New Microsoft Excel Data Visualization Features That Experts Are Excited About

There is no denying how critical Microsoft Excel is for day-to-day data processing and visualizations across organizations. Still, many users are not as familiar with the complete functionality of this handy tool as they could be. Today’s users say they have a fairly good knowledge of Excel and yet Microsoft adds new features each year to make it even more useful. Most companies simply don’t have a decent Excel training program to keep their employees up-to-date on the latest new spreadsheet features.

The most recent version of Microsoft Excel – both on traditional offline Office platforms and the cloud-based environment Office 365 – have new charts that introduce a whole world of data visualization.

You’ll be happy to know that Excel opens in your web browser just like Word, OneNote, PowerPoint, and PDF documents – making it a breeze for you to work with your data in the cloud.

The new Excel charts that were recently added are pretty handy. It is well worth knowing how and when to utilize them. This guide will walk you through three of the best to be released this year.

Waterfall charts

Businesses and organizations always seek to understand their finances better so that they can make their revenue projections more effective. It is critical for them to assess how profits and losses play out at different financial periods. One way to quickly understand and communicate these sets of financial data is through the visualization of financial statements. This is where Waterfall Excel charts come in.

Waterfall charts allow you to quickly illustrate the line items available in your financial data in a manner that provides a clear picture of how each item impacts your bottom line. They help make it easier to understand the cumulative effect of positive and/or negative values that are sequentially introduced.

You could use a Waterfall chart to illustrate how the negative and positive values in your data cumulatively affect the totals or final value such as net income, for instance.

Normally, the outlays or losses that occur throughout the business period should appear as negative integers, while profits or gains are stipulated as positive figures in the Waterfall chart.

Here are some revenue data from the Seattle Art Museum that we will use in our illustration:

To create a Waterfall chart, select your data and head to the ‘Insert’ tab on the Excel ribbon. From there, navigate to the Charts section and click the Waterfall icon.

Once you do that, Excel inserts a Waterfall chart for you, with all the values in the dataset you selected.

Suppose we select the positive values above (first data set); Excel will automatically detect that these are all positive values and color them green as follows:

Notice however that Excel does not identify the last value (Total Operating Revenue) as a total; that’s why it has calibrated it with the same green color.

To resolve that issue, double-click on that total and check the box marked “Set as Total” in the Format Data Point pane that appears.

You’ll see that this action immediately updates the chart, changing the color of the total value from green to grey, reflecting that all the other values colored green actually accrue to that total.

If we follow the same procedure for the Total Operating Expense (second set of data), our final Waterfall chart would look something like this:

Treemaps

Treemaps are great for showing relationships between sets of data. They use colors to create a contrast between the data sets so that you can capture the information on a Treemap at a glance. Let’s use these ticket sales data from the Seattle Art Museum to illustrate what we’re saying:

As you can see, all the ticket sales have been divided into either online or onsite subcategories and the many different classifications of ticket types. By so doing, we are indicating to Excel how we want to organize our chart.

To create the Treemap chart, we have to first select our entire data, then head to the ‘Insert’ tab on the Excel ribbon, and navigate to the hierarchy map symbol. Click the symbol to automatically insert a Treemap chart showing different relationships between online and onsite ticket sales broken down by ticket type.

Map charts

Map Charts help you draw comparisons of values and show how categories compare across different geographical regions. This is to say you may use map charts only when your data have geographical regions included.

A map chart, for instance, would help us visualize the geographical distribution of revenue from the ticket sales above.

To create a Map chart, we would select our data, tap the Insert button and click the map symbol.

This automatically inserts a chloroplast chart with the selected data geographically distributed in it. We can further customize the chart by double-clicking the legend and using the options on the Format Legend Entry menu.

Conclusion

Graphical representation can be quite helpful when it comes to making comparisons of various sets of data or when you want to pinpoint a trend at a glance. With good knowledge of these charts, you have even more tools in your arsenal to take on any data analysis project.

Microsoft Excel

2018 Security Breaches Indicate That Cybercrime Is On The Rise

Cyber breaches have become the norm across the United States and in many parts of the world. Regardless of the size of your company or your budget for security, your company could be at risk. This has caused rapid growth in the cybersecurity industry. According to Forbes, this market will reach 170 billion dollars by the year 2020.

Cybercrime

Some of this growth is being fueled by the advancement of new technology in cloud-based applications, the Internet of Things, and the increase in the number of computers and mobile devices. However, much of it is being initiated by the constant onslaught of cyber-attacks at home and at work.

Biggest Data Breaches of 2017

During 2017, there were actually hundreds of data breaches in the US, though the public only heard about a fraction of those.

The Equifax hack topped the list with a devastating breach that affected 145 million customers. It stunned the public, proving once again, that no one is out of reach of hackers. With each passing breach, hackers refine their techniques so that more consumers are affected and even more extensive damage is done.

The financial data for over 3 million customers was compromised in the Hitachi Payment Services malware hack. This was reported in February 2017 and eventually led to a massive decline in credit card use. Hitachi suffered damage to their reputation and loss of profits and revenue.

Regardless of how many attacks there are, they continue to have the same effect on the public. Cyber breaches cause consumers to be leery of doing business with the company. People stopped buying products from Target stores right after that breach. The cost to Target was substantial. Breaches damage a company’s brand name and cost millions to resolve in many cases.

