Reclaim Productivity with These Microsoft Excel Secret Shortcuts

Microsoft Excel Tips

25+ Microsoft Excel Shortcuts to Boost Your Productivity

Are you getting your money’s worth out of this productivity tool? Find out how to save insane amounts of time and frustration with these 25 Microsoft Excel Tips  

When it comes to processing data, Microsoft Excel is everything to everyone. But because it’s a vast tool, many people never take the time to discover the Excel shortcuts relevant to them.

Obviously, these Excel shortcuts aren’t really secrets. No one’s hiding them from you. But because we don’t learn them, we waste a lot of time in an otherwise very streamlined and powerful productivity tool.

Franklin Covey, the author of the bestseller business classic, 7 Habits of Highly Effective People, said we need to take the time to “sharpen the saw”. Are you working with a dull blade by not using Excel to its fullest? Check out these Excel tips that will instantly sharpen your skills.

Learn Navigating Shortcuts

Ctrl+End moves you to the bottom right-hand corner of your worksheet. Because this stays within the cells in which you currently have data points, shortcuts like this let you quickly move from one side of the sheet to the other. You don’t have to endure the frustration scrolling too far.

Similar navigation shortcuts include:

  • Ctrl + Home – Go to upper left-hand corner.
  • Ctrl + Down Arrow – Go to lowest cell in the currently highlighted column.
  • Ctrl + Up Arrow – Go to the top cell in the current column. But keep in mind that if you have a blank cell in the column, it will stop there whether you’re going up, down, left or right.
  • Ctrl + Right – Go to the far right of the current row.
  • Ctrl + Left – Go to the far left in that row. Home key also does this.

Use the Go To Box

In the upper left-hand side of Excel, above your worksheet, you’ll find a Go To box. Simply point and click into the box. Then you can type any coordinates to go directly to a cell. For example, G102. If you’re working with a large sheet, Microsoft Excel tips like this are indispensable.

Keyboard shortcuts will always save time once you know them. But it’s when you’re on devices that have difficulty with point and click systems that you’ll save the most time.

Use F5 or Ctrl + G to pull up the Go To box automatically. Then type, press enter and go.

Use this same shortcut to select ranges of cells.

You can further use Go To Special, which is in the bottom right of the Go to Screen. This takes you directly to cells that meet a particular requirement. For example, if several cells on a spreadsheet should have a formula, this gives you a visual of which cells are missing formulas to help you validate your data.

From here, while the cells are highlighted, you might choose to add special formatting to make your sheet more understandable at a glance.

Highlight Cells Without the Mouse

Once again, your mouse is a terrible way to navigate in Excel. As you try to highlight groups of cells across columns, you inadvertently select other cells and can’t seem to get the right ones selected.

Yes, there are some better ways to select large numbers of cells with Excel shortcuts.

Ctrl+A highlights all cells with data points in them. Press Ctrl + A again to highlight the whole sheet.

Or highlight a specific section with this keyboard-mouse combo. Just start at the top-left cell of the part you want to select. Then Shift + click into lower right cell with the mouse. This highlights everything vertically and horizontally in between those cells.

You can accomplish the same thing without the mouse if needed. Simply move to the starting cell (always top left) for your highlighted area. Then hold the shift key and use the arrows to highlight across a row, down a column or across columns/rows.

You can also keep holding shift and move the arrows until you get it just right. Or use the mouse plus keyboard technique first. Then fine-tune what you select by pressing shift again and then using the arrows.

This is perfect for erasing large sections or formatting areas of your sheet.

But let’s say that the cells you want to highlight aren’t all next to each other. You can still highlight them together. But you will need the mouse for this one. Hold select while clicking the various cells, you’d like to highlight.

Once you’ve highlighted these cells, use Microsoft Keyboard shortcuts like:

  • Ctrl + B – Bold
  • Ctrl + I – Italic
  • Ctrl + U – Underline

And know that even if you’re using Excel on a Mac, you still have similar shortcuts. In most cases, the Command key replaces CTRL.

