Blog

September 5th, 2012

These past few months of 2012 have been big for Microsoft, with the officially announcement of Windows 8, two new tablets and new versions of nearly every Microsoft product. The Redmond, WA based company has indeed been busy. One of the more recent developments is a new version of Office, Office 2013 or Office 15 as the technical preview labels it. Office 2013 is promising to bring about some big changes.

Here are the major changes you are going to see with Microsoft Office 2013:

Overall changes With Office 2013, all of the major Office components have been updated to take advantage of the new layout in Windows 8. This means that the whole Office suite is now set up with a tablet friendly layout.

At this time, there are five different plans available for users who want to buy Office 2013.

  1. Office Web Apps. A free web based version of Office that is integrated with SkyDrive, Outlook.com and Facebook Messages.
  2. Office Home Premium. The consumer version that comes with Word, Excel, PowerPoint, Access, Outlook, OneNote and Publisher. This version can be installed on up to five computers at once, and comes with 20GB of storage space on SkyDrive.
  3. Office 365 Small Business Premium. Has the same programs as the consumer version, but instead of SkyDrive, uses Office 365. This version also has Exchange email, SharePoint and Lync.
  4. Office 365 Pro Plus. This plan has the same programs as Small Business as well as InfoPath.
  5. Office 365 Enterprise. Enterprise is the most complete plan, with all accounts being 365 Enterprise accounts and the full version of Exchange.
You’ll also be able to subscribe to Office, which will allow you to take your account anywhere and access/stream Office software and documents. Office will download/stream the program you need while you’re using it and then delete it afterwards. Almost every major program of Office has also been updated.

Word Word has been cleaned up a little and the ribbon at the top of the window (where all your editing options are) has been modified slightly to make it more useful. Laying out your documents has been made a lot easier with the ability to insert images directly from the Internet without having to download them first. You’ll also be able to adjust images more quickly due to enhanced alignment tools.

It’s obvious that Word 2013 has been designed for tablets by default, and the window is slightly taller but a lot wider. Some functions like Spell Check also take up a lot more space, which can make it tougher to edit/navigate documents. This could take some getting used to, but shouldn’t pose much of an issue for your employees.

PowerPoint PowerPoint shines with the new layout, with your project or presentation taking center stage with tools fading into the background. If you’re editing a presentation and you close the program, you’ll get a pop-up offering to take you directly to where you left off last time when you restart the program.

Embedding images and videos is a lot easier with the ability to search for media within PowerPoint and embed it directly, without having to mess with code and downloading images. Media also has quick formatting options which are easily accessed from where show up as a small box beside the media element.

There are also some great new presentation tools, including a preview of the next few slides that only you can see, the ability to zoom in/out on slides, and better ability to jump between slides.

Excel Excel has also had a similar facelift, with the latest features aiming to help users with their spreadsheets. Select a range of cells and Excel will give you a Quick Analysis option which can suggest ideas about what you may want to do with that data. When creating a chart or graph, Excel will make a suggestion as to the most appropriate chart/graph for the data. With complex data that can be analysed using pivot tables, Excel will build the tables automatically. Editing of charts, tables and data has also been made easier.

Excel has been made to look more ‘alive’. If you make a change you will visually see the results (if you change data, the resulting chart will update). If you make an error, Excel will now give you detailed explanations about the error, not just the usual error code from previous versions.

Outlook Outlook has been updated to be more efficient too, and you’ll be able to view and reply to emails directly from the main screen, without having to open emails in a new window. Instead  your emails open in a new pane that’s part of the main screen. You’ll also be able to quickly view all of your unread emails, by simply clicking Unread.

The address book has also received an overhaul, to bring it closer to the one on Windows Phone. It will try to put similar accounts together into one card and addresses can be more easily viewed.

There is a slight downside though, as notifications stack up on the right side of the window. If you’ve been away on vacation and return to 100s of emails, you’ll be flooded with notifications that take up a large portion of the screen. They do fade after a few seconds, but they could prove to be a nuisance.

There have been lots of changes made in Office 15, and no doubt more will be made before the retail release of Office 2013. You can sign up to preview Office 2013 here. While you can try it, we recommend that you don’t implement it as the new office suite in your office until the retail version is released. If you’re as excited as we are about Office 2013, and would like to learn more about implementing it after the release please contact us.

Published with permission from TechAdvisory.org. Source.

August 31st, 2012

The Internet is a magical thing; a gateway or connection to the rest of the world. Currently, the Internet is quick enough to do nearly anything without delay, and as such, companies have come to expect Internet connections to always be fast. The truth is, connection speed varies widely, and this can create problems for many companies.

Have you noticed that from time to time the Internet is a lot slower than it should be? If so, this could be because something is hogging all the bandwidth, which is the rate at which data is transferred in and out of one connection. Here are six of the most common bandwidth hogs.

  1. YouTube. If you allow employees to watch YouTube or connect to other streaming services, and they are using it frequently, you’ll notice a significant decrease in overall Internet speed. Some companies have noted that 40 staff using YouTube will account for over half of the total bandwidth usage.
  2. FTP sites. Some companies run FTP sites that host essential files that employees can download. When more employees are downloading/uploading files to the FTP site there’s less bandwidth available for other operations, so the Internet will be slower.
  3. P2P. P2P covers a large number of aspects including video conferencing and sharing of files via programs such as BitTorrent. All P2P services use an incredibly large amount of bandwidth when in operation, slowing the Internet to a point where speeds from 10 years ago were faster.
  4. Online backup. Backing up essential files will capitalize bandwidth leaving very little for other operations. It’s a good idea to conduct backups after office hours to minimize interruptions.
  5. Encryption. In certain industries regulatory bodies require a certain level of encryption, or for companies to take certain steps to secure data. Any extra encryption or security features will slow sites down, however this usually cannot be avoided.
  6. Spam/Virus/Malware. As many scams aim at stealing information the main way this is done is by sending the information over an Internet connection, that is your Internet connection. If you have viruses or other security threats you can guarantee that your Internet will be slower.
If you notice your Internet is slowing down at certain times, it’s a good idea to check and see if any of these six bandwidth hogs are in action. You can:
  • conduct a virus scan to look for malware;
  • ensure your computers aren’t backing up and if they are schedule the backup for later;
  • turn off or block any and all sharing services, and schedule video conferencing for times when bandwidth isn’t needed by other functions; and,
  • limit the bandwidth assigned to YouTube and other streaming services.
Before you tinker with any network connections though, it’s best to contact an expert . We may not just be able to help, but potentially provide an even better solution for you, speeding up your connection and your business success.
Published with permission from TechAdvisory.org. Source.

August 30th, 2012

2012 is shaping up to be a really big year for tech giant Microsoft. With the impending release of Windows 8, nearly every Microsoft product and service is receiving an update to both its visuals and features. One of the latest changes Microsoft has made is with its aging Hotmail. The change is a massive one, and it appears to be for the better.

In late July Microsoft quickly announced and released @outlook.com, their new cloud based email service. If a Web based email service from Microsoft sounds familar, it is, as Outlook.com is a reinvented and drastically improved version of Hotmail.

Outlook.com has completely ditched the clunky, outdated layout Microsoft has used for Hotmail for years and released something that looks 100% modern, and maybe even a little spaceage. The general opinion is that it looks fantastic. For Gmail users, it looks instantly familiar, with files and folders on the left-hand side of the window, your emails in the center and addons on the right-hand side of the screen.

Hold on, isn’t that exactly the same as Gmail? Yes, and for a reason: it works really, really well. However, Outlook.com does improve on Gmail with integration of a large number of features including:

  • Integration with Microsoft Office. All documents sent to you can be viewed and edited online.
  • Integration with SkyDrive. When you click the Outlook box at the top of the window, a drop-down menu opens with the ability to shift to your SkyDrive. This makes it easier to switch and share files between the two services. This also allows you to share larger files that don’t have to be sent via email, slowing down delivery. Just share the file on SkyDrive and link to it in the email.
  • Synchronized contacts. You can instantly synchronize your Facebook and LinkedIn contacts and chat with them directly from Outlook.com.
  • Skype. Experts wondered what Microsoft would do with Skype when they bought it last year. The answer is: integrate it with Outlook.com. While it isn’t active yet, Microsoft has noted it should be part of Outlook.com soon. When it’s activated, you’ll be able to call and chat with your Outlook.com contacts via Skype, directly from the Inbox. There will be no need to install Skype on systems.
  • Mobile support. You can access your account on nearly any mobile device that can connect to the Internet.
How do I get an Outlook.com account? If you’re interested in getting an outlook.com account, you can sign up for free at outlook.com. If you have an existing Hotmail account you can log in, select Options followed by Upgrade. All your contacts, emails, password and rules will be transferred over.

Outlook.com looks like a viable competitor to Gmail, and because it’s a Microsoft product, it’s a near certainty that it will be a heavily supported platform that can and will attract many businesses and other organizations. If you’re interested in learning more about Outlook.com, please contact us.

Published with permission from TechAdvisory.org. Source.

Topic Windows
August 22nd, 2012

One of the main issues that puts off a large number of businesses is how secure their data is in the cloud. If a company uses a cloud service they have no choice but to trust the provider with their data, and recent attacks have shown that some cloud provider technology isn’t as secure as it needs to be, potentially putting your data at risk.

In this year alone, nearly every major cloud provider has had issues with their services. From natural disasters to hackers, companies have seen their data exposed or unavailable, and this isn’t the first time this has happened. In 2011, Sony Entertainment had nearly 77 million accounts hacked, exposing user’s information, Dropbox had numerous service outages, and Gmail had a 30 hour outage that resulted in 44,000 accounts being lost. The list goes on and issues since 2011 go to show that cloud providers and their systems aren’t invulnerable.

Despite numerous attacks and problems, many data centers where cloud providers have their servers are physically secure. Google’s recent security video is a good example of how secure the physical locations are.

When companies talk about cloud security however, they don’t just talk about how secure their physical location is, they also strive to protect against three other elements:

  1. Service outages
  2. Confidentiality of your personal information and control over who can access it
  3. Privacy of banking details and other related information
By focusing on these four factors cloud providers are able to provide close to 99% security. However, many companies are still at risk when using the cloud and this risk actually comes from inside the company. Nearly every cloud service requires a password to access, but scammers know this and they can attack other services, or your company, to get you to give up your password. Once they have obtained this your data is compromised regardless of where it’s stored. This is what happened in a latest security issue with Dropbox.

If your company utilizes cloud services there are a number of things you need to be aware of when it comes to security:

  • According to all cloud providers, liability for sensitive data stored in the cloud rests with your company, not the provider.
  • Some cloud vendors provide reports written by a neutral third party on the security of their service. These should be taken into account when looking for a provider.
  • As with anything online, you should be taking steps to backup data stored in one cloud to a secure physical location.
  • You should establish a process that encourages your employees to change their passwords at least every three months.
Do you have cloud solutions in your company? If so let us know what your concerns are about security. If not, then let us know why.
Published with permission from TechAdvisory.org. Source.

Topic Security
August 21st, 2012

In the last productivity article we discussed using webinars in your company. Webinars are a great way to train people or increase interest in your brand or products and can help you reach a wider audience. If you’re interested in hosting a webinar there are a number of steps you should be aware of in order to make it a success.

This week we present to you six steps to planning a successful webinar.

1. Is a webinar the right tool for the situation? When planning a meeting or training session, you should take into account who your audience is, the purpose of the meeting and the message you’d like to get across. Some messages are better delivered through other mediums, or in-person. If you’re hosting a seminar that’s scheduled to last longer than 2 hours, webinars are probably not the best medium to use, while a 15 minute introduction of your products to a potential client will go over well as a webinar.

2. Who will speak/ who will be support? If you decide a webinar is the medium to use, you need to assemble staff to help you run the webinar and choose the person who will speak. If you have experience addressing small audiences and running a powerpoint and related visuals while doing so, you can do it by yourself. If not, it will help to have a support team to help answer questions, run visuals and acting as tech support.

3. What format will you follow? Like any meeting, webinars require a format to be successful. Will you or your speaker be addressing the audience like a traditional classroom with questions and comments to come later? Or do you want to run more of an open forum and discussion where the speaker moderates? Picking a format will help you develop the content and maybe predict outcomes.

You should also pick how you will host a webinar. If you’re unsure with the options available, please contact us, we may have a solution.

4. Create an agenda When you feel the webinar is almost ready and the key ideas are in place, you can set an agenda. Try to make an educated guess on how long it will run for and how long each part will last. Write the schedule down and include extra time for technical issues and questions. By sticking to an agenda you can better stick on schedule, get the message across and your audience won’t get lost and shortly thereafter be bored.

5. Publicize For any webinar to be successful, you need to publicize who is speaking, when the event will happen, the topics it will cover and what programs will be used to run the event. It’s important to get this to as many people as possible, so put the info on your website, share it on your social networks and create an email to send to participants explaining the event and rundown.

6. Practice A few days to a week before the webinar, you and your support team should conduct a dry run of the event in the location it will take place. This is an important step as it can help identify technical issues and weak spots with the presentation itself. If you have staff who are unfamiliar with the technology or the process, this is also the time to train them.

By following these general steps, you will have a solid foundation with which you can host a successful webinar. To learn more about using your computer systems for communication, please contact us.

Published with permission from TechAdvisory.org. Source.

Topic Productivity
August 20th, 2012

It can be moderately annoying to have to click to open programs that you use on a daily basis. It can take time and lead to you being less efficient, especially when it’s a program like Microsoft Outlook. One way to work around this is to set your computer to open this program when you turn it on, so that you time to go get a coffee and sit down ready to start your day.

Here’s how you can get an Office program to automatically open upon startup of your computer.

On Windows

  1. Start your computer normally and when you're at the desktop, click the Start button, or Windows orb, which is usually located in the bottom left of your desktop.
  2. Point to All Programs followed by Microsoft Office.
  3. In the drop-down menu, hover your mouse over the program you want to open when your computer starts up, press and hold Control and click and drag it into the Startup file.
If you follow this, a shortcut of the program will be made and placed into the startup folder. If you don’t press and hold Control, the program will be moved into the Startup folder, and you will have to navigate to Startup every time you want to open the Office program.

On Mac

  1. Open System Preferences and select Accounts.
  2. Select the account you log in with followed by Login Items.
  3. Press the plus button under the list of programs and select the Applications folder.
  4. Scroll down to the Microsoft Office program you would like to open at startup, click on it and press Add. If you can’t find it, type the name of the Office program into the field with the magnifying glass.
When you next start up your computer, the program(s) you have chosen should open as soon as the computer boots up. It’s important to remember that any programs you add to the startup process will cause the computer to boot up more slowly. If you’d like to learn more tips on using Office in your business or workplace, please contact us.
Published with permission from TechAdvisory.org. Source.

August 10th, 2012

Macs, long touted by Apple to be the safest and most secure computers available have been coming under increasing attack lately, with a growing number of Mac specific malware infecting systems. This has caught many users off guard and they have been scrambling to ensure their systems are secure. There is a new threat that could cause trouble for Mac users.

Dubbed OSX/Crisis, this malware has just been discovered, and it’s an interesting one.

OSX/Crisis silently infects Mac users regardless of their status. If a user visits a website it is hosted on, or downloads an attachment with the malware attached, it will install itself without letting the user know.

As Mac users know, there are two types of users: Admin and non-admin. Admin users have rights to install and delete files, while non-admin don’t. Typically, if a user install something they have to enter an admin password to complete the install. OSX/Crisis doesn’t ask for this permission, meaning the user won’t even know they’ve been infected.

When the trojan is installed, it opens a backdoor to your computer, so a hacker can quickly and easily enter your computer without you noticing, or having to log in. The disturbing thing about OSX/Crisis is it installs different files depending on the user’s access privileges, giving hackers access to the computer regardless of authority of the user.

