Free Microsoft Outlook Training

Microsoft Outlook Training

Every month, we host Microsoft Office and other technology training sessions. Our training sessions are completely free of charge and are available “on-demand”.  Yes, you can tune-in whenever and wherever you like.

Microsoft Outlook Training
 

This month’s training session: 4 Ways To Use Microsoft Outlook Efficiently.

Our in-house Microsoft training specialist, Dawn, will guide you through some very important tips and tricks, such as:

  • Quick Parts
  • Templates
  • Automated Responses
  • Signatures

Tune into this month’s training by clicking here.

Online Excel Training: Tips & Techniques For Managing Workbooks

Organization Shouldn’t Be Complicated

Out of all of Microsoft’s Office programs, Excel is one of the most universally used. What started out as a fairly basic spreadsheet program has evolved into a must-have business tool. However, the more you use Excel, the more data your workbooks will accumulate.

Keeping these workbooks organized and easy to navigate can be a challenge. We can help with that. Check out our short Excel: Tips and Techniques for Managing Workbooks training video, available to you free and on-demand.

Simply Click Here.

Watch at your leisure, and say goodbye to your Excel frustrations.

Managing Excel Workbooks

The End of Windows 7 Support: Things to Know

Windows 7 Support

The Fall of Windows 7 Support: A Guide for Businesses

According to Microsoft, Windows 7 support is ending. Find out what this change can mean for your Windows 7 computer systems in your business operation so you can start preparing now. 

Windows 7 Support

Beloved by many and still in use by a lot of business owners, Windows 7 has been one of Microsoft’s most sought after operating system software products. Even though Microsoft has released other OS designs since Win7, most prefer the simplicity of Win7 and have stuck with it. Unfortunately, Microsoft has announced the end of an era. The company will stop support for Win7 as soon as January 2020. Here is a look at some of the things you will need to know as a business owner who is using devices with Windows 7 installed.

You Will Be Able to Use Win7 without Support

Even though support is ending for Windows 7, it does not mean that you will no longer be able to use the operating system in your business operation. There will, of course, be some differences, such as:

  • no ability to bring in the aid of support when you have a Win7 problem
  • there will be no patched security updates from Microsoft to protect you from the most recent malware attacks
  • some system processes may have slight issues on occasion

It Will Be Possible to Install Win7 After Support Ends

Win7 has garnered itself a pretty stable fan base over its 10 years in use. In fact, the OS is so popular among users that at least 44 percent of people still use Windows 7, according to British Technologies. Microsoft has stated that they have no intentions of completely discontinuing Win7, so it will still be available for installation; it just will not have open support available if you run into problems during installation.

There Could Be Security Risks of Using Windows 7 After Support Ends

If you are looking for the biggest reasons to upgrade from Windows 7 to Windows 10 once support ends, security comes in at the top of the list. Microsoft regularly releases and automatically installs patched security updates to Windows 7 systems when a new threat spurs the development of a new line of software protection. A serious downside to consider here is the fact that some hackers will take advantage of the end of a major operating system’s line of support.

Support Could Be Extended for Certain Win7 Business Users

If you know there is no way that you can get your systems updated before the end of support, it is a good idea to get in touch with Microsoft. There has been talk that Microsoft will be offering extended support through 2023 on a case-by-case basis for businesses who have struggles upgrading in time and can be in danger of security threats.

Internet Explorer Support Will End As Well

Internet Explorer is a product of Windows7, and Microsoft pretty much did away with IE with the development of Edge. Therefore, support will end for IE along with Win7. Unfortunately, this end of support could make an already weakened browser a little less secure and a little more attractive to hackers.

The end of Win7 support is a major change for a lot of business owners. If you need help with upgrading your devices to a newer Windows OS, reach out to a managed IT service for help.

