BNMC Blog

Tip of the Week: How to Hide Yourself from Skype

Tip of the Week: How to Hide Yourself from Skype

In a recent update, Microsoft added Skype to the taskbars of many PCs. While many may believe that they don’t use Skype, they actually have an account because it is tied to their Microsoft account. If you don’t want people to be able to find you on the video chatting service, you’re going to want to follow the instructions we’ve outlined here.

While Skype can be very useful to those who want to use it, it can be an irritation to those that don’t. Fortunately, there are some settings you can adjust to conceal your contact information from others, helping to prevent unwanted Skype calls, messages, and requests from coming in.

First, you’ll need to access Skype, and once logged in (which you may be by default) you should check your Options by clicking the three-dot button, found in the top-left of the window.

From there, click into Settings, then Contacts before accessing Privacy. From here, you’ll want to deactivate a few options. To properly conceal your account from other users, make sure to do the following:

  • Toggle Receive suggestions to off.
  • Toggle Appear in suggestions to off.
  • Toggle Appear in search results to off.
  • Next to where your phone number appears, switch Enabled to Disabled.

This way, other users won’t be able to find your account through a simple search, effectively eliminating the chance that you’ll be disturbed by an unexpected Skype request.

At BNMC, we prioritize protecting your data and privacy, because it really is important to do. If you would like assistance in securing your business from data theft or other unfortunate circumstances, reach out to us at 978-482-2020.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, August 22 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Cloud Email Privacy Computer User Tips Microsoft Network Security Malware Software Google Hackers Productivity Business Hosted Solutions Communication Tech Term Hardware Ransomware Data Internet Mobile Devices Small Business Efficiency IT Services IT Support Smartphone Cloud Computing Backup Data Recovery Workplace Tips Saving Money Innovation Android Upgrade Office 365 Business Continuity Managed IT Services Microsoft Office Windows Information Users Miscellaneous Mobile Device Social Media Windows 10 Managed IT Services Business Management Browser Windows 10 Internet of Things Data Backup Data Management Cybersecurity App communications Gmail Passwords Productivity Word Facebook Outsourced IT Server Phishing Vulnerability Remote Monitoring Artificial Intelligence Disaster Recovery Encryption Network VoIP Smartphones Chrome Employer-Employee Relationship Virtual Reality Analytics Website Applications BYOD Infrastructure Money IT Support Managed Service Tip of the week Managed Service Provider Gadgets Save Money YouTube Apps Apple VPN Risk Management Education Access Control Storage IT Management Paperless Office Government Router Office Tips Quick Tips Hacker Data storage Unified Threat Management Company Culture Big Data Employee-Employer Relationship Display Maintenance Settings Antivirus Development Robot Google Drive Content Filtering Bandwidth Automation Networking End of Support HIPAA Hard Disk Drive Mobile Security Data Security Business Technology SaaS Printing Server Management Business Intelligence Virtual Private Network Touchscreen Holiday Computers Virtualization Laptop Tablet Data loss The Internet of Things Telephone Systems Retail Alert desktop Downtime Outlook Augmented Reality Spam Computing Managing Stress Bring Your Own Device Operating System Collaboration Firewall WiFi Two-factor Authentication LiFi Vendor Management OneNote Avoiding Downtime Monitors Document Management Scam Chromebook Hosted Solution Administration Solid State Drive Mouse Wireless Print Toner Search Black Friday Screen Reader Charging Identity Theft Cryptocurrency Slack Hard Disk Drives Smart Office Wires Training Corporate Profile Google Docs Messaging Emergency Licensing Dongle IT solutions Going Green Content Huawei Servers Google Calendar Safety Solar G Suite Entertainment Dark Web Assessment Automobile Hacks Digital Signage Data Warehouse Network Management Remote Computing Scary Stories Shortcuts Cyber Monday Smart Tech Bitcoin Monitoring Solid State Drives Network Congestion Running Cable Work Dell Google Wallet Buisness Voice over Internet Protocol WannaCry Business Growth Employee-Employer Relationships Cooperation Service Level Agreement Cabling Streaming Processor Legislation Compliance Legal iOS Microsoft Excel Wi-Fi Virtual Desktop Hotspot Internet Exlporer Google Maps Password Troubleshooting Business Analysis SharePoint Writing Sports Drones Security Cameras Managed IT Smart Technology Connectivity Windows 8 Spying National Security Techology IT Technicians Optimization Unified Communications Modem FinTech Analysis Students How To Lenovo Dark Data Update Staff Leominster Human Error Memory Statistics Regulations Deep Learning Scalability Mail Merge Blockchain Language Value Mobile Device Management Virus Downloads Managed Services Shortcut Distributed Denial of Service Politics IoT Digital Payment Updates VoIP Unified Threat Management Mirgation Recycling Bluetooth Comparison Cookies MSP Digital Alt Codes Mixed Reality Firefox Superfish Customer Service Cybercrime K-12 Schools Disaster Device Social Networking Migration Address Permissions Private Cloud Computing Infrastructure Professional Services LED Threats Office Samsung Marketing Budget Laptops Patch Management Managed IT Service Tech Support Star Wars Social PowerPoint User Error Chatbots eWaste Specifications Nanotechnology Spyware Typing Humor Data Breach Customer Relationship Management Wearable Technology Network upgrade Uninterrupted Power Supply Information Technology Mobility Motherboard Cables Computer Care IBM Best Practice Windows 7 Alerts USB File Sharing Current Events Co-Managed IT Heating/Cooling Multi-Factor Security Social Engineering Software as a Service Break Fix Websites Fraud Cost Management Onboarding GDPR Time Management Printer Halloween Identity Continuity Upgrades Gadget Emoji Point of Sale Ben McDonald shares Crowdsourcing BDR Travel Personal Information Botnet 3D Printing Regulation Supercomputer CrashOverride Cortana Staffing Motion Sickness Taxes Machine Learning Administrator Processors Unsupported Software IT Budget Web Server what was your? GPS IT Consultant Computer Repair Relocation Printers Mobile Data Cameras How To Work/Life Balance Tracking Recovery Meetings Cleaning Health Mobile Computing Black Market CCTV Law Enforcement Webcam Electronic Medical Records Financial Notifications Physical Security Error Twitter

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3