Microsoft Teams has revealed that it will erase your previous calls automatically

Users who want to listen to recordings from previous Microsoft Teams calling should not wait too long, according to the firm. 

Microsoft previously announced that the video conferencing service will destroy call records after a certain amount of time if customers did not do anything with them, such as download or listen to them. 

The business has now stated that this time limit will be set at 60 days, meaning that customers will have only a few weeks to engage with the recordings they require, or risk losing the files forever. 

Microsoft Teams deletes a call 

According to Microsoft, the 60-day restriction was established because the firm discovered that most meeting recordings are never watched again once they had passed the 60-day mark. 

Users and administrators can still alter the default expiration date, albeit it will not be available right away. 

Microsoft Teams announced plans to start automatically recording all calls in June 2021, replacing a previous procedure in which users had to opt-in to call recording. 

Organizations who need to record meeting interactions to comply with industry rules or local legislation may find this feature particularly valuable. 

Meeting participants are notified that the meeting is being recorded with a warning shown at the start of the call, with the recording accessible to download and listen to once the conversation has concluded. 

Teams’ managers can now configure meeting recordings saved on OneDrive and SharePoint designer to expire automatically, according to a new upgrade from Microsoft. 

The feature, which will be available in September, will allow admins to create a default Teams policy setting on automatic deletion, though they will be able to change the default meeting recording expiration time via a setting in the Teams Admin Portal or by editing policy attributes using PowerShell scripts. 

Microsoft Teams will be able to compete with rival services like Zoom, which has enabled call recording (and call deletion) for some time. 

Share it on Social Media:

If you lose access to your Gmail account, here’s how to get it back

It may be quite irritating and upsetting to lose access to your Gmail account email services. During my research for this story, I came across many instances of people who had been locked out of their accounts after forgetting their passwords – and a couple who had still been unable to log in weeks later. 

If you’ve been locked out of your Google account — either because you forgot your password or because someone broke into your account and changed it — Google provides a list of options to attempt. They do work on occasion. 

Beyond Google’s suggestions, your alternatives may be restricted, so it’s important to plan ahead of time. Here are some tips to put you in the best possible position to reclaim your belongings. 


If you have a recent backup of your data, it will be less of a blow — and less likely to raise your blood pressure — if you lose access to your account (knock on wood). Takeout is a Google service that allows you to download your data. You may download data from all of your Google applications, some of them, or just one, like Gmail. 

The download formats differ based on the type of data. Your email will be downloaded in MBOX format, which may then be transferred to another Gmail account or most other email services or applications. 


If you forget your password, Google will prompt you to enter in your previous password as one of the options to verify your identity. It may be difficult (or impossible) to remember your previous password if it has been a long time since you changed it (if you have ever changed it). Keep a note of your previous password somewhere secure when you change your Google password — and it’s a good idea to change it on a frequent basis. 

Using your password manager — you do have one, right? — to keep track of old passwords is an excellent technique. When you establish a new password, most password managers will offer to update the current record for an app; if feasible, make a new entry and then modify the old one to say something like “Gmail – old password.” 

If you don’t have a password manager (and if you’ve forgotten your password, you probably don’t), you can maintain a list of past passwords in an encrypted file. In case anything goes wrong. 


It’s a good idea to provide Google as much recovery information as you are comfortable with ahead of time so that you have options if you ever need to verify your identity. 

  • Go to your Google account page and go to the left-hand column to “Security.” 
  • Scroll down to the section under “Ways we can prove it’s you.” 
  • You’ll be able to check if you’ve registered a recovery phone number or an email address. (Note: if you answered a security question in the past, it will appear in the listing as well; however, if you click on it, you will be informed that Google no longer accepts security questions.) 
  • It’s a good idea to fill in at least one of these if you don’t have any already. Enter your information if you wish to be extra cautious. Here’s how to do it. 

Another Gmail account, an email account from a different provider, or even a relative’s or friend’s account might be used as your recovery email account. (Ascertain that the family or acquaintance is security-conscious.) 

  • Click “Recovery email” under the “Ways we can prove it’s you” area (see above) 
  • Click “Verify” after entering your preferred recovery email address 
  • A six-digit verification number will be sent to the email address you provided. Go to your email, copy the code, and then input it on the recovery page. (You have 24 hours to receive another code before you have to acquire a new one.) 
  • A tiny pop-up window should appear stating that your recovery email has been validated. 
  • Click “Recovery email” under the “Ways we can prove it’s you” area (see above). 
  • In the pop-up window, click “Add Recovery Phone” and input the phone number. 
  • At that phone number, Google will SMS you a verification code. In the pop-up window, type it in. 

If everything else fails, Google may inquire as to when the account was created. Personally, I have no idea when I started most of my Gmail accounts; if you want to find out, the best approach is to discover your earliest Gmails (now that you have access to your account) and save that information somewhere secure. 

  • Go to the left-hand menu in your Gmail account, select “All Mail,” and click it. 
  • Check the upper-right corner of your screen for the amount of emails you have. (It’ll read something along the lines of “1-50 of 2,000.”) Select “Oldest” by clicking on it. 
  • Your email will now be sorted by oldest to newest; if you’re like me and haven’t been particularly good at deleting email, this should help you figure out when you originally created the account. 

For individuals who are experiencing difficulties restoring their websites, Google recommends transmitting all of the information you can using your regular computer in the same area where you normally compute and using your regular browser. 


