How Can I Enter and Analyze Data via a Data Entry Form in Microsoft Excel?

Microsoft Excel Data

You can create a data entry form in Microsoft Excel without using VBA or even recording a macro. If those terms don’t mean anything to you, don’t worry. You won’t need to learn them. Excel has a hidden tool you can use to make dreaded data entry fast and easy. Using a data entry form lets you view one record at a time while entering the data, but also makes it easy to analyze multiple records in a tabular format.

1. Open an Excel file.

2. Place the Form tool in your Quick Access Toolbar.

3. Click the Form command to bring up the data entry form view (no other step is needed for this).

4. Use the Find Prev and Find Next buttons to analyze your data one row at a time.

How do I Format the Data for the Data Entry Form?

To use the data entry form, simply put the data in the following format:

  1. One record of data goes in each row in Excel.
  2. Include column headings above the data.
  3. You need at least one record prior to activating a data entry form.

How Do I Add the Forms Toolbar to Excel’s Quick Access Menu?

You can add the Forms… command to Excel’s Quick Access Menu for convenient usage. Here’s how to do that:

  1. Press the options icon that lies to the right of your quick access toolbar.
  2. Choose More Commands when the drop-down list appears.
  3. Add the Form command to the quick access toolbar.
  4. Go to the Choose commands drop-down list. Select Commands Not in the Ribbon from the list.
  5. Scroll down until you come to Form… and click on it to highlight it.
  6. Press Add.
  7. This brings the Form… command in the rightmost box.
  8. Press OK.

Microsoft Excel Data

How Can You Analyze the Data?

Here are some quick tips for navigating the data block created by your entries.

  1. Place the cursor anywhere inside your data block.
  2. Each row has a single record.
  3. Each column has a column heading.
  4. Press the Form button in the quick access toolbar.
  5. The data entry form activates, allowing you to view data or add records one at a time.
  6. Use the Find Prev or Find Next button to surf through the records.
  7. Add a record using the New button or delete existing records with the Delete button.

Ransomware Explained

Ransomware Explained

Ransomware Explained

Ransomware. Ransomware. You have heard the word and know it involves a cyberattack. You assume from news reports that it only happens to large companies like Target, Equifax, and Marriott Hotels for example, and that cybercriminals will not want to bother with your small or medium-sized business (SMB). Unfortunately, that assumption is wrong.

The Federal Trade Commission (FTC) notes that ransomware is a major concern of small business owners across the country. Another report notes that since nearly 50 percent of SMBs have no employee security and awareness training, they are particularly vulnerable to cyberattacks, including ransomware.

The U.S. Department of Justice (DOJ) reports that since January 1, 2016, more than 4,000 ransomware attacks have occurred every single day. Business owners suffer the temporary or permanent loss of their proprietary information, disruption of their daily business operations, and the extreme expense of restoring files, if that is even possible. Their reputation in their community may also be damaged.

What is Ransomware?

Ransomware is a type of malware, a software program intended to damage computer files. It quietly invades your computer, encrypting as many files as it can locate on your local and network drives. The encryption is done by using a complex mathematical algorithm. When the encryption is complete, your files become unreadable unless you have the key to unlock them.

The only one with the key is the cybercriminal who demands you pay a ransom in order to regain access to your files. Your data has been kidnapped. A simple virus scan cannot undo the encryption. Your data is being held hostage by the cybercriminal.

In many cases, there is a time limit for payment. A count-down clock may even appear on your screen telling you that you must pay the ransom within a certain period of time or forever lose access to the files.

How Ransomware Gets into Your System

Ransomware enters your computer most often by a “phishing” approach. This happens when an innocent user receives an email that appears to be from a friend, co-worker, or reputable company. It includes an attachment. When the user clicks on the attachment, it is downloaded and, voila, ransomware invades that device and all other devices connected to the network.

Some websites have malware lurking in the background. It only takes one keystroke and the malicious software will now infect all the files it can access. The intent is to cause as much damage as possible to your network so that it shuts down and you can no longer access any of your files.

Should you Pay the Ransom?

