Categories
Blog Vet

IT Services For Animal Hospitals & Vet Clinics (Questions/Answers)

Searching For A New Computer Services Company For Your Veterinarian Clinic Or Animal Hospital?

If you haven’t read our veterinarian server crash story we posted recently, it was sad and touches on what happens to vet clinics who mistreat and abuse their IT framework. They cut corners on IT prevention and data backups. And then it all comes crashing down all around them.

In our story, IT Service rescue attempt, for the veterinarian, was offered. But in the end, the recommendations were declined by the clinic, and subsequently, both of the clinic’s hard drives crashed, and data recovery was impossible. It was quite a mess.

When thousands of veterinarians across the USA, just like you, are burdened down with business, staff, mistreated pets, cruel owners, and homeless animals, it is easy to forget your IT system can be vibrant when cared for, or on its last legs when misused, abused or neglected.

Which 6 IT Framework Burdens Hound Thousands of Veterinarians Daily?

When you survey Veterinarians, no matter what part of the country their clinic is in, a consensus about the six things they want out of the information technology keep coming up:

  • Alleviate the Burden – Technology should make your life easier, not harder.
  • Maximum Productivity – Get an IT plan that keeps your office efficient.
  • Safety and Security – Secure your records to prevent hackers and viruses.
  • Go Paperless – Save money and search patient records with ease.
  • More Hours in the Day – Stop wasting valuable time fighting with technology.
  • Control Costs – Proactive IT management for a monthly fee. No surprises.

As you read the list, it is understandable how a vet’s frustration would swell over the heavy burden; just so that they can maintain their IT framework all by themselves. Without knowing the six IT success steps, they continue to dig a deeper hole for themselves.

What Are The Six Veterinarian’s IT Support  Success Steps?

When a Veterinarian feels there is no end in sight, from the IT woes, a vet friendly IT company can put together a six-step process that will give the clinic owner, their staff, and volunteers smoother IT success and remove any the framework burdens that slow the business down.

The six IT success steps will also save the staff time and prevent technology failures, so the vet, his staff, and some of the volunteers can focus on caring for animals and keeping their owners happy.

The six immediate areas, to develop IT success, which your IT consultant would address are:

  • Email and Website
  • Security and Firewall
  • Printers and Network
  • Upgrade Workstations
  • Data Backup and Recovery
  • Optimize Server for Hardware & Software

Corralling this group and putting them through the process, your clinic starts to experience more freedom, while your staff focuses on their feline or canine duties.

What Is The Next Step In IT Services For Animal Hospitals & Vet Clinics?

As a Veterinarian clinic owner, always pressed for time. You could find yourself dropped in the middle of emergency surgery on a dog; Maybe your clinic is full of walk-ins, and you’re short on staff, and the lobby just got packed with anxious pet owners; all at a moment’s notice.

A Veterinarian friendly IT Company, working with Vet clinics, understands chaos can erupt at any moment when it comes to owners and their pets.

A vet friendly IT Firm knows you want to spend less time dealing with paperwork and technology, and more time loved by pets and trusted by their humans. So, your first meeting might look like this:

  • Step 1 – Schedule a listening session
  • Step 2 – Tell us about your goals and technology
  • Step 3 – Create an IT Strategy Success Plan

Do you recall the last business meeting, with any vendor, that was as easy as 1, 2, 3?

Where Do You Go To Get The Best Veterinarian Computer Support and IT Services?

As you review your IT infrastructure, look at the number of times you get pulled away. Searching to find out what is wrong now, only to discover your server crashed, and the backup server is whimpering and needing help too. Don’t become another veterinarian server crash story

Be that Veterinarian clinic owner, who focuses on a movement to rescue abused and homeless animals no matter the cost. And leave the IT framework burdens to Veterinarian friendly IT Firms.

Categories
Blog Vet

Comparing Top Veterinary Software Options (Product Information/Reviews)

Reviewing the Highest Rated Software Applications for Veterinarians

Exploring the features and capabilities of the industry’s top-rated veterinary software solutions

There’s no getting around it – vets are some of the busiest healthcare professionals around. They face unique challenges too, like determining the health needs of their animal patients and communicating relevant and important information with pet owners. Managing appointments, handling emergency visits, and maintaining detailed animal health records is a constant balancing act for veterinary practitioners.

Technology is making it possible for vets to get things done more efficiently and treat animals more effectively. Particularly, specialized veterinary software plays a huge role in helping veterinary practices optimize their entire operational effort. Software designed particularly for veterinary practices are equipped with countless features to help make the lives of veterinarians easier by streamlining processes and organizing critical data.

However, like in many other industries, software options for veterinarians are seemingly endless. There are countless options on the market, all with different capabilities and features, and all claiming to be the best option. So, how is a veterinarian supposed to decide? We’ve decided to review some of the highest rated veterinary software options on the market to help your clinic make an informed choice.

Best of the Best: Reviewing Top Veterinary Software Solutions with 5-Star Ratings

In order to find the best veterinary software solutions for your practice, it helps to have a side-by-side comparison of some of the market’s leading options. So, we’ve narrowed down some of the best choices as ranked by the software experts at Capterra. Read on to check out some of the best and 5-star rated software solutions for veterinary practices.

  1. Pet Desk

Pet Desk is totally focused on client communication and is a great add-on for veterinarians who already have a trusted operational software solution in place. Pet Desk is designed to relieve your overloaded staff and efficiently streamline your workload. Pet Desk allows your team to very easily manage appointment reminders and confirmations so that both your clients and schedules are kept up-to-date seamlessly. Pet Desk offers options to communicate with your client base via email, texts, postcards, and a mobile application.

Simply put, Pet Desk allows you to maintain a personal touch with your clients while still leveraging technology to minimize tedious work for your staff. Pet Desk offers the ability to send personalized messages, promote and manage loyalty programs, and connect your clients with online review platforms. With Pet Desk, your clinic gets the best of both worlds – the streamlining efficiency of technology and a personalized and consistent connection with your clients.

You can find full product descriptions, pricing information and user reviews on Pet Desk here.

  1. ezyVet

ezyVet is a top-of-the-line Cloud-based software solution for veterinary practices. ezyVet is your one-stop shop for everything your practice relies on including managing clients, booking animal appointments, scheduling reminders and confirmations invoicing and finance management, inventory management and control, lab integrations and more. ezyVet also has huge integration capabilities with other Cloud solutions that veterinarians rely on like XERO for accounting and Smart Flow for treatment management.