Worldwide Data Breaches

The largest leak in the world, known as the Big Asian Leak, exposed the personal information of 185 million customers. Though the names, addresses, passcodes and some financial information was stolen by hackers, most of the Asian companies who were hacked refused to admit they’d been breached and most refused to comment as well.  The stolen data was eventually offered for sale on the dark web by an online vendor known as “DoubleFlag.”

In the US, consumers expect companies to be fully transparent when a breach does occur. They expect certain steps to be taken to avoid future attacks. Sometimes this happens and sometimes it doesn’t. Company leaders tend to think that if they’ve already been hacked once, there’s very little likelihood that it will happen again. There’s no solid proof to indicate that this is true. Hackers search for easy targets; companies with weak, ineffective cybersecurity.

How data breaches for 2018 are shaping up

The last few years have shown a few definite trends. For instance, in 2015 and 2016, businesses were targeted 40.1 percent of the time with the healthcare industry a close second at 35.4 percent. In 2017, there were a total of 868 cyber breaches with businesses and health care agencies the main targets.

Major businesses across the country have stepped up their security on every level and yet 2018 has already proven to be a busy time for hackers.  A new trend involves cyber thieves looking beyond computers and phones for targets. They’ve discovered a whole world of unsecured devices, such as medical devices, educational and government organizations, and other vulnerable technology.

A new study shows that only 51 percent of all companies monitor and analyze their security information on a regular basis. About 45 percent subscribe to some type of intelligence service, while only 52 percent said they used high-tech intrusion detection systems. These numbers indicate a troubling trend. Only about half of all American companies are actually taking their cybersecurity seriously enough.

Ransomware attacks are on the rise as well. In some cases, the cyber thieves do not ask for much money. They demand smaller amounts like $1900 or $4,500. This strategy makes it far more likely that a business will pay the ransom. It’s just more prudent to pay those smaller amounts than to call in the authorities or security experts to resolve the issues.  Below are a few of the major cyber-attacks that have occurred for 2018.

Cyber Breaches and Ransomware Attacks January 2018

Several Indiana hospitals reported ransomware attacks. In one instance, the hospital paid $55,000 to thieves but reported that no data was stolen. The San Diego Office of Education reported a breach of employee retirement data. It was discovered that an unknown number of email addresses were leaked from MailChimp. National Stores, Inc. reported that some financial data from an unknown number of its credit card users was leaked.

WordPress continued having major issues with cyber thieves who were secretly placing crypto-mining code on the computers of its users. This code is designed to run in the background on a user’s computer without their knowledge for the purpose of mining cryptocurrency.  A major embarrassment to Kansas officials, it was reported that the Kansas Secretary of State website accidentally leaked the last four digits of hundreds of Kansas state government workers.

Cyber Breaches and Ransomware Attacks February 2018

The City of Allentown, PA was crippled by a malware attack that has to date cost at least one million dollars. Both financial and public safety systems were attacked. In a phishing attack, 50,000 Snapchat users had their log-in credentials stolen. A hospital in Tennessee revealed that 24,000 of its past patients may have been exposed to crypto-mining attacks.  Both Chase and Hometown Banks revealed that customer data may have been compromised due to skimming/shimming devices placed at ATM machines.  A dangerous T-Mobile bug was responsible for hackers being able to highjack the accounts of T-Mobile customers.

Cyber Breaches and Ransomware Attacks March 2018

In March, the city of Atlanta reported various government systems were down due to a ransomware attack. Several schools and hospitals reported malware and ransomware attacks that shut down their systems for indefinite periods of time. Some data was compromised in these attacks. Other hospitals reported that employee email accounts were hacked leaking confidential patient information. Even the National Lottery Association reported the loss of log-in info for over 10 million players. Emails were sent out instructing players to change their passwords. A point-of-sale breach occurred at some Applebee’s Restaurants exposing the credit card information of its patrons.

Cyber Breaches and Ransomware Attacks April 2018

April was a busy month for hackers. Over 72 million records were leaked in a long string of ransomware, malware and data breaches. The most notable included Sears Stores, Delta Airlines, K-Mart and Panera Bread. A service that connects handymen with customers called TaskRabbit had to shut down its website and suspend use of its app due to a massive data breach. SunTrust admitted that a former employee had stolen the customer data of 1.5 million customers. A data search service called LocalBlox reported that 48 million records were left accessible on the Internet. The data included personal info, as well as psychographic data used by marketing agencies.

Moving into the Future

Though the numbers are not out yet for May, experts believe that there will continue to be massive data leaks, ransomware attacks, malware attacks, and cyber breaches. Cyber thieves refine their strategies with each passing month. Consumers and business owners must stay on top of the activities of cyber thieves. Experts recommend hiring security experts to gauge how effective your cybersecurity is and recommend methods to improve it. The best defense continues to be a strong offense.

Reasons to Use a Managed Service Provider for Wireless Networking

Wireless networking has become a very important aspect of human life. The global marketplace has forced businesses to find new ways of reaching their customers in countries around the world. However, wireless networking isn’t just for business owners. Various people in every way of life rely on wireless networking for different reasons.

Wireless Networking

Teenagers, young adults, parents, and even senior citizens count on wireless networks to perform a wide range of tasks each day. From paying the bills to visiting favorite social media sites, consumers depend on these services in an ever-increasing number of ways.

