4 Ways Outsourcing Support for Your IT Help Desk in Denver Helps Boost Internal Productivity

IT Help Desk in Denver: Why Outsource To An IT Services Company

The quality of your technology lifecycle and IT support are integral to the success of your business operations. Without a robust IT helpdesk function, this puts business continuity at risk. Technology challenges are inevitable and as your business evolves and grows, there is no doubt that you will be met with constant technology challenges. At first, it starts with a backlog of support requests morphing into applying patches several months later culminating in expired software licenses and redundant hardware. These small issues end up becoming a major problem that can become expensive to fix. Here are 4 ways how outsourcing support for your IT helpdesk needs will help boost internal productivity.

IT Help Desk In Denver

Outsourcing Support for Your IT Help Desk in Denver Streamlines Operations

Recent statistics show the cost of hiring in-house IT support technicians are one of the biggest challenges facing small to medium business leaders today. Apart from finding qualified individuals, an even bigger challenge is what happens if your in-house IT support personnel get sick or resign instantly disrupting workflows. Unless you employ enough people to cover the hours needed to support your operations when needed, your business could be left without any IT helpdesk expertise.

Elevate Services Group is not your typical IT consultant or traditional managed services provider. We offer scalable and secure technology solutions that support small to medium businesses in the Denver area. Outsourcing your IT helpdesk function is a viable and reliable option to support your ongoing operations. With the right partner, outsourcing will boost internal productivity allowing your business and technology professionals to concentrate on what they do best while leaving the challenges of IT support to the experts.

Trained Technicians Boost Internal Productivity

Not only do trained IT professionals boost internal productivity, but they can also help reduce any downtime that ultimately affects your bottom line. Without an adequate IT helpdesk solution, one day you will need to juggle your technology infrastructure and wiring along with business operations. The next day your customer services manager is fixing connectivity and printer issues while someone in marketing is trying to set up new workstations. Not only is this frustrating to employees, but it’s also a drag on their morale. An IT helpdesk technician can fix these issues in no time leaving your people to focus on what they are qualified to do which automatically boosts internal productivity. Elevate Services Group can free you and your employees from having to support the inevitable annoying IT issues that arise throughout the day. We provide the expertise to support any IT helpdesk requests enabling your people to continue to be productive while you concentrate on streamlining essential operations, driving sales, and reducing business expenses.

Outsourcing IT Support Reduces Costs

Downtime is expensive if caught unaware therefore a major benefit of outsourcing your helpdesk function is it reduces the costs associated with any downtime. Knowing what your fixed costs for IT support helps with the budgeting process. When your employees aren’t working to capacity, this puts your productivity to the test. Outsourcing your IT Help Desk function allows you to add consistency to IT support expenses balancing the lifecycle of hardware and software needs without incurring massive unexpected bills. For a flat fee, Elevate Services Group can not only handle all your IT support requests efficiently, but we can also help you plan your technology needs for the future.

New Technology is Adopted More Rapidly

The adoption of new technology is what gives you a sustainable competitive advantage. Outsourcing your technology needs enables faster adoption of any new technology that improves productivity. Working with us gives you access to IT professionals who keep abreast of advances in the technology world. They are also experts in backup and recovery platforms along with working knowledge of advanced security processes which are imperative to the sustainability of any business operation.

In addition to providing robust support solutions for your IT helpdesk requests, Elevate Services Group provides around-the-clock protection for your data and network. Small technology issues can have big consequences for small to medium businesses. Moving your IT helpdesk to an experienced services provider like Elevate Services Group can transform your IT service center needs from a resource-hungry irritant to a strength that positions your business for sustainable success. Call us today on 303-672-8008 or contact us via email to find out just how cost-effective and simple outsourcing your IT helpdesk function can be.

Microsoft Office Lens Lets You Scan Virtually Anything

How Microsoft Office Lens Lets You Scan Virtually Anything

As businesses move online, more of their documents become virtual. Even with the mass migration to the digital world, however, there’s still plenty of work done on paper and other real-world canvases. From sticky notes to whiteboards, important information can be crafted and presented in a physical format only to be erased or thrown out moments later. To prevent the loss of data, one would normally have to manually input it into a digital format. That is, unless they make use of Microsoft Office Lens. Learn how Microsoft Office Lens lets you scan virtually anything.

