Lightning Fast Guide to Using Slide Master in PowerPoint 2016

Do you find yourself making a lot of formatting changes to your slideshows? Do you have to constantly rearrange the placeholders in each slide so things look the way you feel they should? Do the color options never seem to match what you need? Would you like to add a company logo or watermark? Then it’s time to look into PowerPoint’s Slide Master tool.

Microsoft PowerPoint 2016

Purpose of Slide Master

Slide Master allows you to make changes to the formatting and layout of the slides in your presentation. You can change fonts, font sizes, font colors, and colors. You can also add things like the company or organizational logos to your slides, or perhaps a watermark for the background.  Another key aspect of Slide Master is the ability to format and adjust the placement of the slide number, date, and footer text for your slides. You can also rearrange or resize the default placeholders that hold titles, text, or other media.

Accessing SlideMaster

There are two ways to access Slide Master:

  • First Way: Navigate to the View ribbon and then click on Slide Master
  • Second Way: Shift – Normal View button (see bottom right of the screen)

Once you’ve opened up Slide Master, on the left-hand side of the screen you can see thumbnails for the different types of layouts, such as title, comparison slides, image, and others. At the top level of this outline is the master slide.  By default, Slide Master will open up to the type of slide you were on when you opened it.

Making Changes in Slide Master

Any changes to layout or formatting in the top-level master slide will be changed in all the slides in your presentation. You would use the master slide to make changes to all the different types of slides at one time. For example, if you wanted to add a logo to the bottom of all your slides, this would be the place to add that logo. You can quickly check how your changes will affect your existing presentation by exiting out of Slide Master.

If you add text to the title or object area placeholders, it will not appear on your slides. This is because these placeholders are for modifying the formatting only. The text will appear only to show you how the formatting is going to look on the final slides.

Customizing Slide Layouts

Modifying slide layouts is good when you need all of a particular type of slide changed. For example, suppose you want to move the caption on an image slide (e.g., Content with Caption Layout) because it is obscuring the company logo you added. Then you can scroll down through the thumbnails on the left-hand side of the screen until you find that type of slide, click on it, and then rearrange the caption until everything fits the way you want it to. When you exit Slide Master, those changes will be made on all slides of that layout type. And any new slides you add using that layout type will also reflect those changes.

Modifying and Adding Footer Objects

There are three placeholders in the footer area of the slides: slider number, data, and footer text. These are a little bit harder to work within Slide Master. You can make changes to how you want the footer placeholders to look, but they will not appear on the slides unless you do the following once you have exited Slide Master:

  • Go to the Insert tab
  • Click on either Header & Footer or Slide Number
  • A box will appear that allows you to set up the actual text for the footer and the numbering scheme, and to indicate whether or not you want this information to appear on the title slide
  • Once you’ve entered all the information you need to, click Apply to All (if you click Apply, it will only add this information to the current slide)

Many people try to add their company name to the footer in Slide Master, only to have it not show up when they go back to the normal slide view. Remember, as mentioned earlier, that any text you type into a placeholder is only used to show you what the formatting changes would look like, not to add that text to the slides.

Exiting Slide Master

To exit Slide Master, make sure you are on the Slide Master ribbon. On the far right-hand side of the ribbon, there is a button that has an X in it and says Close Master View. Clicking this will return you to normal slide view.

Conclusion

Slide Master is a great way to make overall changes to the layout and formatting of your PowerPoint presentation. Taking the time to learn how to use it properly will make you a much more efficient PowerPoint user and can add that extra level of customization that helps to make your slides stand out.

Windows 10 Enterprise Is Microsoft’s Most Secure Operating System Ever

Windows 10 Enterprise

Is Windows 10 Enterprise Right For Your Business?

With the threats of cyber-attack at an all-time high, there’s no better time to reexamine your company’s operating system to see whether or not it offers the level of protection you, your company, and your clients deserve.

Windows 10 Enterprise

Windows 10 Enterprise ranks high among today’s most popular operating systems for large companies and it’s worth the expense. This operating system is beneficial to large businesses for a variety of reasons.

It features intelligent security, simplified updates, flexible management, and enhanced productivity. There are a number of other solid benefits to using Windows 10 Enterprise.

One of the main things that users notice about this operating system is that it makes up for what was lacking in Windows 8. The developers added many of the same familiar features that made Windows 7 so popular.

But Windows 10 Enterprise has much better security and an optimized interface for greater mobility within the workplace. All of this combined makes a strong case for why large organizations ought to consider Windows 10. It can breathe new life into your workflow and enable stronger productivity.

Enhanced Security

In terms of security, Windows 10 Enterprise is a viable option for businesses of all sizes, but particularly useful for large businesses. Windows 10 Enterprise’s Advanced Threat Protection, or ATP, has proven well worth its weight for peace of mind. In fact, the operating system was virtually unaffected during WannaCry, the largest global ransomware attack to date.

Its solid performance under this type of intrusion is a testament to its capabilities to keep businesses protected.  For this reason, large businesses with much at stake would do well to examine Windows 10 as an option, especially if they’ve been impacted by large-scale global attacks like WannaCry in the past.

Device Guard, Windows Hello, and Microsoft Passport are just a few added security features to help users maintain privacy.