Today’s business people can’t survive without wireless networks to maintain an online presence. Dependable networking is extremely important for the success of any business in this complex online world. There are various providers who specialize in wireless networking. Both individuals and businesses now have numerous options available to them. In this sea of service providers, it may be difficult to find the service that best suits your needs. Each business has its own requirements and usually a tight budget to work with.

Professional services

Managed wireless networking services are most often offered by professionals. These are IT pros who specialize in wireless networking and a wide range of other services. Outsourcing your IT services can make your life much easier. But it’s important to find a provider who understands the specific needs of each customer; someone who will become a trusted partner. This is one of the major pain points of small business owners. They feel as if their IT needs will be lost in the busy workday of an IT specialist and they will not get the exact networking solution they need to thrive in the marketplace.

Eliminates the need to hire trained IT pros

Upon contracting for managed wireless services, the service provider brings his or her own team of professionals in to do all IT-related work. The costs for getting your professional services are factored into the contract price. Usually, this includes 24/7 support, which can be a big expense for some. This can eliminate a major headache for most business owners. You don’t have to hire and train employees to perform these services. Managed wireless networking services thus ensure that businesses employ a smaller number of personnel and therefore save on hiring costs.

Customized solutions

One of the major benefits from outsourcing your IT services is that you can get exactly what you need at a price that fits your budget. Managed service providers are specialists in their field. They are in a position to offer customized solutions to their clients. They most often have an IT consultant on staff who will work with you in determining your specific business IT requirements. For some, this is an easy process and for others, it is more complex due to HIPAA compliance and other government regulations. Most small business owners are not experienced enough to determine how to best handle these complex issues. But, an experienced IT professional knows. Depending on the service provider that you decide to partner with, you may have the option of choosing from different wireless options. The advantage of this is that you can choose specific services depending on their prices. You can select scalable options that will grow with your company.

Extra services

Managed networking service providers usually deliver many extra services, such as assessing, designing, deploying, and managing network services. This can take a real load off any business owner’s plate. It can be a burden to deal with older equipment that’s constantly breaking down. But if your contract includes unlimited service calls, you can rest easy. You won’t have to pay extra or employ people to handle things. As a result, you get inclusive services and at rather affordable costs. Your employees don’t have to spend time trying to fix networking equipment that breaks down. Simply call your IT service provider and you can get back to doing your regular job.

Legal liability

With the increase in the number of cyber crimes, managed networking providers become very important. First of all, these people are in a position to handle any type of data leak or security issue. Having the necessary knowledge of the latest advancements in cyber security is a valuable asset. Your managed service provider is responsible for keeping your systems well-protected.  Secondly, cyber thieves are constantly improving their methods of breaking in and stealing your data. Keeping up with these issues is a time-consuming and complex task. With managed wireless service providers, you do not have to worry about this. Your provider will stay on top of all the latest technology to ensure that your computers and network are protected.  This helps to reduce your liability as well.

Consistent monthly charges

Managed wireless networking agreements state an exact amount of money that the organization is to pay for their services. This means that your company can budget for these expenses. This eliminates enormous charges for broken equipment and outdated software. In most cases, the cost of handling all these problems and charges for networking and computer repairs will be far more than your regular monthly charge. This gives business owners peace of mind and prevents unexpected charges.

Final thoughts

In this era where wireless networks are an absolute necessity, it’s wise for any size business to opt for managed IT services. Find professionals in your area that have a good reputation; a company that stands behind its promises. Most IT service providers include regular maintenance to keep your computers running smoothly. They ensure that your network is protected against cyber intruders. Managed Wireless Networking Providers are a great choice for any organization looking to alleviate the burden of networking, computer repairs, and dependable IT services.

Why Nonprofit Organizations Should Invest in Microsoft Office 365

Not-for-profit organizations frequently contend with the lack of time and money necessary to afford large IT investments that are critical for achieving efficiency in their operations. Those organizations that can afford these technologies constantly have to deal with scarce resources and manpower needed to manage the technology.

Nonprofits Office 365

There is another glaring problem within the nonprofit environment: the staff, Board members, and volunteers are often spread across several locations. Further, their extensive use of different devices and operating systems (OS) tends to result in difficulties accessing the organizations’ latest files.

Microsoft Office 365 – addressing the challenges nonprofits face

Office 365 is Microsoft’s global offering designed to provide eligible users with access to the company’s top-of-the-line cloud-based tools for collaboration and productivity. The service is complete with web conferencing and high definition (HD) video, calendars, business-class email, online Microsoft office suite, as well as file storage and sharing.

While Microsoft has a provision to offer these services to eligible, qualified nonprofits as a donation, the organizations can purchase important additional services for a small fee. In addition to the rich apps connected to Microsoft Cloud always being up-to-date, they are available for users on a 24/7 basis.

If all this isn’t reason enough for you to jump aboard the Office 365 bandwagon, then read along to find out further why your nonprofit should invest in Microsoft Office 365.

Voice and web conferencing allows for easy collaboration

Successful running of any nonprofit heavily depends on the quality of collaboration between its members. Among the suite of tools that come with Microsoft Office 365 is Skype for Business, an all-in-one tool for web conferencing, video calls, voice calls and instant messaging.

