 Remote Meeting Guide
A Guide to Effective and Inclusive Remote Meetings
Remote meetings are suddenly our most common way of connecting with one another. While conversations that typically rely on physical cues to ensure inclusive meetings are gone, we must make sure that remote meetings are as effective and accessible as possible.
While we have provided a few tips on inclusive meetings (also available as a free webinar) and a self-help guide to troubleshooting audio or video quality issues, all this information can seem overwhelming. So we’ve condensed all the key steps into a single guide to effective and inclusive remote meetings.
Looking for what to include in a remote meeting invitation? Suggestions for ensuring everyone has a chance to contribute? Why is it important to say your name before speaking? Quick read to improve your ability to host, present, and participate in our Remote Meeting Guide.
 Slow Down, Check for Phishing Attacks
An Accessible Way to Prevent Phishing
Contributors: Jennie Delisi, Jay Wyant, Ken Rodgers, Kim Wee, David Andrews, John Israel, Microsoft Enterprise Disability Answer Desk.
We have all done it – clicked on a link too fast in an email. We don’t always take the time to:
- verify the sender is who we think it is, and
- check that the link goes to where we think it will go.
You are the first line of defense for phishing scams that target both personal and professional email accounts. When you receive emails asking you for sensitive information, payment, to log into your account, or to open an attachment, you must be sure it is safe to do so.
Instructions are easier to find for those with vision, and for those who use a mouse. But, what if you use a screen reader or an alternative access method like switches? If you write cybersecurity updates for your organization, how do you write instructions to ensure all employees can follow the directions, including those who use assistive technology (AT)?
A group of contributors worked together to ensure we had instructions for all our users, so they could Slow Down, Check for Phishing Attacks.
|