The DOJ does not advise SMBs to pay the ransom. But, it does note that victims of ransomware have tough decisions to make when considering whether or not to pay. It recommends ransomware victims consider the following factors before paying the ransom:

  • How to best protect employees, customers, and shareholders.
  • Paying the ransom does not guarantee that the cybercriminal will provide the key to decryption.
  • Some victims who paid the ransom and did get the decryption key were again targeted by other cybercrminals.

The DOJ encourages businesses who have been invaded by ransomware to report it to law enforcement. There is a chance that they can use legal tools, including working with international law enforcement, to locate the encrypted data.

How to Prevent Ransomware from Invading Your Network

The most important step of preventing ransomware from invading your network is education. Your employees need to understand how ransomware works, and they need to be constantly aware of the importance of not clicking on any attachment no matter how legitimate the sender appears to be. The attachment must first be scanned for malware.

Every file needs to be backed up so it is accessible off of the network so that if there is a ransomware attack, your business is not crippled beyond repair. If an attack is discovered on one device, immediately shut down all devices connected to the network.

Cybercriminals are getting smarter and learning how to circumvent cybersecurity that is installed to prevent the ransomware and other malware attacks. There are Managed Service Providers (MSPs) who can provide a robust cybersecurity system that can withstand the threats. They should also be able to ward off a threat before it can cause any harm.

Are You Part Of The 55% That Fails To Offer Security Training To Staff Members?

Computer Security Training

Making sure the employees that rely on computer systems are trained in cybersecurity is the easiest way to avoid compromising attacks. However, only about 45 percent of business organizations actually make sure their employees are properly trained through mandatory training, and roughly 10 percent make cybersecurity an optional training. This information is alarming for a lot of reasons.

Most Attacks Happen via the Compromise of an End User

Primarily, this new study means that 55 percent of organizations do not think their end users have a big enough role to play in keeping their network safe. In actuality, the end user is usually where systems are compromised in business settings. Phishing messages and other business security threats target people opening emails, performing things on social media, and doing basic functions that end users tend to do. Even if business owners do train their higher-ups, such as management members and team leaders, there is a major risk if the typical system users are not properly trained.

Formal Security Training Is a Struggle in Most Business Settings

Even organizations that offer security training as a mandatory thing to all system users in the work environment, most do so in a limited fashion. According to Mimecast, only about six percent conduct cybersecurity training sessions or courses on a monthly basis. Four percent of business owners do training four times a year, and nine percent only require training when they bring in a new hire. Surprisingly, many places don’t really offer any kind of formal cybersecurity training; they just send out a mass email of tips on occasion.

Employees Are Often in the Dark Where Cybersecurity Is Concerned

Because business owners are not taking the time to ensure their team members are adequately trained in cybersecurity, employees are left in the dark about the threats that could be sitting in wait when they log in to the company system. Studies actually show that one out of four employees have no idea what some of the most common cybersecurity threats are, let alone what they look like or how to avoid making major mistakes.

Considering that one in ten employees are using devices at work, connected to the work network, for personal reasons for at least four hours a day, the aforementioned facts show just how relevant cybersecurity training should be to all team members. Team members may be checking personal emails, hitting up social media sites, or otherwise doing things that could leave companies wide open for an attack. Even if the risks are handled through intranet email, for instance, threats can still get through on other email platforms that an employee uses on a network device.

Implementing Cybersecurity Training Does Not Have to Be Difficult

The majority of business who do not have a good cybersecurity training plan in place avoid the process because they believe it will be too time-consuming. Some wrongly assume that formal training really is only necessary for people who have higher ranks in the company, which is obviously not true. Implementing a good training plan does not have to be a difficult or time-consuming thing. A few ways to incorporate a good training plan include:

  • Working with a cybersecurity company who provides employee training material with their services
  • Making cybersecurity a mandatory part of other training processes, such as safety training
  • Creating basic cybersecurity training modules employees can do in their spare time throughout the day
  • Handing out informative resources and worksheets on cybersecurity threats and protection

In addition, cybersecurity training should be an ongoing thing. Threats are always changing and evolving by the day as criminals get smarter with every thwarted attack or exposed risk. Therefore, it is critical that business owners get proactive about training and make it a priority over the long term. In the long run, this can be a change that saves the livelihood of the business from a serious cybersecurity attack.

Overall, cybersecurity training should be just as important to a business operation as any other form of training. In 2017 alone, cybercrime cost the world an estimated $600 billion, according to CNBC. If you believe your business is not adequately training all employees in cybersecurity, reach out to a cybersecurity training or consulting company for advice.