The HD video conferencing capability means that nonprofit teams can meet and collaborate with each other regardless of where they are located. Out-of-office personnel and volunteers can remotely share data and influence timely decision making.

Skype for Business has a note-taking feature that works in real time. This can allow you to keep track of notes and new ideas from every meeting.

Social networking is easier with Office 365

Every Microsoft Office 365 Nonprofit plan comes with the tech giant’s internal social network, Yammer – designed for organizations like your own. With your own Yammer site, it is easier than ever to bring teams together regardless of where they are located across the globe. Yammer allows the organization’s internal staff, volunteers and other stakeholders to connect, share, and collaborate seamlessly at all times.

Teams can edit and share documents on the go

Microsoft Office 365 also includes Microsoft’s cloud-based file-sharing tool SharePoint Online. With this advanced file sharing tool, teams can easily edit and share documents with one another, even on their mobile devices. Many users love the fact that they can actually edit documents simultaneously with colleagues on this cloud-based platform – effectively saving time and the possible confusion associated with back and forth emailing of documents.

There is just so much you can accomplish with your documents in the cloud. Your board reports will be available so you can share them remotely or access them, along with grant applications and other equally essential documents anywhere, at any time.

Microsoft’s online office suite, Office Online, also allows you to create and edit files using lightweight Microsoft Office web apps including Word, Excel, OneNote and PowerPoint. So, your team has the liberty to open, view, and edit various document forms right from their browsers, both on iOS and Android devices.

Both staff and volunteers can use Microsoft Office 365 to open, view, and edit practically any document on up to five of their devices. This empowers them with the flexibility to work anywhere, anytime.

Guarantee of security and compliance

Data security is one of the greatest concerns to any nonprofit organization. Nonprofits also have to comply with applicable privacy and compliance laws. The good news is, Microsoft’s Office 365 is engineered to the highest level in privacy and security standards.

The service has built-in malware protection to safeguard your data in the cloud. As such, your nonprofit organization can have peace of mind storing its data in the cloud and sharing even the most sensitive information without running the risk of noncompliance with data protection requirements.

Nonprofit organizations enjoy 24/7 support

Office 365 offers the luxury of 24/7 professional-level customer support so you won’t need any IT staff to stay on call. The level of support your nonprofit organization gets depends on your organization’s Office 365 Nonprofit plan.

Final thoughts

Technology related problems can create indecisiveness and slow down efforts in the nonprofit environment, eventually taking a toll on important mission activities and hurting productivity overall. With its full range of capabilities, as well as its cloud accessibility that ensures collaboration both online and offline, Microsoft Office 365 is a great tool for every nonprofit organization that wishes to achieve maximum efficiency.

12 Ways to Get Your Business to the Top of Search

Search Engine Optimization (SEO) is truly an important part of marketing for any business. Businesses that rely solely or largely on online marketing must understand the concepts of SEO marketing in order to be successful. If you’ve been doing this a while, then you probably know that it’s not as easy as it seems on the surface. Today, there are numerous specialists in this field with years of experience in Search Engine Optimization. They will testify that search engine optimization is a complex procedure that requires several layers of precision efforts in order to work.

Search Engine Optimization

Search Engine Optimization is an art that if well mastered, will ensure that your website is ranked higher than the competition. Of course, being on that first page of results is every business owners dream and if it were easy, everyone would be there at one time or another. As with all technology, people have found ways to master SEO and they’ve found ways to “beat the algorithm.” This process, though effective, can cause a website that really shouldn’t be there, to appear at the top of your search results for a specific word or phrase.

Beating the algorithm sometimes results in the website that should be right at the top, falling to the bottom of the page. Though Google and others do work hard to make sure things like this don’t happen, we all see it every day. Below, are our top 12 tips for getting your website to that first page of the listings.

Focus your content on fulfilling a need.

This is simple. All you need to do is find a need and fill it. If you do this well enough, consumers will come looking for you. Know your target consumer. Speak to them personally in your content. Make sure you’re addressing their pain points and hitting all their hot buttons. Be sure your content speaks to people in a personal way. Always remember that the customer is who you’re after; not the search engines. Write content that is useful to your customers.

Ensure your content is mobile friendly.

In this age, where people are somewhat addicted to their mobile phones, your web content must be mobile friendly. Make sure that everything is easily accessible from any device. People are using their smartphones more to shop and make purchases, so this process must be just as simple on a smartphone as online.

Do use keywords but ensure your web content makes sense

Knowing that keywords are the way to beat algorithms, some people load their web content with keywords. Check online to see what the current density rate for keywords is. At the moment, it’s around 2 percent. If you go over this, the search engines could classify your site as SPAM. This is the exact opposite of what you really want. In addition, loading your content with keywords makes it sound less authentic and even annoying. It diverts the attention of the readers from important information about your business.

Give your audience more than they expect

Your website should contain good information about your company and your products and services. You can also add interesting trivia, a surprising story about one of the company owners, or anything unique that might make visitors remember you. Some sites use humor. Above all, be truthful and sincere and this will create trust in your website visitors.

Ensure your work is amazing

Do not bore your audience with irrelevant information. While writing informative pieces, ensure they are entertaining. It’s often a good idea to work with a professional copywriter who can create incredible content that will WOW your audience.