How It Works

Think of Microsoft Office Lens as a portable scanner. It’s an app for your mobile device that lets you scan a variety of different documents. Once these documents are scanned, they are saved in a digital format as an image. While its basic functionality makes it sound no different from a camera function, its extra features take the app to the next level.

With this app, any document you scan will automatically be enhanced, cleaned up, and cropped as needed to make its information easily readable and accessible. Shadows will be eliminated and images will be rotated as needed to get rid of any potential warping of the information due to odd angles. The app can even go so far as to transform images that were drawn by hand into isolated and movable objects. Every object that the app makes from any scanned information can be edited completely as well.

The Four Operational Modes

Microsoft Office Lens features four distinct modes that apply to different scenarios. Each has its own unique function, but they all work to digitize documents and images. The four modes are:

  • Photo: The standard photo mode accomplishes what you might expect from any kind of camera app. You can take pictures of people or any kind of scenery, and the app will automatically remove glares and shadows as well as crop the image to be easy to see.
  • Business card: With this mode, the app will automatically extract important information from any business card and then populate your phone’s contact information with the relevant text. This works with a variety of languages as well, which is useful if you’re dealing with non-English-speaking businesses or clients.
  • Document: The document mode is best used to clear up any text that’s difficult to read. One primary example of this would be scanning a restaurant menu. Each of the options would then be digitized and able to be edited individually.
  • Whiteboard: One of the most popular settings is the whiteboard mode. When you’re in a brainstorming session with your team and you have a whiteboard full of ideas, this mode can put all that information into a convenient digital format. Any glares from the whiteboard are also automatically removed. Keep in mind that this works for blackboards as well.

Where Do the Scans End Up?

Once you scan any kind of image using Microsoft Office Lens, where it ends up is largely up to you, as there are several options available. As you might expect, you can save the images as JPEG files, which can then be exported to OneDrive or OneNote. You can also save an image as a PDF document, as part of a PowerPoint, or as a Word document. Once the file type is established, the images can then be treated as any file would be.

With Microsoft Office Lens, you can enjoy all the benefits of having a portable scanner in your pocket. Save your notes with confidence!

Did You Really “Reply All” On That Last Email?

Office Workers Rejoice: Microsoft is Finally Subduing the Dreaded’ Reply All’

 

Do never-ending reply-all threads emails put a damper on your business chewing up precious time and resources? The good news is, Microsoft rolled out Reply-All-Storm Protection to all Microsoft Office 365 users, an update announced in 2019 that seeks to ease the email disruption to business continuity. Microsoft is finally subduing the dreaded Reply-All function. Your office workers can now rejoice! Last year, at the Microsoft Ignite conference, Microsoft announced it would work on a feature that would help prevent Reply-All email storms on Microsoft 365 Exchange email servers. Microsoft says the “Reply-All-Storm Protection” feature will block all email threads with more than 5,000 recipients that have generated more than 10 Reply-All sequences within the last 60 minutes.

 

 

The Flow On Effect of Reply-All Email Storms

 

When a Reply-All mail storm happens in your organization, it can easily disrupt business continuity. In worst-case scenarios, it can throttle the rest of your organization’s email for a significant period. Emails already drain 5 hours of worker’s time every day without having email servers slowing down or crashing. What happens if the number of recipients in an email chain is large when multiple employees hit the Reply-All button, then the ensuing event generates massive amounts of traffic that will either slow down or crash email servers. Events like this happen almost all the time sometimes because a few employees participating and amplifying Reply-All storms are using this as a prank. Microsoft itself has also fallen victim to Reply-All email storms on at least two occasions, the first in January 2019, and a second in March 2020. The Microsoft Reply-All email storms included more than 52,000 employees, who ended up clogging the company’s internal communications for hours.

