Check Spelling With Microsoft PowerPoint 2016

Microsoft Powerpoint Check Spelling

If you’ve ever attended a high-level education course or business meeting, chances are you’ve come across the PowerPoint presentation. Microsoft’s PowerPoint program has been helping students and professionals organize their thoughts and ideas for decades. From class presentations to complex business proposals, Microsoft PowerPoint 2016 holds a wide range of benefits for users. Familiarizing yourself with the program’s many features can help you create engaging and error-free presentations every single time.

How To Spell Check Your PowerPoint Presentations

It’s important to make a good impression on your audience when using PowerPoint. This includes proper spelling and grammar throughout the entirety of your presentation. Misspelled words and grammar errors can make for an embarrassing moment in front of classmates or colleagues. This is why it’s important to learn to utilize PowerPoint’s wide range of tools. Knowing when and how to check the spelling within your PowerPoint proves you’ve gone the extra mile to produce a professional presentation that helps your audience clearly understand your talking points.

There are several things you can do to improve the overall user experience. Here are a few steps to follow to spell check your PowerPoint presentation.

Run A Spell Check

PowerPoint automatically checks spelling for its users. As you type, you might find some words underlined in red. This can happen quite often in the first draft of your presentation, so don’t panic. While PowerPoint will draw attention to your errors automatically, if you’d rather wait until after you’re done with your presentation to spell check, you have that option, as well.

PowerPoint’s Spelling and Grammar tool was designed to help users create error-free presentations. Once you notice an error, simply right-click on the word to reveal an option for correction. You can also choose the “Add to Dictionary” option, which will avoid PowerPoint flagging the word for the remainder of the presentation.

If you are ready to spell check your entire presentation after you’re finished, click the “Review” tab and then click “Spelling.” PowerPoint will move through each error, offering you options to edit, until you have reviewed them all. PowerPoint will provide alternative options for every error. You may choose one of these suggestions, then click “change” to correct the spelling error. If there are no suggestions provided, or none that make sense for your presentation, you’ll be able to manually type in the word’s correct spelling.

You can repeat this process for each error you encounter as you navigate your presentation. Once the last error has been corrected, you’ll see a dialog box that will confirm your presentation’s spell check is now complete.

Contrary to popular belief, PowerPoint’s Spelling and Grammar tool isn’t flawless. For words like proper nouns and people’s names, the system may still detect an error even if there isn’t one. You can easily ignore spelling suggestions if they don’t apply. Just click “Ignore” to skip a word without changing it. You can also ignore all by clicking “Ignore All”. This will not only skip the word without changing it, but will also skip over other uses of the word for the remainder of the presentation.

Modify Your Proofing Options

Microsoft PowerPoint allows users to modify and customize proofing options to allow more control over the process. For instance, you have the option of customizing the way PowerPoint notifies you of spelling errors. The grammar check also carries the option of helping you correct contextual spelling errors, further simplifying the process as you type. To modify these proofing options, access Backstage view by clicking the File tab, then select the Proofing option to customize as needed.

Find And Replace Words

Finding and replacing certain words is easy with Microsoft PowerPoint. Doing this can help you save time as you work on your presentation. For Mac users, simply locate the “Search in PowerPoint” box in the upper-right corner of your screen, then click the arrow right next to it. This will provide the option to “Replace” text. In the “Find What” box, type in the word you’d like to locate, then type in the word you’d like to use instead, inside the “Replace With” box. You can click “Find Next” to locate the next occurrence of the word, or simply click “Replace All” to replace all occurrences.

Present In Different Languages

Microsoft Office, above all, is intended to make work more efficient for its users. PowerPoint for instance, allows users to type in different languages, such as Chinese or Arabic. To type your presentation in one of these non-Latin based languages, you first must change your keyboard layout. If you’re unable to locate your desired language through Office, you may need to add it manually or download a Language Accessory Pack. These packs can add extra display and/or proofing tools to help you create a highly professional PowerPoint presentation.

Microsoft Powerpoint Check Spelling

Microsoft PowerPoint 2016 is one of many tools within the Office Suite designed to make business better for users. Utilizing these tools to their fullest can potential can help businesses achieve their goals more efficiently than ever before.

 

Excel for Mac: The Latest Features

Microsoft Excel for Mac

A new release of Excel for Mac came out in January of 2018, and with it, some very useful features were added to its existing capabilities. While some spreadsheet power users tend to shy away from the Excel version for the Mac operating system out of fear they won’t be able to do all they are used to, those who have taken the plunge have found it to be every bit as powerful and functional as they need. And with these latest features, it has only gotten better.

Co-Authoring

The latest release of Excel for Mac fully supports the ability for multiple people to work on a document at the same time, also known as Co-authoring. You will no longer have to struggle with a “this file is locked message” when someone else is using a file. You also won’t be forced to work with a read-only copy.

