Reset Your Computer System Today Using Windows 10

Do you need to reset your computer system?

Resetting is different from simply refreshing or restoring a computer system. Resetting means reinstalling Windows but during the process, you delete your personal settings, apps (unless the apps originated with the computer), and files (unless you choose to keep them). Refreshing and restoring your computer doesn’t require deleting these things, the latter of which is a scary idea. You, however, will likely need or want to reset your computer system using Windows 10 if, for example, any of the below are present:

  • Your computer system often freezes, runs slow, or otherwise acts funny and trouble-shooting the cause will take hours or more.
  • You haven’t installed an app, driver, or an update recently, and the computer doesn’t work well.
  • You simply want to restart using a clean slate and don’t want to conduct a cumbersome old-fashioned install typical of Windows 8 and previous versions.
  • You want to resell, trade, or dispose of your computer or computer system.

Resetting your computer system using Windows 10 is a relatively short process that has been considerably refined since Windows 8. Resetting doesn’t require a product key or any other installation tools and amounts to a few basic steps.

Step-By-Step Process to Reset Windows 10

Before resetting your computer system using Windows 10, you want to make sure you have backed up your system. As a reminder, you will lose most––if not all––of your personal settings, files, apps, and drivers when you reset your computer. Once you decide that resetting is what you want to do, you have to decide which of the three basic methods is appropriate for you:

  1. Reset using Settings. Use this option if you can access Settings from the menu.
  2. Reset from the Sign-On Screen. Use this option if you cannot access Settings. It’s also the way to reset using what’s commonly referred to as the Safe Mode.
  3. Reset from a Blank Screen. Use this option if the first two are not options.

Reset Using Settings

  1. Select the Start buttonin the menu.
  2. Select Settings> Update & Security> Recovery .
  3. Click on Open Recovery settings.
  4. From the Recover page and under Reset this PC, select Get started.

  1. You then have three options from which to choose:
    1. Keep my files > Change settings > Preinstalled apps On. This option reinstalls Windows 10 and allows you to keep personal files while removing settings, apps, and drivers you installed and restoring apps installed by the manufacturer. If you choose this option, you will be prompted on the Next screen on what personal files to keep.
    2. Keep my files > Change settings > Preinstalled apps Off. This option reinstalls Windows 10 and allows you to keep your personal files while removing settings, drivers, or apps that either you or the manufacturer installed. If you choose this option, you will be prompted in the Next screen on what personal files to keep.
    3. Remove everything. Under this option, you can either (1) leave Data erasure On, which is best if you will dispose of or sell your computer; or (w) leave Data erasure Off, which is less secure but also takes less time.

  1. Before you actually start the resetting process, you will be provided with an outline of what happens when you reset your system. If you agree, then click the Restore button. The process can take up to an hour. You know it’s finished once a license agreement appears and you are asked to agree to it.

Reset Using the Sign-On Screen

  1. Simultaneously press the Start button  and the L key to render the sign-in screen.
  2. Simultaneously press the Shift key and Power button.
  3. While still holding down on the Shift key, click Restart, which appears in the lower-righthand corner. The computer will restart in Windows Recovery Environment (WinRE), which is also referred to as Safe Mode
  4. A blue screen will appear giving you three options: (1) Continue; (2) Troubleshoot; and (3) Turn off your PC. Choose Troubleshoot.

  1. From the Troubleshoot page, click on Reset this PC. The same Recovery page as mentioned above will appear. Choose Reset this PC.
  2. The Reset this PC page will appear. Choose one of the three same above-listed options on the Reset this PC page and then follow the same process.

Reset from a Blank Screen

  1. Confirm the computer is turned off.
  2. Turn on the computer by pressing the power button.
  3. As soon as it restarts, press the power button again to turn it off.
  4. Repeat steps 1-3.
  5. Restart the computer––it should start-up in the WinRE environment (Safe Mode).
  6. You can now follow the same steps under Reset from the Sign-on Screen.

A Windows 10 Alternative to Resetting

Windows 10 also allows you to refresh your computer system by using the Give your PC a fresh start option. This option is useful when you want a fresh start but do not want all the factory software installed. This process takes a lot less time, like 20 minutes or so, and is preferable when you want to “reset” using Windows 10 because the computer isn’t working well and you recently installed a new app.

