Free Microsoft Outlook Training

Microsoft Outlook Training

Every month, we host Microsoft Office and other technology training sessions. Our training sessions are completely free of charge and are available “on-demand”.  Yes, you can tune-in whenever and wherever you like.

Microsoft Outlook Training
 

This month’s training session: 4 Ways To Use Microsoft Outlook Efficiently.

Our in-house Microsoft training specialist, Dawn, will guide you through some very important tips and tricks, such as:

  • Quick Parts
  • Templates
  • Automated Responses
  • Signatures

Tune into this month’s training by clicking here.

The End of Windows 7 Support: Things to Know

Windows 7 Support

The Fall of Windows 7 Support: A Guide for Businesses

According to Microsoft, Windows 7 support is ending. Find out what this change can mean for your Windows 7 computer systems in your business operation so you can start preparing now. 

Windows 7 Support

Beloved by many and still in use by a lot of business owners, Windows 7 has been one of Microsoft’s most sought after operating system software products. Even though Microsoft has released other OS designs since Win7, most prefer the simplicity of Win7 and have stuck with it. Unfortunately, Microsoft has announced the end of an era. The company will stop support for Win7 as soon as January 2020. Here is a look at some of the things you will need to know as a business owner who is using devices with Windows 7 installed.

You Will Be Able to Use Win7 without Support

Even though support is ending for Windows 7, it does not mean that you will no longer be able to use the operating system in your business operation. There will, of course, be some differences, such as:

  • no ability to bring in the aid of support when you have a Win7 problem
  • there will be no patched security updates from Microsoft to protect you from the most recent malware attacks
  • some system processes may have slight issues on occasion

It Will Be Possible to Install Win7 After Support Ends

Win7 has garnered itself a pretty stable fan base over its 10 years in use. In fact, the OS is so popular among users that at least 44 percent of people still use Windows 7, according to British Technologies. Microsoft has stated that they have no intentions of completely discontinuing Win7, so it will still be available for installation; it just will not have open support available if you run into problems during installation.

There Could Be Security Risks of Using Windows 7 After Support Ends

If you are looking for the biggest reasons to upgrade from Windows 7 to Windows 10 once support ends, security comes in at the top of the list. Microsoft regularly releases and automatically installs patched security updates to Windows 7 systems when a new threat spurs the development of a new line of software protection. A serious downside to consider here is the fact that some hackers will take advantage of the end of a major operating system’s line of support.

Support Could Be Extended for Certain Win7 Business Users

If you know there is no way that you can get your systems updated before the end of support, it is a good idea to get in touch with Microsoft. There has been talk that Microsoft will be offering extended support through 2023 on a case-by-case basis for businesses who have struggles upgrading in time and can be in danger of security threats.

Internet Explorer Support Will End As Well

Internet Explorer is a product of Windows7, and Microsoft pretty much did away with IE with the development of Edge. Therefore, support will end for IE along with Win7. Unfortunately, this end of support could make an already weakened browser a little less secure and a little more attractive to hackers.

The end of Win7 support is a major change for a lot of business owners. If you need help with upgrading your devices to a newer Windows OS, reach out to a managed IT service for help.

Business Continuity Planning: Developing An Impact Analysis

Business Continuity Planning

According to FEMA, 40% of businesses hit with a disaster never recover, and this rate more than doubles for those without a business continuity plan. While the two are linked, a business continuity plan shouldn’t be confused with disaster recovery. You might have a great plan for getting things up and running after an event but still fail to plan for continuity of time-sensitive business functions. And that’s why developing a real continuity plan is so important.

Business Continuity Planning

What Is a Business Continuity Plan?

Business Continuity Plan is an essential component of risk management. The BCP specifically addresses the risk associated with an unanticipated lack of ability to continue business operations. The reasons for this lack could be many:

  • Natural disaster
  • Terrorist attack
  • Major power outage
  • Technology failure
  • Loss of customer data
  • Someone hijacking customer data and holding it for ransom

Even a couple hours of lost operations can have multiple consequences. A BCP mitigates them by identifying and assessing risks before developing, testing, implementing and measuring the effectiveness of strategies that keep your business running with the least downtime possible.