 

How Reply-All Storm Protection Works

 

Reply-All Storm Protection in some ways sounds pretty simple, but there’s some pretty cool stuff going on in the cloud, that makes this possible: When Microsoft detects what looks like it might become a Reply-All storm, anyone who subsequently attempts to reply to everyone will get a Non-Delivery-Receipt (NDR) message back instead. This basically tells them to stop trying to Reply-All to the thread. Once the feature gets triggered, Exchange Online will block all replies in the email thread for the next four hours, preventing email servers from crashing or slowing down. This feature allows servers to prioritize actual emails and shut down the Reply-All storm.

 

Further Updates Expected

 

Over time, as Microsoft gathers usage telemetry and customer feedback, they expect to tweak, fine-tune, and enhance the Reply-All Storm Protection feature to make it even more valuable to a broader range of Microsoft 365 customers. Microsoft said future updates are expected as they will continue working on the functionality going forward, promising to add controls for Exchange admins so they can set their own storm detection limits. Other planned features also include Reply-All storm reports and real-time notifications to alert administrators of an ongoing email storm so that they can keep an eye on the email server’s status for possible slowdowns or crashes. “Humans still behave like humans no matter which company they work for,” the Exchange team said. “We’re already seeing the first version of the feature successfully reduce the impact of reply all storms within Microsoft.”

Microsoft Outlook: FindTime With Colleagues

 

Everything You Need to Know About Operating and Using FindTime

Scheduling meetings seems like it should be an easy task. However, anyone who does business knows with everyone’s busy schedules how difficult it can be to find a time that works for everyone who needs to attend. FindTime is an Outlook add-in that can help companies manage the task of organizing meetings that fits into everyone’s schedule. The following is everything you should know about FindTime.

 

1. What is FindTime?

FindTime is an add-in from Microsoft’s Outlook that is used to simplify the process of scheduling meetings. FindTime was first introduced in 2015. A few years later it was changed and renamed Find a Time. In 2017 FindTime was back again. With FindTime a business can eliminate wasted time playing email tag just to schedule a meeting. Microsoft made sure FindTime was as secure as possible by encrypting personal information such as email addresses. In fact, everything including email subject, the email body, and the attendees the information is sent to is encrypted.

 

2. How Does it Operate?

Invitations to vote on meeting times can be sent to a variety of email addresses. These include Yahoo, Gmail, and other providers. With the data provided by users, FindTime can quickly figure which days and times will work best. The program can find openings in each person’s schedule that will work for meetings. The individual sending out invitations can then propose several selected times for the meeting. The attendees that have received invitations will all vote on the time they want. After a meeting time is chosen, FindTime sends out a notice to each attendee.

 

3. Who Can Use It?

To use FindTime, it’s necessary for the individual or business organizing the meeting to have Microsoft 365 Apps for Business. It can also be used with an Enterprise account that has Exchange Online. It’s important to know that the recipients of meetings scheduled using FindTime do not need to have the add-in installed. If a person is sent a request by someone that has FindTime, this person can still vote on meeting times without actually having the app. In fact, they don’t even need Office 365. It’s only necessary to have an email to be a recipient.

 

4. How Does Installation Work?

Installation is incredibly easy. All a person needs is Microsoft 365 Apps for Business. It can also be installed on Exchange Online through an Enterprise account. According to Microsoft support, it’s necessary to take the following steps to install FindTime from Outlook for the web.

 

  • Open Outlook
  • Select New Message
  • Select the Ellipses Button
  • Select Get Add-ins
  • Select FindTime

 

It’s also possible to install FindTime in Outlook Desktop and from the FindTime site.

 

5. Why Does Your Company Need FindTime?

 

FindTime is easy to implement and can be used by any type of employee. Saving time and squeezing more productivity into the same 24 hours is something every organization is striving for. TechRepublic states several good reasons why a company would want to use FindTime.

 

  • FindTime is easy to use.
  • FindTime is necessary only for the individual scheduling the meeting.
  • FindTime ends the hassle of back-and-forth between those trying to schedule a meeting.
  • FindTime sets up the meeting and informs each person who is invited.
  • FindTime is part of Microsoft 365, which many people already have.

 

FindTime is an add-in that nearly any type of business, large or small, will find useful. Spending more time trying to schedule a meeting instead of actually attending the meeting will be a thing of the past with FindTime.Microsoft FindTime

Three Reasons Why Your Small Business Can Benefits from Elevate’s IT Managed Services

Small Business can Benefit from Elevate’s IT Managed Services.

