Heads up: You need to update Windows 11 by this deadline

Microsoft has issued an important update: If you’re using Windows 11, you need to upgrade to version 23H2 before October 8th, 2024. After this, older versions will no longer receive essential security updates, putting your systems at risk.

Why is this important?

Because Microsoft will stop supporting older Windows 11 versions for business accounts. This includes stopping security updates, which are vital for protecting your systems against the latest cyber threats.

The latest version includes advanced security features to protect against new threats, making sure your business data remains safe. But updating to Windows 11 version 23H2 brings other benefits beyond security.

You’ll also notice performance improvements, making your systems run faster and more efficiently, which is great for productivity. Plus, new tools and features are continually added, helping streamline your workflows and improve overall efficiency. Staying updated ensures compatibility with new software and technologies, maintaining smooth business operations.

Delaying the update could leave your business vulnerable to cyber attacks. Without security updates, your systems will be exposed to potential exploits, risking data breaches and financial loss.

Microsoft typically enforces updates post-deadline to keep people safe, especially for business devices not managed by IT departments. While this is helpful, it’s better to update proactively on your own schedule.

Updating to version 23H2 is straightforward.

  • First, check your current version by going to Settings, then System, and selecting About.
  • Before updating, make sure to back up all your important files to prevent data loss.
  • Navigate to Settings, then Update & Security, and select Windows Update.
  • Click on "Check for updates" and follow the prompts to install version 23H2.
  • Once the update is complete, restart your computer and verify the new version in Settings, System, and About again.

Making sure your systems are up to date will keep your business secure and running efficiently. Don’t wait until the last minute… upgrade to Windows 11 version 23H2 now.

Keeping businesses protected and productive is our top priority. So, if you need any help with that, get in touch.


Cyber extortion: What is it and what’s the risk to your business?

Here’s a topic that’s been making headlines and causing sleepless nights for many: Cyber extortion.

Is it something that’s on your radar? It should be, because it might affect your business one day.

What is cyber extortion?

It’s a type of cyber crime where criminals threaten to harm your business by compromising its data and digital assets unless a ransom is paid. These threats often involve ransomware, a malicious software that encrypts your data, making it inaccessible until you pay the ransom.

Sometimes, cyber criminals go a step further by stealing data and threatening to release it publicly on dark web leak sites if their demands aren't met. This dual threat is known as double extortion.

According to a 2024 report, the number of victims of cyber extortion scams has skyrocketed by 77% over the past year. What’s more, small businesses are four times more likely to be targeted compared to their larger counterparts. This is a worrying trend, especially considering that smaller businesses often have fewer resources to defend against these attacks.

In the first quarter of this year alone, 1,046 businesses fell victim to double extortion. That may not seem huge, but bear in mind the actual number is likely much higher since many cases go unreported, hiding in the shadows of what experts call the "dark number."

The truth is, all businesses, regardless of size or industry, are potential targets. However, certain sectors are more frequently attacked. Manufacturing, professional, scientific, and technical services, as well as wholesale trade, top the list. Alarmingly, the healthcare and social assistance sectors are also seeing a significant rise in attacks, despite the potential societal and political repercussions.

Cyber criminals are opportunistic and strategic. They target regions with strong economic growth and shared languages. For instance, cyber extortion attacks in the US have increased by 108%.

While the rise in cyber extortion is a big worry, there are steps you can take to protect your business. Here are some key strategies:

Back up your data: Make sure you have a robust backup plan. Keep your critical data in an offline or offsite location and regularly test your backup restoration process.

Keep software updated: Make sure all your devices use the latest software, especially those connected to the internet.

Implement Multi-Factor Authentication (MFA): Strengthen your access controls with MFA. This adds an extra layer of security by requiring multiple forms of verification before access is granted (such as a code on a separate device). Also, limit user access to only the systems they need for their job.

Patch and vulnerability management: Regularly update your systems to fix any security vulnerabilities. Cyber criminals often exploit known weaknesses, so staying on top of patches can prevent many attacks.

By understanding what cyber extortion is and how it works, you can better prepare your business to defend against it. Remember, the key is to be proactive.

If we can help prepare your business and keep it safe, get in touch.


Slow PCs? Manage which applications launch at startup


Staying on top of how your technology is set up is crucial for maintaining a reliable network. And one often-overlooked aspect is managing which applications start up when your business’s PCs start up.