Device Guard

Device Guard isn’t just one feature, rather a set of three features that work cohesively to protect your system and eliminate any untrusted code from infiltrating a Windows 10 system.

These features include Configurable Code Integrity (CCI), VSM Protected Code Integrity, and Platform and UEFI Secure Boot.

CCI is responsible for ensuring that only trusted code runs from the bootloader onward, while VSM moves KMCI and HVCI into VSM to protect them from attack. Finally, the last feature, Platform, and UEFI Secure Boot work to ensure that boot binaries and UEFI firmware are accounted for and haven’t been compromised.

Windows Hello For Business

Strong two-factor authentication is vital for robust IT security. Windows Hello for Business ensures a tough line of defense on PCs and mobile devices by going one step further. This new type of authentication boasts a unique type of user credentials associated with a device. It utilizes a biometric or PIN feature for better security, and even allows users to authenticate to an Active Directory or Azure Active Directory account.

Flexible Management

An improved interface is another big benefit of Windows 10. The ability to switch back and forth between different virtual desktops has been something Mac users have enjoyed for years now, and with Windows 10, the feature is now a reality for Microsoft users too. What’s more, the feature is simple to use, requiring just a tap of the task-switching icon.

In addition to enhanced security, Windows 10 Enterprise brings improved compatibility by way of the Microsoft Edge browser. From improved battery usage to new capabilities like reading mood and webpage markup, Edge is intended to make browsing easier and more efficient than before.

Windows 10 Enterprise also offers simplified updates with unique tools that help streamline deployment. IT employees wear many hats, and there isn’t always enough time in the workday to dedicate to repetitive tasks. Windows Autopilot allows for easy, seamless setup and deployment, meaning you can take a new device out of the box and have it fully configured and managed from the cloud, all with minimal effort from the IT department.

Insight into your organization’s IT health and overall efficiency is imperative for sustained growth. With Windows 10, IT managers can ensure employee compliance, a more effective user experience, and smooth upgrades.

Elevated Productivity

Windows 10 offers a world of opportunity for software for tasks both large and small. There is a whole selection of apps that can be full-screen or windowed. The new range of apps includes more powerful media and productivity apps, new photos, music, videos, mail, maps, and calendars.

If your business thrives on creativity, you’ll find a good range of new tools to take advantage of, including Windows Ink, 3D in Windows 10, and OneNote. OneNote offers a single place for notes and ideas, while 3D in Windows 10 allows users to add a new dimension and elevate their design work.

And in a further effort for simplicity and familiarity, Windows 10 apps are designed to sync across a variety of iOS and Android devices for easy navigating between phone and PC. Furthermore, Nearby Sharing in Microsoft Edge, OneNote, File Explorer and other apps enable users to quickly and easily transmit files and web pages to nearby PC users with the click of a button.

Wrap Up

Overall, it has become clear that Windows 10 and Windows 10 Enterprise carry a wide range of benefits for large businesses. If you feel that your organization could use some improvement in the areas of productivity, IT security, and a better user experience, then a switch to Microsoft 10 may be long overdue.

What Can Companies Do To Prevent Privacy Violations?

Privacy Violations

Whether it’s physical, virtual, or in the cloud, discovering and blocking sophisticated threats in the network is at the forefront of every company’s mind. However, businesses are finding that more and more data violations are taking place when network security centers on the edge of the network are not giving equal protection to the network itself.

Privacy Violations

Security at the perimeter of the network has received most of the attention from data protection companies. What many internet service providers and businesses have neglected is protecting what lies within the network. Once attackers get into the network, they normally have free reign to steal valuable data and go undetected. What can your company do to solidify your network and protect you from hackers on the inside?

5 Ways to Prevent Privacy Violations

Prevent Data Theft with Patches

If a company’s IT department is inattentive when it comes to the application of patches, security vulnerabilities and other bugs can easily creep into a network. A patch is simply a set of changes to a computer program and its data that are created to update or fix a liability or get rid of a virus threat. Rapidly growing networks today are comprised of a wide range of networks, including the IoT and the cloud. Keeping track of the equipment inventory and the maintenance of this vast network can be a daily trial. For a company to protect its technology, applying patches is no longer an option but a necessity.

Protecting a Network with NIDS

With cloud computing as a way of life, cloud computing security is a mandatory requirement.

Network-based Intrusion Detection System (NIDS) is one of the solutions for enhancing the security aspect of cloud computing services. NIDS discovers and monitors attacks within the network. NIDS is a signature-based technique with an identification data packet throughout the network.

For the majority of companies, privacy violations are caused by attacks that have been detected for a while. Because these vulnerabilities are well-known and have already been patched, attacks can be identified through security holes in the signature. Incorporating signature-based discovery tools, businesses can seek out a breach and put a stop to it quickly.

Using Behavior-Based Analysis

Zero-day attacks to a network occur within a time frame, known as the vulnerability window. They are vulnerabilities that have not yet patched the software containing the weakness. Hackers can engineer malware that exploits compromised systems and steals valuable data. New high-level attacks are operating various techniques to evade protective measures and attack the network connections without even being noticed.

Behavior-based computer security tools can be designed to discover false or unanticipated traffic. They can destroy zero-day malware variants with what is called detonation chambers or sandboxing and link the data to defend against smart attacks. Behavior-based computer security tools allow data and applications to be scanned for malware across the network and thoroughly inspected. They look for patterns and then constantly monitor the traffic to determine the intent, preempting an attack before it starts.