Elevate is a leading IT managed service provider that specializes in providing IT managed services to corporations throughout the Denver area. As such, we have the experts, tools, and services you need to revolutionize IT operations for any business, enabling you to boost sales and profits while reducing business expenses and streamlining essential operations.

The following are three key reasons why we’re the company of choice for growing companies looking to improve their IT set-up.

IT Managed Services

We Can Meet All Your IT Needs

Recent statistics show that one of the biggest challenges growing businesses face is finding qualified individuals to hire. Thankfully, you can avoid spending long hours searching for an experienced IT technician who is familiar with your industry by partnering with our team of certified, trained experts. For a flat fee, we’ll not only handle all your current IT needs but also help you plan for the future so you can easily stay a step ahead of your competition. Alternatively, we can partner with your current IT expert if you have one to fill in the gaps that he or she is unable to attend.

We Put a Premium on Cybersecurity

IT experts are warning that businesses forced to allow their employees to work from home due to the COVID-19 pandemic are facing an uptick in cyberattacks from cyber criminals out to either steal a company’s data or hold it hostage in exchange for a ransom. Having a savvy IT network administrator who can prevent the overwhelming majority of cyberattacks is a must, and Elevate has the cutting-edge tools and personnel needed for the job. We offer endpoint security, 24/7 network monitoring services, and next-generation firewall software to keep your systems secure at all times.

Our IT Consulting Services can Ensure Your “Reopening Strategy” is a Success.

CIOs are warning companies that the world won’t be the same even after the COVID-19 pandemic passes, and they’re right. Employees who have grown accustomed to working from home may want to continue doing so, and those who return to the office will naturally want to avoid close contact with fellow employees. These changes will impact a company’s IT set-up, requiring many businesses to make changes to enable employees to do their jobs quickly, efficiently, and in a safe, healthy environment.

Our many years of experience in providing digital transformation services make us the partner of choice for any business that needs to adapt to the new work environment successfully. We’ll start by getting to know your business model and then conducting a comprehensive assessment of your IT operations. Next, we’ll make recommendations that can help you improve your IT set-up to boost efficiency while keeping costs to a minimum. Finally, we’ll supervise the implementation of your digital revolution, tweaking the plan as it goes along to enable you to upgrade your IT operations while still maintaining day-to-day operations.

Get Started with Elevate

Elevate is the number one rated network security firm in Denver, Colorado. We specialize in providing comprehensive IT managed services to corporations in the local area, enabling busy business owners to focus on business growth without worrying about IT downtime, breaches, and breakdowns. Get in touch with us at your convenience if you’d like to learn more about who we are and what we offer or schedule an appointment with our team of IT experts.

We look forward to providing the customized IT services you need to protect, adapt, and grow your business now and in the future.

Microsoft Teams Options Improve Remote Presentations

 

Microsoft Teams Options Improve Remote Presentations

 

Until the recent rollout of Microsoft Teams background customization feature, videoconferencing was a sometimes less-then-enviable communication vehicle. Users would have to tidy up the workspace, scrunch the camera to only capture their face or suffer that “lived-in” looking home office or kitchen table in the background. Aside from having the capability to see someone while talking, background distractions and disheveled spaces were significant negatives.

 

Now comes Microsoft Teams’ background customization feature that opens the door to a wealth of possibilities. Work-from-home professionals can now erase coffee mugs and laundry baskets from the video feed that didn’t necessarily convey the right message. The new feature allows Microsoft Teams users to not only improve presentations but also make them your own.

 

How To Customize Your Microsoft Teams Video Background

 

Before diving into the technical steps users will need to follow, it’s important to keep in mind that personalized background customization may only be available for scheduled meetings. The relatively new Microsoft Teams’ personal image feature could evolve to impromptu video chats down the road. For now, users should plan ahead if they want to employ anything other than the curated images. These are the necessary steps to customize your background.

 

  • Open or Join a Teams meeting
  • Click on the three dots at the screens’ bottom
  • Continue to Meetings controls
  • Click through More to Show Background Effects
  • You now have the option of selecting None, Blur, or selecting a standard Microsoft Curated Image.
  • Preview your custom background and click Apply if satisfied

 

Business and educational Microsoft Teams licenses with video conferencing up to 250 users reportedly enjoyed early rollouts. And while this background customization option certainly stands head and shoulders above real-life living spaces, there are other features and possibilities that can take remote presentations to the next level.

 

Maximize the Potential of Microsoft Teams Rooms

 

What may prove to be the game-changer for remote presenters is the wide-ranging customization tools beyond background cleanup. The rollout adds features that transcend ordinary talk to expansive visuals and futuristic information collaboration. Microsoft clearly aims to stay ahead of other applications that offer real-time video chat by delivering a few eye-catching bells and whistles. These include the following.

 

  • Whiteboards: Microsoft provides a feature that allows multiple users to collaborate on thought development by inserting notes and visuals on a virtual whiteboard.
  • Closed Captions: Microsoft video conferencing includes a feature that will enable hearing-impaired users to follow the real-time text.
  • Privacy: Groups can now create a specific channel that contains files and essential elements for unique purposes. This eliminates the need to start from scratch when leveraging digital meeting spaces.
  • DLP: Administrators gain Data Loss Prevention tools to secure sensitive information and prevent leaks.
  • Events: Microsoft 365 allows real-time events with up to 10,000 participants. This can be utilized for anything from live streaming entertainment to virtual industry conferences.

 

Taking maximum advantage of these tools delivers exponential creative presentation enhancements. Between the background customization and other tools, remote presenters will have plenty of outside-the-box ideas.

 

But the ability to upload personalized images may be the defining item. That’s primarily because niche industries sometimes have radically different ideas about what constitutes professionalism, enhancement, or is just plain cool. Now that Teams allows users to upload unique and specialized backgrounds, remote presenters can genuinely make it their own.

What You Need to Do to Protect Your Team From Coronavirus Phishing

 

How to Protect Your Business From the Surge in Phishing Websites

 

Look at the spike in phishing websites during the coronavirus. Learn how cybercriminals are leveraging the pandemic. Find out how to protect your business.  

 

As the entire world is worrying about the coronavirus, cybercriminals are taking advantage of the global crisis to line their pockets. Google reports that there has been a 350% increase in phishing websites in the last two months alone. This threat is genuine, and you need to take steps to protect yourself, your business, and your data.

 

 

What Is a Phishing Website?

 

Phishing websites are designed to steal your information, but they can work in a variety of different ways. For instance, a cybercriminal may make a website that looks like your bank site. You think the site is real so you enter your username and password, and then, the criminals have everything they need to access your account.

 

Similarly, a phishing website may look like it’s for a charity helping people with the coronavirus. Still, in fact, it’s just a scam designed to steal money and credit card information. In some cases, phishing websites download malicious files to your computer when you visit them — once executed, these files may encrypt your data until you pay a ransom, copy all your keystrokes, or steal information from your computer in other ways.

 

Rise in Phishing Websites During the Coronavirus

 

In January, Google reported that it knew of 149,000 active phishing websites. By February, the number almost doubled to 293,000. As the virus began to take hold in the United States in March, the number increased to 522,000. That’s a 350% increase since January.

 

During the coronavirus, the most significant increases in phishing sites have happened during the most stressful times. The most significant day-over-day increase occurred on March 21st, the day after New York, Illinois, and Connecticut told their residents to shelter in place. The second-biggest increase? March 11th, the day the World Health Organization declared the virus as a pandemic. Both of these days saw about a threefold increase.

 

Unfortunately, no one is immune — one survey indicates that 22% of Americans say they have been targeted by cybercrime related to COVID-19.