Whatever your reason is for wanting to reset your computer system, it’s good to know you have options when using Windows 10.

Reasons for Choosing Microsoft Teams as an Alternative to Zoom

Microsoft Teams v. Zoom

Microsoft Teams as an Alternative to Zoom

COVID- 19 induced lockdowns and social distancing measures helped spur Zoom’s growth. The video conferencing app managed to attract 300 million users by April 2020 compared to 10 million in December. Its rise to prominence left rivals like Facebook, Microsoft, Cisco, and Google scrambling for innovative ways to gain a competitive advantage.

However, privacy and security hiccups compromised Zoom’s popularity. Hackers infiltrated many meetings around the world in actions known as Zoom bombing. In South Africa, hackers beamed shocking images to parliamentarians during a virtual meeting.

The security and privacy concerns led to the banning of video conferencing platform by the NYC Department of Education. As a result, remote learning classes in New York switched to platforms like Microsoft Teams. Recent reports revealed that the Zoom app failed to encrypt messages end-to-end, which exposed user’s email addresses.

Microsoft Teams v. Zoom

Microsoft Teams: The biggest threat to Zoom

Microsoft recently confirmed reports about a powerful new feature that is undoubtedly a game-changer in the videoconferencing sector. The platform can now handle up to 300 participants during a virtual video meeting. The technology giant introduces this feature when it has been launching a string of features in its push for the top spot.

The increased number of participants in a meeting is a boon for businesses and other organizations, which host large virtual meetings. With the Zoom app, virtual meetings can only accommodate a maximum of 100 participants. To increase the number of attendees, you need to use an add-on.

The gallery view in Teams enables users to view up to 49 participants during a virtual video call. Microsoft boosted the gallery view feature by adding 40 more people up from nine. The addition is a welcome move for multiple groups like exercise classes, business meetings, and schools.

Benefits of switching to Microsoft Teams

Many users are searching for a viable alternative to Zoom. Microsoft’s introduction of robust new features has enabled the Teams platform to stand out as a strong challenger for Zoom.

Many companies can find it easier to opt for Microsoft Teams because they are already using the tech giant’s other products. As the Teams app’s evolution gains momentum, some analysts from Credit Suisse predict that the platform is more likely to emerge as the greatest threat for Zoom in the long-term.

Experts also highlight Microsoft’s size and profile in the technology sector as its principal advantages. The Teams app also provides easy integration with the tech giant’s productivity suite. Microsoft can launch massive marketing campaigns, thus enabling it to reach potential customers at scale.

Privacy and security features in Teams

Microsoft Teams comes with a wide array of security and privacy controls designed to prevent vulnerabilities to hacking similar to Zoom bombing. These features allow you to monitor and control access to your company’s virtual meetings and sensitive information.

During the meetings, you can add, remove, and appoint both participants and presenters. Privacy controls empower you to regulate access to confidential material used in the presentation. Guest participants from outside your business gain limited access to sensitive details.

Moderation tools allow you to control how attendees post and share information. Microsoft Teams employs artificial intelligence to track conversations to prevent the transmission of inappropriate content or conduct. The app ensures data protection using advanced encryption methods. It complies with more than 90 regulatory guidelines, including FedRAMP, HIPAA, and GDPR.

Notable features in Teams

The platform comes with a sophisticated noise suppression feature to eliminate ambient noise from meetings automatically. Microsoft is planning to add a more advanced real-time noise-canceling feature that uses artificial intelligence. Additionally, Teams will introduce a raise hand feature to enhance convenience during virtual meetings.

Convert a User Mailbox to a Shared Mailbox in Microsoft 365

How to Convert a User Mailbox to a Shared Mailbox in Microsoft 365

How to Convert a User Mailbox to a Shared Mailbox in Microsoft 365

After converting your regular mailbox to a shared mailbox in Microsoft 365, you retain all your existing calendars and email. The only difference is that it will be visible to several people. You can convert your shared mailbox back to private in the future. It promotes teamwork and convenience.