Some of these strategies may include:

  • Reducing risk to customer data through firewalls, backups, employee education, security protocols, etc.
  • Enhancing your servers and telecom infrastructure
  • Enhancing data recovery
  • Re-routing calls/contact
  • Developing a work from home program
  • Setting up a temporary “base” when your building isn’t accessible

The strategies vary as much as the companies that employ them. So before anyone begins developing a business continuity plan, it’s important to know what areas are impacted by the inability to continue operations. How much do they cost your company?

What is a Business Impact Analysis?

The Business Impact Analysis is the first critical step in developing a business continuity plan. In this phase, identify time-sensitive business operations. Additionally, consider related resources needed for employees to perform those functions.

An effective analysis not only identifies these elements. It employs data to prioritize business continuity efforts.

Continuity concerns may present themselves on a scale. At one end you have mere inconvenience. At the other is significant (and possibly irreparable) business harm. So it’s important that when developing a business impact analysis, you make the distinction.

Every department will naturally feel that they are the “most important”. But scrambling to prevent inconvenience will drain resources from impactful continuity challenges. Once again, data save the day. It helps us make the most impartial, data-driven decision.

When it comes to business impact analyses, there are no “cookie-cutter” solutions. That’s why this phase of planning is so important. It helps you develop the customized plan you need to mitigate risk effectively.

How to Develop a Customized Impact Analysis for Your Business

When developing an impact analysis, look at each department, team, and/or area of your business. As you do, consider these three areas. FEMA business impact analysis worksheet says that those elements are:

  1. Timing/Duration of outage
  2. Operational Impacts
  3. Financial Impacts

So, for example, if Department A can’t continue operations for 30-60 minutes what happens? How does this impact the bottom line? What if that department/team were down for two hours? And so on. The ramifications will get progressively worse.

In some departments, financial impacts may be fairly easy to measure. But in others, you may need to think more broadly about the costs of downtime or lack of access. This will give you a truer picture.

  • Direct Financial Impact – lost sales, paying employees who can’t work, overtime to catch up, increased customer returns, etc.
  • Customer Relationship Impact – lost client contracts, bad customer reviews, diminished social sharing, bad public relations, cost of PR damage control
  • Vendor Relationship Impact – lost vendor contracts, increased vendor costs, strained partnerships, lost trust, trouble building new partnerships
  • Employee Relationship Impact – lost faith in the company, morale issues from too much overtime, retention problems, increased recruiting costs
  • Regulatory Impact – This one may vary by industry as well as department. For example, in healthcare, failure to comply with HIPAA may result in fines and legal troubles. If you process payments, inability to meet PCI regulations could result in loss of contracts with major credit card companies. Any company that’s managing customers data ( e.i., every company) should have some awareness of SOC2 compliance and the impacts of not properly securing customer data to maintain business functions. In education, lack of continuity would not only impact FERPA compliance.

Don’t “assume” these costs. In most cases, you’ll have data to clearly quantify their impact. Once you’ve considered the true impacts of lack of continuity in each area, you’re ready to prioritize and develop your business continuity plan.

Texas Government Organizations Blasted In Coordinated Ransomware Attack

Texas Government Coordinated Ransomware Attack

Have you heard the news over in Texas?

Over 20 government organizations across Texas were targeted in a coordinated ransomware attack. That’s right… These government organizations have been added to the ever-growing list of major attacks on government organizations in Florida, Albany, Atlanta, and Baltimore.

The threat of ransomware attacks on corporations, government, and yes, even local small businesses is all too real.

Don’t miss our latest video outlining what you can do to stay safe. Click Here or click the play button below.

Be aware that these threats are very serious. Coordinated ransomware attacks are going to get a lot worse before they get better. In many recent cases, following proper precautions would’ve gone a long way towards prevention.

Follow these quick tips below:

  1. Invest in cybersecurity awareness training
  2. Invest in a rock-solid security solution
  3. Speak with your insurance rep about cyber liability insurance
  4. Schedule a cybersecurity risk assessment

Questions? Call {company} at {phone} or send an email to {email}.