How Can I Apply Styles With Microsoft Excel?

Excel’s ready-made formatting styles bring life and color to your spreadsheet. It lets you give printed versions a polished, professional look. Color coding makes it easier for audiences to interpret your data. Use this neat feature to take your worksheets up a notch.

What is a Preset Excel Style?

A cell style puts together font size and style, number formatting, borders and shading into pre-fab-style packaging you can apply with the click of a button. The software comes with built-in options in a variety of palettes to suit almost any taste. Once you become more familiar with them, you can customize cell styles and make them available in all your workbooks.

Keep in mind that cell styles are affiliated with the theme of your document and applied to the whole workbook. If a document’s theme is changed, the cell styles change as well. Also, you can use the lock cells feature to prevent other users from modifying the styles used in your workbooks.

How Can You Apply Cell Styles?

It’s relatively easy to apply cell styles to jazz up workbooks and impress your internal and external clients. Just follow the steps below:

  1. Select a range of cells to format.
  2. On the Home tab, click on Cell Styles to view a gallery of style choices.
  3. Click on the cell style that fits your spreadsheet or personal preferences.

How Can You Create Your Own Cell Styles?

You can also create customized styles that reflect your company or personal branding by taking the following actions:

  1. Select a single cell in your worksheet.
  2. Apply your favorite formatting options to the cell. A built-in style may be the easiest starting point. Then, you can tweak it to add your own flair.
  3. Click the Home tab on the ribbon and choose Cell Styles to access the Cell Styles Gallery.
  4. Now, choose the New Cell Styles option (It’s near the bottom.)
  5. Enter the name for your new style in the Style name box.
  6. Excel lists the formatting options applied to the selected cell for your reference.

How Can You Modify an Existing Cell Style?

To preserve the built-in styles, it’s safest to duplicate them and then make your modifications to a saved style. However, you can make changes to pre-set and custom styles, as follows:

  1. On the Home tab, select the Cell Styles icon.
  2. In the Cell Styles gallery, right-click on any cell style, then choose Modify to access the Style dialog box.
  3. Click the Format button to reach the Format Cells dialog box.
  4. Use the various tabs to apply your changes and click OK to get back to the Style dialog box.
  5. In the Style dialog box, under Style Includes, clear the check boxes of formatting elements you no longer want.
  6. Click OK to exit the dialog box.

Microsoft Excel

This takes you back to your worksheet and the modified cell style should now reflect the changes.

Hacked: The Australian Emergency Warning System — Is Your Business Next?

Australian Early Warning Network

Australian Early Warning Network

In Australia, citizens fear a terrorist attack or another national emergency just as much as the next country. For this reason, Australia has what’s called the Early Warning Network or EWN for short. Recently, a hacker was able to breach this system and took it over. The result was terrible in that it caused widespread panic. But it was also catastrophic in that it lessened the confidence Australian citizens have in their Early Warning Network system.

A Breach of Australian National Security

The breach of the EWN occurred on January 5, a Saturday evening. Hackers had somehow breached the EWN system and sent out an unauthorized alert to thousands of Australian citizens. Today, experts at the EWN have confirmed that their system was hacked. They say that an unauthorized individual somehow obtained login credentials for the system. Some of the EWM’s customers received a spam notification. The notification went throughout the entire country of Australia.

The notification read:

“EWN has been hacked. Your personal data is not safe. Trying to fix the security issues.”

Also in the message was an email address. The email address was alongside a prompt that users could unsubscribe to the EWN service. In addition to being posted on the website, the message was also sent through landlines, via text, and over email. Throughout Australia, tens of thousands of individual citizens use this service to get information from the government. All levels of the Australian government use EWN.

Right away after the attack, EWN understood that there was a breach in their security. They sent out a message and posted it on their Facebook page. It read:

“At around 930pm [A]EDT 5th January, the EWN Alerting system was illegally accessed with a nuisance message sent to a part of EWN’s database. EWN staff at the time were able to quickly identify the attack and shut off the system limiting the number of messages sent out. Unfortunately, a small proportion of our database received this alert.”