With lots of software wanting to auto-start, it can slow down your system and potentially introduce security risks. But did you know that Windows 11 offers a useful feature that alerts you whenever new apps are added to the startup list?

Every time you hit the power button on your PC, it loads a set of apps automatically. While some of these are essential, others might not be, and can slow down your system’s performance. Over time, as you install more software, your startup list can grow, leading to longer startup times and a slow experience.

Not only that but keeping an eye on startup apps is good security practice. Unwanted or unknown apps starting automatically can be a red flag for malicious software (malware) or other security threats. By receiving alerts about new startup apps, you can quickly identify and investigate any suspicious additions, making sure that your systems stay secure.

How do you enable these alerts in Windows 11? It’s a simple process:

  • Start by opening the Windows 11 system settings. You can do this by clicking the Start menu and selecting the gear icon or by pressing ‘Windows + I’ on your keyboard.
  • In the settings window, click on ‘System’ in the left sidebar, then select ‘Notifications’ on the right.
  • Scroll down to the bottom of the notifications page. Just above Additional settings, you’ll find ‘Startup App Notification’, which is switched off by default. Move the slider to ‘On’.

From then on, you’ll receive a notification whenever a new application is added to the startup process. You can even customize what this notification looks like by clicking on the arrow next to the slider button, allowing you to adjust its appearance and sound to suit your preferences.

Turning on these alerts brings several benefits to your business. First, it helps keep your PCs running efficiently. By staying informed about new startup apps, you can quickly disable any unnecessary software that might be slowing down your system. This means faster start times and better overall performance, allowing your team to get to work without delays.

Secondly, it enhances security. Receiving alerts for new startup apps means you can immediately investigate any unknown or suspicious additions. This proactive approach helps prevent potential security threats from taking hold, safeguarding your business data and systems.

Lastly, it’s a great way to keep track of what’s installed on your machines. With various team members possibly installing different software, these alerts give you a clear overview of what’s being added to the startup list, making sure that only approved applications are running.

To further manage startup apps, you can use Task Manager. Press ‘Ctrl + Shift + Esc’ to open Task Manager, then select the ‘Startup’ tab. Here, you’ll see a list of all the apps that start with Windows, along with their impact on boot time. You can enable or disable apps by selecting them and clicking the appropriate button at the top right.

By regularly checking this list and using the new alert feature, you can keep your startup process streamlined and your system secure.

A better answer is getting someone to set all of this up and manage it for you. We specialize in making technology easy for businesses. If we can help, get in touch.


PING, WHOOSH, or BEEP? Now you can decide with Teams

If you've ever found yourself wincing at the sound of a Microsoft Teams notification breaking your concentration, you're not alone.

Here’s some news that might be music to your ears then: Microsoft has just rolled out an update that promises to make these interruptions much more manageable. With the latest update, you can customize your notification sounds on Teams. We believe that will make it easier to stay focused and prioritize your work.

Instead of the generic "ping" that jolts you out of your workflow, you could opt for a more soothing chime or even a subtle whoosh. This might seem like a small change, but it can make a big impact on how you manage your day. Being able to differentiate between urgent alerts and less critical messages through sound can help you prioritize effectively and reduce unnecessary distractions.

For business owners like you, this update is more than just a new feature – it's a tool to enhance productivity and team efficiency. By allowing your team to customize their notification sounds, you make it easy for them to tailor their work environment to their personal needs. For instance, urgent messages from key contacts can be assigned a distinct sound that grabs attention immediately, while routine notifications can have a softer, less intrusive tone.

This kind of prioritization is essential in a busy work environment where managing time and focus is vital. It can help prevent important messages from getting lost in the noise of everyday communications and ensure that team members can respond promptly to those pressing issues without being constantly disrupted.

The business benefits of this update are clear. First, it helps create a more focused and efficient work environment. When employees aren't constantly interrupted by generic notification sounds, they can maintain their concentration for longer periods, leading to higher productivity levels.

And by enabling the muting of notifications during meetings or focused work sessions, the update makes sure that important discussions and deep work sessions go uninterrupted. This feature is particularly handy in today’s hybrid work environment, where distractions can come from multiple channels.

While the customizable notification sounds are a standout feature, Microsoft Teams offers a huge range of other benefits that make it an invaluable tool for business. It integrates smoothly with other 365 applications, providing a unified platform for all your business needs.