Improve Cell Data Entry Speed

Data entry is the centerpiece of Excel. But there are definitely some right and wrong ways to do it when treating Excel like the productivity tool it is. Check out these Microsoft Excel tips for faster and more accurate data entry.

  1. Highlight an occupied cell and start typing to replace the data. There’s no need to delete or backspace first. But be careful. You could accidentally erase a cell this way.
  2. Edit more detailed cell data from the formula bar instead of in-place. This is especially effective if you have formatted your sheet to not show all the data in a particular cell because it’s long. Just click the cell and then click into the appropriate place in the text to start typing within that bar.
  3. Use in place editing when small amounts of data in a cell. Simply double click to open the cell for editing.

Excel Shortcuts & More

We’ve only scratched the surface. So practice these 20+ tips and you’ll be eager to learn more. For more ways to increase your individual and corporate productivity, follow our blog.

Microsoft Excel Tips

Watch Out! Windows 7 Loses Support in January

Windows 7 End of Support

Careful – Your Windows 7 Loses Support in January 2020

If you use Windows 7, you need to be aware that Microsoft will end support for your operating system in January 2020. Now is the time to upgrade to Windows 10.  

Windows 7 End of Support

Windows 7 is an operating system that still has plenty of serious fans – in fact, it was only earlier last year that the market share for Windows 10 moved past Windows 7. Considering that Windows 10 was released in 2015, that is saying something. All good things must come to an end, though, and Windows 7 is no exception. Microsoft is ending support for Windows 7 in January of 2020, which means that it will become much more difficult to keep the OS up and running moving forward. And a recent announcement from Microsoft has let Windows 7 users know that they are going to be seeing bigger, full-screen pop-ups to warn them of the upcoming end of life of the operating system.

Microsoft is Magnifying it’s Warnings about End of Windows 7 Support

All through 2019, Microsoft has been telling Windows 7 users that the support for their operating system was going to end in 2020. Of course, if you are using Windows 7, you may have missed the warnings or just decided to think about them later – after all, a year is a long time. But the end is really around the corner now.

The official end of support for Windows 7 is January 14, 2020. The day after, on the 15th, you will no longer be able to get support from Microsoft if something goes wrong with your operating system. That is why the prompts telling you that Windows 7 support is going to end are getting a lot bigger and more obnoxious. Microsoft is going to push full-screen pop-ups telling you that “your Windows 7 PC is out of support”.

You don’t have to keep looking at the notifications if you don’t want to. You can ask Windows to remind you later or to never remind you again. You can also choose to ‘learn more’, which will take you to an information page about what loss of support means and give you the option to upgrade to Windows 10.

What Does “Loss of Support” Mean?

There are several things that will happen when support ends for your Windows 7 operating system, including:

  • Loss of tech support. Right now, if something goes wrong with your Windows 7, you can contact Microsoft and get somebody to help you with the problem. They can run you through troubleshooting steps and try to get things going again. But when support ends, you won’t have the option of contacting Microsoft about it. They will tell you that they no longer support your operating system.
  • No more software updates. Microsoft is always working to improve their operating systems – at least the ones they currently support. But once they stop support, they stop putting resources into improving an OS. That means there will be no more updates to make Windows 7 secure and stable.
  • Loss of security. There are always people out there looking to compromise Windows operating systems, even ones as old as Windows 7. When you lose support for your OS, it means that Microsoft will no longer be trying to identify threats and upgrade your OS to defend against those threats.
  • Loss of compatibility. This is the biggest problem for most people with unsupported operating systems. You may be ok with being less secure and not getting the latest and greatest improvements, but you are unlikely to be happy when your favorite software stops working with your version of Windows. Over time, the thing you can use your computer for will become fewer and fewer as software moves beyond your OS.

Fortunately, getting support for your OS is easy enough – you just have to upgrade to Windows 10.

Getting Professional Data Analysis without Hiring Professional Data Analysts 

Business Analytics

Learn how AI helps businesses analyze customer provided data and IoT implementation important for growth, customer loyalty, and greater profitability.  