 

Critical Strategies for Protecting Yourself From Phishing Websites

 

To protect yourself and your business from phishing websites, you need to take a multi-pronged approach. Keep these essential practices in mind:

 

  1. Educate your employees about the risks of phishing websites. Send out a newsletter, set up a training session over videoconferencing, or find another way to talk with your employees about how to protect your business from phishing attacks.
  2. Don’t click on links in emails from unknown senders. A lot of cybercriminals use phishing emails to direct users to their sites. If the email appears to be from someone you know, double-check the sender, and consider reaching out to them directly before clicking on any links.
  3. Invest in quality cybersecurity tools that block malicious websites, prevent your computers from executing approved applications, or protect your network in other ways.
  4. Be aware of the signs of a phishing website. These may include misspelled names of companies or charity organizations or forms that ask for information you usually don’t provide. For instance, a phishing website trying to steal your bank details may ask for your username, password, and PIN, while your bank’s actual website only requests your username and password.
  5. Advise your team to be selective about the websites they visit. Ideally, if they are searching for information on the virus or trying to donate, they should go to sites that they know and trust, rather than going to unknown websites.
  6. Work with a cybersecurity specialist. They can help you safeguard your network, which ultimately protects your money, your data, your business, and your reputation.

 

To stay as safe as possible from cybercrime during the coronavirus, you need to be aware of the heightened risks. If your team is working remotely, your network is likely to be even more vulnerable than usual.

 

To get help, reach out to a cybersecurity expert. In essence, they can guide you toward the right products, scan your network for vulnerabilities, and take other measures to ensure you are as protected as possible.

IT Security in the Work-From-Home Age: A Checklist for Securing Zoom Meetings

IT Security in the Work-From-Home Age: A Checklist for Securing Zoom Meetings

As the COVID-19 pandemic continues to breed uncertainty, more and more people are being mandated to stay home. Social distancing measures mean that many workers and students are now trying to get work done from home while staying connected with colleagues using online technologies. Zoom has become one of the benchmark technologies used by teachers, students, and workers of all stripes.

While Zoom makes virtual meetings a breeze, teachers, students, and working-from-home employees in all sectors should be informed about the potential security issues they could face in this constantly-evolving ‘new normal.’ Like all virtual technologies, Zoom is not immune to security risks, but with the right tips and tricks in mind, Zoom users can be sure their meetings remain highly secured.

Secure Zoom Meetings In Denver

Why You Should Take Zoom Security Seriously

With so much uncertainty going on, adding Zoom security to your pandemic checklist may seem daunting or beyond your technological scope. However, keeping your Zoom meetings secure doesn’t have to be a highly technical or confusing task. Not to mention, making sure your virtual meetings are kept secure is a critical part of keeping business running as usual in these uncertain times.

Maintaining Zoom security is so important because unfortunately, the internet is filled with malicious actors. As more and more people make the switch to working and learning online, hackers and trolls are waiting in the wings to disrupt education and business any way they can. The last thing you need in a time like this is to have your virtual boardroom or classroom invaded by strangers with bad intentions.

Whether they aim to shut down your virtual productivity or interrupt meetings with insulting and inappropriate behavior, keeping internet trolls from ‘Zoom-bombing’ your meetings is a critically important part of protecting team participants and maintaining strong morale amidst the pandemic uncertainty.

A Fool-Proof Checklist for Maintaining Strong Zoom Security

The good news is this: protecting your Zoom meetings and participants isn’t as hard as you might think. The truth is, it’s all about being proactive and vigilant. Below we’ve created a list of easy security tips and tricks that you can deploy to ensure your Zoom meetings aren’t invaded by offensive and tech-savvy trolls and pranksters.

Here are the best ways to keep your Zoom meetings secure + appropriate:

Password-protect your meetings

The easiest way to keep trolls out of your virtual workspace is to set passwords for your meetings. Be sure to choose strategic passwords that only your team participants will know. Also, be sure to share password information privately and change them regularly to prevent hacking.

Keep meeting announcements private + internal

If you have a meeting scheduled, be sure to notify participants privately, through internal email servers or over the phone. Never announce meetings using public mediums like social media – this makes it easier for trolls to know when you’re meeting.

Monitor participant lists regularly

Whenever you have a chance be sure to review the list of participants in meetings and ensure that only authorized team members are included on the participant list.

Screen-share carefully

Screen-sharing is an important part of working collaboratively online. However, to make sure only appropriate and professional screen content is shared with participants, use the Zoom screen-sharing settings to control who can screen-share. Your best bet is only to grant screen-sharing access to those who need it and disable the function for those who don’t.