Whether it's collaborating on documents, scheduling meetings, or managing projects, Teams brings everything together in one place. Teams has a robust set of tools that make teamwork easier and more efficient.

If you’re not already using Teams, where have you been? Give it a try and see how it can help you streamline your workflows and communication.

We can help you customize Microsoft Teams to be perfect for your business. Get in touch.


Is that Chrome extension filled with malware?

If you use Google Chrome in your business, you’re probably familiar with extensions. These useful tools can enhance your browsing experience in countless ways, from blocking annoying ads to reducing distractions.

Extensions are incredibly popular because they can add so much functionality to your browser. But just as you need to be careful when installing new apps on your phone, you must also be cautious when adding new extensions to your browser. That’s because they come with a risk of malware.

It’s short for malicious software – that’s any software intentionally designed to cause damage to a computer, server, or network. Cyber criminals use malware to steal data, hijack systems, and even empty your bank accounts.

Google Chrome holds about 65% of the browser market share worldwide, making it the most popular browser by far. This popularity makes Chrome a prime target for cyber criminals. While cyber attacks sometimes exploit vulnerabilities in the browser itself, there’s an easier way to target Chrome users: Through malicious extensions containing malware.

Although Google keeps a tight watch on its Chrome Web Store, the risk is still there. A recent report claims 280 million people installed a malware-infected Chrome extension between July 2020 and February 2023. That’s a huge number and highlights the importance of being vigilant.

Surprisingly, many malicious extensions remained available for download on the Chrome Web Store for a long time. On average, malware-filled extensions stayed up for 380 days, while those with vulnerable code were available for about 1,248 days. One particularly notorious extension was downloadable for 8 and a half years before being removed.

So, how can you protect yourself and your business from these malicious extensions? Here are five steps we recommend.

1. External reviews: Since checking ratings and reviews on the Chrome Web Store isn’t always reliable (many malicious extensions don’t have reviews), look for external reviews from trusted tech sites to judge whether an extension is safe.

2. Permissions: Be cautious if an extension asks for more permissions than it should. If a new extension requests extensive access to your data or system, this could be a red flag.

3. Security software: Use robust software to catch malware before it can do any harm. This is your last line of defense if you accidentally install a malicious extension.

4. Necessity: Before installing any new software or browser extensions, consider whether you really need it. Often, you can achieve the same functionality visiting a website.

5. Trusted sources: Only install extensions from trusted sources or well-known software providers. This significantly reduces the risk of downloading a harmful extension.

Chrome is the most popular browser, which means it will always be a target for cyber criminals. Google’s security team works hard to review every Chrome extension to ensure they are safe, but it’s still crucial to be vigilant.

If you’re unsure whether your extensions are safe or not, or you’d like more advice around keeping your business secure, our team can help. Get in touch.


Protect your business from a data leak with Microsoft Edge

Microsoft Edge for Business has just rolled out new data leak control capabilities. And that could be a good thing for keeping your sensitive info safe.

What are data leak control capabilities?

In plain English, they help prevent your sensitive information from getting out to the wrong people. Think of it as having an extra lock on your digital doors, making sure only the right people can access your important data.

Every business handles sensitive information, whether it’s financial records, client details, or proprietary data. If this information leaks, it could mean big trouble: Financial loss, legal headaches, and a hit to your reputation.

This new feature in Microsoft Edge helps keep your data secure by making sure only authorized people can access it. It also stops accidental sharing.

Depending on your industry, you may have strict rules about data protection. These new controls can help you stay on the right side of regulations.

And let’s not forget your customers. They’re more aware than ever about data privacy. Using a browser with strong data leak controls shows you’re serious about protecting their information, which can boost their trust in your business.

Microsoft Edge for Business has added this new feature into an easy-to-use package. You can set policies on how data can be shared – like stopping certain types of data from being copied or emailed to unauthorized recipients. This way, you’re less likely to have accidental leaks.

It uses artificial intelligence to spot potential threats and unusual data movements. Edge can alert you to a potential leak before it happens, giving you a chance to act proactively.

If you’re already using other Microsoft products like 365 or Microsoft Teams, good news: Edge for Business integrates smoothly with them, letting you apply consistent data protection across all your tools.

Ready to give it a spin? Here’s what to do:

1. Update your browser: Make sure all your business’s devices are using the latest version of Microsoft Edge for Business. This makes sure you have all the newest features and security updates.