Now when someone else is working on the same workbook, the Sharing corner will show you who that person is. By clicking on their initials, you can see their name and where they are currently editing. This also makes it easy for you to chat with them from inside Excel.

New Chart Types

Excel for Mac has also added some new chart types to support even more powerful data visualization. The Waterfall Chart is one of the newly added types. It is ideal for visualizing data such as revenue coming in, costs going out, and the difference between them.

Charts that focus on hierarchies of data are also supported, such as Treemaps and Sunburst Charts. Treemaps allow you to quickly see a hierarchical representation of data using rectangles and allows you to visually compare data for different categories based on the relative size of their rectangles.

Sunburst charts, on the other hand, look a little like the classic donut chart but use different levels of rings to allow you to drill down into subcategories. The Sunburst chart shows how different pieces contribute to the whole at various levels of abstraction.

Histogram charts have been added to the new release, also. Now you no longer have to adapt a column chart in order to visualize your histogram data.

Another impressive addition to the charting capabilities available in Excel for Mac is 2D Map Charts. This allows you to visualize geographically related data overlaid on a map of the region in question, whether it’s world-based, continent-based, or country-based. Excel works with data from the Bing map engine to create stunning mapped charts.

Microsoft Excel for Mac

Expanded PivotChart Functionality

Excel for Mac has also updated the functionality of PivotCharts: a PivotChart will immediately adapt to changes in the PivotTable upon which it is based. This makes PivotCharts much easier to use and far more interactive. If your document has a data component, you can use the Timeline feature to adjust what data is plotted in the PivotChart. Timelines can easily be inserted via the Insert menu.

Multi-threaded Calculations

Multi-threaded, simultaneous calculations of spreadsheet formulas is now supported in the latest Excel for Mac release. In the past, each formula was processed one after another. Now, with multi-threading, multiple formulas can be processed at the same time. This means that worksheets filled with long, complex calculations will take just a fraction of the time they did in the past. And perhaps the best part is that you don’t have to do anything special – no settings to change, no options to set – for multi-threading to be implemented.

Slicers for Tables

Another useful feature that Excel for Mac now supports is Slicers for tables. Slicers allow users to easily filter out unwanted information so they can immediately focus on what is important to them. What makes Slicers useful is the easy-to-use button interface and the fact that they don’t just work on PivotTables.

Sending Feedback to Microsoft

You can send feedback to Microsoft via the Smiley Face button that appears on the upper right-hand side of the screen. This allows you to either tell Microsoft what you liked about Excel for Mac, or tell them what kinds of things they could do better. The latter not only means you can more easily request new features, but you can send information about specific problems you have encountered. If you’d like to get a response, you can include an email address – but just remember that they don’t have time to respond personally to all the feedback that they receive.

Conclusion

Excel for Mac is constantly evolving to be more like Excel for Windows, and these updated and added features demonstrate Microsoft’s commitment to making that happen. With multi-threading capabilities, coauthoring, new and better charts, and slicers, Excel for Mac users can do even more. And don’t forget to provide your own feedback to Microsoft. This feedback helps the company design more user-friendly apps for its users.

How Safe Am I From an IoT Attack at Home and Work?

IOT Home

As convenient as our interconnected world has become, it has also made us vulnerable to an attack from hackers wanting to make a quick buck. Internet pirates are targeting defenseless networks with the sole purpose of hijacking our personal devices for use in their criminal activity.

IOT Home

The Internet of Things (IoT) is changing how we live our day-to-day lives both in our personal lives at home and our professional time at work. From a doctor’s visit, installing a home security system, and paying our utility services, we have to adjust to this new way of functioning to make sure our information is safe from attack. A recent Gartner (the world’s leading research and advisory company), survey states that 20 percent of individuals and businesses have had one or more IoT-based attacks in the past three years.

What Exactly is the Internet of Things (IoT)?

The “Internet of things” (IoT) has quickly become a buzzword thrown around in the business world and independent of it. It has the potential to influence how we live at home and also how we operate in the workplace. Because of the complexities that surround the Internet of Things, let’s try to break it down to a simple understanding.

The Internet of Things is the concept of linking a device with the Internet or another device. What this means to you is that the IoT encompasses a lot of the stuff you already use each day: cell phones, TVs, laptops, microwaves, etc. Also, as each day passes by, we are encountering the IoT in the basic gadgets we have relied on for years: coffee makers, washing machines, headphones, and refrigerators. If you are flying on a passenger plane, the jet engine of an airplane is being operated and maintained through the use of the IoT. Gartner claims that by 2020 there will be an estimated 26 billion connected devices in use.

How Does the IoT Impact Me?