Link, link, link

You don’t want your visitors searching elsewhere on the internet for information concerning things that you’ve discussed on your site. Instead, provide links that go out to these stories. People today appreciate the convenience. Inbound and outbound linking can be tricky so get help from a specialist if you feel you need it.

Keep creating content

Do not just create your website and then walk away. Instead, keep tweaking the content there. Keep adding fresh content each week.  Make sure articles and blogs are relevant and valuable to your consumers.

Think like your consumer

Being an internet user yourself, you probably know a few things about how consumers think. But, it’s important to learn what motivates a person to make a purchase from your site. There’s a whole science behind these concepts. Once you understand the mindset of your target consumer, you can better address their needs and speak to their heart.

Ensure that content is evergreen

Before you post your content, ask yourself this question: “Three months from now, will this content still be relevant? What about in 6 months or two years?” Is the answer is yes, go ahead and publish it. If not, you may need to rewrite your content so that it’s just as relevant in two years as it is today.

Every piece of your content matters

Your writing should focus on the value of your products and services. You want an amazing website that stays at the top of search listings for years, not just a few days. If you focus on SEO tricks, you may be at the top for a while, but then shoppers may realize that in fact, there is not much on your site they need. Stay relevant. Give shoppers what they’re looking for. This is how you get return visitors.

Social media should be your best friend

Maintain all your social media sites placing fresh content there daily. Most business owners hire someone to do this for them and this can be a valuable investment that really pays off. Social media gives you the opportunity to interact on a personal level with customers and potential buyers. Don’t miss out on this opportunity.

Focus on retention

Work with someone who understands the analytics that you get from your site each week. You can use analytics to tell exactly when someone clicks away and moves on. Find out what they were doing when that happened. Maybe there’s a boring page on your website that could be updated with better content. Maybe there’s something offensive that you don’t see. Sometimes, it’s nothing more than colors, shapes, wording etc. Humans are visual beings. They make decisions based on their feelings.

Length matters a lot

Longer content ensures that you can insert more keyword variations. Today’s successful websites are posting longer blog articles. In fact, blogs that are at least 1000 words are ideal. Of course, longer pieces of content must be broken up with subtitles and images. This keeps readers interested.

Final thoughts

While search engine optimization may not be rocket science, it is still a science that many business owners don’t have the time or the expertise to master. Hire someone who is good at this and has a proven track record.  Expect results and monitor their efforts to make sure this happens. It won’t happen overnight, of course, but within six months, you should begin to see some good changes in your search engine rankings.

How to Publish and View Your Microsoft Planner Tasks in Outlook

Individuals and teams in organizations are always looking to get more things done within the shortest time possible. In this regard, Microsoft Planner comes in handy as a means to quickly get organized and collaborate effortlessly on projects, particularly where remote teams are concerned.

In its drive to make Office 365 ever more useful to its clientele, Microsoft has constantly rolled out new features for its Planner. These features are designed to provide users with greater visibility into project schedules, allow them to receive notifications of upcoming deadlines as well as let users filter and group tasks accordingly.

The latest and one of the most amazing features added to Microsoft Planner enables you to publish tasks to your Outlook calendar.

This feature is really handy if you want to see your personal calendar items alongside the calendar items in your Microsoft Planner. Chances are that you are not already much familiar with this functionality – allow us to show you how it works.

First things first: what you need to know about Microsoft Planner

This is a simple work management app that Microsoft offers as a part of its Office 365 subscriptions – the company’s cloud-based environment that includes different lightweight versions of apps like Word, PowerPoint, Excel and OneNote.

Microsoft Planner lets users organize their projects, assign tasks, share files, publish and view tasks, as well as chat and collaborate with other users. The full functionality of the app is available to premium, business and educational users subscribed to Microsoft Office 365.

Microsoft Planner and Outlook Calendar

You can now view Planner tasks on your Outlook calendar. This feature allows you to import Planner tasks into Outlook via an iCalendar feed. From the My Tasks page, there is the option to pick specific plans to publish, or simply select the Tasks that are assigned to you by a different owner.

Viewing a Planner task in Outlook Calendar

To be able to see your Planner calendar in Outlook, the owner of the plan must first add it to the Outlook calendar using an iCalendar format feed. Adding a plan to the Outlook calendar generates a link that each member can use to add the plan to their own Outlook calendar.

Publishing an iCalendar feed

Supposing that you are the plan owner, to add the plan to the Outlook calendar, tap the ellipsis (…) at the top of your plan, then select the “Add plan to Outlook calendar” option on the dropdown menu that appears.

Notice that you should be able to see the “Add plan to Outlook calendar” option as long as you are the plan owner. If it is missing from the dropdown menu then chances are that your admin has turned off the Outlook calendar sync feature in Planner for your organization.

If the feature is available for your organization however, a dialog box with the Add plan to Outlook calendar with an iCalendar feed title should pop up. In the dialogue box are two options, Unpublish and Publish. The “Unpublish” option is the default state that you’ll find in the dialog box. Select “Publish” to automatically publish your plan’s schedule information to anyone with whom you’ll share the generated iCalendar link.

Anyone you share the iCalendar link with can open up the plan in their own Outlook.

Adding iCalendar link to Outlook

To add your plan to your own Outlook calendar, simply tap the “Add to Outlook” option in the dialog box.