Installing Web Application Firewalls 

Although many attacks are caused by phishing emails or known, unpatched vulnerabilities, web-based attacks are becoming more the norm.  Software that probes and calculates information directly in the data center is commonly targeted.

A web application firewall (WAF) is a filter that is designed to go before you and sift through incoming traffic detecting potential threats and malicious activity. It is one of the most common means of protecting against attacks at the application layer.

In a June 2017 survey of the top 1 million websites, Mozilla reported that an unbelievable 93.45% earned an F score at implementing basic measures to protect them from common attack methods. Companies that fail to accept and adopt application security methods are opening themselves up for constant threats and attacks.

Incorporating Network Segmentation

The modern network needs to be able to handle access through varying devices and an assortment of application and data flows. Businesses can markedly improve their network safety by installing Internal Segmentation Firewalls (ISFW). Network segmentation works by splitting a computer network into subnetworks. If the defense perimeter is breached, an access point penetrated, or if there is an attack from inside the network, ISFW prevents the spread of such threats. ISFWs can be used to protect specific servers that hold a company’s most valuable information and can also protect devices from users and web apps in the cloud.

Conclusion

Managing cyber-risk is a multi-faceted company-wide endeavor that requires implementation from the top level down. The quicker you are able to respond to a threat, the greater the chance you have of being able to stop the potential damage. However, with the implementation of these new tools and strategies, you can protect your company records from hackers. It does take a proactive approach and a watchful eye.

Do You Know How to Add Email Signatures?

Step-by-Step Instructions on How to Add your Email Signature in Outlook, Outlook.com, and Gmail

Creating a signature that will leave a lasting impression at the end of an email is essential in today’s business world. However, users often struggle to know which font to use, how to make it stand out, but not make it too flashy, and so on.

If your company doesn’t specify a detailed way to create a signature, you may end up searching for professional email signature examples every time you change jobs, get a promotion, or feel the need to improve your current signature.

Let’s take a look at how to add a signature to the two most popular email platforms used today: Outlook and Gmail. We will also identify shortcuts and tips to make your experience using these email platforms easier and more effective.

Outlook

Frequently Used Keyboard Shortcuts

Knowing keyboard shortcuts can speed up the process of sending emails, formatting documents, and searching through the toolbar. Let’s look at some great shortcuts for Outlook.

Go to Home tab: Alt+H

New message: Ctrl+Shift+M

Send: Alt+S

Insert file: Alt+N, A, F

New task: Ctrl+Shift+K

Search: Ctrl+E Alt+H, R, P

Reply: Alt+H, R, P

Forward: Alt+H, F, W

Reply All: Alt+H, R, A

Copy: Ctrl+C or Ctrl+Insert

Send/Receive: Alt+S, S

Go to the calendar: Ctrl+2

Create appointment: Ctrl+Shift+A

Move to folder: Alt+H, M, V, select folder from list

Attachment SaveAs: Alt+JA, A, S

Navigating Through Outlook Using Shortcuts

Outlook has great shortcuts that can quickly allow you to hop around from email to calendar, and so on. Let’s look at these shortcuts.

Switch to Mail view: Ctrl+1

Switch to Calendar view: Ctrl+2

Switch to Contacts view: Ctrl+3

Switch to Tasks view: Ctrl+4

Switch to Notes: Ctrl+5

Switch to Folder list in the Folder pane: Ctrl+6

Switch to Shortcuts: Ctrl+7

Adding an Email Signature to the Desktop Version of Outlook

Step One: To begin, open up your Outlook email client and click on File.

Step Two: In the file window, click on Options.

Step Three: When the Options window pops up, click on Mail.

Step Four: In the Mail section, scroll down to Signatures.

Step Five: When the Signature window opens, Click on New.

Step Six: In the Signature window, type in your signature and add a company logo if you desire.

Once you have completed this process, you can select New Email to see the signature you’ve created.

Adding an Email Signature to Outlook.com

If you are using Outlook.com instead of the desktop version of Outlook, adding a signature is a little different. Let’s look at how to add a signature to Outlook.com.

Step One: In your Outlook.com email, click the gear symbol in the top right corner.

Step Two: In the dropdown, scroll down to options, and click on it.

Step Three: In the Options window, scroll down to mail, and click on Signatures.

Step Four: When the Signature window appears, add your customized signature.

Step Five: After adding your signature, click the Save button.

Once you have completed this process, you can select New Email to see the signature you created.

Gmail

Frequently Used Keyboard Shortcuts

As with Outlook, knowing keyboard shortcuts in Gmail can quicken your tasks of sending emails. However, with Gmail, you first need to turn the keyboard shortcuts on.

Turning on Keyboard Shortcuts in Gmail

First: In your Gmail window, click the gear symbol in the top right corner.

Second: Click on Settings.

Third: Scroll down to the “Keyboard Shortcuts” section.

Fourth: Select Keyboard Shortcuts On.

Last: At the bottom of the page, click Save Changes.

Gmail Shortcuts

Once you have your keyboard shortcuts turned on, here are some great shortcuts in Gmail:

Open keyboard shortcut help: Shift + ?

