Install MyGlue extension in Microsoft Edge

Open your Edge browser window and click the ellipsis at the top-right corner of the browser window. Then, click Extensions. On the Extensions page, click the Allow extensions from other stores toggle switch. A pop-up window will appear confirming this action. Click Allow. You will be directed back to the Extensions page...

Managing mailbox rules in Outlook

Rules allow you to move, flag, and respond to email messages automatically. You can also use rules to play sounds, move messages to folders to folders, or display new item alerts. Manage rules in Outlook desktop app How to create rules from a folder...

Protect yourself from phishing

Phishing is an attack that attempts to steal your banking or personal information by getting you to reveal on websites that pretend to be legitimate. Cybercriminals usually pretend to be reputable companies, friends, or acquaintances in a fake message, which contains a link to...

How to join a Teams meeting

With the current COVID-19 situation, most of us are working from home. This is why Google Meet, Zoom, and Microsoft Teams became popular to conduct meetings online. In this article, we will then provide step-by-step procedures and ways on how to join Teams meeting....

How to open a shared calendar in Outlook

Once you’re added as a member of a shared mailbox, you will also have access to the shared calendar. Here’s how you can access shared calendar in Outlook: Launch Outlook then click Calendar. Under Home tab, click Open Calendar (or Add Calendar) Click Open...

How to export and save Chrome bookmarks

Bookmarks help you save a web page on a particular web browser so you can access it quickly at a later stage. In this article, we will provide a step-by-step guide on how to export and save bookmarks through Chrome. Steps on how to...

How to use ThreatLocker

What is ThreatLocker ThreatLocker is a security program its role is to block unapproved applications, extensions and scripts from running on a protected computer. ThreatLocker also will block access to unapproved External Storage devices. These security measures help protect computers and environments by restricting...