Business Continuity Planning: Developing An Impact Analysis

Business Continuity Planning

According to FEMA, 40% of businesses hit with a disaster never recover, and this rate more than doubles for those without a business continuity plan. While the two are linked, a business continuity plan shouldn’t be confused with disaster recovery. You might have a great plan for getting things up and running after an event but still fail to plan for continuity of time-sensitive business functions. And that’s why developing a real continuity plan is so important.

Business Continuity Planning

What Is a Business Continuity Plan?

Business Continuity Plan is an essential component of risk management. The BCP specifically addresses the risk associated with an unanticipated lack of ability to continue business operations. The reasons for this lack could be many:

  • Natural disaster
  • Terrorist attack
  • Major power outage
  • Technology failure
  • Loss of customer data
  • Someone hijacking customer data and holding it for ransom

Even a couple hours of lost operations can have multiple consequences. A BCP mitigates them by identifying and assessing risks before developing, testing, implementing and measuring the effectiveness of strategies that keep your business running with the least downtime possible.

Some of these strategies may include:

  • Reducing risk to customer data through firewalls, backups, employee education, security protocols, etc.
  • Enhancing your servers and telecom infrastructure
  • Enhancing data recovery
  • Re-routing calls/contact
  • Developing a work from home program
  • Setting up a temporary “base” when your building isn’t accessible

The strategies vary as much as the companies that employ them. So before anyone begins developing a business continuity plan, it’s important to know what areas are impacted by the inability to continue operations. How much do they cost your company?

What is a Business Impact Analysis?

The Business Impact Analysis is the first critical step in developing a business continuity plan. In this phase, identify time-sensitive business operations. Additionally, consider related resources needed for employees to perform those functions.

An effective analysis not only identifies these elements. It employs data to prioritize business continuity efforts.

Continuity concerns may present themselves on a scale. At one end you have mere inconvenience. At the other is significant (and possibly irreparable) business harm. So it’s important that when developing a business impact analysis, you make the distinction.

Every department will naturally feel that they are the “most important”. But scrambling to prevent inconvenience will drain resources from impactful continuity challenges. Once again, data save the day. It helps us make the most impartial, data-driven decision.

When it comes to business impact analyses, there are no “cookie-cutter” solutions. That’s why this phase of planning is so important. It helps you develop the customized plan you need to mitigate risk effectively.

How to Develop a Customized Impact Analysis for Your Business

When developing an impact analysis, look at each department, team, and/or area of your business. As you do, consider these three areas. FEMA business impact analysis worksheet says that those elements are:

  1. Timing/Duration of outage
  2. Operational Impacts
  3. Financial Impacts

So, for example, if Department A can’t continue operations for 30-60 minutes what happens? How does this impact the bottom line? What if that department/team were down for two hours? And so on. The ramifications will get progressively worse.

In some departments, financial impacts may be fairly easy to measure. But in others, you may need to think more broadly about the costs of downtime or lack of access. This will give you a truer picture.

  • Direct Financial Impact – lost sales, paying employees who can’t work, overtime to catch up, increased customer returns, etc.
  • Customer Relationship Impact – lost client contracts, bad customer reviews, diminished social sharing, bad public relations, cost of PR damage control
  • Vendor Relationship Impact – lost vendor contracts, increased vendor costs, strained partnerships, lost trust, trouble building new partnerships
  • Employee Relationship Impact – lost faith in the company, morale issues from too much overtime, retention problems, increased recruiting costs
  • Regulatory Impact – This one may vary by industry as well as department. For example, in healthcare, failure to comply with HIPAA may result in fines and legal troubles. If you process payments, inability to meet PCI regulations could result in loss of contracts with major credit card companies. Any company that’s managing customers data ( e.i., every company) should have some awareness of SOC2 compliance and the impacts of not properly securing customer data to maintain business functions. In education, lack of continuity would not only impact FERPA compliance.

Don’t “assume” these costs. In most cases, you’ll have data to clearly quantify their impact. Once you’ve considered the true impacts of lack of continuity in each area, you’re ready to prioritize and develop your business continuity plan.