Contrary to what the original message from the hacker said, no one’s personal information was compromised. Only white page information could have been accessed, such as basic address information. Representatives from EWN also stated that some local, state, and federal government agencies were affected by the hack, but not all clients who subscribe with EWN were affected.

EWN was able to regain control of their services directly after the attack and are investigating the issue to prevent further breaches.

The Importance of Fortified IT Security in an Age of Rampant Cyber Hacking

It is common knowledge that the majority of businesses — no matter whether they are private, publicly funded, government related, or otherwise — are at risk of being hacked. Furthermore, hackers from around the globe are improving their techniques for accessing your private data and information.

This often begins with breaching the system by obtaining login credentials from individuals who already work or subscribe to a specific company, business, organization, or government agency. Naturally, this information is not given up willingly. Instead, it is obtained in a conniving and sneaky way so that the person giving up the login information doesn’t realize what they’re doing. Email phishing and phone call phishing are the top two ways that hackers obtain login information.

Chances are, your business organization is not completely safe from cyber hacks like the one that happened to EWN. Consider hiring an outsourced IT service provider who can improve your company’s security and prevent breaches from occurring.

DNS Infrastructure Tampering

DNS Server

DNS Server

On January 22, 2019, The U.S. Department of Homeland Security, DHS, Cybersecurity and Infrastructure Security Agency, CISA, issued an emergency directive. This emergency directive was put into place to address ongoing problems and issues associated with global Domain Name System, or DNS, infrastructure tampering. As a business owner or executive in charge of a business, you may have many questions about this and how it can affect your business. Here is what you need to know about DNS infrastructure tampering.

What is DNS Infrastructure Tampering?

DNS infrastructure tampering involves techniques that allows an attacker access to your DNS. They are able to compromise a users’ credentials, allowing them to make changes to DNS records. Once the records are changed and altered, it allows an attacker the ability to access and intercept many things related to the network, including but not limited to your web address, your mail traffic and web traffic. An attacker can take that information and redirect incoming traffic to an unsafe website that may contain viruses or may collect information about your customer or business. When the attacker accesses your DNS, they also have access to encryption certificates, which allows certain information to be decrypted. And unfortunately, since the certificate is valid, your users will receive no error warnings that the certificate is outdated, so they may feel safe putting in personal information.

How Can DNS Infrastructure Tampering Affect Your Business?

When an attacker tampers with your DNS infrastructure, they basically hi-jack your website. They can control incoming traffic, control where that traffic goes, and see personal information, such as names and credit card numbers. Unfortunately, if your page is hijacked, you have to tell your customers that their personal information may have been compromised, which reflects poorly on you. Your customers and clients expect you to keep your page safe for them, and if you fail to do so, it can be detrimental to your business.

How Can You Protect Your Business From DNS Infrastructure Tampering?

It can be difficult to determine if your DNS infrastructure has been tampered with unless you take the time to carefully review your DNS certificates. It is recommended that you take the time to audit your DNS records, change your DNS account passwords to more complex passwords and add multi-factor authentication to all of your DNS accounts. This should be done within 10 days, as the threat level for DNS infrastructure tampering is so high. This should also routinely be done in the future to ensure your DNS certificates have not been tampered with.

DNS infrastructure tampering can create a security threat to your business. It can negatively affect your business website, and any websites that those within your business frequently visit and interact with. Fortunately, there are steps you can take to help decrease the risk of DNS infrastructure tampering and protect your business. Having the right IT team in place and learning about security threats is imperative to keeping your business safe from threats at all times.

How To Add A Contact In Microsoft Outlook

Adding a new name and email address to your list of Microsoft Outlook contacts is pretty simple. There are two different ways you can do it depending on whether you want to add the contact information from an email or just want to create a brand new contact.

How to Add a Contact From an Email

1. Right-click the name of the sender in the heading of the email from whom you want to add as a contact.

2. Select “Add to Outlook Contacts” from the drop-down menu.

3. After clicking, you will see a form which is partially filled in with information such as the person’s name, email address, phone number, job title, etc. Fill in any missing information or make any other changes you want.

4. When you are satisfied, click on “Save & Close” on the menu bar at the top of the screen.

How to Add a Completely New Contact

1. Find and select the person icon on the verticle menu bar on the left side of the window.

2. Click on the “New Contact” button on the top menu bar.

3. This will bring you to a completely blank form which will allow you to add the person’s name, email address, and other personal information including a photograph.