How to Convert a User Mailbox to a Shared Mailbox in Microsoft 365

Some of the most important things to know when converting from user mailbox to shared mailbox include:

  • The user mailbox you wish to convert must have a license -assigned to it before you can convert it to a shared mailbox. If it does not, you may not find the option to convert it. If you removed the license, add it back first. You can remove it back later.
  • Do not delete your old user’s account as you will need it to anchor your shared mailbox
  • With a shared mailbox, you can enjoy up to 500GB of data without a license. If you want more data, you must have a license assigned.

You can convert regular mailbox to shared mailbox by following these steps:

  1. Find the Admin option after logging in to your Microsoft 365 account
  2. Find the option ‘Active Users’ under the Admin option
  3. Choose the user you wish to convert and click on the option ‘Mail Settings’
  4. Click ‘Convert to shared mailbox.’
  5. Click ‘Convert’ to finish the process

Using the Exchange Admin Center

  1. Find the option ‘Exchange Admin Center
  2. Click on the option ‘Recipients’ and then ‘Mailboxes.’
  3. Find the user mailbox and select ‘Convert’ under ‘Convert to shared mailbox.’
  4. If the mailbox is less than 50GB, remove the license from the user. Stop paying for it, but do not delete your user’s account. If you are converting it for a previous employee, check to ensure that they have no other way of logging in.

Converting the Mailbox of Deleted User

If you wish to convert the mailbox of a deleted user, follow these steps to complete the process:

  1. Restore the deleted account
  2. Ensure that it has an assigned Microsoft 365 license
  3. Reset the password and wait for the mailbox to be created again
  4. Convert it to a shared mailbox and remove the license from the user mailbox
  5. Start adding members

Converting a Shared Mailbox to a Regular Mailbox

You can convert your shared mailbox back to a regular mailbox by following these steps:

  1. Login to your account as admin and find the Microsoft 365 Admin Center
  2. Click ‘Exchange’
  3. Find the options ‘Recipients’ and then ‘Shared’
  4. Click on the shared mailbox
  5. Click ‘Convert’
  6. Click ‘Convert to regular mailbox.’
  7. You will receive a warning message asking for confirmation.
  8. Click ‘Yes’

You must assign a license for the mailbox after conversion. You must also reset the password. The conversion can take a lot of time. When it is done, you will receive a completion message. Click ‘Close.’

After signing into Microsoft 365 again, you will find all the data from your shared mailbox.

In conclusion, Microsoft 365 is great for both regular and shared mailboxes. They all have unique features and benefits. A shared mailbox is an inbox type that allows you and other members of your team to send and receive emails from a similar address. It is a great option for companies that wish to promote teamwork. Since all members can respond to emails in the address, sharing work is easy.

If you wish to switch from user to shared mailbox, you can complete the process in a few simple steps. During the migration process, your data remains secure and integrated.

What Does $150K Ransomware Payment Say About Your Cybersecurity?

Ransomware Payment

$150K Ransomware Payment

A recent news piece published by Tech Republic highlights the discouraging reasons why too many businesses fall prey to hackers and pay ransoms for their digital property. Perhaps nothing adds insult to injury quite like someone burglarizing your organization and then making you pay for their crime.

A recent $150,000 ransom paid in Bitcoin to regain control of one small business’s digital assets reveals why so many cybercrimes go unreported. As staggering as the data breach statistics are, they may just be the tip of the spear. Security journalist Karen Roby conducted a Q&A with an unidentified CFO who made the decision to set aside pride and succumb to a hacker’s demands.

“His company chose not to get authorities involved given the value that was at stake, and the company’s immediate need to gain back control of its network,” Roby reportedly stated. “We’re hoping his first-hand account will help you better understand what these types of ransomware attacks look like and give you an idea of how to better protect your own organization.”

Ransomware Payment

How Do Ransomware Attacks Happen?

Ransomware attacks rank among the more prevalent methods used by digital thieves. The underlying strategy mirrors that of taking someone hostage and demanding payment from loved ones for their safe return.

In these cases, a company’s digital assets are taken hostage by inserting malicious software that effectively gives hackers total control of a network. Email remains the most-used delivery system. When someone in an organization gets tricked into clicking on a link or downloading a file, the ransomware application enters the network and hackers take control of the system and devices.