With so many devices connected to the internet, it’s easy to understand why the IoT is such a hot topic in our world today. With the IoT, security is an issue that is oftentimes immediately included in the conversation; and rightly so. With all these devices connected together and vulnerable to hackers, what can you do as a consumer to make sure that your information is safe? Will someone actually be able to hack into your microwave and obtain access to your whole network? The IoT also opens up homes and businesses to security threats unimagined even ten years ago.

Can My Smart Appliances Really Give Away My Information?

Kellyane Conway, former Trump spokesperson was quoted in an interview with the Bergen Record in 2017 that microwaves can be used as spy cameras by government agencies. She said this concerning allegations from President Trump that President Obama wiretapped the Trump campaign. Although microwaves don’t seem to have these spying capabilities yet, we do know that televisions do. In CIA documents released by Wikileaks, it came to light that some models of Samsung televisions were hacked by the CIA so that they could eavesdrop on conversations taking place in households the CIA deemed suspicious.

Television companies have also admitted that Smart TVs have the power to spy on the users watching habits as a way to help the manufacturer understand how to better reach their consumer base.

How Can I Protect Myself From Cyberattacks Launched Through The Internet Of Things?

What can you do to protect yourself when using all these new smart devices? Here are some strategies you can implement to keep your family and business safe:

  • Do your due diligence in selecting trustworthy vendors when purchasing new smart devices. Purchasing something as simple as a baby monitor with smart technology, means ensuring the device is from a retailer that has a proven reputation. You are more likely to find that they have better security in place.
  • When feasible, secure your devices. Also make sure your software is updated, and you are properly using filters and firewalls. Train your family members and employees on good internet habits and how to detect phishing scams on websites and through email. When possible, always use a second layer of password protection.
  • Make sure the network you use is designed correctly so as not to send out data without your expressed consent. Keep your passwords protected and diverse to avoid hackers who look for patterns in your network.
  • For an extra layer of protection, consider using a virtual private network (VPN) on your router which adds a firewall to inward traffic. A VPN prevent attacks that attempt to permeate your network.
  • Employ Network Segregation in both your home and business. Network segregation splits one Network into two local networks (LANs) keeping the unsafe computers in one Network and moving the computers that you want to protect to a separate secured Network. Network segregation can be accomplished by using two Entry Level Cable/DSL Routers.

Air Canada Data Breach Prompts Enhanced Mobile App Security Measures

Air Canada Data Breaches

Air Canada Data BreachesAir Canada recently confirmed a data breach occurred between August 22 and 24, affecting users of the Air Canada mobile app. The breach is just the latest in a string of cyber-attacks impacting mobile app users.

The Air Canada mobile app has approximately 1.7 million users. It is believed that one percent, or 20,000 users, may have been affected. The company announced they would be contacting potentially affected users directly via e-mail.

Upon notice of the breach, Air Canada says it immediately took action to deter further unauthorized login attempts and implemented additional measures to enhance security. Certain data, like users credit card information, was deemed safe. This is because this type of data is encrypted and required to be stored in compliance and in accordance with the industry’s payment card regulations.

The type of data compromised includes passenger names, telephone numbers, email addresses, birth dates, nationalities, and other data.

Air Canada contacted potentially affected customers by email beginning August 29. The company also released an FAQ section on their website, which provides details regarding specifics of the breach. As a precaution, the company is requiring that Air Canada mobile App users reset their passwords following a new, improved set of password guidelines.

They recommend a more robust password as an added layer of protection against attempts for unauthorized access. In the release, the company also encouraged users to frequently monitor their transactions to ensure there are no unauthorized charges.

A Growing Trend

Data breaches are a growing problem in today’s increasingly digitalized world. In July of this year, Timehop announced a “network intrusion” that led to a possible breach of personal user data, affecting more than 21 million users. The incident was disclosed in a blog post on the company’s website. About 3.3 million users had information like their name, phone, email, and date of birth compromised.

In February, the data of approximately 150 million users of the MyFitnessPal app was compromised in a data breach. The app’s parent company, Under Armour, said in a press release in March that usernames, hashed passwords and email addresses may have been exposed. Sensitive information such as credit card information was not compromised.

How To Protect Your Data

There are several precautionary steps mobile app users can take to reduce the risk of a data breach within their device. These can include:

  • Make sure to update when new versions are released
  • Reduce the use of public Wi-Fi
  • Clean up apps not in use
  • Use Two-Factor Authentication (2FA) when possible
  • Always use unique, strong passwords for apps

Minimize the Use Of Public Wi-Fi

Free Wi-Fi may seem like a good idea, but using it too much can leave you open to a data hack, especially if you’re not careful. Using free, public Wi-Fi for things like web surfing, streaming movies and shows and reading the news is typically safe.

