631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Tip of the Week: How to Deactivate Skype

Tip of the Week: How to Deactivate Skype

Not too long ago, as of this writing, Microsoft began including Skype in their PCs. As a result, they created accounts for Skype based on a user’s Microsoft account…. Surprise! Now, you may not be comfortable with the prospect of people being able to find you via Skype, which is why we’re offering some tips to hide yourself from others.

Of course, we aren’t saying that this is what you want to do, either. We just know that some who don’t use it will not want their contact information able to be found on the application. All it takes to resolve this issue are just a few switched settings. Once these are deactivated, you will not be able to be found by Skype users, preventing communications through the application.

The first thing you’ll have to do is to access Skype and log in, which might actually happen automatically. Once logged in, click the three-dot button to check your Options. The three-dot window should be in the top-left of the window.

Your next steps should be to access Settings, Contacts, and Privacy, in that order. In Privacy, you’ll have a few options to deactivate. Following the next steps will allow you to hide your account from other Skype users:

  • Switch Receive suggestions to off.
  • Switch Appear in suggestions to off.
  • Switch Appear in search results to off.
  • Where your phone number appears, switch Enabled to Disabled.

Doing so will prevent your information from appearing when another user performs a search. As a result, you’ll be insulated from an unwanted contact request.

We see protecting the data and privacy of our clients to be some of our key responsibilities here at Suffolk Computer Consultants. To learn more about how you can protect your business and its data, give us a call at 631-905-9617.

Google Location Services and How They Apply to the...
A Quick Look at Professional Services Management S...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, March 26 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Privacy Cloud Network Security Productivity User Tips Cybersecurity Microsoft Malware Smartphones Communications Managed IT Services Tech Term Communication Google Backup Business Hardware Email Passwords Efficiency Hackers Outsourced IT Internet Data Software Business Management Browser Android Innovation Hosted Solutions Ransomware Windows 10 Small Business IT Support Mobile Device Users Data Backup VoIP Mobile Devices Data Recovery Wi-Fi IT Services Collaboration Holiday Internet of Things Social Media Network Save Money Smartphone Alert Cloud Computing Applications Managed IT Services Microsoft Office Router Access Control Miscellaneous Saving Money Password Wireless Twitter Bandwidth Computer Business Intelligence Workplace Tips Employer-Employee Relationship Apps Virtualization Chrome Networking Office 365 Excel Office Information Word Automation BDR Analytics VoIP Government Paperless Office Blockchain Patch Management Settings Data Management Data Breach Vulnerability Business Continuity Marketing Gadgets Phishing Artificial Intelligence Retail WiFi Cybercrime Tip of the week Remote Computing Scam Website Virus VPN Workers Remote Monitoring and Management Battery G Suite BYOD Spam Cortana Medical IT Tech Terms Connectivity Company Culture Mobile Device Management Politics App Data Security How To Mobility Hacking Virtual Assistant Managed Service Wireless Charging Data Protection Windows Physical Security Managed IT Service IT Support Gmail Cost Management Compliance Productivity Remote Monitoring Computers Law Enforcement Dark Web Facebook Trends Disaster Recovery Wireless Internet Google Drive Comparison HIPAA e-waste Recovery Chrome OS WhatsApp PowerPoint Big Data Maintenance Troubleshooting Remote Control User Security Hard Drives SSD Cleaning Printers Proactive IT instant Messaging Voice over IP IT budget Touchscreen Hosted Solution Managing Stress Access Voice over Internet Protocol Wearables Digital Internet Explorer CrashOverride Machine Learning A.I. Help Desk Specifications Server Hard Drive disposal Reporting IT Management Sports Upgrade Antivirus Update Spam Blocking Business Technology Inventory Vulnerabilities eCommerce Google Maps Microsoft Office 365 Copy Apple Dongle Personal Information Healthcare Telecommuting Edge Threat News Telecommute Movies Education Smart Technology Certification Multi-Factor Security Conferencing Processors Value Phone System Outlook Email Management Sales Lead Generation Mobile Security Analysis Cryptocurrency Licensing Online Shopping Authentication Paste iPhone Bring Your Own Device SaaS Amazon Millennials Spotify Laptop Printing Telephone System Data loss Unified Communications Two-factor Authentication Content Filtering Spyware GDPR Network Attached Storage Streaming Media Profitability Tablet Hiring/Firing Operating System Staffing Travel Authorization Technology Tips Hybrid Cloud E-Commerce Paper Staff RAM Tech Support Information Technology Training Work/Life Balance HP Database Gadget Storage Server Management Downloads Eliminating Downtime Knowledge Managed IT WannaCry Environment Safety Time Management Live Streaming Telephone Systems File Sharing Botnet Backup and Disaster Recovery Printer Server Plug-In Payment Files Telephony Office Tips Automobile Ink Error Remote Support Websites Microsoft Teams Entertainment Biometrics Cables Security Cameras User Tip Document Management Tactics Shortcut Yahoo Customer Relationship Management Unified Threat Management Encryption Competition Regulation IP Address Search Leadership Current Events Customer Service Vendor Management Autocorrect Mobile Office Computer Care Emergency Avoiding Downtime Domains Net Neutrality Dark Data Scheduling Samsung Windows 10 Gaming Console Managed Service Provider Public Speaking DDoS Instagram Presentation Scalability Synergy Money Lithium-ion battery Video Games Windows 7 Worker IaaS Employer Employee Relationship Augmented Reality Fun Television Wireless Technology 5G Credit Cards Freedom of Information IBM Emoji Printer Quick Tips Hacker HaaS The Internet of Things Budget

Newsletter Sign Up