ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Post to Your Facebook News Feed, But Not Your Timeline

Tip of the Week: How to Post to Your Facebook News Feed, But Not Your Timeline

It’s a typical work day. You’re going about your business, when you decide to take a short break and check Facebook. Maybe you see a post that you’d like to share, but you’d rather not have that post on your timeline. While you could just delete it later, there’s a new feature that lets you share a post to your news feed, without posting it on your timeline.

There are several reasons why you may want to do this. If your primary reason is that you don't want the post to stick on your timeline, that’s one. However, it can also save you time in the long run when it comes time to clean up your Facebook profile. By preventing statuses from being posted directly to your timeline, you can keep it relatively clean throughout your Facebook tenure. If all you want to do is share a link to your News Feed without sharing it on your timeline, this feature will be your best friend.

To use this feature, all you need to do is make a new status update, and before you click Post, look for the Hide From Your Timeline checkbox. Click it, and this will display your post in the News Feed, without posting it directly to your timeline. Keep in mind that you can still choose who your post is being shared with, and whether it’s public, for friends only, or specific friends only.

Keep in mind that your posts will still be available through a search function, and that they’ll appear in Your Posts, which is only accessible by you. As usual, it’s your responsibility as a user of social media to practice discretion, and it’s up to you to choose whether you want to keep posts hidden from your timeline, or to just not post at all.

If nothing else, this new feature of Facebook’s proves that social media is moving in a direction that’s attempting to improve user privacy. For example, Snapchat supposedly gets rid of photos after they’ve been sent in an attempt to improve privacy, and Facebook’s attempt to replicate this in its News Feed is a testament to how “effective” it is. Granted, who can really say what Snapchat does with all of the photos sent through the app, or what Facebook does with the data that it accumulates? The only way to guarantee your personal privacy is to not use social media (or the Internet, for that matter), but let’s be realistic; this isn’t something that we can expect of anyone, and especially not the business owner.

The point stands that, regardless of how you use the Internet, you should be aware that any information that you put on your social media pages, including posts, is shared with the entire world, unless you take matters into your own hands to prevent it from reaching those who shouldn’t see it. This includes hackers, who will be on the lookout for any personally identifiable information that they can use to ruin your life. Ultimately, it’s up to you what you share on Facebook, but be smart about it.