Select a series of messages: Shift

Select all unread messages: Shift + 8 + u

Archive selected messages: e

Mark selected messages as important: =

Compose Email: c

Undo last action: z

Search for messages: /

Go to tasks: g + k

Add a conversation to tasks: Shift + t

Reply: r

Reply all: a

Forward: f

Mark current messages unread: Shift + u

Mark selected message as important: =

Archive selected message: e

Jump to newer email: k

Jump to previous email: j

Jump to next message in email thread: n

Jump to the previous message in email thread: p

Jump back to inbox view: u

Insert link: Command + k

Insert numbered list: Command + Shift + 7

Insert bullet points: Command + Shift + 8

Bold/Italicize/Underline: Command + b/Command + l/Command + u

Remove formatting: Command + Control + \

Send Email: Command + Enter

Adding an Email Signature to Gmail

Step One: After you have signed in to your Gmail account, click the gear symbol in the top right corner.

Step Two: In the drop down, click on Settings.

Step Three: In Settings, scroll down to the Signature window, and add your Signature.

Step Four: At the bottom of the page, click Save Changes.

Wrap Up

There you have it! Easy ways to add a custom signature to today’s most popular email platforms. Plus, as a bonus, all the shortcut keys you need to make sure you’re saving time and being productive each day.

 

Do You Know How to Spot Fake Software and Updates? Learn the 7 Red Flags!

If you are connected to the internet, then you are a target for malware, viruses, and hackers. Every day, 350,000 new malware programs come to the surface. Your firewall and anti-virus protection can only provide so much security. That is why it is very important that you know how to spot fraudulent software and fake updates. Fortunately, there are several common red flags that you and your colleagues can learn to watch out for.

Software Updatest

Red Flag #1: An Offer to Scan Your System Pops Up on Your Screen

Be very wary of software pop-up ads! If an ad (often disguised as an alert) pops up unexpectedly on your screen and offers to scan your computer for malware or viruses, do not click on it. There is an extremely high probability that the real malware or virus is the downloadable software itself. For example, many of these fake software pop-ups will install a keylogger that records your keystrokes, including logins and passwords – which compromise your system and any accounts that you access through the infected computer. Anti-virus and anti-malware software should only be purchased and installed from well-known, reputable sites.

Red Flag #2: You Receive an Alert That Your Device is Full of Viruses

If an ad is warning you that it has already discovered multiple viruses on your computer, this is another red flag that the software is fake. If you click on the ad, then it will offer to install software to clean up your computer — but the truth is, this program will infect your computer with viruses or malware. This is not how real antivirus software actually warns users.

Red Flag #3: Software Suddenly Demands Your Information

The sneakiest of software scams are often introduced to your computer through an infected email that provides a way for malware to be installed on your system. This malware will provide you with an alert that looks very much like a legitimate anti-virus software alert. If you click on the alert, it will eventually request your credit card information or your personal information. Real anti-virus software never does this.

Red Flag #4: You Receive an Email with an Update Link

If you receive an email with a link to update, beware. The vast majority of modern software and apps will alert you through the software itself or via the system tray when an update is imminent, not with an email. Chances are that the update link in that email will install malware or result in a drive-by download. Beware of emails like this. They should not be opened; much less should any links inside them be followed.

Red Flag #5: A Pop-up Appears That Informs You That You Need to Update A Plug-In

Many of us have problems browsing the web when a pop-up appears via our web browser and tells us that a particular plug-in, say Adobe Flash, needs to be updated or we cannot view the page. These pop-ups can be incredibly convincing, with authentic looking logos. But do not be deceived. This is malware. That is not how a reputable software company will let you know that an update is needed. Never update your software through a browser pop-up.

Red Flag #6: You Receive an Alert from Software You Don’t Own

This one might seem a bit obvious, but many people don’t keep track of what software is on their system, especially if it is a work computer. Because of that, it can be easy to fall for a serious looking alert and click on it before making sure that software in question is something that is actually installed on the system. This trap is more common in businesses than on personal computers, but equally dangerous for both.

Red Flag #7: You get a Pop-up Alert That Your Browser is Outdated

Once again, this is not how modern browsers let you know that you are running an outdated version. This particular scam started making the rounds in February of this year. It detects what type of browser you are using and tailors the pop-up to that browser, with pretty convincing graphics.

Being Smart

Make sure you know what software you actually have installed on your system, especially when it comes to anti-virus software. Be familiar with how that software alerts you that an update is needed, and whether or not it automatically updates. Do not trust updates by email, or any browser pop-ups that try to get you to install something. Be careful about letting a program have access to your computer, or update your browser. Legitimate companies do not use those methods!

Conclusion

A little awareness and common sense can go a long way in helping you and your colleagues to avoid falling for scams that can compromise cybersecurity. In an age of ever-evolving cyber threats, a healthy dose of suspicion can go a long way toward protecting your computer from malicious software and internet scams!

What Are the Top 10 Phishing Email Subject Lines from Q2 2018?

Phishing Emails

Phishing EmailsHackers are constantly throwing in new and clever phishing attacks that threaten email users’ security.  KnowBe4, one of the top security attentiveness and simulated phishing platform contributors recently issued the top 10 phishing email subject lines from this year’s second quarter. Please note, the attacks used most often contain email subject lines that relate to a user’s passwords and security warnings.