Disable the ‘Join-Before-Host’ function

By turning off the ‘Join-Before-Host’ function, you’ll ensure that only the authorized meeting organizer is in control of the meeting.

Lock your meetings

Once a meeting is underway, use the ‘Manage Participants’ control panel to lock meetings down and prevent additional participants from joining.

Keep your camera view professional

This one should go without saying, but part of keeping Zoom meetings appropriate and professional falls on your shoulders too. Be sure that nothing in your camera view is inappropriate or detrimental to a productive and secure working environment.

There’s no denying that these are uncertain and challenging times. However, around the globe, teachers, students, and workers alike are all lucky to have virtual technologies like Zoom at the ready to keep business and learning moving – even while the world stops. While security issues can be a hassle, a little proactivity and vigilance can go a long way. Stay informed and use these tips and tricks to make sure your virtual workspace is protected from risk.

COVID-19: Safety How to Clean Your Phone Effectively

How to Protect Your Phone From the Coronavirus

 

Find out how long the coronavirus can live on your phone. Learn how the coronavirus gets onto phones. Get tips on how to clean your phone or other devices. 

 

Around the world, people are taking unprecedented measures to protect themselves from the coronavirus. Schools and businesses have closed, and many people are sheltering in place, only leaving their homes for essentials.

 

While you may already be taking many of these precautions, you also need to be aware that your phone could be harboring the virus. Keep reading to learn how to protect yourself.

 

 

Can the Coronavirus Live on Your Phone?

 

Research indicates that the coronavirus can live on inanimate surfaces such as the metal or glass of a phone for up to nine days. If you’ve handed your phone to a friend to watch a video, had your phone in the vicinity of coworkers or other people, or even just held your phone after touching potentially infected surfaces, you need to clean your phone.

 

Even if your phone hasn’t been anywhere in a while, you should still clean it. This can be especially important if you are a senior or are immunocompromised or if you let your children use your phone.

 

How the Coronavirus May Get on Your Phone

 

Because people use their phones so much, they’re likely to touch their phones without even thinking about it. To illustrate, imagine you’re in a store grabbing groceries. You are very careful not to get within six feet of other shoppers and of course, you sanitize the shopping cart before use.

 

However, you end up touching items on the shelves or the credit card machine while you are paying. If someone with the coronavirus has touched these surfaces or coughed near them, these surfaces may harbor the virus.

 

After touching these surfaces, you are aware that you may have picked up some germs on your hands so you avoid touching your face until you can sanitize your hands, but you still reach for your phone to use mobile pay, check your bank balance, or to look at a text. While doing those routine tasks, you potentially put germs onto your phone.

 

In other cases, the spread of germs to your phone can be much simpler. For instance, you walk into a store, touch the door handle, and then pull out your phone. People are so used to checking their phones frequently that they are often overlooking these risks.

 

Why You Shouldn’t Touch Other People’s Phones

 

Additionally, a lot of people bring their phones into the bathroom, and the coronavirus can be transmitted by fecal matter just as easily as it spreads with droplets from your mouth.

 

To protect yourself, avoid touching other people’s phones. If you work in an industry where you have to touch people’s phones — for instance, if you work in phone repair or handle tech support for a business — you should wipe off phones or devices before touching them.

 

How to Clean Your Phone

 

Now that you see how easily these germs may get onto your phone, check out these tips for properly sanitizing your device.

 

  1. Find a sanitizing product. If you don’t have hand sanitizer, you can make a solution with 0.1% bleach or 62% to 71% ethanol and water. You can use Clorox disinfecting wipes or similar products safely on most phones, but you should not use aerosol sprays, pure bleach, or abrasive cleaners.
  2. Put the cleaner on a soft cloth. Don’t apply it directly to the phone.
  3. Wipe off the phone with the sanitizing wipe or a microfiber rag moistened with cleaner. Throw sanitizing wipes away after use, and put rags directly into the wash. Keep in mind those items may harbor germs so you want to avoid reusing them or putting them somewhere they could spread more germs.

 

The coronavirus is more contagious and significantly more deadly than the flu. People are also contagious for quite a while before they show symptoms. As a result, you need to take protective precautions very seriously, and you should make sure your phones or other devices are as clean as possible.