Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Tip of the Week: Visiting Useful Windows 10 Features

Tip of the Week: Visiting Useful Windows 10 Features

Windows 10 isn’t just a great operating system for getting things done--it’s also jam-packed with features that you might not even have known about. This week’s tip is all about some of the handy features that Windows 10 can provide for your office.

Defending Against Ransomware
Even if the best approach to ransomware is proactively backing up data and staying informed about new developments, Windows 10 offers an additional approach that is built right into the operating system. One example of this is how you can use the Controlled Folder Access function. This feature can make it easier to keep “unfriendly applications” from making “unauthorized changes.”

By default, this protects the Documents, Desktop, Pictures, and Movies folders, and you can assign it to do the same for others, as well as whitelist specific apps. To do so, navigate through the following selections: Windows Security App > Virus & threat protection > Manage ransomware protection.

Dynamic Lock
If your organization has a Bring Your Own Device policy, or you have a company-issued device, you can have your desktop lock automatically if the phone (which is on your person) physically moves too far from the unlocked workstation. You can set up Dynamic Lock by first letting your devices communicate with each other. This connection can be done by following Control Panel > Hardware and Sound > Devices and Printers. Next, you’ll have to go through Settings > Account > Sign-in Options.

Creating Start Menu Folders
If there are too many Live Tiles on your screen whenever you click on the Start menu, Windows 10 gives you the option to drag them over each other to place them in folders. These folders will expand when you click on them. Once you have the folders open, you can assign them names.

Scheduled Restarts
Installing updates comes with a major annoyance to some users: restarting the computer. Windows 10 allows users to schedule the restarts for these updates so that they take place automatically. To do this, you can set your computer to wait until you’re all set with your device. To do so, navigate to Settings > Updates and Recovery > Windows Update > Restart options.

This is only a bite-sized glance at what Windows 10 can do for your business. To learn more, reach out to us at (415) 295-4898.

Can You Stay Productive In the Face of Constant Di...
Developers Are Building Blockchain-Based App for H...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, February 16 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Productivity Data Backup Privacy Business Computing Hosted Solutions Email Tech Term Malware Cloud Software Data Recovery Outsourced IT Network Security Data Hackers Business IT Support Small Business Cloud Computing Internet Managed IT Services IT Services Innovation Business Management Ransomware Mobile Devices Computer Paperless Office Google User Tips Vulnerability Encryption Android Managed Service Provider Hardware Efficiency Windows 10 VoIp Internet of Things Managed IT services Artificial Intelligence Remote Monitoring Data Management Business Continuity Managed IT Applications Smartphones Backup Holiday Browser Collaboration Government Document Management Bandwidth Smartphone Microsoft Phishing Project Management Tip of the week Healthcare Passwords Office 365 Upgrade Scam Server Antivirus Employer-Employee Relationship Information Wi-Fi Save Money Workplace Tips BYOD Website Communication Vendor Management Two-factor Authentication Disaster Recovery IT Management Compliance Blockchain Communications Infrastructure BDR Customer Relationship Management Saving Money Cybersecurity Social Media Managed Service Router Data Security Mobile Device Unified Threat Management Quick Tips Word Machine Learning Patch Management Remote Monitoring and Management Mobile Security Unified Communications Data Loss Automation Server Management Business Technology Employees Alert Redundancy Maintenance The Internet of Things Gmail Company Culture VPN Assessment Software as a Service Network Management IoT Regulations Network Remote Workers Management Tablet Files Access Control Internet Exlporer Facebook Virtual Private Network Microsoft Office Smart Technology Chrome Storage HIPAA Bring Your Own Device Mail Merge User Error Screen Reader Monitoring Statistics Electronic Medical Records Superfish Firewall Identity Meetings Data Breach Modem OneNote Servers High-Speed Internet Permission Comparison Licensing Remote Computing Help Desk Remote Worker G Suite Authorization Professional Services Downloads Technology Tips Tech Support Features Mobility Financial Data Warehousing Flexibility Address WiFi Legislation Smart Tech Bluetooth Operating System Distributed Denial of Service Recovery Mobile Politics How To Development Test Specifications Recycling Office Private Cloud Motherboard WPA3 Chromebook Virtual Assistant Digital Payment Hotspot IT Technicians Cost Management Electronic Health Records Procurement Techology Operations Connectivity Consulting Downtime Managed IT Service Instant Messaging Technology Laws Risk Management Avoiding Downtime Cookies Employee-Employer Relationship Websites Cables Black Friday Cooperation Migration eWaste Bookmarks ROI Fleet Tracking Vulnerabilities Zero-Day Threat Emergency Multi-Factor Security Mouse Language Cyberattacks Social Outlook Disaster Resistance Money Printer Net Neutrality Managed Services Provider Mobile Device Management Networking Break Fix Users Managing Stress Customer Service Unified Threat Management Permissions Nanotechnology SaaS Wires Wireless Search Cyber Monday Staff Chatbots Consultation Favorites Apps Microsoft Excel Mobile Computing Asset Tracking File Sharing Backup and Disaster Recovery Computing Infrastructure Mirgation Hard Drive Read Only Security Cameras Shortcut Proactive IT Notes Wearable Technology Touchscreen Star Wars Point of Sale Hacking Tech Terms Dark Web Augmented Reality Spam MSP Enterprise Content Management Finance Google Calendar Fraud Time Management App RMM Lenovo Identity Theft Enterprise Resource Planning Conferencing Heating/Cooling Geography Human Error Samsung Computing Alerts Cache Printing Windows IT Consulting PowerPoint SharePoint Travel Utility Computing E-Commerce Trending Theft Analytics Virtual Reality Social Networking Proactive Authentication Marketing Gadgets Regulation Wasting Time Twitter Printers

Latest Blog

Late in the summer this past year there were several articles written about how Google would continue to track the location of a person’s smartphone after they had chosen to turn their location settings off. A Princeton researcher corroborated those claims for the Associated...

Latest News

415 IT is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for ...