Where you begin to enter dangerous waters with public Wi-Fi is when you enter personal data like credit card information. Unsecured networks can be dangerous if you’re not protected, and in this case, protection can come in the form of a virtual private network (VPN). This software encrypts your wireless session while using a public network. Some devices even have a built-in VPN for your convenience. If you don’t have one, you can easily purchase one for as little as $5 per month.

Update Your Operating System

Updating your operating system when prompted offers more than cool new features like emojis. These system updates often include security improvements, which can include fixes for security flaws in the previous version. Failing to update your operating systems can leave you susceptible to hackers. Make a habit of updating your OS as soon as the newest version becomes available.

Evaluate Your App Usage

You may think there’s no harm in keeping dozens of apps on your phone, but if you’re not utilizing them, they can do more damage than good. Too many apps leaves the potential for security holes, which can be used by hackers to access your personal data.

Evaluating your apps and deleting those you no longer use on a regular basis can be a good line of defense against a hack. And for the apps, you do use regularly, be sure they’re updated accordingly. You can do this by adjusting your settings to automatically download app updates. It is also a good rule of thumb to download apps only from legitimate sources, like iTunes or the Google Play store.

Lock Your Phone

The auto-lock function on your phone is an important one if you’re hoping to elude the prying eyes of hackers. A strong password is also a necessity. In addition to a passcode, set up a biometric security measure, such as a swipe, finger tap, or fingerprint. This will make it much more difficult for hackers to invade your device.

One general rule of thumb? The longer the password, the more secure it is. Consider custom numeric codes rather than important dates. If you’re running apps with personal information, be sure those are password protected, too.

The need for strong cybersecurity measures is now at an all-time high. Air Canada is just the latest to be affected, but if current trends are any indication, there will be plenty more attacks in the future. Solidifying and implementing a strong cybersecurity plan can help you minimize the chances of your data being stolen. Don’t help thieves steal from you!

Hurricane Florence: State Of Emergency Announced For Virginia

Hurricane Florence

Hurricane Florence is spinning up to be a Category 4 Hurricane. It’s predicted to make landfall between North Carolina and Georgia this week.  Virginia may be impacted when Florence comes ashore at the end of this week.

Virginia announces a state of emergency ahead of Hurricane Florence.

Hurricane Florence

 

Preparing For A Major Hurricane or Tropical Storm

When a hurricane is 36 hours from arriving

  • Turn on your TV or radio in order to get the latest weather updates and emergency instructions.
  • Restock your emergency preparedness kit. Include food and water sufficient for at least three days, medications, a flashlight, batteries, cash, and first aid supplies.
  • Plan how to communicate with family members if you lose power. For example, you can call, text, email or use social media. Remember that during disasters, sending text messages is usually reliable and faster than making phone calls because phone lines are often overloaded.
  • Review your evacuation zone, evacuation route and shelter locations. Plan with your family. You may have to leave quickly so plan ahead.
  • Keep your car in good working condition, and keep the gas tank full; stock your vehicle with emergency supplies and a change of clothes.

When a hurricane is 18-36 hours from arriving

  • Bookmark your city or county website for quick access to storm updates and emergency instructions.
  • Bring loose, lightweight objects inside that could become projectiles in high winds (e.g., patio furniture, garbage cans); anchor objects that would be unsafe to bring inside (e.g., propane tanks); and trim or remove trees close enough to fall on the building.
  • Cover all of your home’s windows. Permanent storm shutters offer the best protection for windows. A second option is to board up windows with 5/8” exterior grade or marine plywood, cut to fit and ready to install.

When a hurricane is 6-18 hours from arriving

  • Turn on your TV/radio, or check your city/county website every 30 minutes in order to get the latest weather updates and emergency instructions.
  • Charge your cell phone now so you will have a full battery in case you lose power.

When a hurricane is 6 hours from arriving

  • If you’re not in an area that is recommended for evacuation, plan to stay at home or where you are and let friends and family know where you are.
  • Close storm shutters, and stay away from windows. Flying glass from broken windows could injure you.
  • Turn your refrigerator or freezer to the coldest setting and open only when necessary. If you lose power, food will last longer. Keep a thermometer in the refrigerator to be able to check the food temperature when the power is restored.
  • Turn on your TV/radio, or check your city/county website every 30 minutes in order to get the latest weather updates and emergency instructions.

Survive DURING

  • If told to evacuate, do so immediately. Do not drive around barricades.
  • If sheltering during high winds, go to a FEMA safe room, ICC 500 storm shelter, or a small, interior, windowless room or hallway on the lowest floor that is not subject to flooding.
  • If trapped in a building by flooding, go to the highest level of the building. Do not climb into a closed attic. You may become trapped by rising flood water.
  • Listen for current emergency information and instructions.
  • Use a generator or other gasoline-powered machinery outdoors ONLY and away from windows.
  • Do not walk, swim, or drive through flood waters. Turn Around. Don’t Drown! Just six inches of fast-moving water can knock you down, and one foot of moving water can sweep your vehicle away.
  • Stay off of bridges over fast-moving water.