So, what if you forget your password or are unable to access your account for any other reason? So you go to Google’s recovery website and begin answering the questions there. 

You can also go to the “Can’t sign into your Google Account” page and choose one or more of the alternatives to see if any additional solutions are available. You can also contact cloud hosting provider to assist you in technical matters. 

Share it on Social Media:

Microsoft is testing a new ‘Super Duper Secure Mode’ for Edge

On the internet, privacy and security are big subjects these days, with every IT Company adding new tools to protect your data. Microsoft, on the other hand, is taking the situation lightly. The company’s browser vulnerability research team is testing with “Super Duper Secure Mode,” a new feature in Microsoft Edge. 

Super Duper Secure Mode — yeah, it’s actually named that right now — is still in its early phases, and it works by disabling V8’s Javascript engine’s Just-In-Time (JIT) compilation. JIT is a technique for accelerating browser performance by compiling JavaScript into machine code before it is utilized. 

Although the benefits are amazing, it also presents several weaknesses that are readily exploited. According to Johnathan Norman, Microsoft Edge Vulnerability Research Lead, about 45 percent of frequent vulnerabilities and exposures in 2019 were connected to JIT. Norman also cites Mozilla statistics suggesting that a JIT issue was used in over half of all Chrome exploits found in the wild. 

Turning off JIT will “remove about half of the V8 issues that need to be fixed,” according to the report. As a result, Norman claims, there will be fewer security updates and emergency fixes. However, no one wants a sluggish browser. JIT was disabled, and JavaScript benchmarks were substantially lower. 

In additional performance testing, Norman adds that when JIT was removed, most of Microsoft’s tests indicated little or minor differences, and users seldom noticed a difference in daily surfing. 

Better security in exchange for a mediocre browser performance is an acceptable compromise for some people. This is particularly true for journalists, activists, and anyone who may meet sensitive information. If you’re using a beta version of Edge, you can use Super Duper Secure Mode, but there are certain restrictions. Edge Canary, Dev, and Beta have the feature under edge:/flags. 

What is the purpose of Super Duper Secure Mode, the burning topic is on everyone’s mind? The browser vulnerability IT consultants wants to “have fun with this project,” according to Norman, which includes giving it a “somewhat controversial name” because it’s amusing and it’s too early to give it a more “formal” designation. Fair! 

Norman did, however, mention in a tweet that they were open to suggestions for alternate names, as the name would most certainly need to be changed in the future. Boo. Allows hope Microsoft’s suits loosen up a little and let everyone have some fun. 

Share it on Social Media:

The latest upgrade to Microsoft Teams will make it much easier to find what you’re searching for

Microsoft is working on an upgrade to its Microsoft Teams calling collaboration platform that would allow users to find information more quickly. 

The Microsoft Teams search function will soon benefit from a new component dubbed Top hits, according to a new item in the company’s product roadmap. 

According to Microsoft, “Top hits is a new area at the top of the autosuggest results in search where users will get the most relevant results across persons, conversations, files, and more.” 

The new feature will be available in a public Teams release by the end of the month, even though it is still in development. 

Microsoft Teams has a search function 

Microsoft has been open about its plans to convert Teams into a single center for working since the outbreak began. By this, the firm implies that it intends to put all the features that professionals want under one roof, including texting, video conferencing, file sharing, project management, and more. 

However, as the number of Teams features grows, the search tool becomes even more significant, allowing users to quickly find certain information, files, and conversation topics. 

Currently, autosuggest offers a limited number of possible results organized by kind, which users may reduce using a variety of criteria. There are a few built-in hacks as well, such as adding an asterisk to the end of a search word to bring up any material with a similar prefix (for example, searching “serv*” will get results pertaining to service, servers, and so on). 

The Top Hits section, on the other hand, should offer another layer of intelligence to current search capabilities, increasing the probability that users will discover what they’re seeking for the first time. The feature, according to Microsoft, would help “improve discovery and minimize search times,” resulting in increased productivity. 

Share it on Social Media:

Don’t fall for this phishing effort, Microsoft cautions Office 365 customers

Microsoft wishes to warn you about a phishing scam that uses the most basic of phishing techniques, such as slightly misspelt domain names, URLs, and sender addresses. IT Consultant and individuals are safe if you’re hyper-aware of mistakes and detect them even when spam filters fail. However, Microsoft has a caution for anyone who only glances at an email to see whether it’s from a valid sender: Look carefully. 

“An active phishing campaign is using a crafty combination of legitimate-looking original sender email addresses, spoofed display sender addresses that contain the target usernames and domains, and display names that mimic legitimate services to try and slip through email filters,” according to the Microsoft Security Intelligence Twitter account. 

If you get an email with file-sharing demands for incentives, staff reports, and other similar stuff, don’t click on the link. The URLs in these malicious emails are bad, and they can lead to a phishing website for Office 365, where you’ll be prompted to enter your credentials. 

The fact that “both URLs require sign-in to continue to the final page, circumventing many sandboxes” makes these phishing attempts more difficult than normal. Furthermore, according to Microsoft, this phishing effort employs various evasion methods that make it difficult to detect. 

Microsoft, on the other hand, isn’t only warning users about the threat; it’s also giving aid in tracking it out. To ensure that no phishing office 365 email have slipped through gateways and harmed innocent inboxes, you may download Microsoft’s sophisticated hunting query from GitHub. 

Share it on Social Media: