croom new

Patriot Tech Services Inc. Blog

Patriot Tech Services Inc. has been serving the Wheelersburg area since 2006, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

For Emergency Purposes Only: Users Can Now Activate Facebook’s Safety Check

For Emergency Purposes Only: Users Can Now Activate Facebook’s Safety Check

Since 2014, Facebook has quietly featured Safety Check, a crisis response tool that lets users in areas struck by natural disasters or other emergencies to confirm their safety on the social network. Originally, Facebook itself would have to activate a Safety Check, but that has changed--the power to activate a safety check is now in the hands of the stricken community.

One of the most devastating elements of any disaster is not knowing if affected friends and loved ones are safe. Safety Check is meant to reduce the fear of this unknown by giving users a simple way to confirm that they are okay, and to check in to make sure the people they cared about were safe as well. However, when Facebook retained total control over the tool’s activation, it was put into effect a total of 39 times worldwide between December of 2014 and December of 2015.

Unfortunately, this number is clearly far too low for a tool meant to chart disasters around the world. As a result, Facebook took steps to put the power to activate Safety Check in the hands of those who would need it most--the communities affected by the crisis in question.

Utilizing a two-step system, Facebook will first receive confirmation that an event is taking place through a network of third-party organizations, and then analyze the chatter put out by the community in the affected area to determine if Safety Check is warranted. This new, fully-automated process has been put to use 328 times since first being tested in June of 2016.

Disasters, unfortunately, are a terrible fact of life on this planet. It is difficult to be prepared for anything, but with tools like Facebook’s Safety Check, we can at least be informed that our loved ones are safe.

Continue reading

Tip of the Week: 3 Ways to Secure Your Facebook Account

b2ap3_thumbnail_facebook_security_400.jpgThe social media revolution has taken the world by storm, so much in fact that some people are completely at the mercy of their smartphones. However, the dark side of social media, especially Facebook, grows more apparent every day, especially when it comes to both cybersecurity and personal privacy. Are you sure that your Facebook settings aren’t giving away a little too much of your information to the powers that be?

Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Cloud Google Network Security User Tips Tech Term Hackers Computer Business Computing Microsoft Business Management Mobile Devices Malware Hardware Efficiency Software Innovation Browser Smartphone Hosted Solutions Data Backup Data Windows 10 Email Productivity Workplace Tips Apps Windows Windows 10 Business Data Security Upgrade Smartphones Internet of Things VoIP Backup Mobile Device Management IT Services Business Continuity Miscellaneous Passwords Best Practice Productivity Data Recovery communications Cybersecurity Android Small Business IT Support Operating System Cybercrime Office 365 Spam Holiday Outsourced IT Network Server Two-factor Authentication Networking Gmail Managed Service Provider Employer-Employee Relationship Saving Money Tech Support Government Collaboration Data Management Budget Users Chrome Information Office Microsoft Office Google Drive Phishing Remote Computing Vulnerability Bandwidth Disaster Recovery Applications Alert User Error Law Enforcement Blockchain Update Ransomware Communication Artificial Intelligence Virtualization Cost Management Automation Money Telephone Systems VPN Cortana Quick Tips Proactive IT Data Breach Social Media Managed Service Social App Managed IT Services DDoS Health Evernote Router OneNote Google Docs Business Technology Word Sports Project Management Hacking Wireless Technology Human Resources Devices Bring Your Own Device Wi-Fi Risk Management Managed IT Services Marketing Gadgets Safety The Internet of Things Saving Time eWaste Social Engineering Mobile Security iPhone Facebook Google Assistant Access Control Travel Application Fraud Mobile Device Recovery Going Green Retail Computers Office Tips Wireless Charging Apple Politics Encryption Password Information Technology Streaming Media Storage Maintenance Memory Remote Monitoring Humor Data Theft Branding Data Loss Chromecast Employee-Employer Relationship Language Data Protection Keyboard Shortcuts WannaCry NFL Disaster Ciminal Alexa for Business BDR Operating Sysytem Wasting Time Gifts Hard Drive Antivirus WiFi Device Security Financial Data storage Windows 7 IT Support Legislation Computing Internet Exlporer Computer Forensics Wearable Technology Administrator Customer Service Hosted Solution Payroll Mobile Computing Vendor Management SaaS Avoiding Downtime Accessory Credit Cards Chromebook Managed IT Distributed Denial of Service Display Comparison App store Security Cameras Shortcut Workers Management Mobility Running Cable Microsoft Excel Access Testing Virus PDF Teamwork Windows Ink Biometrics IT budget Trending History Peripheral FAQ Printing Bluetooth Telephony PowerPoint Excel Spyware Hybrid Cloud Legal Scam Cloud Computing Commerce Co-Managed Services Bloatware Specifications Machine Learning Updates Wireless Internet Hacker Transportation Camera Proactive Patch Management Emergency Meetings Google Maps Files Private Cloud Customer Relationship Management Charger Audit Fax Server Uninterrupted Power Supply Amazon Television Laptop Firewall Telephone Lithium-ion battery Sales Identity Search Microsoft Word Gamification Personal Information Robot Projects File Sharing Websites Reputation Identity Theft Benefits Value Augmented Reality Save Money Vendor Identities Software as a Service Touchscreen Admin Tablets IT solutions Edge Virtual Assistant Touchpad Hyperlink Conferencing Data Privacy Big Data Wireless Hiring/Firing Printers Virtual Reality Worker Commute Hard Disk Drive Sync Twitter Worker CrashOverride Analytics Instant Messaging Emails Tablet WIndows 7 Business Intelligence How To Automobile Screen Mirroring Administration IT consulting End of Support Books Smart Technology Computer Care Work/Life Balance Network Congestion USB Webinar IT Management Cameras Managing Stress Advertising Electronic Medical Records Monitors SharePoint Science Current Events Cast Regulations Video Games Unsupported Software Relocation Adobe Save Time User Battery IT solutions WIndows Server 2008 Printer Nanotechnology Compliance Samsung Upgrades BYOD Licensing Entertainment iOS Printer Server Phone System HaaS Settings Point of Sale Windows 10s Text Messaging Root Cause Analysis Near Field Communication Regulation Black Market Training Consultant Computer Accessories Thank You Presentation Flexibility Employer Employee Relationship Experience Downtime Education Keyboard Cache Best Available Solid State Drive Outlook Cleaning Hard Drives Company Culture HBO Mouse Computer Fan Congratulations intranet Scalability Data Storage Unified Threat Management Music

Sign Up For Our Newsletter

  • First Name *
  • Last Name *

      Latest Blog Entry

      It is remarkable how much trust people have in Internet-based companies. Not just that they will fulfill the expectations placed on them, but that people routinely provide extremely sensitive information to these companies without thinking for a second about what they do wit...

      Latest News

      Patriot Tech Services Inc. launches new website!

      Patriot Tech Services Inc. is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login