Be Safe AFTER

  • Listen to authorities for information and special instructions.
  • Be careful during clean-up. Wear protective clothing and work with someone else.
  • Do not touch electrical equipment if it is wet or if you are standing in water. If it is safe to do so, turn off electricity at the main breaker or fuse box to prevent electric shock.
  • Avoid wading in flood water, which can contain dangerous debris. Underground or downed power lines can also electrically charge the water.
  • Save phone calls for emergencies. Phone systems are often down or busy after a disaster. Use text messages or social media to communicate with family and friends.
  • Document any property damage with photographs. Contact your insurance company for assistance.

Is Your IT Infrastructure Backed Up And Quickly Recoverable?

Many businesses aren’t prepared as they should be.

Yes, you’ve backed up your data to a storage device in the office, but won’t help if your building’s roof comes off. Your office will flood and your server, backup device, and computers will be left floating in Florence’s wake.

This may sound extreme, but it happens.

Unless your IT service company backs up your data to an enterprise-based cloud backup solution, you could lose all the information you’ve worked so hard to attain.

Better yet, ask your IT professional to virtualize your entire network. This means all of your data and software. If you lose your onsite data and applications, everything will be quickly recoverable within a few hours.

A cloud backup, on the other hand, can take days to recover, and you won’t have access to your software applications.

But you have to do this now. You only have a few days left.

Above all, be safe everyone.

Resources:

Hurricane Florence Is Ready To Impact The SE Coast.

Florence is spinning up to be a Category 4 Hurricane. It’s predicted to make landfall between North Carolina and Georgia this week.

Preparing For A Major Hurricane or Tropical Storm

When a hurricane is 36 hours from arriving

  • Turn on your TV or radio in order to get the latest weather updates and emergency instructions.
  • Restock your emergency preparedness kit. Include food and water sufficient for at least three days, medications, a flashlight, batteries, cash, and first aid supplies.
  • Plan how to communicate with family members if you lose power. For example, you can call, text, email or use social media. Remember that during disasters, sending text messages is usually reliable and faster than making phone calls because phone lines are often overloaded.
  • Review your evacuation zone, evacuation route and shelter locations. Plan with your family. You may have to leave quickly so plan ahead.
  • Keep your car in good working condition, and keep the gas tank full; stock your vehicle with emergency supplies and a change of clothes.

When a hurricane is 18-36 hours from arriving

  • Bookmark your city or county website for quick access to storm updates and emergency instructions.
  • Bring loose, lightweight objects inside that could become projectiles in high winds (e.g., patio furniture, garbage cans); anchor objects that would be unsafe to bring inside (e.g., propane tanks); and trim or remove trees close enough to fall on the building.
  • Cover all of your home’s windows. Permanent storm shutters offer the best protection for windows. A second option is to board up windows with 5/8” exterior grade or marine plywood, cut to fit and ready to install.

When a hurricane is 6-18 hours from arriving

  • Turn on your TV/radio, or check your city/county website every 30 minutes in order to get the latest weather updates and emergency instructions.
  • Charge your cell phone now so you will have a full battery in case you lose power.

When a hurricane is 6 hours from arriving

  • If you’re not in an area that is recommended for evacuation, plan to stay at home or where you are and let friends and family know where you are.
  • Close storm shutters, and stay away from windows. Flying glass from broken windows could injure you.
  • Turn your refrigerator or freezer to the coldest setting and open only when necessary. If you lose power, food will last longer. Keep a thermometer in the refrigerator to be able to check the food temperature when the power is restored.
  • Turn on your TV/radio, or check your city/county website every 30 minutes in order to get the latest weather updates and emergency instructions.

Survive DURING

  • If told to evacuate, do so immediately. Do not drive around barricades.
  • If sheltering during high winds, go to a FEMA safe room, ICC 500 storm shelter, or a small, interior, windowless room or hallway on the lowest floor that is not subject to flooding.
  • If trapped in a building by flooding, go to the highest level of the building. Do not climb into a closed attic. You may become trapped by rising flood water.
  • Listen for current emergency information and instructions.
  • Use a generator or other gasoline-powered machinery outdoors ONLY and away from windows.
  • Do not walk, swim, or drive through flood waters. Turn Around. Don’t Drown! Just six inches of fast-moving water can knock you down, and one foot of moving water can sweep your vehicle away.
  • Stay off of bridges over fast-moving water.

Be Safe AFTER

  • Listen to authorities for information and special instructions.
  • Be careful during clean-up. Wear protective clothing and work with someone else.
  • Do not touch electrical equipment if it is wet or if you are standing in water. If it is safe to do so, turn off electricity at the main breaker or fuse box to prevent electric shock.
  • Avoid wading in flood water, which can contain dangerous debris. Underground or downed power lines can also electrically charge the water.
  • Save phone calls for emergencies. Phone systems are often down or busy after a disaster. Use text messages or social media to communicate with family and friends.
  • Document any property damage with photographs. Contact your insurance company for assistance.

Is Your IT Infrastructure Backed Up And Quickly Recoverable?

Many businesses aren’t prepared as they should be.

Yes, you’ve backed up your data to a storage device in the office, but won’t help if your building’s roof comes off. Your office will flood and your server, backup device, and computers will be left floating in Florence’s wake.

This may sound extreme, but it happens.

Unless your IT service company backs up your data to an enterprise-based cloud backup solution, you could lose all the information you’ve worked so hard to attain.

Better yet, ask your IT professional to virtualize your entire network. This means all of your data and software. If you lose your onsite data and applications, everything will be quickly recoverable within a few hours.

A cloud backup, on the other hand, can take days to recover, and you won’t have access to your software applications.

But you have to do this now. You only have a few days left.

Above all, be safe everyone.

Resources:

Is Your Cloud Provider Prepared For A Disaster?

Hawksoft

When companies fail at or are not prepared for a catastrophe, it’s often because they neglect to think that the unexpected is possible.

They often fall into one of two categories:

  • They assume disasters are unpredictable, so why prepare for them?
  • They fall into the allusion that their plans are fail proof (nobody can sink the Titanic).

Most disaster situations are simply due to a service outage or user error. But a catastrophe could wreak havoc on your business when you least expect it. Think about the thousands of companies in Houston that were shut down for weeks due to Hurricane Harvey in 2017. Nobody expected it, but it happened and many people were caught completely off guard.

Companies that take the time to be proactive are more likely to persist, despite a disaster. It requires a higher level of preparation than many businesses currently have. There are too many depending on a simple cloud backup service to save the day, but is that enough?

What is The Condition of Your Cloud Disaster Management Plan?

Current statistics show that more companies are taking inventory and calculating the risks of an attack on their IT infrastructure. However, there are still quite a few who are ill-informed and not doing enough.

Recently, a Forrester Research and Disaster Recovery report showed that up to 40% of companies currently have an official enterprise risk management program that is held accountable by a board or upper management. While the number of companies that are taking cloud disaster management seriously are improving, it’s obvious that not all companies are on board.

The difficulty with cloud disaster management, as with all disaster recovery programs, is that it’s never important until unexpectedly, it is. When a major disaster event occurs, it can take a company down in the blink of an eye.

Could This Happen to You?

HawkSoft, an Insurance Agency Management platform, was just hit with a ransomware attack. Their business had to shut down until they could deal with hackers. Are you ready for a ransomware attack? Does your team know what to do? More importantly, your employees should be well-trained so that they recognize suspicious emails and attachments and do not click on them to begin with.

Hawksoft

Recently, Ticketfly was the victim of a data breach. Over 26 million customers who use Ticketfly to purchase concert tickets were affected. Ticketfly’s parent company, Eventbrite, revealed that customer names, addresses, emails, and phone numbers were stolen by hackers. The breach damaged the company’s reputation and left millions of customers looking for a new place to buy their tickets.

The company had rave reviews from its customers. They most likely had a very sophisticated security system. So what went wrong?

When it comes to disaster recovery, it’s vital to choose an IT services provider that consistently tests their disaster management procedures. They need the best security resources money can buy, but they also need a well-qualified team of pros who understands what’s at stake.

Your IT services company should do more than just provide dependable hosting. They must stay on top of new hacking schemes. They should be running simulations on a regular basis that test disaster preparedness. They should be doing this internally and for their clients.

How Can You Manage Cloud Disaster Recovery Solutions?

A good disaster recovery plan includes the core IT services and infrastructure that your company depends on. These assets should be fully protected with today’s most effective security solutions. You need a qualified team of people who know what to do in case there is a breach. Acting quickly always limits the damage and makes your company look better in the media. Your shareholders and investors should be fully involved.

What Does Your Company Need to Survive a Disaster?

Did you know that service outages are the most common disasters that companies encounter when it comes to IT issues? However, even though possessing a strong data center solution is essential, there are many other situations that can wreak havoc, such as earthquakes, fires, floods, and severe storms. Your team should have a thorough plan to address events like these. That means backing up your data both onsite and offsite using a reliable cloud solution.

Do You Have a Complete Disaster Management Program?

No one ever thinks about what would happen if heavy rain caused the roof of your data center to cave in. What if your offices were flooded in a big rainstorm? How long would it take to get things back up and running again? You could lose several weeks’ worth of work.

Cloud disaster management isn’t something you should figure out on your own. You need a partner with the information, experience, and resources to know what could happen and how to respond. Sometimes you don’t get a second chance.