The true benefit of ezyVet is that it’s a truly connected and integrated solution. It is designed specifically to effectively manage referrals, and emergency specializations, and optimize the treatment experience for all kinds of veterinary practices including small animals, mixed animals and equine. For Cloud-friendly veterinary practices, ezyVet offers an all-encompassing solution that centralizes everything your team and clients require.

You can find full product descriptions, pricing information, and user reviews on ezyVet here.

  1. V-Tech Platinum (VTP)

V-Tech Platinu is a 25-year veteran with a reputation for being both the most cost-effective and efficient veterinary software solution on the market. With round the clock support and team training included at no extra cost, the value offered by VTP is hard to ignore. In fact, any software updates, training modules, additional workstations that your practice requires are included – at zero additional cost to you.

VTP also offers dynamic and organized documentation and reporting solutions and offers integration with Paperless, Paperlite and countless other digital reporting solutions. VTP offers seemingly limitless customization capabilities and intuitive reporting solutions. Even better? The platform has endless options for Server, Cloud or Hybrid server set-ups, meaning you can implement and customize the solution to suit your server infrastructure.

You can find full product descriptions, pricing information and user reviews on VTP here.

  1. Onward Vet – five stars

Onward Vet is the beautifully designed and easy-to-use Cloud-based practice management solution that comes equipped with built-in client communication tools. Celebrated for its comprehensive nature, Onward Vet offers veterinarians a cutting-edge and state-of-the-art paperless platform with big-time integration and optimization power.

Onward Vet is designed specifically to centralize resources and processes for your practice. From the Cloud-based Onward Vet platform, your team can take advantage of countless features including: SOAP and surgery noting tools, inventory control, invoicing, appointment and schedule management, prescription management, lab and device integration, referrals, reporting and treatment planning. Onward Vet also offers optimal integration with Avimark, Cornerstone, Intravet, Impromed, VIA and more.

You can find full product descriptions, pricing information and user reviews on VTP here.

  1. VetBadger

VetBadger offers a truly dynamic and easy-to-use Cloud-based veterinary practice software solution. The platform is designed with role-based task management features, meaning its easier than ever to keep your team connected and working efficiently day in and out. The designers of VetBadger believe so much in their platform that they even offer you the option to give the software a test-drive free of charge.  

The VetBadger platform is designed with efficiency and organization in mind. Client communication and charting are made easier than ever with two-way integrated email, text messaging and fax capabilities that sync directly with medical charts. VetBadger platform also has seamless QuickBooks integration, meaning you’re able to manage inventory, invoicing and all other financial details in real-time.

You can find full product descriptions, pricing information and user reviews on VTP here.

Making a Choice: How to Select the Best Veterinary Software Solutions for Your Practice

At the end of the day, only you and your team will have a solid idea of which veterinary software solution is the right fit for your practice. The first step to finding the right solutions is working to understand the particularities and unique needs of your practice.  What’s most important to your practice? What are the redundancies or tedious tasks that could be better managed with technology?

By asking yourself these questions and determining your unique needs you’ll be able to compare those needs to the features outlined and provided by each solution above and countless others on the market. The best advice we can give is to go with your gut. Do your research and choose a solution that can be customized to meet your needs and the needs of your patients, and team members.

If you require some additional guidance and consultation for your search, never hesitate to check in with an experienced IT consultant. Specifically, reach out to a provider who has experience providing IT support for veterinarians. Consultation and guidance from an experienced insider can help take the stress out of your software search and ensure the veterinary software your select will help optimize your clinic experience.

Categories
Blog

August 2018 Ransomware Update

The Newest Forms Of Ransomware & How To Protect Your Business From Them

2018 Ransomware Update

The Situation

Ransomware is now one of the top security concerns for businesses and organizations of all sizes. The City of Atlanta was hit with a ransomware attack called SamSam in March, crippling some important departments like their court system, sewer infrastructure requests, and water billing department.

The attackers who deploy SamSam are known for clever, high-yield approaches. This, combined with the City’s lack of preparedness, explains why the infection was so debilitating.

Experts are telling us that SamSam will strike again. Unlike many forms of ransomware that spread via phishing attacks where individuals inadvertently invite the attack, SamSam exploits IT system vulnerabilities and cracks weak passwords. These ransomware attackers have made $1 million in less than six months.

Keeping all your systems patched, storing data in enterprise-based cloud backups, and having a ransomware preparedness plan can offer real protections against SamSam and other ransomware infections.

Unfortunately, ransomware attacks are on the rise, and as hackers use more sophisticated encryption technology, the threat is constantly evolving. According to malware security firm Barkly, a company is hit with a ransomware attack every 40 seconds. They also identified ransomware as the most prevalent form of malware, with “4.3x new ransomware variants in Q1 2017 than in Q1 2016.”

This eBook details how dangerous ransomware is, how it could harm your business, and what you should do to protect your data.

Part 1

What is Ransomware?

Ransomware is a type of malicious software (malware) that blocks access to a computer that infects, locks or takes control of a system and demands a ransom to unlock it. It’s also referred to as a crypto-virus, crypto-Trojan or crypto-worm. It then threatens that your data will be gone forever if you don’t pay using a form of anonymous online currency such as Bitcoin.

Most forms of ransomware are spread via spam using unsolicited phishing email or an attachment. Phishing attacks use emails disguised to look like they’re from someone you know and are more likely to trust.

Some ransomware-based applications disguise themselves as police or a government agency, claiming that your system is being locked down for security reasons and that a fine or fee is required to reactivate it. Then it typically asks you to click on a link or attachment to perform a routine task such as updating records or account details. If you do this, a worm or malware is downloaded, infects your system and locks it by encrypting your files.

Ransomware, like SamSam, can also infect your IT system using vulnerabilities in your computer’s browser. It does this when you click on a malicious code hidden in online ads or free software.

Ransomware targets small to medium-sized businesses because they are particularly vulnerable due to limited IT resources. They are also more likely to pay the ransom in the hopes that they’ll get access to their data, although the FBI warns that this isn’t necessarily so.

“Paying a ransom doesn’t guarantee an organization that it will get its data back—we’ve seen cases where organizations never got a decryption key after having paid the ransom. Paying a ransom not only emboldens current cybercriminals to target more organizations, but it also offers an incentive for other criminals to get involved in this type of illegal activity. And finally, by paying a ransom, an organization might inadvertently be funding other illicit activity associated with criminals.”

Paying the ransom only guarantees that the malicious actors receive your money, and possibly even banking information. Also, decrypting files does not mean the malware infection itself has been removed.

No one is immune.

  • Temporary or permanent loss of sensitive or proprietary information,
  • Disruption to regular operations,
  • Financial losses to restore systems and files, and
  • Potential harm to your organization’s reputation.