10 Questions Every Company Should Ask Before Outsourcing IT Services

Questions for Managed IT Service Providers

Ten questions to ask while considering outsourcing your IT services to a provider.  

Many companies are outsourcing their IT functions due to convenience and budgetary constraints. Small- and medium-size businesses can focus their hiring of staff for their core business, and hire an IT consultant for their expertise and efficiency. However, even with the growth in IT consulting, there are several things you should consider before signing a contract.

Questions for Managed IT Service Providers

It easy to fall prey to assumptions when interviewing consultants to outsource IT services. Packaged services don’t always include additional IT support, management, maintenance and security needed for your business’ network. When agreeing to a contract, look carefully to make sure it contains everything you need. Here are some questions for you to ask when interviewing a new consultant.

1. How do you support security compliance?

Often IT providers support security compliance through their package bundles which include an array of features and components. On this list of features you should see firewall configuration, vulnerability patching, incident response, intrusion detection systems (IDS), demilitarized zones (DMZs), intrusion prevention systems (IPS) and more. These features should be included by default to protect your data and hardware.

Dependent on your industry and client list, you should have a good idea of the level of security necessary for your network to ensure compliance and proper security documentation. Discuss this with any providers you interview to match the level of security needed to protect your business.

2. How do you manage service integration?

In order to stay competitive, your company needs to fine-tune service integration. Standard Information Technology Infrastructure Library (ITIL) capabilities require integration and automation from your IT service provider to minimize errors and provide secure and effective on-demand service delivery.

3. How do you support incremental outsourcing?

In order to reduce risks associated with outsourcing, you can divide the requirements you need into manageable projects. If you provide a specific set of deliverables to your service provider to work with in a trial setting, you can better assess their completion. You have the option of having the work done on your premises or remotely to better prepare for completely outsourcing managed services.

4. Do you provide a service-level agreement (SLA)?

The service-level agreement (SLA) is one of the most important factors in outsourcing IT services. This agreement is where the service provider details the list of support actions they will provide including end-to-end program management and deliverables to your company.

The agreement should lay out how the provider will take on the project from your company, deploy a small remote or on-site team to coordinate and complete the work. Included in the agreement are delivery dates, the effectiveness of the work, surveys to ensuring the quality of service, and timeframes for the availability of services and service request response times.

5. How flexible is the SLA?

Can the provider grow and change as your business does? Changes within your company should be reflected by the services provided for your IT needs. As you grow, your company will hire more people, take on new projects, add new departments and functions, and have a need for scalable IT infrastructure from your IT provider. In fact, your service provider should have expertise in their field that includes the knowledge and experience to custom-fit a scalable infrastructure that you need for your company.

6. What kind of experience do you have?

If you look at managed service providers by price alone, you may find that you don’t get the expertise you need. It’s better to outsource your IT services needs to an expert that’s completed hundreds of projects successfully. Extract the most value from an experienced partner to gain peace of mind over the quality of work completed. Included in the experience is the latest training and tools available to best protect your company’s data.

7. How do you handle IT strategy vs. emergency support?

If your company has a strategic IT strategy, you need a service provider that can act as a partner in this process. Your service provider should be the expert resource to assist in your strategy. If all they do is take orders and offer emergency service, they are not the right fit for your company.

8. Who will govern our IT services?

Your SLA should include an understanding about who will govern and take responsibility for your IT services. By including a foundational governance framework, you will set the tone for future accountability and start with a shared understanding for your team and your provider’s team. This framework determines which entity makes specific decisions to support organizational principles.

9. What is your reporting process?

Formal reporting should be listed in your SLA and include the standard set of reports provided and a timeline for delivery of those reports from the provider. The frequency and scope of the formal reports between the provider and in-house manager should take place according to the schedule. However, many providers offer informal reports as work is completed.