You need a business leader in cloud disaster recovery, with proficiency that guards every part of an IT system, from application management, to cloud hosting. All your software programs and data should be backed up regularly so that everything can be restored quickly.

Disasters Are Expensive

Each day that your company is shut down costs you money. Many small businesses in Houston never recovered after Hurricane Harvey. They had to close their doors. They learned the hard way how important disaster recovery is, but you don’t have to.

Look for experts in cloud disaster recovery who will get to know your business and develop a unique plan that addresses all the areas that are important to your business, from applications to servers. Make sure they have a good track record and can deliver on their promises. Working with a proactive IT services provider can ensure that your company survives no matter what.

Do New Laws Improve Employee Stock Ownership Plans (ESOP)?

ESOP

It seems that small businesses rarely catch a break. Unfortunately, their employees often enjoy fewer perks than those working for larger corporations do. This is primarily because the smaller companies have fewer assets with which to work. Due to the smaller economic cushion, they also have a greater risk. That is why, when a fresh law is put into action for the “little guy,” it is newsworthy.

ESOP

As with any new law, however, there are those that it benefits, those that are unaffected, and those that it may hurt. That’s why it’s good to stay informed.

What Are ESOPs?

ESOP stands for Employee Stock Ownership Plan. An ESOP allows the owner of a business to shift that ownership to his or her employees. This is often done by way of stocks or “shares.” In some companies, members buy stocks outright.

Other businesses require no upfront cost. The ESOP is part of an “employee benefits package.” It is considered part of his or her pay, and maybe figured as 50/50. This is where the company matches monies contributed by the employee. Often, the shares are held until retirement, and maybe, in fact, the bulk of that employee’s retirement.

Although ESOPs have existed much longer (just in different forms), they became prevalent in the 1980s. According to the National Center for Employee Ownership (NCEO), a few of the largest ESOP companies include the following:

  • Brookshire Brothers
  • Enercon Services, Inc.
  • Krueger International, Inc.
  • McCarthy Building Company
  • Publix Super Markets, Inc.
  • Travel and Transport, Inc

By 2018, the number of ESOPs has been estimated at between 7,000 and 8,900. The number of participants is over 14 million.

What Are the Pros of Employee Stock Ownership Plans?

Reputedly, there are many benefits to participating in ESOPs. For example, they generally have a positive effect on employees. A few of the primary perks include the following:

  • Employees feel more invested in the company
  • Invested employees are typically harder workers
  • Employees feel a greater sense of job satisfaction
  • They have more job stability
  • They feel like a part of something greater than themselves
  • They often make a tidy profit

ESOPs are particularly beneficial in small companies where the primary owner is planning to retire. This allows for a smooth transition of power. As the company succeeds, the employees succeed, and morale rises.

What Are the Cons of ESOPs?

One of the potential problems with an Employee Stock Ownership Plan occurs when the value of the company decreases after an employee buys in. When the business is worth less, each employee’s stock decreases in value. This usually occurs with companies that have inconsistent profits.

An example of this would be the case of Lifetouch Inc., which was a popular photography company. They primarily specialized in school photos. As digital photography techniques became the demand, the company struggled to adjust. Business suffered.

The company stock in ESOP declined by $840-million between 2015 and 2018. Lawsuits were filed against individual members of the Board of Directors. Unfortunately, the company’s ESOP was not protected against such losses. This is one example of what could go wrong with this type of retirement plan.

How Does the New Law Work and Who Does It Benefit?

New York Senator Kirsten Gillibrand introduced the Main Street Employee Ownership Act in May 2018. This ESOP law is the first to focus on employee ownership in the last 20 years. It eases the process for distributing loans for those transferring to an ESOP. However, there are no additional funds being allocated for this process.

Generally, the new ESOP law is thought to primarily benefit small to mid-sized businesses. More specifically, it targets the Small Business Administration (SBA) in two ways. First, it directs them to make small business loans more readily available to cooperatives. A Cooperatives is a style of business organization that is owned and run by the employees. They also share in the profits.

Second, it encourages the SBA to work with country-wide Small Business Development Centers (SBDC). SBDCs provide consultation and training to small businesses that are transitioning to an ESOP.

The ESOP Association’s president, J. Michael Keeling, was reported as saying the following:

“This law will help organizations better understand how to pursue a strategy of shared capitalism—something that our country’s founders agreed was vital to the health of our nation.”

In Conclusion

Whether Employee Stock Ownership Plans are the wave of the future is difficult to tell. The new law provides many benefits that make it an attractive proposition. It paves the way for small and mid-sized companies to more easily transfer ownership to employees. Consultation and training are more readily available for those companies wanting to make this transition. It also improves the ability to obtain loans. Overall, it appears things will be brighter for small businesses. As with anything, only time will tell.

