Our Blog: Stuff we think you should know

Tip of the Week: How to Hide Yourself from Skype

Tip of the Week: How to Hide Yourself from Skype

In a recent update, Microsoft added Skype to the taskbars of many PCs. While many may believe that they don’t use Skype, they actually have an account because it is tied to their Microsoft account. If you don’t want people to be able to find you on the video chatting service, you’re going to want to follow the instructions we’ve outlined here.

While Skype can be very useful to those who want to use it, it can be an irritation to those that don’t. Fortunately, there are some settings you can adjust to conceal your contact information from others, helping to prevent unwanted Skype calls, messages, and requests from coming in.

First, you’ll need to access Skype, and once logged in (which you may be by default) you should check your Options by clicking the three-dot button, found in the top-left of the window.

From there, click into Settings, then Contacts before accessing Privacy. From here, you’ll want to deactivate a few options. To properly conceal your account from other users, make sure to do the following:

  • Toggle Receive suggestions to off.
  • Toggle Appear in suggestions to off.
  • Toggle Appear in search results to off.
  • Next to where your phone number appears, switch Enabled to Disabled.

This way, other users won’t be able to find your account through a simple search, effectively eliminating the chance that you’ll be disturbed by an unexpected Skype request.

At Haber Group, we prioritize protecting your data and privacy, because it really is important to do. If you would like assistance in securing your business from data theft or other unfortunate circumstances, reach out to us at 866.625.3560.

The Right and Wrong of the Hollywood Hack
Understanding How a Password is Cracked


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, May 26 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Business Email Privacy Hackers User Tips Malware Computer Business Computing Microsoft Productivity Network Security Hosted Solutions Google Internet Software Tech Term Data Small Business Mobile Devices Efficiency Communication IT Services Backup Hardware Workplace Tips Ransomware Windows 10 Smartphone Android IT Support Saving Money Cloud Computing Productivity Microsoft Office Social Media Browser Business Continuity Data Recovery Data Management Managed IT Services Facebook Users Upgrade Mobile Device Phishing Data Backup Word Office 365 Gmail Internet of Things Managed IT Services Innovation Windows Server Windows 10 Smartphones Passwords Disaster Recovery Outsourced IT App Encryption Network Chrome Vulnerability Employer-Employee Relationship Cybersecurity communications Artificial Intelligence Miscellaneous Business Management Information Managed Service Provider Remote Monitoring VoIP Website Save Money Office Tips Apple Virtual Reality Hacker Content Filtering Tip of the week Analytics IT Support Big Data Managed Service Government Money BYOD Applications Infrastructure Gadgets Spam Maintenance Settings Two-factor Authentication Tablet Data storage Paperless Office Apps Display Bandwidth YouTube Employee-Employer Relationship Antivirus Firewall Education Risk Management Access Control Robot Wireless Printing WiFi Router Automation Avoiding Downtime The Internet of Things Virtualization Augmented Reality IT Management Customer Service Telephone Systems LiFi Safety Quick Tips Computers Downtime Scam Business Intelligence Storage Retail Hosted Solution SaaS Solid State Drive Networking Hacking Company Culture Outlook Monitors Holiday Search Unified Threat Management Hard Disk Drive VPN Data Security HIPAA IBM Presentation Data loss Business Technology Virtual Private Network Administration Operating System Chromebook Mobile Device Management Development Customer Relationship Management Office End of Support Wi-Fi Wireless Technology Computing Server Management Password Mobile Security Document Management Recovery Touchscreen Google Drive Laptop Mouse Vendor Management Samsung 5G Monitoring Hard Disk Drives Spyware Superfish Information Technology Cooperation Solar Print Toner Statistics Best Practice telephony Break Fix Cookies Messaging Address Writing Hotspot Professional Services Websites Identity Theft Cortana Work Content Google Docs Black Friday Regulations Halloween Microsoft Excel Star Wars Training Fun Desktop User Error Multi-Factor Security Mirgation Hard Drives Voice over Internet Protocol Entertainment Uninterrupted Power Supply Patch Management Windows 8 G Suite Spying Solid State Drives Google Wallet Staff Automobile Shortcuts Bluetooth Business Growth Dark Web Nanotechnology Analysis Employee-Employer Relationships Corporate Profile Current Events Language USB Optimization Streaming Cyber Monday Social Networking Scary Stories Blockchain Cost Management User Troubleshooting VoIP Legal Google Calendar Chatbots IP Address Refrigeration Cybercrime FinTech iOS Net Neutrality Screen Reader Public Speaking How To Drones Printer Wearable Technology Security Cameras Alt Codes Dark Data Competition Sports Students WannaCry Going Green Social Engineering Computing Infrastructure Dongle Knowledge Recycling Human Error IT service Heating/Cooling Smart Technology Motherboard Remote Computing Social Permissions Assessment Time Management Legislation Identity Update Mobile Office MSP Scalability FCC Smart Tech PowerPoint Firefox Managing Stress Managed Services Cabling Typing Mixed Reality Alerts Service Level Agreement Digital Payment Experience Unified Communications eWaste Device BDR Servers Deep Learning Humor Distributed Denial of Service Hacks Fraud Internet Exlporer Politics LED Network Management Comparison Undo Running Cable Migration Title II Connectivity Virtual Desktop Onboarding Techology Budget SharePoint Collaboration Marketing Cables Laptops Managed IT Cryptocurrency Buisness Slack Data Breach Digital Lenovo How To Licensing Private Cloud Application Continuity Mobility Google Maps Bring Your Own Device sip Managed IT Service Modem Mail Merge Value Tech Support IT solutions Smart Office Co-Managed IT Specifications Compliance Lithium-ion battery Charging Online IoT Computer Care Digital Signage Unified Threat Management Downloads IT Technicians File Sharing Wires Software as a Service Disaster Shortcut Bitcoin Network Congestion Error Regulation Mobile Computing Black Market Point of Sale Law Enforcement Physical Security Travel Notifications Domains CrashOverride Upgrades Botnet Supercomputer Twitter Gadget Staffing Motion Sickness Crowdsourcing Taxes 3D Printing Personal Information Administrator Emergency Machine Learning IT Budget Web Server GPS Printers IT Consultant Unsupported Software Computer Repair Relocation Processors Cameras Tracking Meetings Cleaning Mobile Data Health Alert CCTV Emoji Webcam Windows 7 Work/Life Balance Electronic Medical Records