The lack of awareness and cybersecurity training is a leading cause of ransomware.

Part 2

Ransomware Comes in Many Forms.

Ransomware comes in many different forms, but essentially, it’s a type of malware that denies access to your computer devices unless you pay a ransom. The ransomware malware encrypts your data. Once it does this, it can travel throughout your network and encrypt other mapped and unmapped network drives. Because of this, it can bring your organization to a halt.

The ever-evolving nature of these threats makes ransomware very difficult to keep track of. Ransomware-as-a-Service (RaaS) makes it easy for cybercriminals to set up a lucrative hacking scheme. It is provided as a vendor platform on the Dark Web. Unlawful vendors offer hackers and criminals a tool to use to lock down computer files, information or systems and hold them hostage.

Ransom32 is a type of “Ransomware-as-a-Service” that provides any cybercriminal, even those without technical knowledge, the ability to create their own form of ransomware. What makes Ransom32 so dangerous is that it uses JavaScript, and can be used on computers that run Windows, Mac OS X, and Linux.

Over 2,900 types of ransomware have been reported, and they’re growing. Here are just a few:

Bad Rabbit 

Bad Rabbit has infected organizations in Russia and Eastern Europe and is spreading throughout the world. It does this via a fake Adobe Flash update on compromised websites. When the ransomware infects a machine, users are directed to a payment page demanding .05 bitcoin (about $285).

Cerber

This ransomware encrypts your files using AES encryption and demands a ransom of 1.24 bitcoins (worth $500). It communicates via a text-to-speech voice message, a recording, a web page, or a plain text document. There’s no way to decrypt files that are encrypted by Cerber unless you pay the ransom.

Cryptolocker

CryptoLocker infects computers that run Microsoft Windows. Like other forms of ransomware, you must pay the hackers to decrypt and recover your files. CryptoLocker spreads via fake emails (phishing) designed to mimic legitimate businesses.

CryptoWall

This form of ransomware has been around since 2014, but new variants are still circulating, including CryptoBit, CryptoDefense, CryptoWall 2.0, and CryptoWall 3.0. Like CryptoLocker, CryptoWall is distributed by spam or exploit kits.

CryptXXX

CryptXXX used additional capabilities including network-share encryption. This means that even if you can decrypt your files, it can still cause significant downtime by encrypting files on your network shares.

FakeBsod

FakeBsod uses a malicious piece of JavaScript code to lock your web browser. It displays a fake warning message and tells you to go to a particular webpage (that contains the ransomware). The message says to “contact Microsoft technicians” about an “Error 333 Registry Failure of the operating system – Host: Blue screen Error 0x0000000CE.” When you call the phone number, you’ll be asked to pay a fee to fix the problem.

Lockscreen

This form of ransomware isn’t new and has been in use for quite a while. It attacks Android devices. However, now there’s a new version that is more powerful and much more resilient. It used to lock your screen using a hardcoded passcode, but with the right code, you could unlock your device. Today the new version is impossible to reverse-engineer the passcode since it uses pseudorandom passcodes. Because of this, you can’t unlock your device and must pay the ransom.

Locky

If your computers are infected by Locky, it will rename all of your important files and prevent you from opening them. It does this through encryption and using the file extension–locky. Now, only the cybercriminals have the decryption key, and you must purchase it from them to retrieve your files. To do this, you have to go to the Dark Web and pay $400+ in Bitcoin.

NotPetya

This is a strain of Petya and was first seen in 2016. Today, experts believe NotPetya’s sole purpose is to destroy data instead of obtaining a ransom.

Petya

Petya is especially dangerous because it encrypts entire computer systems, and overwrites the master boot record, so you can’t reboot your operating system.

Spider

Spreads via spam emails. It’s hidden in Microsoft Word documents and installs the ransomware on a computer when it’s downloaded. The Word document (typically disguised as a debt-collection notice) executes macros that encrypt your data.

TeslaCrypta

This uses an AES algorithm to encrypt files and is specifically designed to attack Adobe software vulnerabilities. TeslaCrypta installs itself in the Microsoft temp folder.

TorrentLocker

TorrentLocker spreads via spam email campaigns and targets specific geographic regions. It also uses the AES algorithm to encrypt files. It collects email addresses from your address book to spread malware to your business contacts, friends and family members.

WannaCry

WannaCry has hit over 125,000 organizations in over 150 countries. It currently affects Windows machines through a Microsoft exploit known as EternalBlue.

WannaCrypt

This computer attack began locking down data on May 12, 2017. It affects Microsoft Windows Operating systems. WannaCrypt encrypts all the data in on your computer and holds it hostage.

ZCryptor

This form of ransomware uses a worm-like tactic to self-propagate and encrypt files and external drives so that it can attack other computers.

Part 3

How Ransomware Infects Your Computers

Ransomware attacks are increasing, and so are the ransoms to recover your data.

You’ll know when ransomware infects your computer because the hackers display a message telling you how much to pay to unlock your files. These ransoms typically run in the $300-$500 range. But, some businesses are having to pay upwards of $1,000 per computer. If you have 25 computers that are infected, that’s $25,000.

Hackers primarily use the following attack vectors to infect computers:

Phishing Emails

This is the most common scenario. A realistic-looking email is sent to you with a link or attachment that contains the ransomware. Hackers will often send a number of these links or attachments to hide the one with the malware. Once it’s clicked the malicious software loads itself and the ransomware infection spreads throughout your files, locking them until you pay the ransom.

Drive-by-Downloads

If you unknowingly visit a realistic-looking website containing ransomware, it can load itself onto your computer. If you use an old browser, out-of-date software, or third-party applications, you’ll be most vulnerable. A hacker can detect a vulnerability and exploit it. When a software vendor discovers this, they’ll release a patch to repair the issue, but by this time the criminal has already done their dirty work. Examples include unpatched versions of Adobe Flash, a bug in Java or an old web browser, or an unpatched operating system.

Free Software

A lot of us download free versions of software. Some are legitimate, but others contain ransomware. They are especially prominent in broken versions of expensive games, free games, porn content, screensavers or bogus software. By convincing the user that they should download the software, they can get past firewalls and email filters. You might not even know that you’ve done this until the ransomware activates weeks later.

Unpatched Software

According to the U.S. Computer Readiness Team (CERT) using unpatched and unsupported software may increase the risk of proliferation of cybersecurity threats, such as ransomware. Microsoft provides a guide to help you keep your software up to date. They recommend that you use feed update functionality to stay informed about new ransomware variants and what you should do to protect your data.

Part 4

What to Do If Your Files Get Encrypted.