An estimated 1 out of 3 people will open a phishing email each day. This tricky way of gathering people’s personal and financial information is getting bigger, despite all the warnings from technology experts.

What is Phishing?

Phishing is a technique that hackers practice to steal personal information, like credit card info or login authorizations. The hacker replicates an existing login page from an online service such as Dropbox, Apple, Gmail or your financial institution. This made-up website holds a code that delivers all the personal data you submit directly to the hacker. To lure you to the bogus website, hackers send a believable email to you. Quite often, the email sent to you will ask you to log in to your bank account because your bank has exposed a transaction that you did not authorize.

Hackers can make these emails look and sound real and their exploits have been very successful. They often use fear. The email will make it sound like you need to take action NOW! So without really checking, the victim clicks the bad link and continues to the bogus landing page where they give the cyber thief their log-in and password information.

Why is Phishing a Concern?

It is reported that consumers, businesses, and organizations will lose an estimated $9 billion in 2018 globally. With so much personal information tied to finances now shared online, hackers use phishing in order to illegally steal your money.

The Anti-Phishing Working Group (APWG) latest quarterly release reported:

  • Over 11,000 phishing domains were created in the last quarter alone.
  • The number of phishing sites rose 46% over the previous quarter.
  • The practice of using SSL certificates on phishing sites continues to rise to lure users into believing a site is legitimate.

Is Phishing Just a Risk for Personal Users?

Because they store a lot of files in the cloud, Phishing is also a risk for all kinds of companies:  Digital design companies, financial institutions, security companies, etc. According to hackmageddon.com, there were 868 reported company security breaches or cyber-attacks in 2017.

What do Hackers need to be successful?

There are generally three things hackers do to gain access to your information:

  • Build an email account to send emails
  • Buy a domain and set up a fake website
  • Think of a tech company that is used often to mask itself as a legit website (Dropbox, Amazon, eBay, etc.)

What Can I Do to Avoid Phishing?

It has become increasingly difficult to guard yourself against phishing. As hard as Apple, Google, and other tech companies have worked to filter them out, hackers are always devising new ways to phish. However, here are some tips on spotting phishing emails:

  • Try to avoid clicking on buttons and/or links in emails.
  • Begin using password managers. A password manager aids the user in creating and retrieving complex passwords and storing the passwords in an encrypted database. Therefore, if hackers get one of your passwords, they can’t use it on any of your other accounts.
  • Don’t put total faith in the green lock icon in your address bar. This only ensures that it is a private channel but does not inform you about who you’re communicating with.
  • Allow 2FA (two-factor authentication). Two-factor verification is an extra layer of safekeeping otherwise known as “multi-factor authentication.” 2FA requires a password and username, and also something that only the user knows (mother’s maiden name) or has (passcode texted to another device, such as a cell phone).
  • Be extra cautious if the browser plugin of your password manager doesn’t show your login credentials automatically.
  • Be quick to report suspicious emails to your friends and colleagues. Organizations who make it easy for their employees to report attacks will see a significant decrease in cyber-attacks. The quicker an IT department can respond to a threat, it will minimize the threat potential damage inflicted on people.

Ironically, the trend for most of these phishing emails are warnings about security alerts.

Here are the top 10 from Q2:

  1. Password Check Required Immediately (15 percent).
  2. Security Alert (12 percent).
  3. Change of Password Required Immediately (11 percent).
  4. A Delivery Attempt was made (10 percent).
  5. Urgent press release to all employees (10 percent).
  6. De-activation of [[email]] in Process (10 percent).
  7. Revised Vacation & Sick Time Policy (9 percent).
  8. UPS Label Delivery, 1ZBE312TNY00015011 (9 percent).
  9. Staff Review 2017 (7 percent).
  10. Company Policies-Updates to our Fraternization Policy (7 percent).

Why Should My Company Upgrade to Windows 10?

Windows 10

If you are in a startup company or run a small business, the simplest software update can easily cause anxiety for you and your group of employees. Everyone has experienced the update that causes glitches and hiccups that can disrupt the workflow.

Windows 10

With that said, why should you upgrade to Windows 10? Is it worth the hassle? Let’s look at the reasons why upgrading to Windows 10 will benefit you and your team in the long run.

10 Reasons Why You Should Upgrade to Windows 10

The Need for Speed

One of the major advantages Mac has had over Windows for years is the speed at which they start up when the power button is pushed. Windows 10 has a feature called Fast Startup. How it works is when you shut down your computer, rather than just placing everything in RAM, Windows will save an image of your loaded kernel and drivers in what Microsoft calls the hiberfile. The next time the system boots up, it just reloads this file, making it boot abundantly faster.

The Return of the Start Menu

For Windows 10, Microsoft has created an updated version of the Start menu that includes the familiarity of the classic menu from older versions along with parts of the Start screen that they introduced with Windows 8.

In this newest version, you will see a left rail with buttons to access different settings and locations. On the right, there are Live Tiles, which will light up to keep you up to date.

Talk to me, Cortana

The ability to be able to talk and interact with your technology hands-free is liberating and can also be exciting. Not only can you instruct Cortana to play music or jot down notes for you, Cortana will remind you to pick up needed items using your Android iPhone and Windows Phone. Another smart feature Cortana offers is Her Notebook, which tracks your interests, giving you information, such as when your favorite band is in town, team scores, local weather, and even traffic updates for your drive to and from work.