2. Set your policies: Work with your IT support partner to set up data sharing policies that make sense for your business. Microsoft provides guidelines and templates to help you get started.

3. Train your team: Make sure your employees know about the importance of data security and how to use the new features. A quick training session can do the trick.

4. Monitor and adjust: Keep an eye on how things are working and tweak your policies as needed. You want to find a balance that keeps your data secure without disrupting your workflow.

Better still, why not get our team to just do this for you. Get in touch.


Ransomware threats are surging – here’s how to protect your business

Imagine waking up one morning, turning on your computer, and finding that all your important files – everything from customer data to financial records – are locked. Tight.

And then a scary message pops up demanding a ransom fee to unlock them.

That’s ransomware in a nutshell. It’s a type of malicious software that hijacks your data and holds it for ransom.

It usually starts with an innocent-looking email or link. You might get an email that seems legitimate, asking you to click on a link or open an attachment.

This is known as a phishing email, where the sender appears to be genuine but isn’t. Once you click, malicious software is silently installed on your system. From there, the cyber criminals quickly go to work.

They’ll be encrypting your files so you can’t access them. Then, you get that dreaded ransom note, demanding payment in exchange for a decryption key to unlock your files. Paying the ransom is a risky move because there’s no guarantee you’ll get your data back, and it just encourages the attackers to target more victims.

2023 was a particularly bad year for ransomware, with attacks surging after a two-year decline. According to a report, there was a huge increase in ransomware incidents, breaking a six-year record.

One reason for this spike is the rise of something called Ransomware-as-a-Service (RaaS). This model lets cyber criminals "rent" ransomware tools, making it easier than ever for them to launch attacks.

As a result, more businesses are finding themselves posted on data leak sites, with a 75% increase in the number of victims between 2022 and 2023.

Ouch.

And it gets worse. Attackers are getting smarter. They’re developing new variants of old ransomware, sharing resources, and using legitimate tools for malicious purposes.

They’re also working faster, often deploying ransomware within 48 hours of gaining access to a network. And they tend to strike outside of work hours, such as when you’re tucked up in your bed, so they’re less likely to be noticed.

If your business falls victim to a ransomware attack, the consequences can be devastating. You might face significant financial losses, not just from the ransom itself but also from the cost of downtime and recovery.

There’s also the risk of losing critical data if you can’t decrypt your files.

Your reputation could take a hit if customers find out their information was compromised. Oh, and your business operations could be severely disrupted, affecting your ability to serve your clients.

The most important question then: How can you protect your business from this growing threat?

  • Start by educating your team. Make sure everyone knows how to spot phishing emails and avoid suspicious links and attachments
  • Regularly back up your critical data and securely store those backups offline
  • Keep your software and systems up to date with the latest security patches, and invest in strong security tools
  • It’s also important to limit access to your data. Only give employees access to the information they need for their jobs
  • Monitor your network for unusual activity and have a plan in place to respond to incidents quickly

If you do get hit by a ransomware attack, don’t panic. Work with cyber security experts (like us) to resolve the issue.

Remember, it’s best not to pay the ransom, as it only fuels the cyber criminals’ activities.

My team and I help businesses take proactive action to protect their data. If we can help you, get in touch.


Are your employees reporting security issues fast enough… or even at all?

Getting your team to report security issues quickly is something that’s important for your business… but maybe something that might not have crossed your mind before.

You might think that with so many security tech tools, you're covered. But guess what? Your employees are your first line of defense, and they’re irreplaceable when it comes to spotting and reporting security threats.

Imagine this: One of your employees receives a fishy-looking email that appears to be from a trusted supplier. It's a classic phishing attempt (that’s where a cyber criminal sends an email and pretends to be someone else to steal your data).

If the employee brushes it off or thinks someone else will handle it, that innocent-looking email could lead to a massive data breach, potentially costing your company big bucks.

The truth is, less than 10% of employees report phishing emails to their security teams. That's shockingly low. Why? Well:

· They might not realize how important it is
· They're scared of getting into trouble if they're wrong
· Or they think it's someone else’s job

Plus, if they've been shamed for security mistakes before, they're even less likely to speak up.

One of the biggest reasons employees don't report security issues is that they just don’t get it. They might not know what a security threat looks like or why reporting it is crucial. This is where education comes in, but not the boring, jargon-filled kind.

Think of cyber security training as an engaging and interactive experience. Use real-life examples and scenarios to show how a small issue can snowball into a major problem if not reported.