This prompt opens up your own Outlook calendar in Outlook on the web. It also opens a Calendar Subscription dialog with the “Subscribe online and keep up to date” description.

The dialog box also contains the same iCalendar link and the calendar name (which you can change to rename the plan if you so wish).

Notice that you can also copy your iCalendar link and paste it into any calendar app that connects using iCalendar. Anyone who has this link can see your plan’s task information without needing to sign in.

Adding a plan to your Outlook calendar if you are not plan owner

If a plan owner has shared an iCalendar link with you and you wish to add it to your own Outlook calendar, simply tap the ellipsis (…) at the top of your plan then select “Add plan to Outlook calendar” in the dropdown menu that follows.

You will then have the option to review the link and calendar name in the Outlook for Web Calendar Subscription dialog box. Once everything checks out for you, proceed to choose Save at the top of the page.

This imports the details to Outlook. You can then find the name of your plan’s calendar to the left of your calendar, under People’s calendars. If you select it, you will see a new tab above your personal calendar with the plan’s name, along with the plan’s tasks on this calendar.

For more information about getting the most out of your Microsoft solutions, be sure to keep an eye on our blog.

Microsoft Planner Outlook

Hackers Infect Healthcare Sector

Security researchers have discovered a new hacking group that is targeting healthcare organizations and other major international corporations related to this sector all around the world, and especially in United States, Europe, and parts of Asia. The intent of this group is to conduct corporate espionage. Researchers have named this hacker group “Orangeworm”. According to a recent report, this group has been active since early 2015, and its primary focus is the health sector.

Hackers Healthcare

How does Orangeworm work?

The healthcare industry has been targeted by Orangeworm to get access to patient’s records and to learn more about imaging devices. The hackers install a Trojan (dubbed by security researchers as “Kwampirs”) in computers used to control high-tech imaging devices like MRI and X-Ray machines. This allows the hackers to steal sensitive data and remotely access equipment by opening a backdoor in these compromised computers. It also infects machines that are used to assist patients in filling consent forms.

Kwampirs then takes some basic information from these compromised computers and sends it to the hackers to a remote command-and-control server. This server then determines if the hacked system is being operated by a high-value target or a researcher. If the server finds the victim to be of interest then the virus spreads itself across network shares and infects all the other computers in the same organization. The malware uses the system’s built-in commands to gather information about the victim’s compromised system and network instead of using enumeration tools and third-party reconnaissance.

Companies infected by Orangeworm

Almost 40% of companies infected by this malware belong to the healthcare sector while the rest of the organizations, although not belonging to the medical sector, are related to healthcare organizations. Other organizations infected with Orangeworm belong to companies in the agriculture, logistics, IT services, and manufacturing sector. According to researchers, hackers attempted a supply-chain attack to penetrate the software of healthcare organizations by infecting a service provider.

Profile of the hackers  

According to investigators Orangeworm does not fit the techniques, procedures, and tactics of a classic nation-state APT (advanced persistent actor) but it is still an APT. The most common observation is that Orangeworm is a single hacker or a group of lone hackers working to steal information about patients from healthcare organizations to sell on the black market. This patient information is considered to be more complete than customer data stored in financial or any other institution. Hackers gather as much information as they can about their victims such as network shares and user groups, configuration information, account policy information, list of directories and files, running system process and systems, accounts with admin access and the like.

If the virus detects something of value in the system, Kwampirs will copy itself, propagate across the network and infect other computers. Investigators are of the opinion that the hackers are working on some sort of espionage on the sector as they do not appear to be copying any data from the network.

The hackers are not concerned about being detected as they are using lateral movement methods that are thought to be noisy and antiquated. In spite of this, it took investigators three years to disclose and identify the group’s attacks. According to investigators, the reason why this malware went undetected for so long is that the healthcare organizations usually use computers that are old and have software that is rarely updated, doesn’t have an antivirus, and are therefore easy to hack.

According to experts, hackers employed a similar pattern in all the attacks that were carried out. They infected one computer with Kwampirs, and then proliferate to others. This ensured them remote access to every infected host. The hackers spread the virus to as many systems possible that is why the malware has also infected the computers that control the medical devices.

Security concerns

According to the findings of a detailed report on the group’s method of operation, hackers have made no efforts to update the virus since the first attacks which suggest that the attackers are either stupid or supremely confident about never getting caught.

These attackers are bold as their methods have proved very effective. Security researchers have been stressing for a long time the need to install security measures to safeguard the weakened ports. Medical devices have been targeted before also. Recently, WannaCry ransomware also targeted hospitals all around the globe.

Even though the motives of Orangeworm are unclear and investigators have been unable to find the group’s origins, they are of the opinion that the group is conducting espionage for personal gain and commercial purposes. They have been unable to find any significant evidence suggesting that a nation-state backs it.

Although, Orangeworm is not the first or the last malware to hit the healthcare organizations it is imperative that these organizations routinely search and monitor their computer systems to make sure that their devices are safe from such attacks.

Getting the Most Out of Your Business Website

Business Website

Today’s internet has literally changed the way businesses function. It has redrawn the boundaries and changed the rules of competition in today’s business climate. The Internet has allowed business owners to create much closer relationships with their customers. In addition, it has given consumers more power through access to unlimited information.