4. When you finish adding information, select “Save & Close” on the menu bar at the top of the screen.

Microsoft Outlook

That is it!

Now whenever you want to email the person you just added, you will only need to type in the first few letters and Microsoft Outlook will automatically suggest the contact. Remember that you can always change or add to the personal information for each of your contacts by selecting the person from your contact list.

Important Update: North Carolina Data Breach Laws

North Carolina Data Breach Laws

North Carolina Data Breach Laws

What are the Proposed Changes to NC’s Data Breach Laws?

North Carolina’s lawmakers will consider legislation first introduced by the Attorney General Josh Stein and Representative Jason Saine. The proposed law would redefine the term “data breach” and give companies 30 days to report breaches to consumers.

For healthcare providers, this reduces the HIPAA timeframe, which states that breach notifications must go out within 60 days. According to the proposal, this gives consumers additional time to freeze their credit and take steps to prevent identity theft.

The law extends the definition of a breach to include ransomware attacks – a big change for healthcare providers, who have been targeted by recent hackers.

How Do the Proposed Changes Give Consumers Greater Control?

Consumers gain a number of protections, including the following.

  • Quicker notification. Receiving notification within 30 days, instead of 60, gives consumers a heads up so that they can take action to protect their credit and identity.
  • Credit freezeConsumers can place a temporary freeze on their credit reports to prevent hackers and thieves from opening unauthorized credit cards in their name.
  • Credit monitoring. If a credit reporting company, such as Equifax, is breached, they have to provide four years of free credit reporting to impacted consumers. Other organizations that are breached have to provide two years of free credit reporting.
  • Clarifies penalties. Businesses that fail to report breaches within 30 days will be in violation of the Unfair and Deceptive Trade Practices Act.

What Does This Mean for Consumers?

The bill expands consumers’ right to information about the breached data, as follows.

  • Consent. A company seeking access to a person’s credit information would need that person to express their permission. The reason for the request has to be provided in writing.
  • Right to request information. North Carolinians can ask the consumer reporting agency to give them a list of credit-related and non-credit information, its source, and the entity or person that received it.

Why is the State Considering the New Rules?

North Carolina hosts the headquarters of many credit card companies and financial institutions and the legislation follows a dramatic rise in breaches throughout the state. According to Health IT Security, 1.9 million North Carolina residents were compromised in 1,047 breaches in 2018. This was a 3.4 percent increase over 2017.

This is the second attempt to tighten privacy laws in the state. If this bill passes, North Carolina would join several other states that have passed similar laws to combat digital thieves. For example, Colorado passed legislation to shorten their breach notification to 30 days in 2017, and Iowa is proposing a 45-day deadline to notify consumers.

Is This Just Happening in North Carolina?

On the national front, lobbyists and some Congress members are also calling for more protection for consumers whose data has been compromised. For instance, the Information Technology and Innovation Fund has suggested scrapping the hodge-podge of privacy regulations, such as HIPAA, in favor of more unified federal privacy laws.

How To Set Up Your Microsoft Office 365 Email On Your Smartphone

Office 365 Email smartphone

Office 365 Email smartphone

Do you want to have the ability to stay on top of your emails from anywhere without the need to learn a new email system? Then enjoy the convenience of using your Microsoft Office 365 email and calendar directly on your smartphone. The Microsoft Outlook app is available for both iPhone and Android devices, it is free to use, and only takes a few minutes to get it up and running.

A Quick Guide to Installing the Outlook Office 365 Mobile App on an iPhone

  1. The first step is to download Microsoft Outlook from the App Store. Be sure to search for and download the latest version of the “Microsoft Outlook – Email and Calendar” available from Microsoft Corporation.
  2. Once the Microsoft Outlook app finishes downloading, open the app and select “Get Started” from the menu. Choose “Get Notifications” if you want to receive email alerts. Remember, you can always adjust your notification setting in the future.
  3. To connect with your Microsoft Office 365 account, input your email address and click “Add Account.”
  4. This will take you to a login screen with the email portion of the form already filled. Enter your email’s password and select “Sign in.”
  5. If you want to add additional work or personal accounts, you now have the option. If you don’t want to add more accounts at this time, click on “Maybe Later.”
  6. Go through the tutorial to learn how to use the app to write, read, and respond to emails or access your calendar. Now, whether you access your Microsoft Office 365 account using your phone or computer, everything will remain perfectly synched.

