Tech Tip: How to Provide Remote Support for FREE with Quick Assist • Blisstech Solutions

This Two Minute Tech Tip shows you how to view or control someone else’s screen for FREE.

As an IT managed service provider we have lots of tools we have to pay for to help us support our clients.

However, if you’ve ever been in a situation where you are trying to help someone remotely will know the frustration when you cannot understand what they are trying to explain on their screen.

Well, if you both use Windows you can remotely assist someone by viewing their screen for FREE without needing to install anything!

The feature is called Quick Assist and is a lifesaver. It will save you a lot of time and frustration when trying to help a colleague, friend or family member.

This tip will show you:

👉 How to access the Quick Assist feature BUILT-IN to Windows.
👉 What the process looks like for you, and the person you are helping.
👉 How to avoid buying a specialist solution by utilising this hidden Windows feature.

These tips will help you to:

đź’Ą Save time and frustration when helping someone remotely.
đź’Ą Quickly help someone by controlling their screen.

Thanks for watching.

More Content

A mailbox with NO SPAM written on it

Spam emails are losing your business hundreds of hours every year

Spam emails: Very annoying and everyone hates them! They take up your time and make it hard for you to get other work done! A recent study found that each one of our employees could be losing 80 hours per year due the hassle associated with managing spam. That’s a LOT...
SHOCK STAT: A third of business owners don’t trust their staff

SHOCK STAT: A third of business owners don’t trust their staff

Do you trust your employees with sensitive business data? You might be shocked to learn how many business owners don’t. But why… ? We have the answers.

Never mind “can’t teach an old dog new tricks”…

They say you can’t teach an old dog new tricks, but what happens when it’s a young pup that needs training? New research on people under 40 has revealed a scary attitude towards cyber security. We tell you more here.

Tech Tip: How to use Microsoft Teams as a phone system

Welcome to a new Tuesday tech tip video. In it, I will demo the Microsoft Teams Phone system. Microsoft Teams has become a cornerstone for collaboration, offering seamless chat and meeting experiences for millions of users worldwide. But did you know that Teams can...
Security Awareness Training Thumbnail Image

Human Error: The Achilles’ Heel of Your Cybersecurity

Small and medium-sized businesses (SMBs) are prime targets for cyberattacks, and the most vulnerable element in their defence is their workforce. Effective cybersecurity awareness training is essential for every employee across your organisation. But to implement it...

Tech Tip: How to name cells in Excel

Welcome to a new Tuesday tech tip video where I will show you how to name cells in Microsoft Excel. Naming cells can make your spreadsheets easier to understand and maintain and help you write more concise and efficient formulas. In the video, I show one way of doing...

Tech Tip: How to manage staff shifts using Teams

Welcome to a new Tuesday tech tip video where we will show you how you can manage your staff shifts from right within Microsoft Teams. The Microsoft Teams app has grown to become one of the most widely used productivity apps in the world, yet most people aren't even...
Man with magnifying glass

Cyber Essentials: A Guide to CE and its Benefits

Many people have heard of Cyber Essentials (CE), but do you know what it is and what benefits it can bring to your business? This article will discuss what cyber essentials is and how it can help your business and the role that a Cyber Essentials assessor plays in...
How to create secure passwords

How to create secure passwords

Weak passwords are one of the biggest security risks to your business.
Why?
Because cyber criminals are getting smarter than ever before. If they manage to crack just one password, they could gain access to your sensitive business data, financial information, or even gain control of your entire system.
Cyber criminals use automated tools to guess passwords, allowing them to try out millions of combinations in seconds. So, if you’re using something like “Password123” or “CompanyName2025”, you’re practically handing them the keys to your business.
A compromised password can lead to big issues, such as:
• Data breaches
• Financial losses
• Identity theft
• Reputation damage
But how do you create strong passwords without driving yourself (and your team) mad?
Think of your password like a secret recipe, where only you should know the ingredients. It should:
• Be at least 14 characters long (the longer, the better)
• Include a mix of uppercase and lowercase letters
• Contain a few numbers and symbols (like @, $, %, or &)
• Not contain any common words or easily guessable information (like birthdays, names, or the word “password”)
Instead of using a single word, you could try a passphrase – a short, random sentence that only you would understand. For example, instead of “Sailing2025”, try something like “Coffee&CloudsAreGreat9!”. This is much harder to crack, yet still easy to remember.
You should also steer clear of these common mistakes:
• Using personal info (your name, birthday, business name, etc.)
• Reusing the same passwords across multiple accounts
• Using simple sequences (“123456” or “abcdef”)
• Storing passwords in an easily accessible place (like a sticky note on your desk)
If remembering unique passwords for every account sounds impossible, there is another option: Password managers. These generate strong passwords, store them securely and autofill them for you.
With a password manager, you only need to remember one strong master password for the manager app itself. The rest are encrypted and stored safely, reducing the risk of data breaches.
Even the strongest password isn’t foolproof, which is why multi-factor authentication (MFA) is also important. MFA requires a second form of verification, like a one-time code sent to your phone or generated from an authentication app.
If you have employees accessing your business systems, it’s a good idea to have a password policy in place to explain your rules and why they’re important. This should include:
• Unique passwords for each system and account
• Regular security training on password best practices
• Business-wide use of MFA for critical systems
• Scanning for compromised passwords regularly
By making password security a priority, you can reduce the chances of a cyber attack creating a nightmare for your business.
And if you need help making your business more secure, get in touch.

Tech Tip: How to create a scheduling poll using Outlook

Welcome to a new Tuesday tech tip video where we will be exploring how to create a scheduling poll using Outlook. You know what it's like when you are trying to get everyone together for a meeting. Trying to find a time that suits everyone can be a real pain! There...
Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © 2024 Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05