301-571-5040    Get SUPPORT

Washington Works Blog

Tip of the Week: Visiting Useful Windows 10 Features

Tip of the Week: Visiting Useful Windows 10 Features

Windows 10 isn’t just a great operating system for getting things done--it’s also jam-packed with features that you might not even have known about. This week’s tip is all about some of the handy features that Windows 10 can provide for your office.

Defending Against Ransomware
Even if the best approach to ransomware is proactively backing up data and staying informed about new developments, Windows 10 offers an additional approach that is built right into the operating system. One example of this is how you can use the Controlled Folder Access function. This feature can make it easier to keep “unfriendly applications” from making “unauthorized changes.”

By default, this protects the Documents, Desktop, Pictures, and Movies folders, and you can assign it to do the same for others, as well as whitelist specific apps. To do so, navigate through the following selections: Windows Security App > Virus & threat protection > Manage ransomware protection.

Dynamic Lock
If your organization has a Bring Your Own Device policy, or you have a company-issued device, you can have your desktop lock automatically if the phone (which is on your person) physically moves too far from the unlocked workstation. You can set up Dynamic Lock by first letting your devices communicate with each other. This connection can be done by following Control Panel > Hardware and Sound > Devices and Printers. Next, you’ll have to go through Settings > Account > Sign-in Options.

Creating Start Menu Folders
If there are too many Live Tiles on your screen whenever you click on the Start menu, Windows 10 gives you the option to drag them over each other to place them in folders. These folders will expand when you click on them. Once you have the folders open, you can assign them names.

Scheduled Restarts
Installing updates comes with a major annoyance to some users: restarting the computer. Windows 10 allows users to schedule the restarts for these updates so that they take place automatically. To do this, you can set your computer to wait until you’re all set with your device. To do so, navigate to Settings > Updates and Recovery > Windows Update > Restart options.

This is only a bite-sized glance at what Windows 10 can do for your business. To learn more, reach out to us at 301-571-5040.

Can You Stay Productive In the Face of Constant Di...
Developers Are Building Blockchain-Based App for H...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, February 18 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Productivity Malware Hackers Email Software Business Network Security Tech Term Hosted Solutions Internet Computer Data Mobile Devices Data Backup Ransomware Backup Google User Tips Managed IT Services IT Support Efficiency Data Recovery Innovation Cloud Computing Microsoft Productivity Outsourced IT Hardware Small Business Paperless Office IT Services Smartphone Business Management Managed Service Provider Collaboration Android Office 365 Business Continuity Social Media Encryption Workplace Tips Browser Remote Monitoring Windows 10 Smartphones Windows 10 Data Management Save Money Managed IT Services Communication Government Holiday Employer-Employee Relationship Phishing Server Disaster Recovery Bandwidth Apps Healthcare Artificial Intelligence BYOD Unified Threat Management Upgrade BDR Work/Life Balance Facebook Document Management Infrastructure Internet of Things Tip of the week Communications Scam VoIP Antivirus Wi-Fi Vulnerability IT Management Passwords Cybersecurity Information App Quick Tips Maintenance Hosted Solution Word Customer Relationship Management Office Big Data Password Politics Chrome Applications File Sharing Saving Money Money Chromebook Virtual Reality Automation Vendor Management Compliance Risk Management Windows Two-factor Authentication Blockchain How To Network Mobile Device Managed Service SaaS Telephone Systems Electronic Medical Records VPN Physical Security Twitter Data Security G Suite Hacker Computing Microsoft Office Business Technology Server Management Professional Services Firewall Private Cloud Computer Care Access Control HIPAA Virtual Private Network Robot Taxes Management Downtime Website Social Mobile Security Recovery Training Remote Computing Smart Technology Websites Tablet Bring Your Own Device Meetings Wireless Router Remote Monitoring and Management Botnet Mobile Device Management Patch Management Employees Alert Remote Workers Automobile Health Machine Learning Data loss Gmail Company Culture Regulations Identity Theft Samsung Point of Sale Tech Support IoT How To Storage Managing Stress Help Desk Travel IBM Break Fix Network Management Cookies Fleet Tracking Operating System Relocation Cleaning Security Cameras Printer YouTube Wearable Technology The Internet of Things Black Friday Social Networking Personal Information Backup and Disaster Recovery Alerts Managed IT Electronic Health Records Supercomputer Analytics Chatbots High-Speed Internet Finance Gadgets Budget Fraud Star Wars Update Monitoring GPS Virtual Assistant Legislation Enterprise Content Management Bookmarks Motion Sickness IT Support Dark Web Touchscreen Nanotechnology Legal Asset Tracking Tech Terms Printing Settings IT Budget Cyber Monday Google Drive Motherboard MSP Human Error Corporate Profile Licensing Outlook Cyberattacks Mouse Identity Lenovo Notifications Development Authentication Web Server Users Solid State Drive Statistics Cost Management USB Consulting Office Tips Tracking Software as a Service Unified Communications Favorites Cabling Customer Service Microsoft Excel Screen Reader Sports OneNote Theft Error Remote Worker SharePoint Digital Mail Merge IT Solutions Digital Payment VoIP Techology Computer Repair Proactive Permission IT Consultant WannaCry Cooperation Shortcut Virtualization Enterprise Resource Planning Files Firefox Superfish Cables Authorization Cameras Hard Disk Drive Hotspot Bluetooth Assessment Dongle Managed Services Provider Wasting Time Processors Project Management Spam Smart Tech Search Employee-Employer Relationship Staffing ROI Downloads Spyware IT Technicians Address Upgrades Cybercrime Distributed Denial of Service Avoiding Downtime Test Financial Unified Threat Management Monitors Staff Mobile Read Only Comparison Wires Law Enforcement CCTV Language Internet Exlporer Service Level Agreement E-Commerce Administrator Vulnerabilities Conferencing Webcam Disaster Heating/Cooling Connectivity Notes Multi-Factor Security Mirgation Managed IT Service Time Management Modem WPA3 RMM Education Procurement User Error Cortana Black Market Specifications Augmented Reality Networking Crowdsourcing Zero-Day Threat Gadget Computing Infrastructure Value Emoji Utility Computing Features Geography Instant Messaging Uninterrupted Power Supply Permissions Servers WiFi PowerPoint Google Calendar Safety Regulation Marketing Hiring/Firing Fun Competition IP Address Miscellaneous Mobile Office Domains Hard Drives Public Speaking Presentation CrashOverride Printers Lithium-ion battery Wireless Technology 5G Emergency