Archives - Work from Home Tips


Maximize your window or app when screen sharing

If you’re sharing your laptop’s screen on a Zoom, Webex or Google Meet call, consider maximizing the window or app so that other participants can’t see what’s on your desktop. Also make sure to close out any unnecessary tabs that could be glimpsed during the session.

Watch out for phishing emails related to Microsoft Teams

As part of Office 365, Teams is a widely used collaboration tool. Its popularity has made it a common vector for phishing attacks. Look out for strange emails saying you’ve missed a message in Teams and containing embedded links for replying within Teams. If you’re unsure about whether you have important messages to read, open […]

Check recent activity on your Outlook.com account

Worried that someone might have accessed your Outlook.com email account? It’s easy to see where and when you (or anyone else) signed into it. Simply use the official Activity page to view all recent successful logins, plus any security challenges (such as asking for another authentication factor) for your account.

Request a single-use code for your Outlook.com account on shared computers

While it’s not advisable to sign into your personal email account on a shared machine, there are some precautions that can reduce the risk of doing so. For Outlook.com, choose to sign in with a single-use code instead of a password. You’ll need a linked mobile number to complete this process.

Look for the “trusted sender” icon in Outlook.com

If you use Outlook.com for your personal email, be sure to take advantage of its built-in phishing protections. One of the most useful is a green shield icon next to the text “This message is from a trusted sender.” Also look out for yellow (spam) and red (fraud) icons.

Watch for ransomware delivery via phishing email

Ransomware is commonly delivered through phishing emails or via “drive-by downloads.” Phishing emails often appear as though they have been sent from a legitimate organization or someone known to the victim and entice the user to click on a malicious link or open a malicious attachment. A “drive-by download” is a program that is automatically […]