Intego.com, the company that found the malware has noted that there have been no cases of this malware in users. While it isn’t out there yet, chances are highly likely that it will be soon. The company also noted that it only works on OSX versions 10.6 and 10.7, earlier versions and the new version, 10.8 won’t allow it to install itself.

If you use Macs in your office, you should take precautionary steps by installing virus scanners, ensuring they’re up-to-date and conducting scans on a scheduled basis. To learn more about this threat and other security issues, please contact us.

Published with permission from TechAdvisory.org. Source.

Topic Security
August 9th, 2012

There’s no doubt that Microsoft’s products and programs are incredibly useful, with most companies using at least one of their systems. One of the most used products, one that many employees don’t see, is servers. Small businesses have many options including Microsoft Small Business Server (SBS) which has recently been retired, leaving many businesses wondering what to do now?

If your company has employed a Microsoft SBS 2008 or older solution, you aren’t totally left in the dark. Before announcing the end of SBS, Microsoft announced Microsoft Windows Server 2012, which is meant to be the replacement for SBS.

In the past, Microsoft has been a company of options, not content with releasing just one or two versions of an operating system or server structure, instead opting for many. With Windows Server 2012, the options have been slimmed down to just four, of which two will be best for the majority of small businesses.

Foundation Foundation is the most basic version of Windows Server 2012, with support for common activities like file and printer sharing. It won’t however support virtual environments, meaning, in other words, you will have to stick with physical servers instead of being able to run different servers on one physical machine. It’s also limited to 15 users and under.

The downside with Foundation is that it will only be available on new servers created by Original Equipment Manufacturers (OEMs). If you want to utilize this version, you’re going to have to buy a new server. If you’re looking to centralize basic office functions, or connect the office internally, and don’t currently have any servers, this might be a good option for you.

Essentials If you currently use SBS, or another retired Microsoft product, you’re best bet is Essentials. At a cost of around USD $425, it’s a low cost upgrade aimed specifically at businesses with 25 or fewer users. An upgrade to Essentials brings about the ability to easily connect and manage Microsoft’s cloud based solutions such as Office 365 and the cloud version of Sharepoint, as well as others. Essentials also has Client Backup, and Remote Web Access, features which are mature and have been brought forward from SBS and Home Server.  Essentials can also integrate with an onsite Exchange 2010 server if you are keeping email in-house vs the cloud.  A separate server license will be needed for Exchange.

The downside to this is if you have more than 25 users in your company you’ll either need to pay for an upgrade to Server Standard to “unlock” Essentials to unlimited users, or pick another version. Aside from this, Essentials, unlike Foundation, does support a fully virtualized server environment. Essentials will be a good upgrade for companies that are interested in transitioning to the cloud but may still want some featured in-house during the transition (Exchange, Sharepoint). Interested in learning more about integrating Windows Server 2012 in your company? Please contact us, we can help.

Published with permission from TechAdvisory.org. Source.

Topic Security
August 9th, 2012

The cloud and all related services are making large inroads into businesses around the globe, with many utilizing at least one form of cloud. One of the most popular categories of cloud in use is cloud storage. Until recently cloud storage has been relatively secure, but, a major cloud storage provider has recently had an incident where account information was stolen.

The cloud service provider that had its security breached was Dropbox. While the company has taken steps to remedy this situation, some users had their information leaked before the situation could be solved.

What happened? Dropbox made an announcement that hackers had stolen account information from another - undisclosed - website and used that information to log in to Dropbox accounts. One of the accounts happened to belong to a Dropbox employee who had other email addresses connected to Dropbox accounts stored in a document.

With the stolen account names, the hackers proceeded to send spam messages to users’ email addresses. It was complaints from users about spam emails being sent to accounts that are only associated with Dropbox that alerted the company to the problem. From information we’ve been able to attain, it appears that accounts stolen were mainly in Western Europe, and the UK.

Is Dropbox doing anything? Dropbox is to be commended for a quick reaction. They let users know as soon as they found out and announced two enhanced security measures on August 2. The first measure is two-factor authentication, most likely a password you enter that’s provided by SMS at the account activation stage. This measure should be in place within the next couple of weeks. The second measure is an account activity page which is available now and shows all the devices that have connected to your account.