For more great Internet tips and best practices, be sure to subscribe to ClearView IT’s blog and reach out to us at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Cybersecurity Phishing IT Services Backup Data Backup Ransomware Smartphone communications Upgrade Smartphones Microsoft Office Small Business Network Mobile Devices Managed IT Services Communication Data Recovery Quick Tips Productivity Users Social Media VoIP Mobile Device Automation Tech Term Business Continuity Facebook Windows 10 Covid-19 Passwords Holiday Disaster Recovery Apps Managed Service Windows 10 IT Support Browser Cloud Computing Outsourced IT Miscellaneous Data Management Internet of Things Remote Work Managed Service Provider Government Saving Money Operating System Networking Workplace Strategy Windows Artificial Intelligence Gadgets Managed IT services Server Information Bandwidth Remote Encryption Mobile Device Management App WiFi Business Technology Virtualization Blockchain Spam History Budget Employee/Employer Relationship Gmail Office Apple Two-factor Authentication Information Technology Office 365 Access Control Data Security Cybercrime Wi-Fi Health Analytics BDR Big Data Conferencing Save Money Employer-Employee Relationship Patch Management Compliance Vendor Remote Monitoring Remote Computing Voice over Internet Protocol Help Desk Hacking Cost Management IT Management Training Document Management Hacker Search... Best Practice Customer Service Unified Threat Management Firewall Retail Augmented Reality Applications Alert Word BYOD Project Management IBM Hiring/Firing Vulnerabilities Website Computing Outlook Password Vendor Management Hard Drive Mobile Office Managed Services Legal Data loss Data storage Money Update Sports Travel Social SaaS DDoS Virtual Reality Storage Social Engineering Data Breach Cryptocurrency Black Market Paperless Office Antivirus iPhone Cleaning Education Cortana Robot Maintenance Content Filtering User Monitoring Router Healthcare Websites Remote Workers Chrome Meetings Mobility The Internet of Things YouTube Windows 7 Twitter Windows 11 Free Resource Google Maps Scam Law Enforcement End of Support Laptop How To Printer Mobile Computing VPN Marketing Running Cable Virtual Desktop Managed IT Co-Managed IT Google Docs Virtual Assistant Experience Entertainment Digital Bluetooth Distributed Denial of Service Employees Office Tips Taxes Avoiding Downtime Private Cloud Memory Holidays Processor Disaster Cooperation Physical Security Politics Video Conferencing Machine Learning Settings HIPAA Lithium-ion battery Virtual Machines Computer Repair Solid State Drive Multi-factor Authentication Processors Start Menu Professional Services Computer Care Downloads Vulnerability Saving Time Chromebook Drones Automobile Software as a Service Managed Services Provider Bitcoin Data Protection Computers Virtual Private Network How To Telephone PowerPoint Wireless Technology Microchip Administration Current Events eWaste Flexibility Presentation Excel Solutions Specifications Downtime IT Consultant Hack Safety Identity Theft Integration Tech Terms Images 101 Notifications Customer Relationship Management Display Unified Communications Administrator Telephone System AI Text Messaging Regulations Trend Micro Proactive IT Computer Accessories Web Server Transportation Directions Digital Security Cameras Bring Your Own Device Backup and Disaster Recovery Electronic Health Records Content Cables Digital Payment Desktop Wasting Time SharePoint Electronic Medical Records Worker Accountants eCommerce Music Modem Videos Staffing Access Database Surveillance Time Management IP Address Point of Sale Public Cloud Managing Costs Botnet Health IT Equifax SSID Micrsooft Shortcuts Hard Drive Disposal Employer/Employee Relationships Audit Media Rental Service Spyware Tactics Development Username Flash File Sharing Virtual Machine Redundancy Reviews Telephone Systems Troubleshooting Startup Optimization Business Growth Freedom of Information Competition Be Proactive email scam Teamwork Navigation 2FA Recovery Cache Addiction Unified Threat Management Data Storage Workers Mobile Security Hypervisor LiFi User Tip Shopping Banking Legislation Entrepreneur Google Wallet News Medical IT Application Deep Learning Workplace Strategies CCTV SQL Server Printing Evernote Paperless Documents Messenger Network Management Touchscreen PCI DSS Licensing Business Intelligence Emergency Proxy Server Gig Economy Business Metrics Business Owner Emails Humor Hosted Solution Computer Malfunction Fake News Vendor Mangement Service Level Agreement Internet Service Provider Computing Infrastructure Azure Business Communications Securty Books Management Regulations Compliance Domains Language Samsung Device security Managed IT Service Society Webcam Microsoft Excel Uninterrupted Power Supply Wireless Headphones Memes Business Mangement Going Green Net Neutrality Monitors Smart Technology Business Cards Visible Light Communication Tech Human Resources Reading Error Financial Data Tablets Windows 8 Bookmark Risk Management Inbound Marketing IT Download Public Speaking Displays Supercomputer Piracy Advertising Google Calendar Term Google Apps Relocation Streaming Media Virus Telework Work/Life Balance HTML Tech Support Motion Sickness Microsoft 365 Browsers Smartwatch Nanotechnology Communitications Keyboard Electronic Payment Google Drive Upload Procurement Hard Drives Supply Chain Software License Comparison Google Play In Internet of Things Social Network FinTech intranet Knowledge Data Analysis CES Wireless Hacks Corporate Profile Screen Reader IT Assessment Shortcut Network Congestion Reliable Computing Telephony Trends Supply Chain Management Heating/Cooling Writing Workplace Phone System Employer Employee Relationship Mobile Technology Value Environment Television Security Cameras Windows XP Customer Resource management Organization Cabling Devices Cyber security Social Networking G Suite Tip of the week Fileless Malware Tablet Smart Devices Scalability VoIP Gamification Remote Working Scams Tracking Company Culture Mouse

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?