BNMC Blog

Tip of the Week: How to Hide Yourself from Skype

Tip of the Week: How to Hide Yourself from Skype

In a recent update, Microsoft added Skype to the taskbars of many PCs. While many may believe that they don’t use Skype, they actually have an account because it is tied to their Microsoft account. If you don’t want people to be able to find you on the video chatting service, you’re going to want to follow the instructions we’ve outlined here.

While Skype can be very useful to those who want to use it, it can be an irritation to those that don’t. Fortunately, there are some settings you can adjust to conceal your contact information from others, helping to prevent unwanted Skype calls, messages, and requests from coming in.

First, you’ll need to access Skype, and once logged in (which you may be by default) you should check your Options by clicking the three-dot button, found in the top-left of the window.

From there, click into Settings, then Contacts before accessing Privacy. From here, you’ll want to deactivate a few options. To properly conceal your account from other users, make sure to do the following:

  • Toggle Receive suggestions to off.
  • Toggle Appear in suggestions to off.
  • Toggle Appear in search results to off.
  • Next to where your phone number appears, switch Enabled to Disabled.

This way, other users won’t be able to find your account through a simple search, effectively eliminating the chance that you’ll be disturbed by an unexpected Skype request.

At BNMC, we prioritize protecting your data and privacy, because it really is important to do. If you would like assistance in securing your business from data theft or other unfortunate circumstances, reach out to us at 978-482-2020.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, March 23 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Email Cloud Privacy Business Computing Malware Hackers Productivity User Tips Google Network Security Tech Term Business Software Computer Microsoft Communication Internet IT Services Hosted Solutions Efficiency Mobile Devices Ransomware Smartphone Data IT Support Small Business Hardware Android Cloud Computing Managed IT Services Backup Saving Money Data Recovery Business Continuity Innovation Workplace Tips Data Management Microsoft Office Windows 10 Windows Browser Managed IT Services Internet of Things Data Backup Users App Cybersecurity Windows 10 Passwords Productivity Business Management Server Vulnerability Outsourced IT Remote Monitoring Office 365 Upgrade Mobile Device communications Gmail Disaster Recovery Artificial Intelligence Encryption Chrome Facebook Word Phishing Employer-Employee Relationship Social Media BYOD Website Analytics Applications Network Managed Service Infrastructure Tip of the week VoIP Smartphones IT Support Money Information Managed Service Provider Google Drive Access Control Bandwidth Government YouTube Content Filtering IT Management Miscellaneous Risk Management Apple Paperless Office Office Tips Display Router Employee-Employer Relationship Big Data Hacker Data storage Save Money Robot Company Culture Antivirus Settings Automation Maintenance Virtual Reality Development Hosted Solution Document Management Networking Administration VPN SaaS Mouse Wireless HIPAA Data Security Server Management Holiday Business Technology Computers Touchscreen Education Mobile Security Virtual Private Network Quick Tips Retail Alert Storage Tablet Printing Laptop Business Intelligence The Internet of Things Vendor Management Data loss Monitors Unified Threat Management Two-factor Authentication Chromebook Telephone Systems desktop Downtime Avoiding Downtime Spam Computing Scam Outlook Gadgets WiFi End of Support Operating System Managing Stress Firewall LiFi Uninterrupted Power Supply Print Toner Search Black Friday Information Technology Wearable Technology Network upgrade Spyware Slack Remote Computing Typing Humor Nanotechnology Content Halloween Servers Google Calendar Current Events Alerts USB Computer Care IBM Messaging Emergency Network Congestion Best Practice Motherboard Cables File Sharing Network Management Fraud Cost Management Solid State Drive Entertainment Dark Web Identity Continuity Digital Signage Screen Reader Charging Shortcuts Cyber Monday Wi-Fi Apps Smart Office Identity Theft Monitoring Writing Cryptocurrency Streaming Scary Stories Legislation IT solutions Going Green Licensing Dongle Training Corporate Profile Virtualization Google Docs Wires Running Cable SharePoint Hacks Assessment G Suite Hard Disk Drive iOS Dark Data Microsoft Excel Update Solar Automobile Troubleshooting Smart Tech Dell Security Cameras Buisness Managed IT Smart Technology Google Wallet Work Spying Techology Bitcoin Human Error Sports Statistics Politics Cooperation Service Level Agreement WannaCry Analysis How To Virtual Desktop Lenovo Business Growth Voice over Internet Protocol Cabling Downloads Password Hotspot Internet Exlporer Scalability Mail Merge Customer Service Blockchain Legal Compliance Google Maps Windows 8 Connectivity Managed Services Shortcut Distributed Denial of Service Unified Communications Drones IT Technicians Optimization VoIP Unified Threat Management Office Samsung Device Bluetooth Comparison Tech Support Staff Leominster Firefox Superfish Modem FinTech Mobile Device Management Language Value Migration Address Permissions Deep Learning Regulations LED Social Engineering IoT Laptops Patch Management Managed IT Service Mirgation Recycling Digital Payment PowerPoint Cybercrime User Error Disaster Mobility Marketing Specifications Websites Augmented Reality K-12 Schools Digital Customer Relationship Management Alt Codes Cookies MSP Heating/Cooling Multi-Factor Security Computing Infrastructure Professional Services Bring Your Own Device Social Networking Collaboration Co-Managed IT Printer Safety Social Star Wars Software as a Service Break Fix Budget Chatbots eWaste Onboarding Time Management Webcam Personal Information Botnet 3D Printing Cortana Error Point of Sale Ben McDonald shares Machine Learning Processors Unsupported Software BDR Travel Regulation Computer Repair Relocation Supercomputer CrashOverride Mobile Data Staffing Motion Sickness How To Work/Life Balance Taxes Recovery Administrator Printers Web Server what was your? Health Private Cloud IT Budget GPS Black Market Law Enforcement IT Consultant Notifications Cameras Electronic Medical Records Physical Security Tracking Twitter Meetings Upgrades Gadget Mobile Computing Cleaning Windows 7 Emoji Crowdsourcing CCTV

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3