10. How will you adopt new configuration management?

Changes are part and parcel of a business, making managing those changes routine for your IT service provider. For routine changes, your SLA should cover implementation, but if you have a large project then you should discuss management with your provider before implementation. You can initiate a change request to the provider to allow them to complete an analysis of how to proceed. Once the provider has responded with a schedule and any questions they have, you can move forward on the project together. With a system in place to accomplish new projects, it’s easy to maintain proper tracking and logging of work completed.

Get Your Beauty Sleep With Nightlight In Windows 10

Windows 10 Tips and Tricks

Get Your Beauty Sleep With Nightlight In Windows 10

You may have been using Windows 10 for some time now, but it’s likely that you haven’t mastered all of its features just yet.

If you, like so many others, use your computer late at night, before (or even in) bed, then you may have found that it throws off your sleep cycle. Despite being tired when you got into bed, after staring at the backlit screen for a few hours, you’re not as tired anymore.

This has to do with melatonin – a chemical produced by your body when your eyes see that it’s dark and determine its time for sleep. Looking at a bright screen throws off this natural process, and the lack of melatonin makes it harder to get to sleep.

Did you know you can reduce this effect with Nightlight?

Nightlight is a feature that lowers the brightness of the screen and changes the color spectrum in order to limit the interruption to melatonin production. To turn it on, find it under Settings, and set a schedule for it to follow based on your preferences for late-night computing.

We hope you enjoyed our series on Windows 10…searching for a new IT company?  Give us a call at {phone} or send us an email to {email}.

Texas Government Organizations Blasted In Coordinated Ransomware Attack

Texas Government Coordinated Ransomware Attack

Have you heard the news over in Texas?

Over 20 government organizations across Texas were targeted in a coordinated ransomware attack. That’s right… These government organizations have been added to the ever-growing list of major attacks on government organizations in Florida, Albany, Atlanta, and Baltimore.

The threat of ransomware attacks on corporations, government, and yes, even local small businesses is all too real.

Don’t miss our latest video outlining what you can do to stay safe. Click Here or click the play button below.

Be aware that these threats are very serious. Coordinated ransomware attacks are going to get a lot worse before they get better. In many recent cases, following proper precautions would’ve gone a long way towards prevention.

Follow these quick tips below:

  1. Invest in cybersecurity awareness training
  2. Invest in a rock-solid security solution
  3. Speak with your insurance rep about cyber liability insurance
  4. Schedule a cybersecurity risk assessment

Questions? Call {company} at {phone} or send an email to {email}.

Capital One Data Breach

Recently, news broke about the latest large-scale data breach to hit a major organization. Capital One Bank has announced that millions of customers across the US and Canada have had their personal information compromised in one of the biggest breaches to ever happen to a financial services company.

This brief video courtesy of News24 discusses the scope of the incident, the kinds of information impacted, and tips to help protect you from scams that target you directly.

 

If you have any questions, give us a call at {phone} or email us at {email}.

Capital One Data Breach

The End Of Windows 7

As of January 14th, 2020, Microsoft will be ending all support for their hugely popular Windows 7 operating system, which has technology professionals strongly recommending businesses upgrade to Windows 10 in response.

This brief video on the subject discusses what the end of Windows 7 support means for users and the risks that come with choosing not to upgrade before January 2020.

 

 

If you have questions or want to find out how we can assist you with upgrading smoothly to Windows 10, give us a call at {phone} or email us at {email}.

Windows 7 End of Support

Capital One Data Breach

Capital One Data Breach

Recently, news broke about the latest large-scale data breach to hit a major organization. Capital One Bank has announced that millions of customers across the US and Canada have had their personal information compromised in one of the biggest breaches to ever happen to a financial services company.

This brief video courtesy of News24 discusses the scope of the incident, the kinds of information impacted, and tips to help protect you from scams that target you directly.

If you have any questions, give us a call at {phone} or email us at {email}.

Capital One Data Breach