Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Block Annoyances from Facebook

Tip of the Week: How to Block Annoyances from Facebook

Facebook is a great tool to connect with people in both your personal and professional life, but having a business page on Facebook can attract a lot of attention--and it’s not necessarily wanted in certain cases. For example, what if someone started slinging expletives at your page without your consent? This doesn’t just hurt your feelings; it makes you look bad. This week’s tip is dedicated to blocking unwanted content on your Facebook page.

It should be noted, however, that any steps you take below will require administrative access to a Facebook Page.

Use a Profanity Filter

A profanity filter does exactly what it sounds like it does. Facebook has created tiers of words and phrases that it deems offensive, giving organizations the ability to block them from appearing on a page. This keeps your page looking as professional as possible. To enable this setting, you must access your business page’s Settings. From here, navigate through General > Profanity Filter. You’ll see options for Off, Medium, and Strong. Once you’ve selected your preferred strength, you should save your changes.

Basically, Facebook will block any words or phrases that have been deemed offensive by the page’s manager, preventing comments or posts that use such language from being posted.

Blocking Specific Words

Not all offensive or vulgar words will be stopped by the filter, which is why Facebook gives you the option to block specific words on a page. You can turn this on by accessing your page’s Settings > General > Page Moderation. You can then input words that you don’t want to see on the page, separated by a comma. Be sure to consider alternative spellings of the word, as well as all of the tenses, too. Of course, this will be an ongoing process, but at least Facebook gives this option.

For more tips and tricks, be sure to subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 04 February 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Small Business Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Smartphone Data Backup AI Data Recovery Android Upgrade Disaster Recovery VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Automation Artificial Intelligence Facebook Miscellaneous Information Holiday Covid-19 Gadgets Cloud Computing Training Managed Service Provider Remote Work Compliance Server IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Windows 10 Office Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Data Security Apps Vendor Two-factor Authentication Mobile Office Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Apple Networking App Employer-Employee Relationship Managed Services Voice over Internet Protocol BYOD Office 365 Conferencing How To BDR HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Access Control Marketing Help Desk Analytics Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Big Data Managed IT Services 2FA Operating System Healthcare Computers Router Virtual Private Network Risk Management Website Health Monitoring Microsoft 365 Solutions Firewall Document Management Telephone The Internet of Things Scam Data loss Windows 11 Social Cooperation Excel Going Green Patch Management Save Money Remote Monitoring Vulnerability End of Support Remote Workers Customer Service Vendor Management Cybercrime Physical Security Display Printer Free Resource Project Management Windows 7 Paperless Office Infrastructure Mobility Multi-Factor Authentication Word Smart Technology Outlook Machine Learning Saving Time Money Humor Employees Integration Managed IT Service Safety Maintenance Antivirus Sports Downloads Mouse Licensing Holidays Entertainment Administration Data Storage Supply Chain Video Conferencing Managed Services Provider Telephone System Professional Services Robot Virtual Machines Customer Relationship Management Cost Management Settings Printing Wireless Content Filtering Hacking IT Management Presentation VPN iPhone YouTube Meetings Cryptocurrency Wireless Technology User Tip Vulnerabilities Modem Processor Data Privacy Computer Repair Mobile Security Virtual Desktop Images 101 Data storage LiFi Shortcuts Mirgation Laptop Websites Organization Hard Drives Windows 8 Smart Devices Domains Drones Ransmoware Nanotechnology Digital Security Cameras Remote Working SharePoint Memory Vendors Addiction Electronic Medical Records Language Google Play Be Proactive Chatbots Halloween Data Breach Refrigeration Management Electronic Health Records Public Speaking Lenovo Workforce Screen Reader Writing Distributed Denial of Service Videos Lithium-ion battery Wasting Time Threats Service Level Agreement Virtual Reality Computing Infrastructure Security Cameras Workplace Strategies Entrepreneur Identity Scary Stories Private Cloud Trend Micro Hacks Server Management Software as a Service Bookmark Superfish Meta Smart Tech Identity Theft Fun Managing Costs Amazon Download Deep Learning Twitter Alerts Undo SSID Error eCommerce Surveillance Browsers Virtual Assistant Outsource IT Connectivity Education Social Engineering Break Fix Remote Computing Virtual Machine Environment Upload Media Social Network Mobile Computing Medical IT Multi-Factor Security Reviews Development Transportation Small Businesses IoT Tablet Search Dark Web Alert Hypervisor Displays Application Trends Best Practice Customer Resource management Managed IT PowerPoint Regulations Buisness File Sharing Dark Data Google Calendar Shopping Optimization IBM Data Analysis Legal Employer/Employee Relationships Outsourcing Star Wars IT solutions How To Microsoft Excel Staff Notifications PCI DSS Gamification Business Growth Navigation Workplace Social Networking Travel Legislation Gig Economy Internet Service Provider Fileless Malware Techology Teamwork Hiring/Firing Google Maps Cortana Wearable Technology Regulations Compliance Content Alt Codes Evernote Paperless Competition Health IT Co-managed IT Motherboard Downtime Unified Threat Management Comparison Memes Net Neutrality Directions Unified Threat Management SQL Server Technology Care Assessment Hosted Solution Permissions Financial Data History Typing Business Communications IT Scams Network Congestion Specifications Smartwatch Procurement Microchip Google Drive User Error Azure Hybrid Work User Internet Exlporer Knowledge Fraud Tech Human Resources Telework Cyber security Username Communitications Cables Point of Sale 5G Black Friday CES Supply Chain Management IP Address Google Docs Database Unified Communications Experience Term Google Apps IT Technicians Running Cable Tech Support FinTech Bitcoin Network Management IT Assessment Proxy Server Google Wallet IT Maintenance Cookies Monitors Cyber Monday Flexibility Value Business Intelligence Recovery Tactics Hotspot

Blog Archive