Apps at Your Employee’s Fingertips

For those still using Windows 7, there is no way to utilize the app store. Windows 10 opens up the possibilities for your team to get software more readily to assist them with various tasks. Windows 10 makes these apps safer as well, since they now run in their own sandboxes. Utilizing social media to promote your business is easier with Windows 10 and the easy-to-use media apps, which include access at your fingertips to the following:

  • Photos
  • Videos
  • Calendars
  • Maps
  • Mail
  • Music
  • People

The Added Touch

Microsoft took all of the basic features from Windows 8, but then added several new ones in Windows 10. The 2-in-1 laptops with Windows 10 allow you to have both touchpads and touchscreens in one device. Microsoft is adding the touchscreen to many desktop and laptop computers.

A Call to Action

Windows 10 gives you the advantage of allowing pops-up notifications for messages, updates, and important news. The Microsoft Action Center shows messages from email, system updates and warnings, and messages and updates from apps. Sometimes the updates come at a time when you are absorbed in a project or task. When that happens, you can quickly dismiss the notification. Windows 10 gives you the opportunity to go back and see the entries you missed when you are not as busy.

 A New Browser

Windows 10 comes with a brand-new browser called Microsoft Edge, which has great compatibility and speed. Tests have revealed that Edge is easier on both tablet and laptop batteries than Chrome. It is 15% more secure than Chrome as well.

Added Security

Keeping Secure Boot from Windows 8, Microsoft has made it even more secure. A specific code runs immediately when your computer starts up to make it incredibly difficult to penetrate. Windows 10 makes it so there is no way around these security measures. Windows 10 also implements Device Guard which provides better security against malware.

 The Virtual Desktop Advantage

Just like on a Mac, Windows 10 lets you open multiple windows and apps at the same time. If you are multi-tasking on a work project and personal tasks, you can easily do this with Windows 10 and the virtual desktop feature.

Xbox App

Windows 10 has an Xbox app that allows you to track your online friends, while also letting you stream games from the console to the PC.  Utilizing The Windows Store gives Xbox players an easy way to find and purchase games with a simplified flow between the PC and Xbox.

Wrap Up

Upgrading to Windows 10 shouldn’t be stressful or difficult. Though it does take a few minutes to perform the update, you’ll have access to some new and helpful features. In addition, your network security will be improved. Once you get the hang of it, you’ll wonder why you waited so long to make the move.

Tips To Have Microsoft Outlook Play By The Rules

Using Rules To Organize Your Outlook 2016 Inbox

The purpose of Rules in Microsoft Outlook is to help you organize your email and receive updates if items are changed. Rules can save you time, keep on top of high priority tasks, and reduce the clutter of your Outlook inbox – if you know how to use the Rules Wizard correctly.

Basics of Outlook Email Rules

To set up a Rule, you first select the condition(s) that the email must meet (e.g., certain words in the subject line or from a particular sender), then indicate what you want to have happen when an email meets those conditions (e.g., place in a certain folder or provide an alert). It helps if you think about how you process your email. For example, you get various emails about a certain project, so you place those in a folder for that project. The condition would be that the subject line contains that project name in it, and the action would be moving it to a certain folder.

Creating a Simple Rule

Let’s create a simple rule that takes all emails with a subject line that contains the word “Proposal” and moves them to a folder in the “Smith Account.” Begin by right-clicking on a message in your Inbox. In the list that appears, select Rules>Create Rules. This will open up the Create Rules dialog box.

The Create Rules dialog box is fairly straightforward to use. The first section of the dialog box deals with the rule conditions. Check the Box beside Under Subject Contains, then type Proposal in the text box next to it. That indicates the rule is to apply to all emails whose subject contains the word Proposal. Then, moving down further in the dialog box, check the box next to Move the Item to Folder. A list of available folders pops up. Select the Smith Account folder (note you can create a new folder if needed by clicking on the New button), and click Ok. Smith Account will now appear next to the words Move Item to Folder. Next, click on OK to create this rule.

Another dialog box pops up to let you know the rule has been created. Notice there is a checkbox that says Run this rule now on messages already in the current folder. If you check that box and click OK, this allows the rule to immediately be put to use on existing emails. Otherwise, it will wait until new email messages come in.

For email rules, conditions can include sender, text that appears in the subject line, or who the email was sent to. When an email meets the conditions, then you can choose what happens next.

Available options for what happens in a simple email rule like the one we just created include the following:

  • Display in the New Item Alert Window
  • Play a Selected Sound
  • Move the Item to a Folder

Using Rule Templates

You can access templates for Rules by going to File>Manage Rules and Alerts>New Rule. Here the Rules Wizard gives you access to templates organized under three categories: Stay Organized, Stay Up to Date, and Start from a blank rule.

