Disaster Machine Learning Touchpad Fiber Optics Employee-Employer Relationship iOS WIndows Server 2008 Server Maintenance Remote Work Wireless Internet Saving Time Remote Workers Identities Point of Sale HaaS End of Support Regulation Relocation Black Market Cleaning Big Data Automobile Thank You Twitter Managing Stress USB Worker How To Books PDF Mobile Computing Video Games Experience Congratulations Hiring/Firing Work/Life Balance Virtual Reality Crowdsourcing Employer Employee Relationship Current Events Electronic Medical Records Text Messaging es Phone System Cache Benefits Communitications Save Time Computer Accessories Training Monitors Office tips Flexibility Music Advertising Smart Technology Television CrashOverride Compliance Company Culture Scalability Analytics