In order to regain control, cyber-thieves demand payment — typically in Bitcoin — in exchange for a decryption code. Like real-life hostage-taking, paying ransoms does not necessarily ensure the criminals will hold up their end of the bargain. Sometimes ransom-payers never receive the code. Other times, hackers delete systems to wipe away any digital fingerprints.

Why Some Decision-Makers Pay Ransoms

A ZDNet article called “Ransomware attacks: Why and when it makes sense to pay the ransom,” highlights why more businesses pony up rather than contacting the authorities. Written by Larry Dignan, the piece points out that the decision often comes down to cold financial calculations.

“Now paying ransomware is likely to go against conventional wisdom. The practice may also make you throw up in your mouth,” Dignan reportedly states. “However, there are real costs to having your company or city dead in the water for days. Paying ransomware should be viewed as any other business decision.”

In the case of the Tech Republic Q&A, the small business promptly contacted a third-party IT professional to assess the potential fallout of not paying the hacker’s demand. A quick review of the outfit’s digital assets revealed that the cybercriminal did not necessarily have control of what many consider to be the most valuable data. These typically include the following.

  • Banking information
  • Healthcare records
  • Personal identity information such as Social Security numbers
  • Intellectual property files

“The third party that we spoke to that were acting as our agent between us and the hackers. They said, ‘This is strange. You don’t really have anything they can hold over your head other than just stopping your business.’ But we engaged them quickly,” the ransomware victim reportedly said. “Ironically, they worked straight through on a Sunday to help us and by Monday morning we were in full agreement, and they began the conversation with the hacker group to see what we could get done.”

The third-party negotiated the ransom of $400,000 down to $150,000 in what took on the appearance of a corporate contract negotiation. The process revealed that some hackers conduct themselves like ordinary businesspeople. An encryption code was delivered, luckily, and this criminal outfit even offered tech support to the victimized company if they ran into problems getting computers back online.

“Yeah. I mean, if anything has made me laugh about this whole situation is that it’s just the selective morality of, ‘Hey, we know we’ve robbed you of money and your files and held you at our whim, but by the way, we’re here to help 1-800 …’ It’s unbelievable,” the victim reportedly said.

The Tech Republic’s microcosm looks at why organizations pay ransomware demands points out that some are overly reliant on their network. Failure to have a go-to backup system or secure digital assets that can be leveraged leaves industry leaders with a hard choice. Either pay up or sustain even greater financial losses. Bitcoin payouts are the hidden cost of subpar cybersecurity.

What’s the Best Way to Switch IT Managed Service Providers?

Switch IT Service Companies

The Best Way to Switch IT Managed Service Providers

The COVID-19 lockdowns have naturally changed how many organizations and companies operate. Educational institutions are embracing virtual classes, events that were previously held in person are now fully virtual, and a whopping 98% of employees worked from home to avoid spreading the novel coronavirus. Sadly, not all IT managed service providers were able to keep up with their customers’ needs during this challenging time, leading disaffected business owners to search for new IT managed services that can handle a company’s current and future IT challenges.

While finding a competent IT service is imperative, it’s also vital to know how to change companies without disrupting your current IT operations. The following are some expert tips that can help a company transition to a new IT service safely and smoothly.

Switch First

Don’t tear up your contract with your current IT managed service provider until you find another provider that can take their place. Furthermore, you’ll need your new provider to get to work on your IT set-up right away. Once your new IT service has everything under control, you can pull the plug on your former IT service.

What does this operation entail? Here are some steps you’ll need to take to make sure your business is ready to switch IT managed services:

  • Make sure you have all your login information and administrative access to all your accounts. Any decent IT managed service will provide you with this information even before you ask for it. Sadly, some subpar services try to hold onto your information to force you to continue to work with them.
  • Have your new company do a thorough cybersecurity assessment of your business to ensure there are no back doors that former IT technicians can use to gain access to your valuable company information.
  • Let your staff members know that you will be changing IT managed services by a specific date. Inform them of new protocols that will be put in place once you make the switch.
  • Schedule IT training sessions with your new managed IT service as soon as possible so your staff members can learn how to master new programs and cybersecurity rules quickly and easily.

What Does a Good Managed IT Service Look Like?