Under Stay Organized, there are templates for the following:

  • Move messages from someone to a folder
  • Move messages with specific words in the subject to a folder
  • Move messages sent to a public group to a folder
  • Flag messages from someone for follow-up
  • Move items from a specific RSS Feed to a folder

Under Stay Up to Date, here are your options:

  • Display mail from someone in the New Items Alert Window
  • Play a sound when I get messages from someone
  • Send an alert to my mobile device when I get messages from someone

Let’s run through a quick example using a Rules template. We will create a rule that flags messages from a certain person for follow-up. Note that this can be applied to an email from people or from public groups. Begin by going to File>Manage Rules and Alerts>New Rule. This will start the Rules Wizard. Under Step 1, go to Stay Organized, select Flag messages from someone for follow-up.

At the bottom of the Rules Wizard, you will see Step 2. Here, you will edit the rule description to meet your needs. Anything underlined in blue can be edited. In the case of a move messages rule, you should see something like this under Step 2:

Apply this rule after the message arrives
from people or public groups and
flag message for follow up at this time

If you click on people or public groups, then you will be provided with a list of people or public groups to choose from. Clicking on follow up at this time will open up flagging options. These include what type of flag to apply (e.g., Follow Up, For You Information, Forward, etc.) and when it needs to be completed (e.g, Today, Tomorrow, This Week, Next Week, No Date, Complete). Once you’ve edited the rule description to meet your needs, click on Next.

This takes you to some additional options for refining the rule, such as requiring that certain words be in the subject or that the email comes through a specific account. Clicking on Next allows you to add exceptions to the rules, such as making an exception for emails sent from a public group or that you have been CC’ed on.

Clicking Next again allows you to name your rule and choose from a few more rule options that are presented next to checkboxes. These rule options are as follows:

  • Run this rule now on messages already in Inbox
  • Turn on this rule
  • Create this rule on all accounts (this only appears if you have multiple accounts)

Once you’ve made the modifications you need, click on Finish. Outlook will provide you with a message to let you know if the rule is only run when Outlook is open. Click on OK, and everything will be set up.

Conclusion

Taking the time to think through how you process email helps you gain control of your Outlook 2016 inbox. Remember that the rules can be as simple or complex as you want them to be. If you don’t know where to start, then use one of the Rule Templates. Templates simplify the Outlook Rules Wizard process so you can get familiar with how it works.

How Concerned Should I Be About An IoT Attack?

This video made by Cisco does an incredible job of showing how the Internet of Things (IoT) based attacks are already a reality in the business environment. The Internet of Things is changing our culture. For us to see innovations in medical care, manufacturing, and utility services, we have to adjust to this new way of operating a business and ensure our networks remain safe from attacks. A new Gartner (the world’s leading research and advisory company) survey reveals that almost 20 percent of organizations have experienced one or more IoT-based attacks in just the last three years. Also, they are predicting that global spending on IoT security will reach $1.5 billion in 2018, a 28 percent increase from 2017.

Who Needs to Defend Themselves from an IoT Attack?

Finance Industry

The rapid-paced world of finance has encompassed the digital revolution. Banks, investors, and financial institutions of all kinds track current market conditions and command precise, up to the minute data. Through IoT, the financial industry will link and grasp the buying performance of clients. IoT technologies will provide the financial market with real-time analytics to push a more significant revenue stream.

The Risk

Since the end goal for cyber-attacks is money, the finance industry is the apparent leading target for cyber villains. Financial institutions are a top target for ransomware attacks. Smart devices offer tremendous potential for finance with instant access to customer data, but IoT devices are a blind spot that exposes financial companies to easy unlawful access.

Financial organizations are stringently regulated, and they have to meet an assortment of regulatory and compliance standards. For a company to provide satisfactory protection of IoT devices, businesses need full asset discovery for all their devices on all of their networks. They also need an ability to keep track of the behavior and monitor the connections made by those IoT devices.

The Solution

It’s crucial for financial institutions to have a service that gives them instant protection of IoT. Their devices must connect safely to the network, and they need a system that monitors the activity and exchanges of these devices. Being able to automatically identify erratic behavior or suspicious connections will ensure that the companies remain secure and compliant.

Healthcare

Gartner Research states that 25% of healthcare attacks will initiate from IoT devices by 2020. And over 70% of hospitals now report that security risks around connected medical devices are their biggest concern.

The Risk

With the arrival of the Internet of Things age, the healthcare industry has a new task: The Internet of Medical Things. MRI machines, x-ray machines, and heart monitors, just to name a few, are devices that can now be infiltrated threatening the vital care of a patient.

The Solution

Most of the current IoMT devices were not intended to have a high security-first position. They cannot support an agent to ensure their security. Healthcare organizations need an agentless resolution that can recognize the devices, their performance, and the networks to determine if a medical device has been compromised. They also need to be able to quickly disconnect the device from the network if it has been compromised.

Manufacturing

IoT has made the manufacturing world more efficient by providing access to vital data in real time. IoT sensors provide companies with the ability to monitor the temperature in food manufacturing, the performance of the production line, and track quantities of their product up to the minute. IoT improves the manufacturer’s production efficiency to cut costs and provide better quality.

The Risk

Manufacturing is a multifaceted progression that relies on numerous moving parts to keep running smoothly. When this progression slows or stops production, it will have a disastrous impact on profit and may cause long-lasting damage to the reputation of the product or brand. IoT streamlines manufacturing, however, since it is connected, it is also vulnerable to attack. Invaders can influence IoT devices to send bad data that affects quality or productivity, halt systems altogether, and stop productivity. Compromised IoT devices in the manufacturing sector allow hackers to gain access to the network and steal whatever data they want.