Tell your employees to let you know if they experience the following:

  • They can’t open their files, or they get error messages saying a file is corrupted or contains the wrong extension.
  • A window pops up with a ransomware program that they can’t close. This window may contain a message about paying a ransom to unlock files.
  • A message says that a countdown has started for a ransom to decrypt files and that it will increase over time.
  • They see files in all directories with names like “How to decrypt files.txt or decreypt_instructions.html.”

Ransomware isn’t easy to find while it’s at work encrypting your files. So, you might not know that it’s happening until the hacker sends you a message. By this time, the infection has completed its job. The best thing you can do at this point is to contain the virus from spreading throughout your network.

Unplug the infected computer from your network. You may also need to turn off all network access for all your computers until you know the virus is contained. Set your Basic Input Output System (BIOS) time back if the ransomware has started a countdown. This will hopefully give you more time to recover your critical files and try to eliminate the malware. You can access your BIOS time through the BIOS Setup Utility on the computer.

Restore your files from your last backup. This is why it’s important to regularly backup your files to a safe, offsite cloud location. Just make sure your most recent backup wasn’t infected as well. If you use a Disaster Recovery as a Service (DRaaS) solution, you should be able to do this and quickly “spin up” the DR image on your computer. By spinning up the image in a self-contained virtual machine (VM), you can inspect the DR image without exposing it to your entire network.

Alert the FBI. Don’t pay the ransom. This is a mistake because you still may not get your files back and the criminal will continue to extort you for money.

Unfortunately, recovery from ransomware can be difficult as cybercriminals fine-tune their tactics and become more sophisticated.

Part 5

How to Protect Your Data From Ransomware

ood news is that there are best practices you can adopt to protect your business. The Small Business Administration has these 14 recommendations. Your Technology Solutions Provider can help you with these.

  1. Implement an awareness and training program. Because end users are targets, employees should be aware of the threat of ransomware and how it is delivered.
  2. Enable strong spam filters to prevent phishing emails (an attempt to obtain sensitive information electronically) from reaching employees and authenticate inbound email using technologies like Sender Policy Framework (SPF), Domain Message Authentication Reporting and Conformance (DMARC), and DomainKeys Identified Mail (DKIM) to prevent email spoofing.
  3. Scan all incoming and outgoing emails to detect threats and filter executable files (used to perform computer functions) from reaching employees.
  4. Configure firewalls to block access to known malicious IP addresses.
  5. Patch operating systems, software, and firmware on devices. Consider using a centralized patch management system.
  6. Set anti-virus and anti-malware programs to conduct regular scans automatically.
  7. Manage the use of privileged accounts based on the principle of least privilege: no employees should be assigned administrative access unless absolutely needed and those with a need for administrator accounts should only use them when necessary.
  8. Configure access controls—including file, directory, and network share permissions— with least privilege in mind. If an employee only needs to read specific files, the employee should not have write access to those files, directories, or shares.
  9. Disable macro scripts (toolbar buttons and keyboard shortcut) from office files transmitted via email. Consider using Office Viewer software to open Microsoft Office files transmitted via email instead of full office suite applications.
  10. Implement Software Restriction Policies (SRP)s or other controls to prevent programs from executing from common ransomware locations, such as temporary folders supporting popular Internet browsers or compression/decompression programs including the AppData/LocalAppData folder.
  11. Consider disabling Remote Desktop Protocol (RDP) if it is not being used.
  12. Use application whitelisting, which only allows systems to execute programs known and permitted by security policies.
  13. Execute operating system environments or specific programs in a virtualized environment.
  14. Categorize data based on organizational value and implement physical and logical separation of networks and data for different organizational units.

In Conclusion

The increased incidence and rapid evolution of ransomware have raised concerns and stakes for both small and large businesses. Of everything we’ve discussed here, the two most important things to do to protect your business is to use a solid enterprise-grade cloud backup solution and to provide professional Cybersecurity Awareness Training for your employees. In both cases, your Technology Solutions Provider is your best friend. They’ll help you fight and prevent ransomware and cybercrime of all kinds. Don’t wait. Contact them today.

Categories
Blog

Check Out The 10 Best Tablets of 2018 (Ratings/Reviews)

They are the next best thing to hauling your laptop around to school and on flights, and they’ve become the weapon of choice for parents with fussy toddlers in public spaces. But while tablets have earned their accolades in recent years, that’s not to say choosing one to take home is an easy task. With endless options to select from, it will take some time and research to determine which tablet is best for your unique needs.

Top Tablets 2018

What constitutes a great tablet depends on several factors. Aside from function, things like versatility, user-friendliness, and affordability all play a role in how well a tablet is received by the masses. Versatility carries so much weight, in fact, that many of today’s top tablets come with keyboards to offer an experience similar to that of a desktop. These 2-in-1s are all the rage, and if you’re hoping to pick up a new one, you’ve got your fair share of picks. Here are some of our favorite tablets to help you navigate your options.

Apple iPad

The Apple iPad is one of the most revered tablets to date, and the newest version spares no expense when it comes to cool features. Compatible with the new Apple Pencil, the tablet is easy on the eyes with a 9.7-inch Retina display and a small, but mighty A10 Fusion processor for all the power you could want in a tablet. Plus, Apple now carries plenty of options for immersive AR experiences, and at its most affordable price point yet, you can be sure this tablet is one to covet for business and entertainment alike.

HP Envy x2

HP’s Envy x2 model, hot off the heels of the debut of the Snapdragon 835 processor, allows for stronger performance and a load of other features. Fast-charging capabilities, optional LTE connectivity, and a 15-hour battery life are just a few things users have to look forward to in this tablet. From a digital pen to a sleek backlit keyboard, the Envy x2 is versatile and durable, and definitely not one to be looked over if a solid tablet is on your wish list.

Acer Chromebook Tab 10

Created in collaboration between Acer and Google, the Acer Chromebook Tab 10 is a 9.7-inch slate tablet perfectly fitting of its target K-12 education market. The first tablet to be powered by Chrome OS, it features a 2,048 x 1,536 resolution display, and a textured design for easy handling on-the-go. It also comes complete with an EMR stylus, which fits conveniently in its own slot. This tablet was definitely built for convenience.

Samsung Galaxy Tab S3

With a 2048 x 1536 resolution AMOLED display, the Samsung Galaxy Tab S3 is primed for immersive entertainment. Inside you’ll find a powerful quad-core Snapdragon 820 CPU and a sufficient 4GB of RAM. Its 600mAh battery is good for up to 12 hours of power, whether you’re hoping for gaming or Netflixing. It also comes with a bundle featuring the new S-Pen, which is ideal for creatives hoping to use this tablet for work. All in all, between its power and its potential, the Galaxy Tab S3 is among the best money can buy.