Business Analytics

There is so much data available to your business but getting a proper read on its importance an investment in costly data scientists. Learn ways technological advances, such as AI, helps your business synthesize data and provide your IT team with the information needed to create apps and other solutions at a lower cost.

The Internet of Things (IoT) is at the forefront of the data analysis performed by businesses. According to a recent article appearing in Forbes.com, data centers used to house the billions of bytes of data businesses collect, along with business analytics are growing at a compound annual growth rate of 50 percent between the years 2017 – 2021. The market value of IoT in 2017 was $235 billion and expected to more than double to $520 billion by 2021.

What does this mean for you and your business? All those valuable bits and bytes you collect from your customers is useless if you do not have a team in place that can help you make sense of it and use it to grow your business. This typically means hiring a staff of professional data scientists who, according to the U.S. Bureau of Labor Statistics (BLS), earned a median pay in 2018 of $118,370 or $56.91 an hour. That is a huge investment in labor which may be better spent instead on AI developed approaches to data analysis and app development.

Leveraging AI to Produce Professional Data Analysis

Professional data scientists cost you nearly $60 per hour while computer programmers with less education and the skills necessary to write and test computer code and develop apps based on your data earn about $40 an hour (median pay of $84,280 according to BLS). AI gives you the ability to hire programmers over scientists, who can help you properly analyze and utilize your data. Here’s how: AI has involved in one of the few technological advances capable of passing the Turing test.

If you are not familiar with the Turing test, it is the ability of a machine to demonstrate human-like intelligence and provide responses indistinguishable from human responses. That this phenomenon has finally happened for the first time in 2014 (64 years after the test was developed in 1950 by British mathematician Alan Turing, noted for breaking German code during World War II) means AI has become the leading driver for businesses looking to bring sense and order to data and quickly create consumer-driven apps to further engage customers and increase revenue.

Why AI over Human Analysis?

Without giving away to fears about machines taking over ala Stanley Kubrick’s HAL 9000 in the movie “2001: A Space Odyssey,” business should come to quickly recognize that machine learning and AI are useful technologies, important in reducing human labor costs and providing a way to integrate IoT into your business.

Hiring programmers who can seize upon the results of AI analysis comes at a savings of about $35,000 per scientist needed to perform the role artificial intelligence does. This alone gives you a compelling business reason to consider the advantage of leveraging AI over traditional human analysis performed by professional data scientists. As companies move slowly toward IoT implementation, you have the opportunity to be on the forefront and beat your competitors to the punch, enabling you to chart uncharted territories and seize important market share!

Are SAML-enabled Enterprises Needed?

SAML Enterprises

SAML-enabled Enterprises Increase Network Security with SSO

SAML helps organizations implement single-sign-on. End-users need a single username and password for system access. SAML simplifies management of network security  

One of the first things most of us do when we arrive at work is sign-on to the corporate network. On the rare occasion that we have to sign on to a specific application, we’re irritated. Why is the separate sign-on necessary? The simple answer is SAML.

SAML Enterprises

What is SAML?

SAML stands for Security Assertion Markup Language. It is an open standard for sharing information across an enterprise for authentication and authorization of the end-user. It’s what lets you sign on once to access multiple applications. For SAML to work, all applications must communicate using the SAML specification. If an application cannot support SAML, the end-user will have to sign on separately.

How Does SAML Work?

A single-sign-on (SSO) environment has an identity provider where the user’s identity information is stored. When the end-user wants to use an application in the SSO environment, the application or service provider makes a request to the identity provider. The identity provider authenticates the end user’s identity and responds to the service provider’s request. The end-user is either granted or denied access.

A simplified SAML process for an end-user named Joel might flow like this:

  • Joel tries to sign on to his work computer. His sign on initiates a request to the company’s identity or SSO provider, asking for authentication.
  • The SSO provider authenticates Joel’s identity and grants him access to the network.
  • Joel launches his email program. His request initiates an exchange with the email application referred to as a service provider.
  • The service provider is configured to authenticate using SSO, so the application asks the identity provider for authentication of Joel.
  • The identity provider responds to the service provider with a digitally signed response that identifies Joel.
  • The SAML-formatted response either authenticates and authorizes Joel for the email application or denies access.
  • The service provider validates the identity provider’s response and either grants or denies access to the email application.
  • Joel accesses his email via the service provider’s application, based on the identity provider’s response.