Business Website

Regardless of the size of your business, you probably have a website and a pretty decent one at that. In fact, websites are not as costly as they once were to build and manage. Thanks to the increase in the number of web developers and online sites that host websites, almost anyone can have a website if they want it.

For savvy business owners, their website is the key to greater sales and stronger relationships with customers. A successful website is constantly adding new content that offers value to consumers. They update the site regularly with the latest security and technology. A company with an amazing website almost always excels in the marketplace over competitors who don’t. Why? Because they understand that their business website is the voice of their company online.

Websites have become a valuable commodity to business owners. They are the first stop of prospective clients who want to find more information about your business. Current clients also rely on websites to find product information and updates. Your website is the place where all the action takes place each day. Your website can make or break your business. Knowing how important websites are, most business owners are interested in learning how they can get the most out of their site.

Allow your website to communicate your story to clients

With the understanding that websites do speak to your customers, you should ask yourself the question, “What do you want your website to say to customers?”

Each day, you must make sure that the information you provide is important to your customers and that it’s accurate. Does it resonate well with them? Will it make them want to purchase your products or services? Image is everything in a business. Since your website represents the first image that people have concerning your business, it’s important to make a good first impression. As it is commonly said, first impressions matter. What story do you want the website to tell?

The best websites always tell a compelling story. Sometimes your story is all about why you started your business and sometimes it’s more about your roots, your background. Great businesses have a unique reason for their existence. Bill Gates got the idea for Microsoft when a friend, Paul Allen, showed him the 1975 issue of Popular Electronics. This issue featured a story on the Altair 8800, one of the first microcomputers. Both Gates and Allen saw the potential for developing a programming language for the computer. The rest is history.

In putting together the story behind your business, it may be necessary to hire a good writer to help craft the message. This expense is well worth it. Once you create a great story that customers can relate to, your next job is to write professional content for your site. Though your budget may initially be small, you can go back and redo this once you have the time and money to do so. Usually, your website is a work in progress anyway. It is constantly evolving and changing as your business grows.

Good content will make customers feel that they need your goods and services to meet a need in their lives. You should include information about how these goods or services are better than those offered by others in the same industry. Many of today’s most successful brands have become indispensable to their customers. Think about how Prada and Louis Vuitton have changed the handbag industry. Their customers feel a strong urge to own one of these exclusive handbags and many are priced in the thousands of dollars.

Provide contact information

Imagine locating a website online, and the information given therein is attractive. You read through their homepage and look at what they offer. In your mind, you are convinced that this is it. They are exactly what you need. You pick up your phone while scrolling down, looking for the contacts page and you find nothing. No phone number, no email address, no physical address, nothing. This can be frustrating, right? In fact, most people will get disheartened immediately. They will look elsewhere for other products. Consumers feel that if there’s no contact information, then the business must be shady. So it’s important to include your physical location, email address and phone number. This degree of transparency tells consumers that you have nothing to hide.

Collect lead information

If you have been in business long enough, you know that some clients will visit your website more than once before they decide to make a purchase. Do not despair, this does not mean that your website is not fulfilling its mandate. It simply means that many customers enjoy doing lots of shopping before they make a purchase. In the meantime, you can collect lead information using a lead capture form. This will give you the opportunity to send them regular email updates about specials you might have. Often, if a prospective customer gets an email telling them they can get a discount by making a purchase right away, they will do so. Everyone loves to get a great deal.

User friendly navigation

The whole science behind user experience has grown tremendously in the past ten years. A site must be intuitive, responsive and user friendly. You cannot afford to hide things or make it hard for customers to get information. Websites that are difficult to understand end up chasing customers away. Try to get regular feedback from users. Find out what people are saying about your site. Correct any issues you may have right away.

Final thoughts

All in all, if you maximize each component of your website, you will discover the magic that a great site can offer. Customers will visit often. They will tell their friends about your site. An amazing website truly is priceless.

Meltdown and Spectre Spawn New Round of Phishing Scams

The recent announcement of the vulnerabilities found in the Intel, ARM, and AMD processors has sparked a new phishing campaign – not the good kind of fishing with bait and largemouth bass. Although, these hackers are using a particular kind of bait.

Phishing Scams

While Meltdown and Spectre require access to your system, hackers have various ways to gain access. Already hackers are using phishing emails to trick users into giving them access. They send out an email claiming to contain a patch for Meltdown or Spectre. Instead, the email installs malware on your system. This malware gives the hacker access to your system, allowing them to exploit the bugs and take the unprotected data.

Be wary of social engineering scams like phishing emails. Hackers are all too eager to take advantage of problems like this, and unfortunately, some people are so eager to fix the problem that they might not realize that the “patch” they just clicked on is now allowing a hacker to steal all their data.

WHAT IS PHISHING?

Phishing is a hacking technique that “fishes” for victims by sending them deceptive emails. The “ph” replaces the “f” in homage to the first hackers, the “phone phreaks” from the 1960’s and 1970’s. Virtually anyone on the internet has seen a phishing attack. Phishing attacks are mass emails that request confidential information or credentials under pretenses, link to malicious websites or include malware as an attachment.

