Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

In Case of Emergency, Activate Facebook’s Safety Check

In Case of Emergency, Activate Facebook’s Safety Check

In 2014, Facebook launched Safety Check, a helpful tool allowing users to “check in” that they’re okay during a crisis event, like a natural disaster, mass shooting, etc. Recently, Facebook made a major change to Safety Check by allowing users affected by the crisis to activate the feature. This is yet another example of how social media is changing the way people find out about major events and react to them.

Continue reading
0 Comments

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Google Business Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications Business Continuity IT Support Smartphones Communication Smartphone Miscellaneous Mobile Device Small Business Network Browser Collaboration Productivity Cybersecurity Quick Tips Users Business Management Phishing Windows Upgrade Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Cloud Computing Data Recovery Office Server Save Money Windows 10 Passwords Social Media Saving Money Holiday Gadgets Tech Term Chrome Virtualization Automation Managed IT Services Managed Service Microsoft Office Computers Cybercrime Artificial Intelligence Operating System Facebook BYOD Mobile Device Management Health Internet of Things Networking IT Support Wi-Fi Hacking Information Technology Covid-19 Information Alert Spam Managed Service Provider Office 365 Telephone Systems Remote Router Employer-Employee Relationship Recovery BDR Bandwidth Social Engineering Mobility Applications Mobile Computing Application Human Resources Law Enforcement Data Breach Remote Monitoring Big Data Password Money App History Encryption VPN Blockchain Government Data Storage Paperless Office Patch Management Remote Computing Private Cloud Mobile Office Managed IT Apps Office Tips Training How To WiFi Google Drive Gmail IT solutions Entertainment Website Settings Budget Avoiding Downtime Two-factor Authentication Vulnerability Windows 7 Word Mouse HaaS Infrastructure Voice over Internet Protocol Servers Bring Your Own Device Data Management Work/Life Balance Data Security Flexibility Wireless Marketing Lithium-ion battery Safety Sports HIPAA Redundancy Keyboard USB Vendor Firewall Managed Services Conferencing Staff Software as a Service Display Telephone System Machine Learning Virtual Reality Scam Apple Connectivity Remote Work Social Employee/Employer Relationship Save Time RMM User Error Vendor Management Meetings Cleaning Risk Management Hacker Data Protection End of Support Education Physical Security The Internet of Things Help Desk SharePoint CES Spam Blocking Printing Electronic Medical Records Printer PDF Content Management Bluetooth Business Technology Customer Service Access Control Hiring/Firing Proactive IT Environment Managed Services Provider Virtual Assistant Best Practice Fax Server Authentication Database YouTube Remote Workers IT Consultant Black Market SaaS Business Intelligence Processor Update Humor Audit Worker Document Management Solid State Drive Wireless Technology Network Congestion IT Management Hard Drive Google Docs How to Downtime eWaste Botnet Identity Theft IT Plan Computing Data storage Automobile Unsupported Software Wearable Technology Augmented Reality Computing Infrastructure Retail Hard Drives Charger Fraud Going Green Instant Messaging Robot Excel Compliance Digital Signage Remote Worker Virus OneNote Computer Care Cryptocurrency Biometrics Current Events Virtual Desktop Battery Unified Threat Management Telephony Computer Accessories Shadow IT Samsung Legal Procurement Comparison Net Neutrality DDoS Workplace Strategy Internet Exlporer Value Troubleshooting Outlook File Sharing Employees Leadership Employee/Employer Relationships Start Menu Camera Windows 365 Notifications Customer Relationship Management Inventory Specifications ISP Distributed Denial of Service Screen Mirroring Wire Video Conferencing Analyitcs Loyalty Evernote ROI Bitcoin Books Travel Shortcuts Frequently Asked Questions Sales Programming Mobile Printers Point of Sale Windows 10s Personal Millennials Cryptomining Relocation Printer Server Cast Smart Office Supply Chain Management Wireless Charging webinar Batteries Emergency Video Games Antivirus Tip of the week Monitoring Professional Services Virtual Private Network Windows 8.1 Public Cloud Digitize Windows 8 Employer Employee Relationship Workforce Worker Commute IT service Assessment Cables Windows Server 2008 R2 Experience Scalability Windows Server 2008 Customer relationships Tools Project Management Email Best Practices Nanotechnology IT Assessment Tablet Telecommuting Manufacturing Business Owner NarrowBand Domains Television Cortana Digital Signature Managed IT Service Security Cameras Search Computer Tips iPhone IaaS Warranty Virtual CIO Maintenance OneDrive Biometric Security HVAC Peripheral Bloatware Public Computer Google Apps Analysis Using Data Transportation Regulations Digital Security Cameras Files Administrator Computer Fan Devices Copiers Tablets Rootkit 5G Consultant Analytics Chromecast Enterprise Content Management Quick Tip Entrepreneur Workers Accountants Benefits Smartwatch MSP Ergonomics Colocation Microchip Uninterrupted Power Supply Shortcut FENG Thought Leadership Development Credit Cards OLED Best Available WIndows 7 Password Management PCI DSS Cost Management IBM Password Manager Virtual Machine Social Networking Fiber Optics Smart Technology Multi-Factor Security Employee Monitor Flash 2FA Search Engine Twitter Messaging Cabling Software Tips NIST Policy Supercomputer Business Mangement Hypervisor Streaming Media Emails Smart Tech Trend Micro Trending Reputation Running Cable Sync Dark mode Tech Support Addiction SMS Memory Amazon Default App Content User PowerPoint Techology Windows Media Player Laptop Procedure Recycling Saving Time Netflix Practices Shopping Two Factor Authentication Google Search Customers Wiring dark theme Root Cause Analysis Cache AI Amazon Web Services IT Infrastructure Audiobook Managing Stress Music Bing Touchpad HBO Safe Mode FinTech Knowledge Criminal Hosted Computing Social Network Science Skype GDPR Cameras Advertising Data loss Wireless Internet Online Shopping Investment Politics

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code