BNMC Blog

Tip of the Week: How to Hide Yourself from Skype

Tip of the Week: How to Hide Yourself from Skype

In a recent update, Microsoft added Skype to the taskbars of many PCs. While many may believe that they don’t use Skype, they actually have an account because it is tied to their Microsoft account. If you don’t want people to be able to find you on the video chatting service, you’re going to want to follow the instructions we’ve outlined here.

While Skype can be very useful to those who want to use it, it can be an irritation to those that don’t. Fortunately, there are some settings you can adjust to conceal your contact information from others, helping to prevent unwanted Skype calls, messages, and requests from coming in.

First, you’ll need to access Skype, and once logged in (which you may be by default) you should check your Options by clicking the three-dot button, found in the top-left of the window.

From there, click into Settings, then Contacts before accessing Privacy. From here, you’ll want to deactivate a few options. To properly conceal your account from other users, make sure to do the following:

  • Toggle Receive suggestions to off.
  • Toggle Appear in suggestions to off.
  • Toggle Appear in search results to off.
  • Next to where your phone number appears, switch Enabled to Disabled.

This way, other users won’t be able to find your account through a simple search, effectively eliminating the chance that you’ll be disturbed by an unexpected Skype request.

At BNMC, we prioritize protecting your data and privacy, because it really is important to do. If you would like assistance in securing your business from data theft or other unfortunate circumstances, reach out to us at 978-482-2020.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, May 21 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Business Computing Privacy User Tips Malware Hackers Business Network Security Microsoft Google Software Productivity Computer Tech Term Hosted Solutions Internet Communication IT Services Data Efficiency Mobile Devices Small Business Ransomware Smartphone IT Support Hardware Android Workplace Tips Backup Innovation Cloud Computing Data Recovery Managed IT Services Saving Money Business Continuity Windows 10 Windows Data Backup Data Management Internet of Things Mobile Device Users Social Media Microsoft Office Managed IT Services Browser Outsourced IT Word Passwords Productivity Vulnerability Facebook Server Cybersecurity Phishing Office 365 App Business Management Windows 10 Disaster Recovery Encryption Information Smartphones Chrome Remote Monitoring Upgrade communications Artificial Intelligence Gmail Network Managed Service Tip of the week Save Money VoIP Employer-Employee Relationship Miscellaneous Managed Service Provider Virtual Reality Gadgets Analytics Applications Infrastructure BYOD Website IT Support Money Maintenance Robot Big Data Antivirus Google Drive Content Filtering Bandwidth Automation Settings Apple Education Access Control IT Management Paperless Office Router Government YouTube Risk Management Hacker Data storage Company Culture Office Tips Employee-Employer Relationship Display Outlook Augmented Reality Spam Computing Managing Stress Operating System Laptop Firewall WiFi Two-factor Authentication Vendor Management The Internet of Things Avoiding Downtime Monitors LiFi Development Document Management Scam Chromebook Hosted Solution Administration Mouse Wireless Downtime Solid State Drive Networking End of Support HIPAA Apps VPN Mobile Security Hard Disk Drive Storage Data Security Business Technology SaaS Printing Server Management Virtual Private Network Touchscreen Business Intelligence Holiday Quick Tips Computers Virtualization Data loss Unified Threat Management Tablet Telephone Systems Retail Alert desktop Cookies MSP Virtual Desktop Digital Alt Codes Mixed Reality Firefox Superfish Customer Service K-12 Schools Sports Disaster Device Bluetooth Comparison Bring Your Own Device Migration Address Permissions Computing Infrastructure Professional Services Collaboration LED Office Samsung Social Networking Laptops Patch Management Managed IT Service Tech Support Star Wars Social PowerPoint User Error Chatbots eWaste Budget Nanotechnology Spyware Typing Humor Data Breach Customer Relationship Management Wearable Technology Network upgrade Uninterrupted Power Supply Information Technology Mobility Specifications Motherboard Cables Computer Care IBM Best Practice Alerts USB File Sharing Current Events Co-Managed IT Heating/Cooling Multi-Factor Security Social Engineering Software as a Service Break Fix Websites Fraud Cost Management Cybercrime Onboarding Time Management Printer Identity Continuity Black Friday Screen Reader Charging Identity Theft Cryptocurrency Slack Hard Disk Drives Marketing Smart Office Print Toner Search Wires Training Corporate Profile Google Docs Messaging Emergency Licensing Dongle IT solutions Going Green Content Servers Google Calendar Safety Entertainment Dark Web Assessment Automobile Hacks Digital Signage Network Management Remote Computing Solar G Suite Cyber Monday Smart Tech Bitcoin Monitoring Solid State Drives Network Congestion Work Dell Google Wallet Shortcuts Voice over Internet Protocol WannaCry Business Growth Employee-Employer Relationships Cooperation Service Level Agreement Halloween Cabling Streaming Legislation Legal iOS Microsoft Excel Wi-Fi Hotspot Internet Exlporer Google Maps Password Troubleshooting SharePoint Writing Compliance Managed IT Smart Technology Connectivity Windows 8 Spying Techology IT Technicians Optimization Unified Communications Drones Security Cameras Modem FinTech Analysis Students How To Lenovo Dark Data Update Staff Leominster Scary Stories Human Error Statistics Deep Learning Scalability Mail Merge Blockchain Language Value Running Cable Mobile Device Management Downloads Regulations Managed Services Shortcut Distributed Denial of Service Politics IoT Digital Payment VoIP Unified Threat Management Mirgation Recycling Buisness Work/Life Balance Tracking Recovery Meetings How To Cleaning Health Private Cloud Mobile Computing Black Market CCTV Law Enforcement Webcam Windows 7 Electronic Medical Records Notifications Physical Security Error Twitter Upgrades Gadget Emoji Point of Sale Ben McDonald shares BDR Travel Crowdsourcing Personal Information Botnet 3D Printing Regulation Supercomputer CrashOverride Cortana Staffing Motion Sickness Machine Learning Administrator Processors Taxes Unsupported Software IT Budget Web Server what was your? GPS IT Consultant Computer Repair Relocation Printers Mobile Data Cameras

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3