Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Keep a Facebook Friend From Viewing a Post You Don’t Want Them to See

Tip of the Week: How to Keep a Facebook Friend From Viewing a Post You Don’t Want Them to See

The advantage of Facebook is also its disadvantage: the fact that you’ve likely got a large variety of people on your friends list. While this works out great for networking, it may mean holding back on posting a personal opinion if it isolates or offends someone you’re friends with. To get around this social dilemma, Facebook allows you to hide your status from one or more friends. Here’s how to do it.

To get started, create a post like you normally would by opening a new status update. Type whatever it is you want to post and then click on the privacy control button, located on the bottom right side of your status window. This will cause a drop down menu to appear.

By default, your privacy setting will be set to Friends (unless you’ve previously changed it). Scroll down and select Custom. This will open a new popup window for Custom Privacy.

From here, go to the section titled Don’t share with and select the form. Next, enter the name of the person you wish to exclude from seeing your post. If there is more than one person that you wish not to see your post, then go ahead and enter their name(s) too. Additionally, if you happened to have your friends already organized into lists, like family, coworkers, etc., then you can enter the entire lists into the form and exclude everyone on the list from seeing your post.

Upon completing this form, select Save Changes. You’ll next be taken back to the Update Status window. You can now say whatever it is you want to say and select Post without having to worry about someone taking it the wrong way!

Now technically, the only way the person you excluded would be able to see your post is if you went back and changed the privacy settings to include them, or if you edited the post by tagging their name. However, after going through all of this trouble to exclude them, you probably don’t want to do that--unless you’ve had a change of heart.

Depending on your social sensitivities, this little trick may make using Facebook a completely different experience for you. Or, from a business perspective, it can be a way for you to share your true thoughts about a product or service, without having your friends associated with said product or service find out what you posted.

Of course, all of this is for nothing if your social media post gets relayed in real life to the person you intended to exclude, which is why you’ll want to be mindful of your mutual friends, and perhaps exclude them too.

Are you one to hold back what you really think on social media because you don’t want to offend any of your friends? If so, is this tip a game-changer for how you use Facebook? Share your thoughts in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 30 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Computer Phishing Google Email Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money AI Communication Cybersecurity Data Backup Smartphone Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Information Holiday Miscellaneous Automation Artificial Intelligence Facebook Training Gadgets Compliance Cloud Computing Covid-19 Remote Work Outsourced IT Server Managed Service Provider IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Government Data Management Business Continuity Virtualization Business Technology Wi-Fi Windows 10 Blockchain Bandwidth Apps Managed Services Two-factor Authentication Mobile Office Data Security Vendor Apple App Employer-Employee Relationship Tip of the week Voice over Internet Protocol Networking Mobile Device Management Chrome Gmail Budget BYOD WiFi Applications Access Control Conferencing Computing Hacker Information Technology Avoiding Downtime Marketing Managed IT Services How To Office 365 BDR HIPAA Physical Security Big Data Virtual Private Network Health Help Desk 2FA Operating System Computers Retail Risk Management Healthcare Website Analytics Office Tips Augmented Reality Storage Password Router Bring Your Own Device Display Printer Social Paperless Office Infrastructure Windows 11 Monitoring Going Green Customer Service Document Management Excel Cybercrime Managed IT Service Remote Workers Telephone Scam Data loss Cooperation Free Resource Project Management Firewall Windows 7 Patch Management Save Money Remote Monitoring End of Support Microsoft 365 Vulnerability Vendor Management Solutions The Internet of Things Employees User Tip Modem Administration Integration Processor Computer Repair Mobile Security Holidays Customer Relationship Management Smart Technology Data Storage Settings Machine Learning Wireless Supply Chain Printing Saving Time Content Filtering Video Conferencing Managed Services Provider Hacking YouTube Virtual Machines Professional Services Presentation Maintenance Cryptocurrency Downloads Wireless Technology Antivirus Licensing Virtual Desktop iPhone Entertainment Data storage LiFi Word Vulnerabilities Data Privacy Outlook Images 101 Robot Telephone System Money Humor Cost Management Multi-Factor Authentication Mobility Safety IT Management Sports Meetings VPN Mouse Trend Micro Security Cameras Workplace Strategies Username Mobile Computing Point of Sale Black Friday Search Software as a Service Meta Managing Costs Amazon Application Database Best Practice Tech Support IT Technicians Buisness eCommerce SSID Network Management IBM Proxy Server Legal Cookies IT solutions Monitors Cyber Monday Surveillance Virtual Assistant Outsource IT Virtual Machine Environment Media Tactics Business Growth Hotspot Websites Mirgation Reviews Medical IT Nanotechnology Cortana Development Transportation Small Businesses Hypervisor Displays SharePoint Addiction Alt Codes Electronic Medical Records Language Chatbots Downtime Shopping Optimization PowerPoint Competition Management Employer/Employee Relationships Outsourcing Lenovo Screen Reader Hosted Solution Writing Distributed Denial of Service PCI DSS Navigation Service Level Agreement Typing Virtual Reality Computing Infrastructure Private Cloud Identity Gig Economy Workplace Server Management Teamwork Hiring/Firing Superfish Bookmark Google Drive User Identity Theft Smart Tech Knowledge Internet Service Provider Regulations Compliance Evernote Paperless Download Twitter Alerts Error 5G Memes Co-managed IT SQL Server Technology Care IP Address Browsers Google Docs Connectivity Unified Communications Social Engineering Break Fix Experience Net Neutrality Financial Data History Business Communications Upload Bitcoin Remote Computing Running Cable Smartwatch Multi-Factor Security IT Scams Social Network Google Wallet Azure Hybrid Work Recovery Tablet IoT Dark Web Procurement Telework Cyber security Tech Human Resources Hard Drives Trends Windows 8 Alert Laptop File Sharing Regulations CES Dark Data Google Calendar Communitications Cables Domains Managed IT Customer Resource management Drones Data Analysis Star Wars How To Microsoft Excel Supply Chain Management FinTech Term Google Apps Refrigeration Gamification Notifications Staff Halloween Travel Social Networking Legislation IT Assessment IT Maintenance Public Speaking Value Business Intelligence Lithium-ion battery Techology Fileless Malware Google Maps Flexibility Organization Shortcuts Content Hacks Entrepreneur Wearable Technology Scary Stories Unified Threat Management Motherboard Digital Security Cameras Comparison Fun Smart Devices Ransmoware Health IT Memory Vendors Unified Threat Management Directions Assessment Deep Learning Permissions Remote Working Data Breach Google Play Be Proactive Undo Education Videos Network Congestion Specifications Electronic Health Records Workforce Wasting Time Threats User Error Microchip Internet Exlporer Fraud

Blog Archive