Selecting the right IT managed service provider to replace your current IT service is no easy task. Here are some tips that can help you make smart decisions.

  • Make sure the IT managed service is familiar with your industry.
  • Look up reviews online and ask prospective IT managed services to provide references from clients they have worked with in the past.
  • Ask about the pay structure. It should be a fixed monthly price, with allowance to scale services as the need arises.
  • Make sure the IT service can meet not only your current but also future needs.
  • Choose an IT service provider that puts a premium on cybersecurity services. Data breaches are becoming more commonplace than ever, with more than eight billion records exposed in the first quarter of 2020 alone.

Switching IT managed services can be challenging. It shouldn’t be done in a hurry; at the same time, you shouldn’t hesitate to find a new service provider if your current one is unable to meet your present and future needs. Do careful research to ensure your new provider is the best fit for your business and then start the transition process before notifying your current IT company that you will no longer use its services. Doing so will protect your business from disruptions while improving your IT efficiency and security.

Switch IT Service Companies

Microsoft Edge Browser FAQ

Microsoft Edge Browser

Have You Tried The Microsoft Edge Browser?

Microsoft’s Internet Explorer has been around from the early beginnings of the World-Wide Web. Over the years, it was sometimes immersed in controversy since it was “built into” some previous Windows versions. Well, not quite, since knowledgeable users knew how to install other browsers. But when Windows 10 came along, along with it came a new browser, Microsoft Edge. Below are some interesting, frequently asked questions.

Microsoft Edge Browser

What Great Things Can Microsoft Edge Do?

The following wonderful features exist on the newest Chromium-based version of Microsoft Edge, released January 15, 2020.

  • It has a new Collections feature that helps organize favorite webpages.
  • Web Note allows you to annotate web pages you find with a pen, highlighter, or typed notes. You can even do artful doodling on those pages, then save them in Edge or into MS OneNote.
  • It natively supports 4K video viewing, Dolby Audio, and Dolby Vision.
  • It runs on and syncs passwords, favorite websites, and settings on macOS, iOS, and Android. A Linux version is also rumored to be in the works for release later in 2020.
  • We are all familiar with horizontal web page tabs, but Edge also has an option to make them vertical, which is great for having lots of tabs open at the same time.
  • When you use passwords, Password Monitor will check autofill passwords against a database to see if they are in use elsewhere.
  • As with all great browsers, Edge also has a Privacy Mode.

Does Microsoft Edge Have Good Internet Protection?

The World-Wide Web, the wild-wild-West of the Internet, danger lurks all around. Cyber-thieves could use adware, malvertising, pharming, formjacking attacks, and man-in-the-middle browser attacks. Webpages may have malicious or poorly programmed scripts able to harm your computer and compromise your security. MS Edge is one of the major browsers in use, so all the reputable security software companies work together with Microsoft to create safe, seamless browsing experiences. Microsoft is continually being attacked from all sides, so its products are always being updated whenever issues are discovered.

Even if you were to accidentally lose or turn off your computer protection software suite of products, MS Edge works with other Windows applications to protect against the most common Internet hazards.

How Often Is Edge Updated?

Windows 10 users know that Microsoft has monthly updates for their systems. MS Edge will sometimes be updated at the same time. The user can also manually do updates or turn on automatic updating.

Is Microsoft Edge Based on Chromium?

The first version of Microsoft Edge came with the launch of Windows 10 using a proprietary Microsoft technology. Starting on January 15, 2020, Microsoft launched a new Google-Chromium-based Edge browser. In some ways, Microsoft’s version is more advanced than Google’s Chrome. For example, it already has anti-tracking defenses built-in. Edge has its own add-on market, however, add-ons can also be obtained from the Chrome Web Store.

Do I Have To Use Microsoft Edge?

If you use Internet Explorer 11 or an earlier version, you are probably using an operating system that will eventually no longer be supported. When that operating system reaches the end of its lifecycle, Microsoft will also phase out all support for that version of Internet Explorer.

However, you can use Google Chrome, Mozilla Firefox, and many other browsers. Each browser has its strengths and weaknesses. Hard-core users of Chrome often find that MS Edge will often work where Chrome fails.

Should I Use Microsoft Edge?

