Out of the Box Solutions Blog

Tip of the Week: How to Deactivate Skype

Tip of the Week: How to Deactivate Skype

Not too long ago, as of this writing, Microsoft began including Skype in their PCs. As a result, they created accounts for Skype based on a user’s Microsoft account…. Surprise! Now, you may not be comfortable with the prospect of people being able to find you via Skype, which is why we’re offering some tips to hide yourself from others.

Of course, we aren’t saying that this is what you want to do, either. We just know that some who don’t use it will not want their contact information able to be found on the application. All it takes to resolve this issue are just a few switched settings. Once these are deactivated, you will not be able to be found by Skype users, preventing communications through the application.

The first thing you’ll have to do is to access Skype and log in, which might actually happen automatically. Once logged in, click the three-dot button to check your Options. The three-dot window should be in the top-left of the window.

Your next steps should be to access Settings, Contacts, and Privacy, in that order. In Privacy, you’ll have a few options to deactivate. Following the next steps will allow you to hide your account from other Skype users:

  • Switch Receive suggestions to off.
  • Switch Appear in suggestions to off.
  • Switch Appear in search results to off.
  • Where your phone number appears, switch Enabled to Disabled.

Doing so will prevent your information from appearing when another user performs a search. As a result, you’ll be insulated from an unwanted contact request.

We see protecting the data and privacy of our clients to be some of our key responsibilities here at Out of the Box Solutions. To learn more about how you can protect your business and its data, give us a call at 800-750-4OBS (4627).

Google Location Services and How They Apply to the...
A Quick Look at Professional Services Management S...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, March 23 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security User Tips Privacy Productivity Tech Term Microsoft Communication Data Efficiency Smartphones Internet Email Cybersecurity Google Hardware Mobile Devices Passwords Windows 10 IT Support Cloud Innovation Malware Browser Mobile Device Android Small Business Collaboration IT Services Business Management Communications Network Users Ransomware Wi-Fi Business Wireless Holiday Software Data Backup Applications Outsourced IT Managed IT services Workplace Tips Backup Saving Money Managed IT Services Data recovery Internet of Things Hackers Employer-Employee Relationship Hosted Solutions VoIp Marketing Cloud Computing Business Intelligence Information Social Media Networking Blockchain Computers Cortana Facebook Save Money Apps Tech Terms Gmail Bandwidth Remote Monitoring and Management Cost Management Automation Paperless Office Smartphone Access Control Microsoft Office Artificial Intelligence Analytics Virtual Assistant Password Medical IT BDR Wireless Charging Managed IT Service G Suite Remote Computing Patch Management Virtualization Computer Managed Service Mobility VPN Data Security Connectivity Data Management Office 365 Compliance HP Content Filtering Touchscreen Dongle Cryptocurrency Paper Settings Phishing Proactive IT Help Desk Operating System Company Culture Outlook Movies HIPAA Comparison Personal Information Maintenance Antivirus User Tip Technology Tips Telephony Security Cameras Cables Document Management Telecommute Microsoft Office 365 Ink IT budget Data Breach Business Continuity Managing Stress Storage E-Commerce Router Physical Security Workers Profitability Twitter Hard Drive Specifications Staff Miscellaneous Streaming Media Lead Generation Network Attached Storage Voice over IP Reporting Word Database Voice over Internet Protocol Gadgets Government Time Management PowerPoint Battery Sales Upgrade Environment Dark Web Websites Payment Internet Explorer eCommerce Laptop Millennials Amazon Eliminating Downtime Inventory Unified Communications Processors Backup and Disaster Recovery Downloads Wearables Cybercrime Digital Data loss Authentication Chrome Sports Tablet Analysis Certification e-waste Conferencing Error Safety instant Messaging Threat Online Shopping Business Technology BYOD Data Protection RAM Vulnerability Machine Learning Troubleshooting Hard Drives Trends SaaS Healthcare Tactics Spam Authorization Chrome OS IT Management Excel disposal Bring Your Own Device Office Vulnerabilities Printing Plug-In Wireless Internet Mobile Security Microsoft Teams Spyware Big Data Telecommuting Update SSD A.I. WannaCry Server Management GDPR Edge Virus Tip of the week Server Knowledge Training Value Hybrid Cloud Disaster Recovery Regulation Windows 7 Printers Alert Quick Tips Net Neutrality