As with any security breach, if you or your employees use Dropbox, you should take appropriate steps to change your password. To change your password, log in to Dropbox on your browser, select your account name from the top right of the page and click Settings. Select Security followed by Change password. You’ll also notice the devices or computers that have accessed your account here.

While this may seem like a big issue, Dropbox has handled the leak well and taken appropriate steps to remedy the situation. You shouldn’t let an issue like this sway your opinion on cloud services. If you’d like to learn more about how Dropbox, or other cloud storage and service solutions can be integrated with your business please contact us.

Published with permission from TechAdvisory.org. Source.

Topic Security
August 8th, 2012

Clark Kent: star reporter for the Daily Planet and always one of the first reporters to break the news. To many, Clark Kent is more commonly known as Superman. If Superman had an email address, it’d be a sure thing that he’d take steps to ensure it remains secure and out of the hands of criminals. Do you echo what superman would do and protect your email address?

Failing online protection from a superhero here’s five things you can do to ensure your email address is properly protected.

Give your email a disguise Superheros often protect their identity through the use of a disguise. We’re not saying you need to dress up in spandex, go out and search for spammers/scammers to beat down, or prevent from getting your email. Instead, you should be aware of how scammers operate - largely by writing programs that search websites for email addresses - and disguise your email from this.

Many programs look for traditional emails like imthebatman@gmail.com, so to disguise your email, spell it out: imthebatmanATgmailDOTcom or, imthebatman(DELETETHIS)@gmailDOTcom. People are smart enough to figure out that the AT and DOT are actually @, . or to delete (DELETETHIS). You’d be surprised at how much this will cut down on spam.

Protect your email’s identity Aside for a disguise, superheroes will often go to great lengths to protect their identity. You should do the same with your email address. When signing up for a new service, forum, or anything that requires a username, don’t use your email as the username. If possible, don’t use your email address at all.

You should also read the Privacy Statements of all websites you have accounts with. Yes, there is lots of legal speak and they are long, but thats to get the user to scroll to the bottom of the document and hit accept. Look for clauses regarding your email, and note any companies that say they reserve the rights to sell your email to advertisers or aren’t held liable for stolen information, as you can ensure that your email will be spammed.

Beyond that, many websites allow you to hide your email address from other users. It’s highly recommended that you do this and an option to do so can usually be found in the Account Options or Account Security sections of your user profile on websites.

Don’t respond to flashy requests When a superhero is not out fighting crime, they’re off cultivating and maintaining their alter-ego. They hardly do anything outside of their normal character, and normally won’t respond to flashy requests for super luxury balls (unless you’re Bruce Wayne or Tony Stark of course). If you get an email that sounds too good to be true, such as announcing that you’ve won something spectacular, it’s a good idea to not open or respond to it, as chances are near 100% that it’s a scam or simply aimed at getting your email address or other information.

Get your email a side-kick Some superheroes have sidekicks that help them fight crime or solve mysteries. We recommend that you get your main email a sidekick and sign up for a separate email that you use for online shopping, forum registration and basically anything that’s non-work/family/friends related.

Take a picture of your email In numerous Spider-Man story arcs, Peter Parker is tasked with taking pictures of Spider-Man. Of course, being Spider-man, all he has to do is take a picture of himself and people seem to be happy with that. As many spam programs don’t take information from pictures, it’s a good idea to make your email addresses into a picture that you place onto email signatures, or into the body of the email itself.

The easiest way to do this is open MS Paint, (if you have a windows machine), or an online image creator like pixlr and type your email address into the image, resize so it just fits the font and hit save. The best format to save it as is a .jpeg, as it can be easily read by Internet browsers and email programs. Most email programs will allow you to put an image into your signature, typically done under Settings.

You don’t have to be a superhero to protect your email, just take these precautionary steps and your important email addresses will be as safe as any superhero’s true identity. If you’d like to learn more about staying secure while surfing the Internet, please contact us, and we will come to your aid.

Published with permission from TechAdvisory.org. Source.