Does your company require you to log in from home to get access to special web-based database applications? If so, you want to first check with your corporate IT office to see if their software is running software using legacy DLLs: ActiveX Controls, Silverlight, or Java. It is very expensive to make reliable, stable custom controls for specific company needs, so your IT department may want you to wait before trying to access their website for home-based work purposes. However, they may also give you special instructions on how to configure Microsoft Edge to run in IE mode or enterprise mode. Remember, for home-based work with established companies, ask them what upgrades work best before trying something new.

What About Edge with Adobe Flash, ActiveX, Silverlight, or Javascript?

Adobe is ending Adobe Flash after 2020, but Edge supports web pages with and without it. Edge does not support BHOs like Silverlight or Java, nor ActiveX controls. For operating systems that still support Internet Explorer 11, Edge can be set to open web pages with those technologies in IE 11 automatically.

Should I Try the New Microsoft Edge?

Yes! But make sure you first learn it on a personal computer or device. Anybody who does research on the Internet will like the new features within the Edge Browser.

 

Internal IT vs. Outsourcing IT

Outsourcing IT Services To An MSP

Internal IT vs. Outsourcing IT: The Value of Outsourcing to an MSP

The question of whether to outsource or rely on an internal IT team is common. Services that were once considered ‘nice to have’ are now necessities. They include machine learning, artificial intelligence, and cloud computing. While they add a lot of value to your business, they can be difficult to manage if you don’t have a reliable team of IT experts.

Outsourcing IT Services To An MSP

Why Outsourcing To An MSP Make Sense

While having an in-house team presents unique benefits, the value of outsourcing is unrivaled. Some of the reasons why it may be a better choice include the following:

1. Optimized Uptime and Consistency

Having an in-house team is a good idea, but how do you deal with issues after their working hours? Your in-house team has specific working hours. They may need to be away from work because of sickness or personal emergencies. Even the slightest problem could cost you days or hours of work. Outsourcing takes care of that problem. You can enjoy consistent and comprehensive IT support. Your MSP can handle issues as soon as they occur. They are available 24/7 and don’t need to take breaks. Your provider offers regular maintenance to promote peak efficiency.

With cybersecurity, consistency is critical. You cannot afford to snooze. Most ransomware attacks happen outside regular working hours. If you rely on your internal team, you need to wait until the next business day to address them. MSPs, on the other hand, can keep your business safe while you are away.

2. Specialized IT Support

Your in-house IT experts may do their best, but they are unlikely to deliver the expertise you need to take advantage of modern technologies. As your business evolves, you may need to train them or hire a new team. However, the right MSP can cater to the needs of your business as it grows. With their help, your business can take advantage of the latest technologies.

3. A Variety of IT Skillsets for Your Company

Your MSP can provide you with a range of skillsets that are essential for successful network management. They may provide you with IT strategy and planning, cybersecurity, and cloud and mobile expertise. Finding members of an in-house team that have all of these skillsets is difficult, especially if you have a limited budget. The most realistic way to take advantage of all the competencies is by working with an MSP.

4. Maximizing Productivity

Outsourcing is a smart way to free up some time for your team. They can focus on the core purpose of your business while your MSP focuses on IT matters. Your MSP handles issues that your in-house employees would otherwise waste a lot of time trying to resolve.

5. Safeguarding Your Institutional Knowledge

If you choose to work with an in-house team, you may need to spend a lot of time and money training them. When they leave your company, they take all your institutional knowledge with them. The IT industry is competitive, and your former employees are likely to share what they learned from you with their new organizations. With an MSP, you don’t need to go through the trouble of hiring, training, and rehiring staff members. They are a long-term partner that gets you through all the stages of growth.

6. Saving Money

Working with an MSP may be cheaper than hiring an in-house team. It cuts out the cost of training and hiring employees. With MSPs, your business can have less downtime and improved productivity.

The benefits of outsourcing IT services outweigh the advantages of working with an in-house team. The most outstanding ones include safeguarding your institutional knowledge, improving your productivity, 24/7 support, and specialized IT support.

Alleviate Customers’ Booking Frustrations with Microsoft Bookings

Microsoft Bookings: Part Of Your Microsoft 365 Subscription

For service-based businesses, a significant paint point in the customer experience is the simple process of scheduling an appointment.

