Our Blog: Stuff we think you should know

Tip of the Week: How to Hide Yourself from Skype

Tip of the Week: How to Hide Yourself from Skype

In a recent update, Microsoft added Skype to the taskbars of many PCs. While many may believe that they don’t use Skype, they actually have an account because it is tied to their Microsoft account. If you don’t want people to be able to find you on the video chatting service, you’re going to want to follow the instructions we’ve outlined here.

While Skype can be very useful to those who want to use it, it can be an irritation to those that don’t. Fortunately, there are some settings you can adjust to conceal your contact information from others, helping to prevent unwanted Skype calls, messages, and requests from coming in.

First, you’ll need to access Skype, and once logged in (which you may be by default) you should check your Options by clicking the three-dot button, found in the top-left of the window.

From there, click into Settings, then Contacts before accessing Privacy. From here, you’ll want to deactivate a few options. To properly conceal your account from other users, make sure to do the following:

  • Toggle Receive suggestions to off.
  • Toggle Appear in suggestions to off.
  • Toggle Appear in search results to off.
  • Next to where your phone number appears, switch Enabled to Disabled.

This way, other users won’t be able to find your account through a simple search, effectively eliminating the chance that you’ll be disturbed by an unexpected Skype request.

At Haber Group, we prioritize protecting your data and privacy, because it really is important to do. If you would like assistance in securing your business from data theft or other unfortunate circumstances, reach out to us at 866.625.3560.

The Right and Wrong of the Hollywood Hack
Understanding How a Password is Cracked
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, March 25 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Hackers Privacy Business Malware User Tips Computer Business Computing Google Productivity Internet Microsoft Network Security Software Tech Term Hosted Solutions Communication Mobile Devices Efficiency IT Services Small Business Data Ransomware Backup Windows 10 Hardware Smartphone Android IT Support Productivity Microsoft Office Saving Money Workplace Tips Data Management Managed IT Services Cloud Computing Browser Business Continuity Data Recovery Data Backup Facebook Innovation Server Upgrade Internet of Things Windows Managed IT Services Gmail Windows 10 Passwords Office 365 Disaster Recovery Users Smartphones Phishing Word Outsourced IT App Mobile Device Chrome Vulnerability Cybersecurity communications Managed Service Provider VoIP Social Media Remote Monitoring Employer-Employee Relationship Artificial Intelligence Business Management Encryption Hacker Money BYOD Content Filtering Tip of the week Big Data Applications Miscellaneous Spam Website Apple Managed Service Infrastructure Analytics IT Support Information Office Tips Government Network Robot Maintenance Settings Printing WiFi Access Control Two-factor Authentication Router Automation Avoiding Downtime Tablet Bandwidth The Internet of Things YouTube Antivirus Risk Management Virtual Reality Save Money Employee-Employer Relationship Wireless Paperless Office Data storage Display Customer Service Firewall IT Management Chromebook Presentation HIPAA Quick Tips Downtime Hosted Solution Scam Operating System Office End of Support Document Management Wireless Technology Computing Gadgets Virtualization Password Business Intelligence Recovery Networking Google Drive Search Education Mobile Security Mouse Vendor Management IBM VPN Company Culture Data Security LiFi Administration Computers Mobile Device Management Data loss Business Technology Storage SaaS Customer Relationship Management Virtual Private Network Apps Retail Wi-Fi Server Management Laptop Augmented Reality Touchscreen Unified Threat Management Development Holiday Hacking Outlook Telephone Systems Monitors Safety Legislation Fun Identity Typing Smart Office Co-Managed IT Permissions Assessment Address Charging Politics Deep Learning Humor Digital Signage Collaboration FCC Uninterrupted Power Supply Smart Tech Patch Management Wires Software as a Service User Error Undo Distributed Denial of Service Bluetooth Hacks Solar Print Toner Alerts Scary Stories Service Level Agreement Monitoring Marketing Comparison Cryptocurrency Work Content IP Address Fraud Corporate Profile Cybercrime Internet Exlporer Budget Messaging Tech Support Bring Your Own Device sip Desktop File Sharing Title II Solid State Drive Connectivity How To Voice over Internet Protocol Entertainment Computer Care Application SharePoint VoIP Managed IT Service Knowledge Modem Shortcuts Samsung Licensing How To Sports Spying Specifications IT service Compliance Heating/Cooling Bitcoin Network Congestion Optimization Streaming Mobile Office WannaCry Value Analysis Websites Identity Theft Time Management Best Practice telephony Troubleshooting Online Hard Disk Drive IoT Information Technology FinTech iOS Training Downloads IT Technicians Automobile Break Fix Cabling Experience Cookies Unified Communications Writing Security Cameras G Suite Cooperation Firefox Google Docs Hard Drives Black Friday BDR Regulations Servers Windows 8 Recycling Human Error Hotspot Running Cable Professional Services Multi-Factor Security Mirgation Network Management Virtual Desktop Business Growth Microsoft Excel Star Wars Google Wallet MSP Scalability PowerPoint Dark Web Nanotechnology Managed IT Current Events Managing Stress Managed Services Staff Buisness Techology Refrigeration Cyber Monday Google Maps Social Networking IT solutions eWaste Device Remote Computing User Lithium-ion battery Language Digital USB Lenovo Legal Google Calendar Chatbots Alt Codes Dark Data LED Update Public Speaking Blockchain Cost Management Mail Merge Drones Migration Onboarding Competition Net Neutrality Disaster Screen Reader Shortcut Going Green Social Engineering Cables Laptops Printer 5G Wearable Technology Unified Threat Management Digital Payment Smart Technology Cortana Motherboard Statistics Social Continuity Mobility Computing Infrastructure Spyware Halloween Dongle Superfish Slack Meetings Unsupported Software Windows 7 Tracking Health Cleaning Private Cloud Alert CCTV CrashOverride Emoji Webcam Mobile Data Regulation Electronic Medical Records Work/Life Balance Error Black Market Point of Sale Emergency Travel Law Enforcement Mobile Computing Notifications Twitter Physical Security Botnet Supercomputer Printers Motion Sickness Domains Upgrades Gadget Staffing Personal Information Administrator Crowdsourcing Taxes Web Server Machine Learning IT Budget 3D Printing GPS Computer Repair IT Consultant Processors Cameras Relocation