HP Chromebook x2

The HP Chromebook is heavy on both looks and performance. This 12.3-inch tablet is touted as the first detachable Chromebook and comes complete with a base hinge for keyboard attachment. It runs on Google’s Chrome OS and can download apps from Google’s Play Store. Aside from an impressive QHD display, it offers both front and rear facing cameras and includes the new HP Active Pen to make tasks like sketching that much easier.

Dell Latitude 5290 2-in-1

This 2-in-1 is pricey, to be sure, but that’s not to say it isn’t worth the money if power is what you’re after. Weighing in at just 2.64 pounds, the tablet boasts an eighth-gen Intel Core i7 processor and a crisp, clear screen ideal for work or play. Gorilla Glass 4 for durability and an adjustable kickstand are just a couple of the perks you’ll find on this hybrid, and that’s not all. There is also an optional keyboard to make typing a breeze.

Lenovo Miix 630

The Lenovo Miix 630 has a unique advantage over its competitors. It can stay connected all day via LTE, which is enabled by a Qualcomm Snapdragon 835 processor. It’s a fresh option for Windows devices, courtesy of a partnership between Qualcomm and Microsoft. And with this Snapdragon processor also comes an extended battery life, upwards of 20 hours. So if you happen to be looking for a tablet to replace your laptop for business, the Lenovo Miix 630 is a suitable option, indeed.

Surface Pro 4

Equal parts tablet and laptop, the Surface Pro 4 gets right a lot of what the original Surface Pro got wrong. Its 12.3-inch screen offers more than enough space for clear, crisp pictures, and its configuration capabilities are nothing to scoff at. From its dual cameras to its loudspeakers and extraordinary picture quality, the Surface Pro 4 is the best of both worlds.

Xplore XBOOK L10

One thing’s for sure: durability isn’t an issue with the Xplore XBOOK L10. Waterproof, dustproof, and drop proof for up to six feet, this tablet is one with plenty going on. It’s got a plethora of ports, including USB-C, USB-A, and Ethernet, with its powerful performance courtesy of an eighth-gen Intel Core i5/i7 processor. And with an ultra-bright display, there isn’t much this tablet can’t do.

Google Pixel C

The Google Pixel C, which many call a solid alternative to the Apple iPad, has a unique design that sees its optional Bluetooth keyboard double as the tablet’s cover. Its made from durable compact aluminum, and boasts a lightning fast performance plus a bold, bright screen bound to make your favorite games that much more enjoyable. If Android is what you’re after, this is simply one of the best.

Categories
Blog

What Employees Need To Know About Phishing Attacks

Phishing is just one of many tools in a hacker’s repertoire and happens to be one of their most effective.  Through phishing, hackers dangle their bait in front of preoccupied employees who would never dream that their PC could provide an open door for a hacker.  That’s why it is so important that employees understand how phishing works, how costly it can be, and what they can do to avoid letting themselves become an unwitting accomplice to a hacker’s attack on their company.

Phishing

The Nature of Phishing

Phishing involves a malicious entity that sends out emails that look like they are from reputable, well-known companies (maybe even the employee’s own employer) – but these emails are not what they seem.

Sometimes the purpose of a phishing email is to trick the recipient into revealing information such as logins, passwords, or personal information. Other times, phishing emails are used to install malware on the recipient’s computer. Once the hacker behind the phishing attack has succeeded in infiltrating the target system via login information or malware, the damage they cause quickly escalates.

Phishing Can Be Very Costly

So how expensive can phishing be?  Well, consider what happened to a bank in Virginia that fell victim to two phishing attacks in just eight months. Their disaster began when an employee received and opened a phishing email which succeeded in installing malware on company computers.  The malware was able to use the victim’s computer to access the STAR Network, a site used to handle debit card transactions.  Through the STAR Network, the hackers behind the malware were able to steal $569,000 in that one incident alone.

But that wasn’t the end of the matter.  Eight months later, even after hiring a cybersecurity forensics firm and following their advice to better secure their system, the same bank was victimized again through another phishing email.  This time, the hackers again gained access to the STAR Network, but then used the bank’s Navigator system.  Through those systems combined, the hackers were able to credit money to various bank accounts and then withdraw the money using hundreds of different ATMs.  Losses from this incident amounted to almost $2 million.

To make matters even worse, the bank’s cyber insurance provider denied coverage and the bank is now forced to pursue a lawsuit to recover their losses.

The Very Real Dangers Of Phishing Attacks

Phishing wouldn’t be so effective if it wasn’t so easy for busy employees to fall victim to seemingly legitimate emails or innocent-looking attachments.  The malware that was used to initiate the first attack on the bank discussed in this article was embedded in a Microsoft Word document.  Most of us have worked with thousands of Word documents during our careers and have never been victimized by one – but it only takes one time to cost a business millions of dollars.

In this case, once that document was opened, the malware was installed and the group behind it had access to what they needed. The bank in question hired Verizon to investigate both incidents. It was finally determined that the same group of Russian hackers were likely responsible for both attacks.

Common Sense Required

Even the most powerful of cyber security systems is still susceptible to attacks that take the form of phishing or social engineering. As long as people continue to subscribe to the view that firewalls, anti-virus, and anti-malware systems provide all the protection against cyberattacks that a company needs, then successful phishing attacks will continue. Education is one of the forgotten keys to foiling phishing attacks.

Employees need to be taught how to recognize a suspicious email and be given real-world examples of how convincing phishing emails can appear.  They need to be encouraged to view both emails and attachments with a critical eye.  Employees must also understand that, under no circumstances, is there a legitimate reason for someone to ask for their password.

Another aspect of this type of education is making sure that people realize that the targets of phishing are not C-suite executives or IT technicians, but employees from all levels.  Through a connection to the company’s network, any employee’s computer could serve as a launching pad for an industrious hacker’s plan of attack.

Conclusion

Phishing attacks are a reality that must be addressed if a company wants to avoid becoming a victim.  These attacks often result in very expensive losses that may not be covered by insurance.  While the importance of a rigorous cyber security system is never to be overestimated, neither is the importance of employee education.  Too many employees have unwittingly become accomplices in costly cyberattacks because they didn’t recognize a phishing email and never thought they could be the target of one.  The first line of defense against phishing isn’t a network firewall, but a trained employee who knows how to recognize a suspicious email or a questionable attachment.

Categories
Blog

Google’s Recent Speed Update (Questions/Answers)

Google Speed Update Is Now Out.

What Does This Mean for You?