Many phishing sites look just like the sites that they are impersonating. Often, the only difference in many spoofed sites is slight, and easily missed difference in the URLs. Visitors can easily be manipulated into disclosing confidential information or credentials to the hacker if they can be induced to click the link. Even blacklisted phishing sites can often get by standard filters through the technique of time-bombing the URLs. Then the URL will lead to an innocent URL initially to get past the filters but then redirect to a malicious site.

Although malware is harder to get past filters, recently discovered and zero-day malware stands an excellent chance of getting through standard filters and being clicked on, especially if malware hides in a non-executable file such as a PDF or Office document. This is how many of the recent ransomware attacks were pulled off.

Now with Meltdown and Spectre looming over us, the average person is more susceptible to “quick fixes” and solutions to this issue.

Despite the lack of personalization, an astonishing 20% of recipients will click on basically anything that makes it to their inbox.

SPEAR PHISHING

Spear phishing is an enhanced version of phishing that aims at specific employees of the targeted organization. The goal is usually to gain unauthorized access to networks, data, and applications. In contrast to the mass emailing of a phishing attack, which might see hundreds of attack messages sent out to random recipients within the space of a couple of hours, spear phishing is methodical and focused on a single recipient. Often the initial email will contain no URL or attachment. Instead, it will simply try to invoke the recipient into thinking that the sender is who they say they are. Only later on will the hacker request confidential credentials or information, or send a booby-trapped URL or attachment.

The additional customization and targeting of a spear phishing email, along with the lack of easily recognized blacklisted URLs or malware customization results in click-rates more than 50%!

Why Managed Detection and Response Is More Important Now Than Ever

Technology is constantly evolving, and so is its relevance. In the world today, technology is fast-becoming a human being’s best friend. Just think of the number of times that you rely on technology in a day’s time. Everyone, even the self-proclaimed analog dinosaur, depends on technology to some extent.

Managed Detection

Of course, this has spawned a major increase in the number of cybercrimes that occur daily across the globe. Cybercriminals are targeting information technology systems that are simply not well-protected from intrusion. The fact that people are so reliant on technology makes it easier for these criminals to achieve their goals. This is where Managed Detection and Response (MDR) comes in.

Information Technology experts face a constant struggle to curb cybercrimes. This crime, which has become deep-rooted in our society today, has led to the loss of time, money and reputation. Cybercriminals target websites with weak security because they’re an easy mark. Then they sell that data on the black market. It’s an ongoing crime and has quickly become a familiar scenario to many.

This is why MDR is so important in our society today. MDR is not a new concept; it has been around for a long time. Like technology, however, MDR continues to evolve with the changing trends in hacking. The main goal of Managed Detection and Response is to ensure that cybercrimes are prevented. It’s not enough to arrest and prosecute these criminals. The crimes need to be stopped before they actually happen.

How can MDR help with this cause? The simple answer to this question is that MDR is a system used to enable organizations to better understand their cybersecurity environment. With this program in play, your organization can more fully understand the IT environment in which you operate. This will provide you with some important advantages that can help prevent hacking.

Environmental threat detection

First, as mentioned above, the main goal of MDR is to aid in detecting cybersecurity threats in a particular environment. To this end, this system performs a series of functions including analyzing the types of risks that your organization may be exposed to. This can enable you to determine exactly what the most critical threats are. Using MDR, companies are able to gauge which threats are more serious. This allows you to take preemptive steps to close those doors to cyber thieves. Preventing just one attack can save you millions of dollars.

Makes threat detention faster

By making the organization aware of the threats they face, MDR makes threat detection simpler. Since MDR enhances threat analysis, your business can fully understand exactly which cybersecurity threats you face. Imagine being able to act before a breach occurs. You can take action today and avoid a nightmare tomorrow. With MDR, your company can quickly assess its level of security and take action right away.

Increases ability to respond to threats

MDR enhances the capabilities of organizations that use it to respond to cybersecurity threats. Preparation is everything when dealing with hackers and cyber thieves. Your organization needs to be prepared for every type of threat, from ransomware and hacking to data leaks. Having greater knowledge of those threats that pose the biggest risk helps you to respond with more precision. Anticipate threats before they happen. Define those weaker areas and eliminate them.

Enhances threat prevention

An ounce of prevention is better than a pound of cure, they say. This holds true especially when millions of dollars are at stake. The impact of cybersecurity in our world today is far-reaching. Every year, cyber breaches cost businesses millions of dollars. They damage your reputation and slow your forward progress.  With MDR, threat prevention becomes your greatest ally. Proactive security monitoring can apply proven rules to your security system, thus offering a new level of breach management.

Do we really need MDR?

Many business owners feel frustrated by the sheer number of cyber breaches occurring each day. It seems that the criminals have the upper hand and there’s nothing we can do to stop them. MDR allows you to take back control of your data security. It’s a reliable system that focuses on one thing: preventing cyber breaches from occurring.

The threat of cyber-attacks is ever looming. Thieves are constantly finding new ways to get through any crack or hole in your security system. And, their methods are getting more and more sophisticated as the days go by. The whole cyber security industry evolves at such a fast pace that most business owners are unable to keep up with it. This fact leaves you at a distinct disadvantage.

Final thoughts

Though the intricacies of MDR may be somewhat complex, it is important to remember the advantages of this system. With MDR in place, you can avoid being the next victim and sleep much better at night. For business owners, peace of mind is priceless. You can focus on running your company once again and take pride in your accomplishments.