Tech Tip: How to use browser profiles • Blisstech Solutions

This Tech Tip is on how to use web browser profiles.

If you are a freelancer, virtual assistant, or just wear many hats in your job role, you probably have multiple different logins for the same application.

As so many applications are web-based, we have to login to them with a web browser, and if you have multiple logins for the same application, it can get VERY MESSY!

This is no more true than for Microsoft 365 and it can be tricky sometimes to know which account you are using. If you struggle with this, you should start to use separate browser profiles to keep your logins separate from each other.

Although this tip is focused on Microsoft 365, you can apply the same principle for Google, Hubspot or any other application you use through a web browser.

Well, this week’s tip will show you:
👉 How to create a new browser profile
👉 How to configure this profile to automatically log you into Microsoft 365
👉 How to change the appearance of your profile so you can see, at a glance, which profile you are using

Today’s tip will help you to:
đź’Ą Simplify the process of working with multiple logins
đź’Ą Stop the confusion over which account you are logged in as
đź’Ą Keep your logins separated while speeding up switching between accounts

We hope you enjoy it. To learn more you can subscribe to our newsletter.

Feel free to get in touch if you want to know more.

More Content

Charging in public places? Watch out for “juice jacking”

Airports, hotels, cafĂ©s, even shopping centres, offer public charging points where you can boost your phone or laptop battery on the go. They’ve been in the news after the FBI recently tweeted advice to stop using them. Crooks have figured out how to hijack USB ports to install malware and monitoring software onto devices as they charge. The security risk …
Read More

Security essentials: How to stop spam before it stops your business

Is your inbox already full of junk before you’ve even had your first coffee? Most people just sigh, delete, and move on. But what if one of those “junk” emails wasn’t just annoying… but dangerous? Spam has evolved. Today it’s one of the easiest ways for cyber...

Tech Tip: How to Tidy up Copied Data in Excel

This Tuesday Two Minute Tech-tip shows you how to tidy up data in Excel spreadsheets. Do you have data in a messy format and need to change it so it is organised? Have you ever received data in Excel or in a text file or Word document and wanted to change it from rows...

Tech Tip: How to create a transcript using Word

Welcome to another Blisstech Solutions Tuesday Tech Tip! Are you tired of rewinding and pausing video or audio content just to jot down notes? Say goodbye to that tedious process and hello to a more efficient solution. In this tech tip video, we'll show you how to...
Power Automate and Flows Thumbnail

Tech Tip: What is Microsoft Power Automate?

Welcome to a new Tuesday tech tip video where I will give you a quick introduction to Microsoft Power Automate. We all want to streamline our work life and make ourselves more productive. Well, if you use Microsoft 365, you can do just that by using Power Automate....

Tech Tip: Using Microsoft Teams Keyboard Shortcuts

Microsoft Teams is a great productivity tool. It has many features that can help you be more productive and speed up repetitive tasks. One way to be even more productive with Microsoft Teams is to use the shortcut keys. The shortcut keys can help you quickly access...
HRMC Crown

The tax relief few businesses know about

A quick summary: When you buy certain new equipment (including computers) you can claim 130% capital allowance What that means: If you spend ÂŁ1,000 on computer equipment, it'll reduce your corporation tax bill as if you had spent ÂŁ1,300 How long does it last? It will...
Shady character in a mask sitting by computer screens

A new zero-day vulnerability in Windows

Introduction A new zero-day vulnerability in Windows Search has been discovered which can be exploited to automatically open a malicious search window containing remotely-hosted malware executables. The vulnerability is triggered when a user launches a Word document,...

Bring Your Own Device: Dos and don’ts for your business

Do you let employees use their own phones, laptops, or tablets for work? That includes things like sending a quick email or updating a client account. If you do, it’s important to remember that personal devices often lack the security measures of work-issued devices....
Beware this malware: It “annoys” you into handing over login details

Beware this malware: It “annoys” you into handing over login details

A sneaky new malware wants to annoy you into giving up your login details. It locks your browser in full screen mode, making you think you’re trapped… But you can easily escape and we’ll tell you how…

Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05