On July 9th, Google began rolling out the Google Speed Update that they first announced in January 2018. So why is Google’s new speed update important for you if you have a business website?

Bounce Rates Affect Search Rankings

According to Google data, a 3-second load time increases the bounce rate by 32%. Bounce rate is an Internet marketing term used to evaluate web traffic. It represents the percentage of visitors who enter the site and then leave (“bounce”) instead of remaining to view other pages on the same site. What’s more startling is that if your site takes 5 seconds to load, it can increase your bounce rates by 90%, according to Google. To put it in laymen’s terms, every bounce could mean a prospective customer lost.

Since 2010, Google has determined that site speed is a direct ranking factor. Google sees a bounce as a strike against the site in their rankings. At the time, in 2010, this was a desktop-only search update, but the new update includes mobile sites as well.

Google now suggests that website creators embrace a mobile first attitude to accommodate a large number of people now using mobile devices to browse the web. This means that pages should load in less than a second, as slow sites will pay the price in terms of lower search rankings.

While this new update only affects a small percentage of queries and has no precise sign of percentages, according to Google, it’s still important to investigate how Google’s speed update affects you.

What Pages Will Google Speed Update Affect?

The speed update will only affect the slowest pages; the ones that Google states, “deliver the slowest experience to users”. If you already have a site with pages well optimized for speed, this update is not exact enough for you to troubleshoot ways to lower your load time by milliseconds.

However, if you do have pages with poor load times, the update should cause you to sit up and take notice. Many companies depend on consistent organic traffic to push their business, so poor load times should be a big concern.

How Can You Determine Your Page Speed?

It’s important to determine how fast your site loads and where the holdups are. There are several tools you can use to do this. Here are some helpful tips you can use to measure and troubleshoot website speed and page load times.

Google Page Speed Insights

A good place to start for measuring website load times is Google Page Speed Insights. On this site, type and enter the URL of the page you want to check. You will get a report evaluating page speed and user experience, as well as tips on ways to make your website faster.

Pingdom

Pingdom has a website speed test tool similar way to Google Page Speed Insights, but it gives you a report divided into several sections. These include page analysis, a performance grade and a waterfall analysis, helping you identify the most vital causes of website slowdown and how to fix them. It also does a great job of explaining its analytics and testing using a color-coded system.

GTMetrix

GTMetrix combines information from other online page speed tools. After you enter your URL into the on-screen box, it generates a report highlighting tons of different aspects of website load times, and it grades each one from A to F. This grading system lets you take a peek at the areas of your site that worked well and the ones that need your help. Also, GTMetrix ranks the serious issues first, in order of importance, so you know what needs the most attention.

Google Analytics

Google Analytics shows you which pages are underperforming and gives tips on how to identify significant trends as to whether things are getting better or worse. It does this by including site speed in its reports, which can be found in the Behavior section. The Page Speed Suggestions link shows how individual pages could be improved, allowing you to focus on the most important pages first.

How Do You Fix Website Page Speed Issues?

Once you have identified the holdups on your site, the next move is to fix them. All of the tools listed above make suggestions.

Here is a list of the most common recommendations you find on these tests:

  • Reduce the size of your images
  • Refine your hosting
  • Optimize your code
  • Use a content delivery network
  • Compress your site
  • Use caching
  • Optimize scripts
  • Reduce the number of external services you use

After you make the recommended fixes, it’s a good idea to test your site to establish a benchmark and re-test at regular intervals.

Any Other Suggestions?

One last tip that Google gives about the speed update is, “The intent of the search query is still a very strong signal, so a slow page may still rank highly if it has great, relevant content.”

Although speed is important, it should not take precedence over the strength of your site’s content. Bad content that loads fast will not rank well. Good content is always going to make your site stronger.

However, if you have great content that is performing well, but your site speed is slow, you might as well take the steps to improve your speed to ensure the best rankings.

Categories
Blog

Amazon AWS Vs Microsoft Azure: Which Cloud-Based Infrastructure Reigns Supreme?

Choosing a cloud infrastructure can be complex, even for seasoned IT professionals with vast knowledge of the benefits. There are plenty of perks associated with cloud-based infrastructure, and as the popularity of these services grows, so does the need to understand the similarities and difference between two of the industry’s heaviest hitters: Amazon Web Services (AWS) and Microsoft Azure.

Both tech giants in their own right, these two cloud-based offerings are two of the most trusted in the game, but which is best for your organization will depend on several factors, which we’ll discuss below.

Amazon AWS vs. Microsoft Azure

But First, What Is Cloud-Based Infrastructure?

Cloud infrastructure is among the basic products offered through the Infrastructure-as-a-Service (IaaS) model. It is intricate and carries a variety of components, including virtual servers, virtual PCs, virtual memory, virtual network switches, and virtual storage clusters.

With cloud infrastructure, users are able to create their own unique IT infrastructure, which comes with processing, storage, and networking fabric resources that are easily configured to a company’s preferences.

What Are The Benefits of Cloud-Based Infrastructure?

There are many benefits of cloud structure versus traditional physical infrastructure. For one, it does away with the frequent procurement, maintenance, and capacity planning that comes with the use of physical servers and storage. In addition to a low barrier to entry, cloud infrastructure also boasts low capital requirements and a low total cost of ownership. Typically, cloud infrastructure offers more flexibility in design with its easy set-up and ability to be replaced or deleted, and it is also highly scalable.

What Are The Primary Differences Between Amazon Web Services (AWS) and Microsoft Azure?

Amazon Web Services made its grand debut more than ten years ago, and it’s gotten progressively better since then. Operating since 2010, Microsoft Azure comes with its own long list of benefits, and while these two both share some similarities in their capabilities, there’s a world of difference between them.

AWS is known for stability, reliability, and an array of solid offerings. It groups IaaS offerings into four categories, which include:

  • Compute
  • Storage and Content Delivery
  • Database
  • Networking

With AWS, you can monitor your resource usage with innovative management tools like Amazon CloudWatch, and track API usage and user activity with AWS Cloudtrail. Other tools, like AWS Config, can be used for monitoring resource inventory and other changes.

Azure, on the other hand, is divided into categories such as Compute, Data Management, Performance, and Networking. It secures these services utilizing tools such as:

  • Azure Active Directory
  • Multi-Factor Authentication
  • Active Directory Federation Services
  • Others

Azure also boasts service and integrations to help monitor and alert businesses about their performance metrics and logs.

While cloud infrastructure can be of great benefit to a wide variety of organizations across a number of industries, it’s a solid option for government agencies as well. In fact, both Microsoft Azure and AWS have dedicated areas for Government on their clouds, which ensures that their strict needs for compliance are maintained at all times. Both services are said to be compliant with ITAR, HIPAA, DISA, FIPS, CJIS, and other organization standards.