Capital One Data Breach

Capital One Data Breach

Recently, news broke about the latest large-scale data breach to hit a major organization. Capital One Bank has announced that millions of customers across the US and Canada have had their personal information compromised in one of the biggest breaches to ever happen to a financial services company.

This brief video courtesy of News24 discusses the scope of the incident, the kinds of information impacted, and tips to help protect you from scams that target you directly.

If you have any questions, give us a call at {phone} or email us at {email}.

Capital One Data Breach

Watch Out for Hidden Malware on Your Phone

Malware Smartphone

What You Need to Know About Android Malware

Hackers are devising new ways to infect phones with malware. Learn about the latest attack on Android phones and how to minimize your risk of getting malware. 

Malware Smartphone

Since the first computer operating systems hit the market, malware has been a serious security concern. Today, malware can infect not only desktop and laptop computers, but devices that are connected to nearly everything we do: our phones. In July 2019, cybersecurity experts found that up to 25 million Android phones were infected with malware masquerading as trusted apps like WhatsApp. Here’s what you need to know.

Imposter Apps

The latest malware threat was able to breach Google’s Android OS and replace legitimate apps with “zombified” versions that bombard users with unwanted ads. The outbreak affected approximately 15 million phones in India, 300,000 in the U.S., and nearly 140,000 in the U.K., making it one of the most devastating cyberattacks of the decade.

The malware was traced back to 9apps.com, a third-party app store owned by Chinese company Alibaba. Hackers that plant malware on these sites usually target users in developing nations, though this particular attack hit a significant number of phones in the states and the U.K.

Research thus far into the imposter apps found no threat apart from malicious ads. However, hackers that employ this type of attack can potentially do much more evil such as stealing user data, tracking user locations, and even accessing private messages.

How Does the Malware Work?

The malware is programed into a variety of apps such as photo editors, games, and messaging apps and made available for download. Once downloaded, the app runs the malware, which is often disguised as a harmless app update. The malware then corrupts popular apps such as WhatsApp, turning them into zombie apps that launch unwanted ads. In this case, the hacker’s end goal appears to be to trick users into tapping the ads and generating revenue via a pay-per-click scheme. Fortunately, the malware does not appear to affect other data stored on the phone.

Who’s Behind the Malware?

Experts have linked the malware to a Guangzhou company involved in developing and marketing apps for Android phones. While most of the carrier apps were made available on third-party storefronts, the hackers may have considered sneaking the apps onto Google Play. Researchers at Check Point are working closely with Google to identify and take down potential malware installers.

How to Protect Your Android Phone from Malware

A good first step in minimizing your risk of malware is to update your phone to the latest version of Android OS. Be wary of downloading apps on third-party stores, which typically have fewer security measures in place than the official Google Play store. Even after taking these precautions, you should still be proactive in recognizing red flags. For example, if an app suddenly starts displaying ads or behaving differently than before, it’s likely infected. To fix this, navigate to your phone’s app info list and uninstall ones you don’t recognize.

No matter how many security updates Google releases, hackers will find and exploit loopholes. You can help stop hackers by being aware and reporting suspicious activity on your Android phone to Google.

How to Leverage iOS12 Enhancements to Boost Productivity

IOS 12 Quick Tips

How to Use iOS12 to Instantly Share Information With Colleagues

Want an easier way to communicate with your colleagues? Save time and reduce errors by learning how to instantly exchange information using iOS12’s share feature. 

Beginning with Apple’s release of iOS8, it has been easier to share information, files and apps with others, including colleagues. The feature continues to be available in iOS12 as either an icon or a share link within apps. Individuals can share information within a message, an email, or by using AirDrop. The share feature also integrates with social media apps, such as Twitter and LinkedIn. iOS users can also share information with themselves through apps such as Notes and Reminders. The ability to seamlessly and instantaneously share information with others can boost productivity regardless of whether everyone is in the same office. By learning how to share files, images and media, employees can keep exchanging important and relevant content when urgency is a factor.

Using the Share Icon

With built-in iOS apps such as Photos or Safari, the share feature is available through the share icon, which is usually located at the bottom. In iOS12, the share icon resembles a single document or piece of paper with an arrow extending from the top. To share an image, a web page or link, or information within the News app, tap the share icon. In some of the built-in apps, the share icon will be located at the top instead of the bottom.