All requests and responses must conform to the SAML protocols for exchanging information.

Why Use SAML?

SAML centralizes the authorization process. It also externalizes authentication to a separate identity provider. The configuration provides several benefits for both the end-user and the organization.

  • SAML provides a standard for deploying internet-based single sign-on.
  • SAML raises security access to the highest level. An identity provider can enforce a high level of authentication, such as Two-Factor Authentication, even if the individual applications do not support a high degree of authentication.
  • SAML simplifies the sign-on process for the end-user, who only has to remember a single user name and password.
  • SAML offers a single point for deactivation by centralizing access rights.
  • SAML enables the identity provider to audit access across SAML-enabled applications.

With a SAML-enabled enterprise, administration and monitoring of user access are reduced. Using an identity provider with a higher level of authentication than other applications within the network increases security. Allowing end-users to sign-on with a single username and password minimizes the number of times individuals require assistance because of forgotten passwords or usernames. The ability to control user access from a single point enables an organization to de-activate end-users quickly.

Chrome Users Need to Update Now

Google Chrome Updates

Why Google Chrome Users Should be Concerned About Security Patches

Does Your Organization Use Google Chrome? Find Out Why Recent Security Flaws Have Created an Urgent Need to Update Your Devices’ Browsers Immediately  

Google Chrome Updates

If users in your organization use Google Chrome, there is a high chance that several of those systems are creating an opportunity for hackers to install malware. Google recently identified a major security flaw with its Chrome browser that impacts Windows, Mac, and Linux-based devices. Although Google has released a security patch to correct the security vulnerabilities, the patch fixes two separate problems.

Security Vulnerabilities

One of the security vulnerabilities Google identified is Chrome’s audio component. The other vulnerability is tied to the browser’s PDF library. Both allow unwanted modifications or corruptions to memory data. This allows hackers to elevate privileges on the device or within applications installed on the device. If someone is able to gain administrative access to a system or software on a system, the individual could make unwanted changes or wreak havoc on the device’s operating system. There is also a high chance that a hacker could install malware or execute malicious code on the device.

Version

The version of the browser that fixes the security issues is 78.03904.87. Although the Chrome browser may be configured to automatically update itself in the background upon launch, it is a good idea to manually check each device. The browser can be manually checked by selecting the Help menu and then “About Google Chrome.” If there is an update available, the browser will automatically search for it and find it. The browser’s version will also be displayed in the “About” section. If the listed version is 78.03904.87 or later, then the device has received the necessary security patch.

If there are problems with the browser updating, it may need to be removed from the system and reinstalled. Some organizations have an automatic process to uninstall and reinstall applications from the server once the devices connect to the organization’s network. Reports can be run to see which systems still have outdated versions and technicians should manually check those systems to diagnose why automatic updates are not going through.

Other Considerations

A system that is not receiving automatic updates from Google Chrome may have other issues. Technicians should check for the following:

  • Is the anti-malware program up to date and running correctly?
  • Is the OS receiving approved updates and are these updates installing?
  • When was the last time the system pinged the network?
  • Has the system been restarted recently?
  • If the system has been disconnected from the organization’s network, how long has it been offline?
  • Has a malware scan recently been run? Were any malicious items identified and removed?
  • Are there are any suspicious executables or unauthorized programs installed?

Sometimes wiping a system and completely reinstalling the OS are the best courses of action. Signs that a device may be too infected, corrupted, or outdated include the presence of unauthorized or suspicious applications, more than 100 pending OS updates or a previous update date that is more than a month old, and an anti-malware program that will not update or run a scan correctly. Before wiping a system and reinstalled the OS, a technician should check for and back up any user data that may be installed on the device’s hard drive. However, the data should be carefully scanned for any malware infections prior to transferring it back onto the system.