What Is A Hybrid Cloud?

Making the transition from physical servers to the cloud can be an arduous process for businesses. There are many reasons why organizations may choose to forgo cloud infrastructure in lieu of their own data centers for some aspects of the business. With this, Microsoft has created support for unique hybrid cloud configurations.

Hybrid clouds allow businesses to run cloud applications and deploy cloud-model applications and infrastructure, all with the comfort of your own on-premises resources. This seamless transition between the two is allowing a growing number of businesses to explore the benefits of cloud infrastructure without totally abandoning what is tried and true.

Which Service Is More Affordable?

Although there are many factors that make cloud infrastructure more affordable than its predecessor, the savings aren’t always cut and dry. Many of the costs associated with cloud infrastructure are due to user behavior in addition to workloads. While trying to predict the costs can seem futile, both Azure and Amazon have cost calculators to make the process an easier one.

Will I Need Licensing For Cloud Infrastructure?

When it comes to cloud-based infrastructure, many users are drawn to the simplicity of licensing. With the cloud, users are automatically charged for licenses based on usage. If you happen to work for a big company, chances are you already own a number of expensive licenses. Luckily, not all hope is lost. Moving to the cloud won’t result in wasted investments, as Windows offers license mobility for application servers that qualify.

Cloud infrastructure is saving many businesses time, trouble, and money. If you think your organization is ready to make the transition to the cloud, you’d do well to do your research to determine which of these two possess the tools you need to make the most of a new and improved infrastructure.

Categories
Blog

What The Sunset Of Windows 7 Means To Its Users

Windows 7 is being “put out to pasture” by Microsoft at the beginning of 2020.  Not all Windows 7 users are aware of precisely what this means and how it can affect their day-to-day business.  Because of impending issues, such as steadily degrading usability and increasing security vulnerabilities, Windows 7 users need to know what to expect and what their options are.

Quick Background On Windows 7

Windows 7 was released in October of 2009.  Its purpose was to serve as an incremental upgrade to the not-so-well-received Windows Vista operating system. Windows 7 included some much-needed improvements to Windows Aero, the new user interface that Microsoft introduced with Vista, and with improved performance.  Users responded far more positively to Windows 7 than they did Vista, primarily because it addressed so many of Vista’s deficiencies.  The Windows 7 Service Pack 1 came out in 2011, and a platform update was released a few years later in 2013.

By 2014, however, Microsoft began preparations for the retirement of Windows 7 as they began stopping its retail sales.  Next, mainstream support for the operating system came to a halt.  In 2016, PCs were no longer shipped with Windows 7 pre-installed.  Microsoft then announced that on January 14, 2020, extended support for Windows 7 would end.  That was the official sunset announcement.

What Sunset Means

Sunset begins with Microsoft no longer offering extended support for Windows 7.  It also means no more security updates, bug fixes, or service packs.  That, in turn, means the usability, security, and performance of Windows 7 will begin to degrade with time.  On the surface, applications and the operating system will generally perform all right, but there will always be exceptions.  Over time, however, there will be a definite trend toward more issues, steadily poorer performance, and serious security vulnerabilities.

Why This Important to Windows 7 Users
Here is what a Windows 7 user can expect to see after sunset begins:

  • Software, utilities, and features may become incompatible
  • Applications no longer receive updates that apply to Windows 7
  • New devices (g., printers or webcams) may not be able to connect with Windows 7
  • Antivirus will not be updated, and third-party virus protection software will eventually stop supporting Windows 7
  • Software bug fixes are no longer patched, leaving the system open to exploitation
  • Online banking transaction systems may expire if their authentication and encryption methods cannot be supported by Windows 7

Also, incompatibility can quickly become a problem for companies whose customers or partners need them to use or interface with software that simply will not run correctly on Windows 7.  Running a sunset operating system can also cause problems when attempts are made to add devices or install new software.

The most serious issues with sunsetting are those involving security.  Hackers will know that Windows 7 has become vulnerable and will seek out ways to exploit those weaknesses.  This leaves a system susceptible to malware, ransomware, and viruses.  The probability of suffering from an attack that renders your computers unusable will continue to increase with time.

Windows 7 Sunset

Options Available to Windows 7 Users

If you are running Windows 7, then now is the time to start migrating to a new operating system.  The most straightforward upgrade path would be Windows 10, which still has some of the look and feel of Windows 7 with a plethora of new features and even better usability.

The other option for most businesses is switching to Mac OS.  This means an entirely new work environment for traditional Microsoft users. This option can involve a steep learning curve.  While some Microsoft packages, such as Office, are available for Mac OS, they work a bit differently and it will take some time for new users to become proficient. Macs can also be more expensive than a Windows-based computer system, but have a reputation for being more reliable.

Unless a business is heavily involved in video production or graphic design, Windows 10 is probably the best option.

Getting Ready to Migrate

Before migrating, perform an inventory of software and group each application into one of three groups: unwanted, optional, or required.  Some software may require an upgrade to run on a newer operating system.  Next, prepare a similar inventory of hardware.  As with the software, some hardware may need to be updated or replaced to remain compatible with the new operating system. Also, check the requirements of the replacement operating system, paying special attention to available hard drive space, physical memory, and processor or CPU needs.

Please note that if a machine is already getting a bit outdated (e.g., 7 or more years old), it might make sense to purchase a new machine with Windows 10 pre-installed. The Trump tariffs will cause an increase in the price of computers, scanners, printers, servers and even their components. So now is definitely the best time to buy!

Conclusion

With the sunset of Windows 7 impending, now is the time to start the process of migrating to a new operating system, whether it be Windows 10 or Mac OS.  Failure to upgrade will not only lead to issues with compatibility and performance, but will involve serious security risks.

Categories
Blog

How to Record the Screen on Your iPhone or iPad

There’s no shortage of useful features on your iPhone, but just because there are so many doesn’t mean you’re utilizing your smartphone to its fullest. The iPhones and iPads of yore were good for little more than making calls, taking photos, and browsing the internet. However, today’s iOS capabilities have improved over time. With each new iPhone model comes a range of cool new features to play with. Since last year, these new features include the ability to record your screen, leaving many iPhone users to wonder how they ever did without.

Record Screen iPhone

Tell A Story with Smartphone Video

The Screen Record feature is improving the iPhone experience for users everywhere, especially in a world where a video is the weapon of choice for storytelling. There are a number of reasons why you may want to capture what’s going on with your screen. These reasons range from social and fun to professional.

