Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Keep a Facebook Friend From Viewing a Post You Don’t Want Them to See

Tip of the Week: How to Keep a Facebook Friend From Viewing a Post You Don’t Want Them to See

The advantage of Facebook is also its disadvantage: the fact that you’ve likely got a large variety of people on your friends list. While this works out great for networking, it may mean holding back on posting a personal opinion if it isolates or offends someone you’re friends with. To get around this social dilemma, Facebook allows you to hide your status from one or more friends. Here’s how to do it.

To get started, create a post like you normally would by opening a new status update. Type whatever it is you want to post and then click on the privacy control button, located on the bottom right side of your status window. This will cause a drop down menu to appear.

By default, your privacy setting will be set to Friends (unless you’ve previously changed it). Scroll down and select Custom. This will open a new popup window for Custom Privacy.

From here, go to the section titled Don’t share with and select the form. Next, enter the name of the person you wish to exclude from seeing your post. If there is more than one person that you wish not to see your post, then go ahead and enter their name(s) too. Additionally, if you happened to have your friends already organized into lists, like family, coworkers, etc., then you can enter the entire lists into the form and exclude everyone on the list from seeing your post.

Upon completing this form, select Save Changes. You’ll next be taken back to the Update Status window. You can now say whatever it is you want to say and select Post without having to worry about someone taking it the wrong way!

Now technically, the only way the person you excluded would be able to see your post is if you went back and changed the privacy settings to include them, or if you edited the post by tagging their name. However, after going through all of this trouble to exclude them, you probably don’t want to do that--unless you’ve had a change of heart.

Depending on your social sensitivities, this little trick may make using Facebook a completely different experience for you. Or, from a business perspective, it can be a way for you to share your true thoughts about a product or service, without having your friends associated with said product or service find out what you posted.

Of course, all of this is for nothing if your social media post gets relayed in real life to the person you intended to exclude, which is why you’ll want to be mindful of your mutual friends, and perhaps exclude them too.

Are you one to hold back what you really think on social media because you don’t want to offend any of your friends? If so, is this tip a game-changer for how you use Facebook? Share your thoughts in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 10 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Productivity Passwords Communication Cybersecurity Saving Money Smartphone Managed Service Data Backup Android Upgrade Data Recovery AI VoIP Business Management Smartphones Disaster Recovery Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Facebook Information Miscellaneous Automation Artificial Intelligence Covid-19 Gadgets Cloud Computing Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance Encryption Employee/Employer Relationship Spam IT Support Office Windows 10 Data Management Government Business Continuity Blockchain Virtualization Wi-Fi Business Technology Bandwidth Windows 10 Data Security Vendor Apps Two-factor Authentication Mobile Office Gmail Apple Networking App Employer-Employee Relationship BYOD Managed Services Voice over Internet Protocol Tip of the week Chrome Mobile Device Management Budget How To WiFi HIPAA BDR Applications Computing Information Technology Hacker Conferencing Access Control Avoiding Downtime Office 365 Marketing Bring Your Own Device Managed IT Services Router Big Data Operating System 2FA Help Desk Virtual Private Network Risk Management Computers Health Healthcare Analytics Website Office Tips Augmented Reality Retail Storage Password Scam Microsoft 365 Data loss Solutions The Internet of Things Going Green Patch Management Social Save Money Remote Monitoring Vulnerability End of Support Windows 11 Vendor Management Cybercrime Monitoring Physical Security Customer Service Display Excel Printer Paperless Office Remote Workers Infrastructure Telephone Document Management Cooperation Free Resource Project Management Firewall Windows 7 Mouse Telephone System Multi-Factor Authentication Mobility Cost Management Safety Administration Employees Integration Robot User Tip Modem Settings Mobile Security Processor Printing Wireless Holidays Content Filtering IT Management Customer Relationship Management VPN Data Storage YouTube Meetings Smart Technology Supply Chain Video Conferencing Cryptocurrency Hacking Managed Services Provider Professional Services Saving Time Presentation Virtual Machines Computer Repair Virtual Desktop Managed IT Service Data storage LiFi Wireless Technology Downloads iPhone Outlook Machine Learning Licensing Money Word Vulnerabilities Humor Entertainment Data Privacy Images 101 Maintenance Antivirus Sports Organization Education Social Networking Social Engineering Entrepreneur Legislation Shortcuts Smart Devices Remote Computing Ransmoware Fileless Malware Digital Security Cameras Mobile Computing Content Remote Working Wearable Technology Memory Vendors Comparison Google Play Be Proactive Health IT Tablet Undo Motherboard Data Breach Search Assessment Electronic Health Records Alert Permissions Workforce Directions Videos Best Practice Managed IT Buisness File Sharing Wasting Time Threats Dark Data Specifications Security Cameras Workplace Strategies Legal IT solutions Trend Micro How To Internet Exlporer Software as a Service Notifications Fraud Meta Microchip Business Growth Username Travel Application Managing Costs Amazon Black Friday SSID Techology Google Maps eCommerce Cortana Database Surveillance Virtual Assistant Outsource IT Alt Codes IBM Downtime Unified Threat Management IT Technicians Virtual Machine Environment Media Cyber Monday Medical IT Unified Threat Management Proxy Server Reviews Hosted Solution Cookies Tactics Development Hotspot Transportation Small Businesses Typing Mirgation Hypervisor Displays Network Congestion PowerPoint Google Drive User Error Shopping Competition Nanotechnology Optimization Knowledge Addiction Language Employer/Employee Relationships Outsourcing Management PCI DSS Point of Sale Chatbots 5G Navigation Distributed Denial of Service Workplace Google Docs Gig Economy Unified Communications Screen Reader Experience Service Level Agreement Internet Service Provider Running Cable Tech Support User Computing Infrastructure Teamwork Hiring/Firing Bitcoin Network Management Google Wallet Regulations Compliance Identity Monitors Evernote Paperless Co-managed IT Bookmark Smart Tech Memes IP Address Download Net Neutrality Laptop Websites Alerts SQL Server Technology Care Windows 8 Drones Financial Data History Business Communications Break Fix Scams SharePoint Browsers Smartwatch Connectivity IT Electronic Medical Records Upload Procurement Halloween Recovery Azure Hybrid Work Lenovo Social Network Telework Hard Drives Cyber security Writing Multi-Factor Security Tech Human Resources Dark Web Cables CES Domains IoT Communitications Virtual Reality Hacks Server Management Trends Supply Chain Management Scary Stories Private Cloud Superfish Customer Resource management FinTech Identity Theft Refrigeration Regulations Fun Google Calendar Term Google Apps Twitter Microsoft Excel IT Maintenance Data Analysis Deep Learning Public Speaking Star Wars IT Assessment Lithium-ion battery Gamification Flexibility Error Staff Value Business Intelligence

Blog Archive