A traditional appointment-booking system requires the customer to call (or email now) and ask about an available timeslot. There’s then a back-and-forth of suggesting and checking different times that takes place until a mutually suitable time is found and booked.

This process requires customers to call during business hours when it’s done over the phone, and it requires customers to wait for an email response if done via the web. Neither of these is ideal, and the negative impact can be especially substantial because scheduling an appointment is often the first interaction a customer has with a business.

Microsoft Bookings modernizes the appointment-scheduling process so that it’s efficient and — most importantly — easy for customers to book timeslots through.

The Benefits of Using Microsoft Bookings

Some of the most important benefits that Microsoft Bookings provides improved customer experience.

Customers and clients can easily schedule appointments through the web-based platform, so they can book timeslots at their convenience rather than a business’ convenience. If a customer has a few spare minutes during the day, they can quickly log onto a business’ website and find and available time. Alternatively, they also can schedule appointments late at night, early in the morning, and on the weekend regardless of whether a business is open. The appointment software operates 24/7 for them.

Also, customers don’t have to go through the back-and-forth of suggesting times and seeing whether they’re available. When a customer logs onto a business’ website, the customer can instantly see what timeslots are available for certain services. Form the available choices, they can immediately schedule the opening that they prefer.

Businesses also benefit on the back end, where the Microsoft Bookings platform keeps everyone current on what timeslots and services have been booked. Each time a customer makes a booking, every connected device is instantly updated to reflect the schedule change. This ensures customers don’t double-book appointments, and it also makes sure employees know which of their timeslots are taken.

The Ease of Booking Appointments with Microsoft Bookings

The actual process of finding and scheduling an appointment with Microsoft Bookings is straightforward.

After the software platform is installed, a business can publish its appointment availability, and details such as services offered, employees involved, and other items can be included.

Customers then log onto the business’ website and see what appointments are available. They select the timeslot and service they want and schedule the appointment. An email confirmation is sent to the customer as a notification is pushed to the business as well. Shortly before the scheduled appointment, a reminder email is sent to the customer to decrease no-shows.

The Types of Businesses That Benefit From Microsoft Bookings

Almost any business that offers scheduled services can benefit from the scheduling ease that Microsoft Bookings provides. Law firms, dental offices, consultants, financial advisors, salons, and many other businesses can use this software — and many may find that it’s already included in their Microsoft 365 subscription.

Get Assistance with Microsoft Bookings

If your business would like to benefit from the ease and simplicity of Microsoft Bookings, contact us for assistance setting up the platform. Offering a full range of help Microsoft 365 programs, we’re well-acquainted with this particular application. Our team can quickly get it set up for you and show you just how easy it is to use the platform.

Microsoft Bookings

Microsoft Office Lens Lets You Scan Virtually Anything

Microsoft Lens

How Microsoft Office Lens Lets You Scan Virtually Anything

As businesses move online, more of their documents become virtual. Even with the mass migration to the digital world, however, there’s still plenty of work done on paper and other real-world canvases. From sticky notes to whiteboards, important information can be crafted and presented in a physical format only to be erased or thrown out moments later. To prevent the loss of data, one would normally have to manually input it into a digital format. That is, unless they make use of Microsoft Office Lens. Learn how Microsoft Office Lens lets you scan virtually anything.

How It Works

Think of Microsoft Office Lens as a portable scanner. It’s an app for your mobile device that lets you scan a variety of different documents. Once these documents are scanned, they are saved in a digital format as an image. While its basic functionality makes it sound no different from a camera function, its extra features take the app to the next level.

With this app, any document you scan will automatically be enhanced, cleaned up, and cropped as needed to make its information easily readable and accessible. Shadows will be eliminated and images will be rotated as needed to get rid of any potential warping of the information due to odd angles. The app can even go so far as to transform images that were drawn by hand into isolated and movable objects. Every object that the app makes from any scanned information can be edited completely as well.