 

Health & Human Services OIG Report Finds Maryland Did Not Properly Secure Its MMIS System

Maryland Healthcare Data Breach

An Inspector General’s (OIG) report from the Federal Department of Health and Human Services (HHS) finds that Maryland failed to secure its Medicaid Management Information System (MMIS) against several avenues of attack.

Maryland Healthcare Data Breach

What Security Violations Did Maryland Commit?

The report, available in summary form at OIG Report on Maryland MMIS Security, does not go into detail for fear of revealing the nature of the vulnerabilities and possibly exposing the MMIS to penetration. It does note that, in addition to other techniques, automated penetration testing tools were used in an attempt to break into the system. The report indicates that these tools succeeded.

How Attacks Are Evolving

Other reports have noted that automated penetration tools are getting more sophisticated over time, and now far exceed the sort of attacks that were driven by “script kiddies” in the last decade. On top of that, despite increased efforts at email security and training workers in cybersecurity hygiene, phishing attacks, in which a phony email is used to get a user to perform an action that leads to system penetration, are all too common.

Because of the lack of detail in the OIG report, we can only speculate about what was attacked and what methods of penetration were used. Consider this, though. The typical MMIS is a mainframe-based system that is communicated with from terminals. It usually runs some version of Windows over networks that often must, of necessity, be routed partially over the public internet. Even if a virtual private network (VPN) is used for the connection, the “attack surface” – the set of points and vulnerabilities that led a bad actor to attack a system – is expansive.

All the attacker has to do is gain access to an unencrypted portion of the traffic. Inserting malware, such as ransomware or keyloggers, is simple from that point on. The lesson is that one must avoid penetration at all costs.

Was There A Cyber Security Attack on the Maryland MMIS?

The OIG report specifically notes that there is no evidence that the Maryland system had, in fact, been penetrated. But consider what might have happened if it had. The MMIS is used to pay Medicaid providers. While providers often complain that Medicaid payments are less than their cost of service, the aggregate amount of money involved is huge. Nationally, Medicaid spent almost 596 billion dollars in 2017. The expense is very roughly split 50/50 between the states and the Federal government for the traditional Medicaid population. For the people that were brought in under the Affordable Care Act (ACA) Medicaid expansion, the Federal government pays 90%.

A Huge Payday for Hackers

So, there is a pool of more than half a trillion dollars, potentially payable to providers, for hackers to attack. The MMIS in most states has modules for beneficiary enrollment, provider enrollment, recording of services rendered, and provider payments. A hacker who had control of the system could create phantom beneficiaries, phantom providers, bill for nonexistent services, and generate checks to pay the nonsexist providers for not providing them. Once the hacker is in the system, a potentially huge piggy bank is opened. The OIG’s principal worry in its report was the possible exposure of Medicaid data to the public, but the possibilities for fraud are equally worrying.

Why Does It Take So Long For Hacking To Be Discovered?

How quickly such a penetration would be detected is a function of the security measures the state has in place. The mere fact of finding a penetration does not, in and of itself, reveal where the miscreant was or what the hacker did. That requires checking of audit logs and development of a trail. Depending on what events are logged, even that might not be enough. In a worst-case scenario, not until some other event – a beneficiary notice returned as undeliverable, a bank questioning an electronic deposit, and so on – would sufficient suspicion be generated to lead to the discovery of phony providers and phony beneficiaries.

Holes In The Medicaid System

The MMIS includes tools for surveillance and utilization review, but their basic functions are still fairly unsophisticated, relying on detection of statistical outliers. Depending on where the limits are set, cases that are truly concerning may be missed. We can draw some instructive lessons from looking at what has been found out about HIV drug prescriptions under Medicare. In one case, a 48-year-old in Miami went to 28 different pharmacies to pick up HIV drugs worth over $200,000 dollars, in doses that were more than ten times what the typical HIV patient gets in a year (see Suspicious Prescriptions for HIV Drugs in Medicare).

Wrap Up

Maryland’s MMIS has parts that first came online in 1996. A contract to replace the system was terminated in 2015 and the case between the state and the prime contractor is now in the courts. Maryland’s experience in attempting to replace its MMIS system is not unique. Despite its surface simplicity, MMIS systems can involve hundreds of modules providing thousands of different functions that often have to interface with other state systems such as finance, enrollment and eligibility, public health, social services, and the state’s education system.

Designing and programming one is not easy. When it has to interface with multiple-aged legacy systems that the MMIS contractor has no control over, the job is even harder.

Master Google Search In Just 28 Minutes

This month’s training on demand focuses on helping you find the most accurate information you need on Google.

We’ll leave no stone unturned in this 28-minute online training session. Learn how to find answers to your queries and questions right through to advanced techniques using Google.

Click the video play button below to get started.

Google Search Tips

Click Here To View Online