The Solution

What occurs in manufacturing settings is the reality that these smart devices and sensors were not originally designed with security in mind. Most of these devices are totally unmanaged when it comes to security. With no way to protect the IoT device directly, companies need a new approach to IoT security. Being able to monitor device behavior to detect when it is connecting to a hacker’s network is critical. Also, interacting with inappropriate devices or systems in order to identify suspicious or anomalous behavior will save the manufacturer from peril. Companies need a smart security solution that can see any IoT or unmanaged device, and respond automatically to ensure there are no interruptions of productivity.

Cisco IoT

Summary

The number of IoT attacks, and the damage that they have done, have both been gradually growing. IoT security requires businesses to be able to keep track of their device’s state, performance, vulnerability, history, and reputation. Visibility and monitoring can help companies detect potential attacks, but in order to prevent an attack, their security system must be able to control all wired and wireless connections in order to spontaneously block traffic or disconnect compromised devices. This IoT security solution must also be able to assimilate seamlessly with the company’s existing network hardware and software.

As companies realize the very real dangers of an IoT attack, they must work together to design and create security solutions that protect their bottom line.

Promoting Events On Facebook. Industry Secrets Revealed

Everything You Need To Know About Facebook Events!

Facebook allows you to post events for pages and groups, and from your personal page as well. Many of the options are going to be the same for all three of these, but not all options – and some options, once set, you cannot change. It’s a good idea to have an overall idea of what you can do and what information you need as you create an event on Facebook.

Facebook Events

Creating Events for a Page

You can create public events for a Facebook page. You’ll start by navigating to the Home page for the particular Facebook page involved with the event. Once there, click on Create Event. From there, you can add a picture for the event, and then specify information such as the name of the event, its location, date and time, and any co-hosts (which can involve individuals or other Facebook pages).

If tickets need to be purchased to attend the event, there is a spot to add a URL to take individuals where they need to go to buy a ticket. Next, you can describe your event, select a category, and add tags to make your event easier for people to discover. There is also an option you can check to make sure that only the host and co-hosts can post on the event wall.

Sometimes you may want someone else to take a look at an event before you publish it. If you notice, there is a drop-down arrow beside the word Publish. One of the options is Save as a Draft. You (or someone else) can come back to it later and publish it. Sometimes you may want to schedule the event to be posted at a later time, and for that, you can use the Schedule option.

Once you’ve created your event, don’t forget to invite people, share it with others, or publish it on the Facebook page behind the event. This will help to get the word out about the event. You can also promote an event for a page.

Creating Events for a Group

You can create events directly from a Group page as well. There is a Create Event option that directs you to enter information such as name, location, date, time, and details. The final option controls whether or not posts and stories related to the event must be approved by the admin.

Who will be able to see the event depends on the privacy settings for the group. If it’s a Public group, then anyone on or off Facebook can view it. If the group is Closed, only members can see posts and events. If someone tries to access the event page, they will not be able to see any of its contents. The same is true for Secret groups.

Creating Events from Your Personal Page

For events related to a personal page, you’ll want to navigate to your Facebook homepage, and the easiest way to do that is to click “Home” on the upper right-hand side of your screen. Once there, you’ll notice a list of Favorites in the column of the left-hand side. In that list, click on Events.

That takes you to information about events that are going on. You want to create a new event, so click on Create Event.

Event Privacy Settings

Now, this part is essential: the drop box beneath Create Event gives you the one and only opportunity to decide if your event is going to be public or private.  If you want it to be a public event, then click on Create Public Event. If this is going to be a private event, then click on Create Private Event. Public events are visible to anyone, even people not logged in to Facebook. Private events, on the other hand, are only visible to the people that you invite. If they aren’t invited through Facebook, they’ll never even know the event exists.

Private Events

Once you’ve chosen private events, it’s time to set the attributes for your event. You can start by selecting an image to upload for the event, as well as an option to choose a theme to use. Next, you’ll add the name of the event and the location. Next comes the date and time information. All of this can be edited later on if you wish.

Now, there is a caveat with private events. One of the options you can choose will allow people invited to invite their friends. Do not check that box if you want to retain full control over who can see the event and who is invited via Facebook. This is the last option under private events. Once you’ve entered the information, click on Create. The next task is to encourage your Facebook friends!

If you’d like to add co-hosts, click on Edit Event. This not only allows you to select someone as a co-host, but it will enable you to invite additional friends and change other event details such as time or description.

Public Events

Setting up public events is similar to what we just described for private events. First, however, you’ll need to specify who the host is going to be. You can then add a picture of the event, then the usual event name, location, time, and description. Added to public events, however, are descriptive tags you can use to describe your event and make it easier for interested parties to find out about it. Once you’ve filled in all the information, you can Edit Event and make changes or add a co-host.

Conclusion

Facebook is a great way to get information out about your event. This popular app gives you quite a bit of control over who views it and who can be invited. Knowing what the options are as you go along can help you get it right the first time. Though most details can be edited, some cannot, so it may be a good idea to write down all the details of your event before ever going into the Facebook app to create your next event. Brainstorm with friends. Write down specifics. Locate good photos that will make the event shine. These are just a few ways to ensure that your next Facebook Event is a huge success.