Simulate phishing attacks and demonstrate the potential fallout. Make it clear that everyone has a vital role in keeping the company safe. When employees understand their actions can prevent a disaster, they'll be more motivated to report anything suspicious.

Even if your employees want to report an issue, a complicated reporting process can stop them in their tracks. Make sure your reporting process is as simple and straightforward as possible. Think easy-access buttons or quick links on your company’s intranet.

Make sure everyone knows how to report an issue. Regular reminders and clear instructions can go a long way. And when someone does report something, give them immediate feedback. A simple thank you or acknowledgment can reinforce their behavior and show them that their efforts matter.

It’s all about creating a culture where reporting security issues is seen as a positive action. If employees feel they’ll be judged or punished, they’ll keep quiet. Leaders in your company need to set the tone by being open about their own experiences with reporting issues. When the big boss talks openly about security, it encourages everyone else to do the same.

You could even consider appointing security champions within different departments. These are your go-to people for their peers, offering support and making the reporting process less intimidating. Keep security a regular topic of conversation so it stays fresh in everyone's minds.

Also, celebrate the learning opportunities that come from reported incidents. Share success stories where reporting helped avoid a disaster. This not only educates but also motivates your team to keep their eyes open and speak up.

By making it easy and rewarding for your employees to report security issues, you're not just protecting your business; you're also building a more engaged and proactive workforce.

Encourage open communication, continuous learning, and avoid shaming anyone for their mistakes. The faster issues are reported, the easier and cheaper they are to fix, keeping your business secure and thriving.

This is something we regularly help businesses with. If we can help you too, get in touch.


Now Copilot’s going to make your team work better together

Have you heard about Team Copilot yet? It’s the latest addition to Microsoft's suite of AI tools and should be available later this year.

Think of Team Copilot as an advanced, AI-powered assistant designed to help your team work better together. While Microsoft’s 365 Copilot has been a personal assistant for individual tasks like drafting emails or recapping missed meetings, Team Copilot takes it to the next level by focusing on group activities.

There are three main ways Team Copilot can help your team:

1. Meeting facilitator
During a Teams video call, Team Copilot can take notes that everyone in the meeting can see and edit. It can also create follow-up tasks, track time for each agenda item, and assist with in-person or hybrid meetings when used with Teams Rooms.

2. Group text chat assistant
In group text chats within Teams, Copilot can summarize lengthy conversations to highlight the most important information. It can also answer questions from the group, making it easier to stay on track and informed without wading through pages (and pages and pages) of chat history.

3. Project manager
Team Copilot can help manage projects by creating tasks and goals within Microsoft’s Planner app. It can assign these tasks to team members and even complete some tasks itself, like drafting a blog post. It will notify team members when their input is needed.

You know that productivity isn't just about individual work. It’s also about effective teamwork. So, by helping with group-oriented tasks, Team Copilot can make big improvements to your overall productivity.

It’s important to note that while Team Copilot is incredibly helpful, it doesn’t replace the role of a human meeting facilitator. It won’t lead meetings or ensure inclusivity, but it will create agendas, track time, take notes, and share files.

It’s more of a business insights assistant, helping with group interactions and meetings rather than censoring comments or keeping people in line. But hey, who knows what’s to come in future!

Team Copilot will be available in preview later this year for Microsoft 365 customers with a Copilot subscription. While it’s a work in progress, the potential it has to transform team productivity is huge.

Keep an eye out for its release and think about how it could fit into your workflow to boost your team’s productivity.

If you have any questions or need further assistance in understanding how Copilot can benefit your business, get in touch.


More businesses are proactively investing in cyber security defenses

More and more businesses are making the smart decision to be proactive and invest in their cyber security defenses. This is fantastic news, especially since stats show that about half of SMBs still have no cyber security measures at all.

If your business falls into that category, it’s time to change.

Cyber security might sound complex, but it starts with a few simple steps. Let’s talk about some basics you can put in place right away.

First, think about encryption and multi-factor authentication (MFA). Encryption is like putting your data in a secure vault. It ensures that even if someone intercepts your information, they can't read it without the encryption key.

MFA adds an extra layer of security by requiring you to verify your identity using a second device, like your phone, whenever you log in. It’s a bit like needing two keys to open a lock instead of just one.