Besides news stories, articles, useful internet links, and images, location information from the Maps app can be shared with others. Venue information for meetings, conferences, and events that occur outside of the office can be exchanged without having to type all of the information within a separate email. Likewise, if one individual has written notes from an interview or something similar, the share icon is available within the Notes app to send it to the person that needs it. The act of retyping the information in an email or trying to describe it in a voicemail is no longer necessary.

Using the Share Feature

Some of the apps within iOS12 allow sharing, but do not display the share icon. The Contacts app is one of them. Employees can still share contact information, including name, phone number and email address using the “Share Contact” link.

Apple’s iOS12 also displays its share feature with three dots within apps that contain music and videos. The three dots represent a menu that brings up a series of options, including the ability to share. Depending on the app and the media, one could see a “Share Song,” “Share Album,” or “Share Episode” link. Podcasts with useful tips and information related to one’s industry, discipline, and particular role can be shared this way.

The need to share information with colleagues is not new, but the ability to instantly share pertinent information and files in digital form is. Learning how to leverage built-in mobile tools can make the process easier, more efficient, and more accurate. Apple’s iOS12 share feature is one of those tools that can become critical to productivity while traveling or working remotely. With modern smartphone capabilities, waiting to share information or taking extra steps to ensure colleagues are kept in the loop no longer have to be part of employees’ normal routines.

IOS 12 Quick Tips

How to Use Your Computer to Install Apps on Your Android Device

Installing Android Phone

Downloading Apps on Your Android Device: How to Use Your Computer

Installing apps to your Android phone via your desktop computer (or other “unofficial sources”) is fast and easy. Learn the simple process right here.  

Installing Android Phone

One of the best things about Android devices is the fact that you can access and execute unique commands on your Android from other devices, such as your computer. Of course, if you own and use an iOS (Apple) device, you know that there are certain commands you perform from your computer as well. But Androids allow for even more flexibility, and in particular, the ability to bypass the official “Google Play Store” for downloading apps.

Instead of being forced to use “Google Play Store,” you can instead opt to retrieve apps for your Android device from nearly any source. Without restrictions, you can download and install these apps onto your Android with just a few clicks.

Here’s how to do it.

Steps to Installing Android Apps From Your Desktop

Before diving into the specific steps, let’s talk about the utility you’ll need to use for this procedure. It’s called Android Debug Bridge or ADB, and it can be used on any operating system, from Windows to Linux and Mac.

This utility is what will allow you to transfer the installation of any app from your computer to your Android device. You can even remove apps that already exist on your Android device — all with Android Debug Bridge and all from your computer.

Ready to download some Android apps? Let’s get started!

Step 1: Download Android Debug Bridge.

Naturally, the first step in this process is to download Android Debug Bridge to your desktop computer. You can do this by going here. You’ll see the package called “SDK Platform-Tools.” Download the package for your appropriate operating system. Do not do anything with the download just yet.

Step 2: Enable your Android device to be recognized on your computer.

  • Head to the “Settings” app on your Android.
  • Navigate to “About phone,” and from them, tap on “Build number.” Do this approximately seven or eight times until it states you are a developer.
  • Go back to the “Settings” app.
  • Now, you’ll see an option labeled “Developer options.” Tap here.
  • Tap “USB debugging” to turn it on.

You’re all set to try installing an app!

Step 3: Get set up to download an Android app from your desktop.

Grab a USB cable, and use it to attach your desktop and Android. At this point, you may be asked to select your mode of connection. In this case, you should select “data transfer.”

Mac users:

1. Open Terminal

2. Enter: cd

3. Press “Spacebar”

4. Drag the folder labeled ADB from your “Downloads” folder (or wherever you receive downloads) and drop it into Terminal

5. Press “Enter”

PC users:

1. Open the downloaded ADB folder

2. Hold “Shift” down and right-click (doesn’t matter where)

3. From the pop-up menu, select “Open a command window here”

Step 4: Start the download process.

In the Terminal window at your disposal, type in the following: ./adb devices. Press “Enter.”