A Quick Guide to Installing the Outlook Office 365 Mobile App on an Android Phone

  1. First, go to the Play Store and search for the latest version of Microsoft Outlook. Once you find it, click on “Install.”
  2. When Microsoft Outlook finishes downloading, open it and choose “Get Started.”
  3. Type in your Microsoft Office 365 email, and select “CONTINUE.”
  4. Now you need to log in using your Microsoft Office 365 credentials. The email portion of the form is already complete, so just enter your password and select “Sign in.”
  5. At this point, you can either add additional accounts by clicking on “CONTINUE,” or skip this step for now by tapping “SKIP.” You can easily add additional accounts in the future.
  6. Learn how to use the app to write, read, and respond to emails or access your calendar by going through the short online tutorial. Now your Microsoft Office 365 account will remain synched whether you access it through your computer or smartphone.

Once you have on-the-go access to your Microsoft Office 365 email and calendar, you will find yourself being more productive no matter if you are in or out of the office.

Urgent Tech Tip: Disable Facetime On Your iPhone

Apple Facetime

Apple Facetime

A major FaceTime bug discovered recently has left Apple device users skittish about yet another privacy concern and forced the tech giant to scramble for a fix for the issue.

For users of Macs or iPhones, understanding the FaceTime flaw and knowing how to disable the function are important steps until the issue is fully resolved.

What is the FaceTime Flaw?

The FaceTime flaw affects iPhone users running iOS 12.1 or later. Here’s how it works. Someone calls your number using the FaceTime feature. Before you pick up, the caller swipes up and adds their own number (or any number), creating a Group FaceTime interface.

At that point, the caller can hear all audio coming through your microphone — even if you never answered the call.

News of the glitch spread like wildfire over social media. Others discovered that taking further simple actions could give the caller access to video, too.

What Is Apple Doing About the Issue?

Within hours of broad disclosure of the issue, Apple disabled the servers controlling the Group FaceTime function. As of January 29, Apple’s system status page states that “Group FaceTime is temporarily unavailable.” The company has stated that a fix is likely in a few days.

The company had first introduced Group FaceTime in late 2018 for both Macs and iPhones.

What Should I Do About FaceTime on My Device?

Users may want to disable FaceTime on their iPhones or Mac computers. It’s a simple process for either device type.

For iPhones

1. Go to Settings .

2. Scroll to FaceTime. This feature is in the fifth section of settings along with other built-in apps like Phone, Messages and Maps. If you’re having trouble finding it, go to the top of the Settings screen and type FaceTime in the search bar.

3. Click on the FaceTime bar.

4. At the very top of the FaceTime settings, there’s a label marked FaceTime with a slider. If the green light is lit, FaceTime is activated on your phone. Slide the slider to the left to turn FaceTime off.

Note: When Apple releases an iOS update, install the update, go back to the FaceTime settings and slide the slider to the right to reactivate the feature.

For Macs

1. Launch the FaceTime App.

2. Select the FaceTime menu bar from the top-of-the-screen navigation.

3. Select Turn FaceTime Off. Command-K also turns the feature off.

Note: Once Apple releases a fix, turn the feature back on by launching the app and clicking the Turn On feature.

How Did This Happen?

It’s unclear how this flaw was included in the Group FaceTime release. However, the New York Times reported that a 14-year-old Arizona boy discovered the glitch on January 19, 2019, 9 days before it became widespread on January 28.

On January 20, the boy’s mother sent a video of the flaw to Apple, warning of a “major security flaw.” She heard nothing from Apple Support and began using other channels to try to get the company’s attention. She emailed and faxed information to the Apple security team. She posted alerts to both Twitter and Facebook. Five days later, on January 25, Apple’s product security team suggested she create a developer account and submit a formal bug report.

It appears that the company didn’t react until three days later when a developer reported the flaw and a 9to5mac.com article went viral.

Apple faced criticism for its brief and limited response, which stated the company “identified a fix that will be released in a software update later this week.” In an ironic twist, the bug went viral on January 28, which is international Data Privacy Day.