The Four Operational Modes

Microsoft Office Lens features four distinct modes that apply to different scenarios. Each has its own unique function, but they all work to digitize documents and images. The four modes are:

  • Photo: The standard photo mode accomplishes what you might expect from any kind of camera app. You can take pictures of people or any kind of scenery, and the app will automatically remove glares and shadows as well as crop the image to be easy to see.
  • Business card: With this mode, the app will automatically extract important information from any business card and then populate your phone’s contact information with the relevant text. This works with a variety of languages as well, which is useful if you’re dealing with non-English-speaking businesses or clients.
  • Document: The document mode is best used to clear up any text that’s difficult to read. One primary example of this would be scanning a restaurant menu. Each of the options would then be digitized and able to be edited individually.
  • Whiteboard: One of the most popular settings is the whiteboard mode. When you’re in a brainstorming session with your team and you have a whiteboard full of ideas, this mode can put all that information into a convenient digital format. Any glares from the whiteboard are also automatically removed. Keep in mind that this works for blackboards as well.

Where Do the Scans End Up?

Once you scan any kind of image using Microsoft Office Lens, where it ends up is largely up to you, as there are several options available. As you might expect, you can save the images as JPEG files, which can then be exported to OneDrive or OneNote. You can also save an image as a PDF document, as part of a PowerPoint, or as a Word document. Once the file type is established, the images can then be treated as any file would be.

With Microsoft Office Lens, you can enjoy all the benefits of having a portable scanner in your pocket. Save your notes with confidence!

Did You Really “Reply All” On That Last Email?

Please Stop The Reply All Emails

Office Workers Rejoice: Microsoft is Finally Subduing the Dreaded’ Reply All’

Do never-ending reply-all threads emails put a damper on your business chewing up precious time and resources? The good news is, Microsoft rolled out Reply-All-Storm Protection to all Microsoft Office 365 users, an update announced in 2019 that seeks to ease the email disruption to business continuity. Microsoft is finally subduing the dreaded Reply-All function. Your office workers can now rejoice! Last year, at the Microsoft Ignite conference, Microsoft announced it would work on a feature that would help prevent Reply-All email storms on Microsoft 365 Exchange email servers. Microsoft says the “Reply-All-Storm Protection” feature will block all email threads with more than 5,000 recipients that have generated more than 10 Reply-All sequences within the last 60 minutes.

Please Stop The Reply All Emails

The Flow On Effect of Reply-All Email Storms

When a Reply-All mail storm happens in your organization, it can easily disrupt business continuity. In worst-case scenarios, it can throttle the rest of your organization’s email for a significant period. Emails already drain 5 hours of worker’s time every day without having email servers slowing down or crashing. What happens if the number of recipients in an email chain is large when multiple employees hit the Reply-All button, then the ensuing event generates massive amounts of traffic that will either slow down or crash email servers. Events like this happen almost all the time sometimes because a few employees participating and amplifying Reply-All storms are using this as a prank. Microsoft itself has also fallen victim to Reply-All email storms on at least two occasions, the first in January 2019, and a second in March 2020. The Microsoft Reply-All email storms included more than 52,000 employees, who ended up clogging the company’s internal communications for hours.

How Reply-All Storm Protection Works

Reply-All Storm Protection in some ways sounds pretty simple, but there’s some pretty cool stuff going on in the cloud, that makes this possible: When Microsoft detects what looks like it might become a Reply-All storm, anyone who subsequently attempts to reply to everyone will get a Non-Delivery-Receipt (NDR) message back instead. This basically tells them to stop trying to Reply-All to the thread. Once the feature gets triggered, Exchange Online will block all replies in the email thread for the next four hours, preventing email servers from crashing or slowing down. This feature allows servers to prioritize actual emails and shut down the Reply-All storm.

Further Updates Expected

Over time, as Microsoft gathers usage telemetry and customer feedback, they expect to tweak, fine-tune, and enhance the Reply-All Storm Protection feature to make it even more valuable to a broader range of Microsoft 365 customers. Microsoft said future updates are expected as they will continue working on the functionality going forward, promising to add controls for Exchange admins so they can set their own storm detection limits. Other planned features also include Reply-All storm reports and real-time notifications to alert administrators of an ongoing email storm so that they can keep an eye on the email server’s status for possible slowdowns or crashes. “Humans still behave like humans no matter which company they work for,” the Exchange team said. “We’re already seeing the first version of the feature successfully reduce the impact of reply all storms within Microsoft.”