Another easy step is using a password manager. These generate long, random passwords for every account and remember them for you. Password managers make life easier and your business more secure in one package. Amazing.

Advanced monitoring tools are another great way to protect your business. They’re a little like security cameras for your digital space, always on the lookout for anything suspicious. These tools help detect unusual activity in your systems, giving you a heads-up if something’s not right.

And let’s not forget about protecting your business from phishing scams. These are attempts by criminals to trick you into giving away personal information by pretending to be someone you trust, like a supplier or a bank. Educating your team on how to spot these scams is crucial. If something feels off, it probably is.

Why is investing in cyber security so important?

· It protects your data
· Avoids financial loss
· And builds trust with your customers and partners

Your business data is valuable, and protecting it means safeguarding your business's operations and reputation.

Cyber attacks can be costly, not just in terms of money but also time and resources. Prevention is ALWAYS cheaper than dealing with the aftermath of a breach. Plus, showing that you take security seriously helps build trust with your customers and partners. They need to know that their information is safe with you.

Investing in cyber security doesn’t have to be daunting. We’re the experts in this field and would love to help you secure your business. Whether you need advice on getting started or want a comprehensive security plan, get in touch.


You might hold the secret to data security in your finger

We all know how important it is to keep our data safe, whether it's our business secrets or just personal info. Passwords used to be the number one way to keep things under wraps.

But are they still cutting it today?

According to a recent report, it seems many people are sticking to their guns when it comes to passwords, with only a small fraction opting for biometrics like fingerprints. But why the hesitation? It seems like everyone's got data privacy and security on their minds, and that's totally fair.

So, what exactly are biometrics, and why should we consider them as a more secure alternative to passwords?

Biometrics are all about using your unique physical or behavioral traits – like your fingerprints, face, or even your eye scan – to prove it's really you. Unlike passwords, which can be forgotten, stolen, or cracked, biometrics bring a whole new level of security to the table.

Sure, there's still some worry about biometric data getting into the wrong hands. But don't worry too much. It's rare and takes a lot of effort and know-how.

Biometrics are still a solid weapon in the fight against cyber threats. They're not only harder to copy than passwords but also offer unparalleled convenience. No more struggling to remember a jumbled mess of letters and numbers… just a quick scan of your fingerprint or face, and you're good to go.

But what if you're not sold on biometrics just yet?

There’s an alternative: Passkeys.

These clever authentication methods offer another option to the old-school password. Passkeys use special codes unique to each person and are tough to phish (that's when someone tries to trick you into giving away your login credentials).

By mixing biometrics with passkeys, you can make a big enhancement to your business’s security without making your staff’s lives harder (in fact most people find biometrics and passkeys easier).

Passwords may have served us well in the past, but it's time to embrace new, safer methods of authentication.

Need a hand implementing biometrics or passkeys? We can help – get in touch.


Say goodbye to video call pop-ups (and Teams meeting blushes)

Picture this: You're on an important video call with a client, confidently presenting your latest project updates.

Suddenly, a notification pops up on your screen from your significant other, reminding you (not so discreetly) about the damage your child did during their temper tantrum this morning. Or worse, a message from your gym reminding you of your long absence.

Embarrassing, right?

We all know the struggle of trying to maintain professionalism during video calls while secretly battling the fear of embarrassing pop-ups stealing the show. But Microsoft is on it. They're reportedly working on a much-needed feature that could save us all from these cringeworthy moments.

Imagine being able to hide specific apps entirely while you're on a Teams call. No more worrying about intrusive notifications stealing your thunder. This means you can say goodbye to awkward interruptions from messaging apps, or reminders that you'd rather keep private.

How does it work? According to reports, Microsoft's new feature won't just minimize apps to the taskbar like the current workaround. Instead, it'll completely hide them from sight, sparing you from any unexpected surprises (and blushes).

And the best part? It's not just about saving face. This feature could also help boost your device's performance. By keeping those apps in the background, you free up valuable computing power and resources.

If you've ever found yourself frantically closing apps and browser windows to ensure a smooth video stream, this could be the end of that struggle. With the new feature, you can focus on what truly matters during your calls without worrying about technical hiccups or embarrassing distractions.

While we're excited about the potential of this new feature, we'll have to wait and see if it becomes a reality. We'll be keeping a close eye on the official Microsoft 365 roadmap for any updates and will keep you informed.

In the meantime, if we can help make your business’s video calls run more smoothly, get in touch.