How to take control of your email – part 1

How to take control of your email – part 1

Taking control of your email

These days we all struggle with the sheer volume of emails in our inboxes. Over the next few weeks we will discuss strategies to reduce this volume, starting with the Clutter tool in Outlook 2013 and 2016.

Found in Outlook 2013 and 2016 is the Clutter folder, where low priority messages are automatically sent. Outlook filters out these messages by looking at information such as the sender, whether you’ve previously corresponded with the email address and the importance of the message. It will never send emails from yourself, your management chain or your direct reports to the Clutter folder.

Similar to the Junk mail folder, you can move messages to and from the Clutter folder and Outlook will remember this for next time. This feature is enabled by default and if you wish to opt out must be manually turned off.

The Clutter folder is only available to those with an Office 365 subscription. This is one of several new features that will only be available to Office 365 users as they come online.

If you would like to upgrade to Office 2016 or Office 365, please contact us to discuss this. CyberGuru can also provide training to help you make the most of your Office environment, no matter which version of Office you use.

(Image designed by Freepik)

Use your favourite apps wherever you go

Use your favourite apps wherever you go

Use your favourite apps wherever you go

Whilst you use apps on your desktop computer, laptop and tablet, using portable apps allows you to have access the same apps when you are using offsite facilities. All you need is a suitably-sized USB drive or access or cloud storage location, such as Dropbox.

If you use shared computers in co-working spaces and training facilities, you’ll realise it not always easy (or possible) to install apps onto such computers. The way I get around this is through the use of what are known as “portable apps”.

Portable apps, available free of charge from (link opens in new window) can be downloaded and installed on portable devices such as USB or cloud drive, and which will then enable you access to programs that may be needed for your work without the need to install them again on each device you use.

Portable apps can be used on a variety of operating systems, including Windows and Mac OS X. The apps available include a range of browsers, internet tools, office programs and much more. There are over 300 apps available in the directory, which is free to use and portable across devices.

If you’d like to know more, contact us today and we can help you set this up. All you need is a portable device such as USB or cloud drive.

Don’t be an April fool – Be wary of fake technical support

Don’t be an April fool – Be wary of fake technical support

Don’t be an April fool - Be wary of fake technical support

Over the past few years, scammers claiming to be from Telstra and Microsoft technical support have been in operation. It seems that this particular scam is again doing the rounds as there have been a few cases recently that CyberGuru has become involved with to assist clients.

One client received someone claiming they were from Telstra technical support. The technical support person advised that their “IP address was hacked” and that they would need to log onto their computer to fix it. Fortunately, the client was quick to take down their phone number and say they would call on their ICT consultant (CyberGuru) to look into the matter. When they called me I looked at the phone number and determined that it was not Telstra calling them. Interestingly, the phone number was diverting from Australia to an overseas number. It is not known what this organisation was after but the client was very fortunate not to have allowed them to access the computer.

In a slightly different experience, someone who required assistance recently searched the internet for help with their computer, so they searched the internet and came across a number for a technical support organisation. The organisation then connected to their computer to fix the issues with the client’s permission. They were charged nearly the price of a new computer for the service. When I was advised by the client of the situation, I suggested taking quick action to prevent any malicious activities. I advised the client to turn off the computer until we visited to ensure that there was no access of their information, and that they speak to their bank to request a chargeback. Upon my arrival, I identified they had installed bogus software so they could access the computer remotely and removed their existing internet security and replaced it with some inferior product.

Unfortunately, increased sophistication amongst these fake technical support organisations is making it difficult to identify whether they are legitimate or not. Therefore we strongly encourage you to take down the details and then call a trusted, local ICT professional. If you think you may have been taken advantage of, it is important to act quickly to prevent any issues to take place.

If you are in need of professional technical support, contact CyberGuru.