631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Tip of the Week: How to Deactivate Skype

Tip of the Week: How to Deactivate Skype

Not too long ago, as of this writing, Microsoft began including Skype in their PCs. As a result, they created accounts for Skype based on a user’s Microsoft account…. Surprise! Now, you may not be comfortable with the prospect of people being able to find you via Skype, which is why we’re offering some tips to hide yourself from others.

Of course, we aren’t saying that this is what you want to do, either. We just know that some who don’t use it will not want their contact information able to be found on the application. All it takes to resolve this issue are just a few switched settings. Once these are deactivated, you will not be able to be found by Skype users, preventing communications through the application.

The first thing you’ll have to do is to access Skype and log in, which might actually happen automatically. Once logged in, click the three-dot button to check your Options. The three-dot window should be in the top-left of the window.

Your next steps should be to access Settings, Contacts, and Privacy, in that order. In Privacy, you’ll have a few options to deactivate. Following the next steps will allow you to hide your account from other Skype users:

  • Switch Receive suggestions to off.
  • Switch Appear in suggestions to off.
  • Switch Appear in search results to off.
  • Where your phone number appears, switch Enabled to Disabled.

Doing so will prevent your information from appearing when another user performs a search. As a result, you’ll be insulated from an unwanted contact request.

We see protecting the data and privacy of our clients to be some of our key responsibilities here at Suffolk Computer Consultants. To learn more about how you can protect your business and its data, give us a call at 631-905-9617.

Google Location Services and How They Apply to the...
A Quick Look at Professional Services Management S...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, May 26 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Privacy Cloud Network Security Productivity User Tips Google Cybersecurity Microsoft Communication Efficiency Malware Smartphones Communications Hardware Tech Term Business Internet Data Hackers Managed IT Services Business Management Email Passwords Outsourced IT Innovation Backup Windows 10 Mobile Device Small Business Software Android Hosted Solutions Browser IT Support Ransomware Data Backup Social Media Network Mobile Devices Bandwidth Data Recovery VoIP Wi-Fi Applications Managed IT Services Apps Collaboration Users Smartphone IT Services Holiday Alert Cloud Computing Computer Microsoft Office Gadgets Save Money Internet of Things Miscellaneous Wireless Employer-Employee Relationship Workplace Tips Business Intelligence Router Password Twitter Chrome Access Control Office Saving Money Data Management Automation Managed Service Analytics Blockchain Phishing VoIP Virtualization Patch Management Settings Gmail Data Breach Vulnerability Business Continuity Networking Marketing Information Office 365 Excel Government BDR Word Paperless Office IT Support Mobility Cost Management Company Culture Virtual Assistant Spam Politics Remote Monitoring How To Mobile Device Management Law Enforcement Wireless Charging Compliance Data Protection Windows Physical Security Managed IT Service WiFi Cybercrime Computers Scam Artificial Intelligence Telephony Facebook Battery Productivity Voice over Internet Protocol Dark Web Cortana Retail Remote Monitoring and Management App G Suite Healthcare Tip of the week Remote Computing Virus Website VPN Hacking Value Workers Medical IT Tech Terms Connectivity Net Neutrality Upgrade BYOD Data Security News Data loss Unified Communications Education Smart Technology Multi-Factor Security Conferencing Work/Life Balance Spyware Phone System GDPR Electronic Health Records Online Shopping Network Attached Storage Streaming Media Profitability Email Management Sales Managed IT Operating System Licensing Authorization Paste iPhone Botnet Technology Tips Hybrid Cloud SaaS E-Commerce Millennials Office Tips Automobile Paper Health Telephone System Staff RAM Training Content Filtering HP Database Storage Travel Server Management Downloads Eliminating Downtime Tablet WannaCry Environment Two-factor Authentication Staffing Time Management Hard Drives Backup and Disaster Recovery Plug-In Payment Ink Gadget Error Employees Websites Microsoft Teams Information Technology Cables Security Cameras Document Management Tactics Live Streaming Trends Wireless Internet Knowledge Server HIPAA e-waste Tech Support Chrome OS PowerPoint Safety Troubleshooting Telephone Systems File Sharing SSD Printer Server Proactive IT instant Messaging Files Google Maps IT budget Shortcut Touchscreen Solid State Drive Remote Support Managing Stress Entertainment Biometrics Wearables User Tip Digital Internet Explorer WhatsApp Machine Learning A.I. Disaster Recovery Help Desk Google Drive Comparison Hard Drive disposal Recovery Reporting Human Resources IT Management Sports Maintenance Update Remote Control User Security Inventory Cleaning Printers Vulnerabilities Voice over IP CrashOverride Microsoft Office 365 Hard Disk Drive Hosted Solution Dongle Big Data Access Spotify Edge Threat Telecommute Movies Certification Specifications Processors Employee-Employer Relationship Antivirus Outlook Spam Blocking Business Technology Hiring/Firing Lead Generation Mobile Security Customer Service Analysis Cryptocurrency eCommerce Authentication Video Copy Apple Bring Your Own Device Personal Information Amazon Telecommuting Laptop Printing Fun Domains Freedom of Information Gaming Console Windows 7 OneNote Windows 10 Public Speaking Scalability Yahoo Presentation Synergy Encryption Video Games Lithium-ion battery Worker Quick Tips IaaS Search Augmented Reality Television Credit Cards Wireless Technology 5G Emoji Vendor Management Regulation Printer Autocorrect IBM HaaS The Internet of Things Avoiding Downtime Hacker Dark Data Unified Threat Management Scheduling Budget Samsung Competition Customer Relationship Management Current Events Managed Service Provider Leadership IP Address DDoS Instagram Money Computer Care Emergency Employer Employee Relationship Mobile Office

Newsletter Sign Up