Microsoft Excel Experts SWEAR By This…

Microsoft Excel Training

Businesses nowadays collect an incredible volume of data from various sources, including online sales, in-store-transactions, social media, and various other places.

So how do you find value in that data? The simple answer: Organizing it properly within worksheets.

Ready to unlock the potential of your data? If you want to analyze and make sense of the information you’re storing, here’s how…

Watch Our Microsoft Excel Tips and Techniques Video

In the video above, we teach you how to link several worksheets together within one workbook AND how to link data across multiple workbooks to:

  • Reduce errors
  • Save time
  • Improve data integrity

Click here to watch online

Questions? Feel free to reach out to us at any time.

Microsoft Excel Training

No quicker way to let ghouls into the network 👻

Windows 7 Upgrade

Ghosts, ghouls, and monsters, OH MY…

Are you planning to let them into your network?

Seriously…

Cybercrime is rising at an incredible rate.

A network is attacked every 39 seconds.

Windows 7 Upgrade

What’s the quickest way to let these bloodcurdling creatures into your network?

Run outdated technology, that’s all.

Windows 7, Windows Server 2008, and Windows Server 2008 R2 will no longer be supported come January 14th, 2020.

No more security patches or bug fixes = a gravesite filled with the WORST of the worst.

Get outta there before it’s too late!

RUN, FAST. (but don’t forget to call us to start phasing these technologies out!)

Questions? Give us a call or send us an email.

[ Free Training] Protect Your Yourself From Hackers

Ransomware attacks are growing a staggering 350% each year. And to make matters worse, 43% of all cyber-attacks are aimed at small businesses. Why? Because more often than not, they don’t have the budget or expertise to protect themselves.

Online Cybersecurity Training

Fortunately, knowledge is prevention in situations like this. Even if you don’t have an unlimited amount of money to spend on enterprise-grade security solutions, you’re able to stand a chance as long as your staff members are trained.

After all, human errors are the biggest vulnerability when it comes to staying safe online. Take a look at our training site where we outline 10 ways to stay safe online below.

Click Here To Watch Our Online Training

You never know… One of the tips outlined in the video might be just the thing to prevent you from becoming a victim of an attack that would otherwise cost you thousands of dollars.

If you have questions, hit the “reply” button and let me know.

This free training could save you thousands…

Ransomware attacks are growing a staggering 350% each year. And to make matters worse, 43% of all cyber-attacks are aimed at small businesses. Why? Because more often than not, they don’t have the budget or expertise to protect themselves.

Online Cybersecurity Training

Fortunately, knowledge is prevention in situations like this. Even if you don’t have an unlimited amount of money to spend on enterprise-grade security solutions, you’re able to stand a chance as long as your staff members are trained.

After all, human errors are the biggest vulnerability when it comes to staying safe online. Take a look at our training site where we outline 10 ways to stay safe online below.

Click Here To Watch Our Online Training

You never know… One of the tips outlined in the video might be just the thing to prevent you from becoming a victim of an attack that would otherwise cost you thousands of dollars.

If you have questions, hit the “reply” button and let me know.

This video might save you thousands…

Online Cybersecurity Training

Ransomware attacks are growing a staggering 350% each year. And to make matters worse, 43% of all cyber-attacks are aimed at small businesses. Why? Because more often than not, they don’t have the budget or expertise to protect themselves.

Online Cybersecurity Training

Fortunately, knowledge is prevention in situations like this. Even if you don’t have an unlimited amount of money to spend on enterprise-grade security solutions, you’re able to stand a chance as long as your staff members are trained.

After all, human errors are the biggest vulnerability when it comes to staying safe online. Take a look at our training site where we outline 10 ways to stay safe online below.

Click Here To Watch Our Online Training

You never know… One of the tips outlined in the video might be just the thing to prevent you from becoming a victim of an attack that would otherwise cost you thousands of dollars.

If you have questions, hit the “reply” button and let me know.