From here, you’ll see your Android phone listed (along with any other attached devices).

Keep in mind that at this point, you should already have the Android app APK file at-the-ready for installation. Keeping Terminal open, type in the following: ./adb install. Please “Spacebar.”

Now, navigate to the Android app APK file you’ve chosen as your first installation, and click and drag it into Terminal. Drop it into Terminal, and finally, press “Enter” to begin the installation process.

Head to your Android device and double-check that your new app has been downloaded.

And there you have it!

Not Interested in Downloading Apps This Way? ADB Can Still Be Highly Useful

Advanced Debug Bridge is a popular utility, most notably because of its ability to let you download apps to your Android device from basically any sources.

But even if you don’t plan on downloading and installing apps to your Android device with Android Debug Bridge, it’s a great utility to have on your computer. That’s because it allows you to perform numerous other useful tasks.

The most notable benefits you may receive from downloading and using ADB include the ability to create complete backups of your Android devices, the ability to reboot your device in recovery mode, and the ability to record your screen.

Whether you’re a professional developer or an average Android user, Advanced Debug Bridge is an excellent utility to consider. Again, you can find it here for immediate download.

Online Free Excel Training: Tips & Techniques For Managing Workbooks

Organization Shouldn’t Be Complicated

Out of all of Microsoft’s Office programs, Excel is one of the most universally used. What started out as a fairly basic spreadsheet program has evolved into a must-have business tool. However, the more you use Excel, the more data your workbooks will accumulate.

Keeping these workbooks organized and easy to navigate can be a challenge. We can help with that. Check out our short Excel: Tips and Techniques for Managing Workbooks training video, available to you free and on-demand.

Simply Click Here.

Watch at your leisure, and say goodbye to your Excel frustrations.

Managing Excel Workbooks

Efficiently Manage Notifications In iOS 12

iOS 12 notifications

Apple’s mobile iOS operation system is one of the most popular platforms in the world. With more than 1.3 billion devices running iOS worldwide, Apple has clearly done an excellent job of providing a world-class experience for its users.

Watch the video below or click here to watch on YouTube.

 

One area of the operating system that has undergone significant development in recent updates is in notification management. With more apps — and corresponding notifications — than ever before, it is important for mobile operating systems like iOS to provide ways for users to manage these notifications in a simple and streamlined way.

Here are some of the ways Apple is helping users manage their notifications in iOS 12:

Notification Grouping

One great innovation in iOS 12 is the ability to have notifications from individual apps “grouped”. This means that, instead of having a long list of every notification from an app, you will see the most recent notification for each app, with previous unanswered notifications stacked behind them. This makes it easier to see notifications from multiple apps, without the notifications from one app taking up all the space on your screen.

Grouped notifications can be expanded by tapping on the top notification, so you’ll still have access to all notifications when you’re ready to view them.

Deliver Quietly

Another new feature is the ability to have notifications delivered “quietly”. The “Deliver Quietly” function can be activated from the notification screen. When this setting is turned on, notifications will not cause a vibration or notification tone, but will still be visible when looking directly at your device. In essence, “Deliver Quietly” is very similar to the “Do Not Disturb” function — except that it can be app-specific.

App-specific notification settings

In addition to the “Deliver Quietly” feature, iOS 12 also gives users the ability to change other notification settings for individual apps. In addition to the ability to “Deliver Quietly” and turn notifications off completely, users can choose where notifications appear (notification screen, lock screen, banner at the top of the screen). In addition, individual apps can have sounds and badges turned on or off. Even notification grouping can be turned on or off for individual apps.

For the privacy-conscious, iOS 12 also gives users the ability to turn notification previews on or off for individual apps. This means you can still keep non-sensitive apps showing previews while protecting potentially sensitive data by turning off notification previews.

Quick notification setting changes

Perhaps the most convenient notification feature in iOS is the ability to quickly make app-specific notification changes. Instead of going through multiple menus in the “Settings” app, users can simply click on the ellipsis (three dots) that show up in the top-right of notifications. From here, users can make all the changes discussed in this article.

While there are more notifications than ever before, Apple is making them more manageable in iOS 12.

iOS 12 notifications