Many people are visual learners, and explaining step-by-step instructions to someone is much more difficult than just showing them. From sharing footage of your own gameplay, to walking a friend through the steps of how to use certain features on their own phone, the ability to easily capture and share video on your screen is one you don’t want to skip out on, especially if you’re hoping to squeeze every ounce of use out of your iPhone.

Screen Recording, in a nutshell, allows you to capture what’s happening on your screen at any given time. The best part? You don’t even need a third-party app to make it happen. While, technically, the ability to record what’s on your screen has long been available to iPhone users, to do so was no easy feat.

Before the screen record feature made its way into iPhones, users were forced to go through the motions of opening up QuickTime Player and performing several steps to get the goods. Quick and efficient the process was not. Now the screen recording feature is built right into your iOS, allowing you to record your screen or capture individual screenshots with just a few taps.

How To Access Your Phone’s Screen Recording Feature

Your recent model iPhone’s screen recording feature is relatively simple to operate, but there are a few things you may need to do in order to activate it. Devices like the iPhone 8, 8 Plus and, X should already contain the screen recording feature in your control center, but if not, you can easily make it so. To quickly access the tool on one of the aforementioned devices, swipe up from your phone’s home screen and press the bottom-left button.

If your screen recording tool isn’t already in your Control Center, then before you can begin screen recording, you’ll need to fix that in your settings. Go to your iPhone’s Control Center settings and turn on “Access Within Apps.” Go to Customize Controls, and in the More Controls section, add Screen Recording to your Control Center by tapping the green button. This will ensure the feature is ready to go to your Control Center for easy access.

Once your screen shows what you want to start recording, bring up the Control Center using 3D Touch and hit the Screen Recording icon. With this, you’ll be able to manage your audio with the Microphone icon. Once you’re ready to start recording, tap the Start Recording option, which will prompt a countdown. You’re now set to record, and even narrate if you wish, which comes in particularly handy for guides and tutorials. While you’re recording, you’ll see a blue bar at the top.

If you’re ready to stop recording, tap the red icon on your upper-left corner. Once you’re ready to view your screen recording, simply go to the correct folder, locate the file, and hit Play. It’s really that easy.

Editing Your New Video

Recording and sharing your video is simple enough, but you may need to make a few edits, depending on what your video will be used for. After you’re done recording, you’ll be able to do cool things like edit and make annotations when you download a free app, like Record It.

Initially, your video will show any and all actions you take once you hit record, such as starting and stopping the recording. To edit these out, simply click the top right button to edit your video, then trim out the extras by dragging the handles at the bottom of your screen and creating new start and end points for your video. Click done, and that’s all there is to it.

Wrap Up

It’s no surprise that your iPhone and iPad are full of potential. The Screen Record option is just one of the many tools at your disposal. Learning to use its wide range of features will help you get the most bang for your buck, and simplify your life just the way Apple intended.

Categories
Blog

Professionals Reveal Their Microsoft Outlook 2016 Top Tips

Looking for quick tips to optimize your Microsoft Outlook experience? Check out this article that includes all you need to know to get the most out of Microsoft Outlook.

Outlook Tips and Tricks

With over a billion users worldwide, Microsoft Outlook is the preferred email program for business owners. Though other email programs have some of the same features, no single one of them addresses the everyday needs of business professionals better than Outlook.

In spite of its popularity and its versatility, many users are not getting the full range of benefits Microsoft Outlook has to offer.

This program provides a rich array of valuable features. It allows users to sort, filter and categorize all emails. In addition, there are numerous other email shortcuts that can save users time and reduce their daily frustration. Below, we discuss some of the biggest time-savers. Please note that these shortcuts are based on Outlook 2010, but most will work on later versions, as well as earlier ones.

Learn the Keyboard Shortcuts

It may not seem like it to some people, but having to move your mouse around and click on something takes a lot longer than just pressing two keys. For people whose world revolves around email, the wasted time can really add up. Therefore, it’s expedient to learn a half dozen of the most commonly used shortcuts:

  • Ctrl+R: reply to email
  • Alt+S: send email
  • Alt+R: reply to all in email or switch to work week calendar view
  • Ctrl+M: or F9 to Send/Receive all
  • Alt+W: forward email or switch to weekly calendar view
  • Ctrl+G: open the “Go to date” dialog and jump to any date in the calendar

New to Outlook?

You won’t be a newbie for long once you learn these tricks. Below are a few great tips for newcomers that will have you working like a pro in no time.

Switching Tasks

This tip lets you easily switch between your calendar, contacts, email and other items by pressing Ctrl + [the place number of the item]. This can eliminate lots of clumsy maneuvering in the navigation pane.

Quick Steps

This feature, first introduced in Microsoft Outlook 2010, is the fast, painless way to create your own shortcut when performing any multi-step action (it’s also available for modifying default Quick Steps). For instance, let’s say you want to create a Quick Step for marking emails as read, then forward them to a specific group of people.

Go to the Home tab and click Mail, then in the Quick Steps section, click the More arrow. Next, click on Manage Quick Steps. Select the Quick Step you would like to change, and then choose Modify. Look for Actions, then change or add the actions you want this Quick Step to perform. In the Shortcut key box, assign this Quick Step a name. You can also change the icon next to the Name box by clicking on it, then click OK.

Create a New Item from the Clipboard

This one is a real time-saver. Instead of going to Outlook, opening a new item and then copying and pasting content into it, you can do all this in one smooth step. Simply copy text to your clipboard and press Ctrl-V to create a new message that contains the selected text.

Using Outlook for A Short Time?

Sometimes we all must work on a specific project or with a team that’s already using Microsoft Outlook. For those people, it can be a hassle to get up to speed on how to carry out common tasks. The tips below will have you whizzing through your emails.

How to Create a Calendar Event

Most new users think you have to scroll through the calendar to find a date that works for your upcoming meeting or appointment. Outlook allows you to simply type phrases like “three weeks from now” or “next Wednesday”. Your calendar automatically sets up the appointment. Of course, you can always change these dates if you need to.

Modify Desktop Notifications

If you get lots of emails each day, you understand how distracting it can be to constantly be notified of a new email. Many of the emails we all get aren’t that important anyway. Outlook allows you to set your desktop notifications so that you are only notified of messages from people that you specify.

You can set up a VIP email folder by going to Rules > New Rules, then select “Advanced Options”. The “Rules Wizard” allows you to specify which emails should be sent directly into the VIP folder. That way, you’ll have your important messages all in one place. Using the Rules Wizard, you can set up all your Mail Options so that they work for you, not against you.

Creating Email Templates

During an ordinary workday, we often send out similar messages to people. Why not create an email template for those? Open the email, then select File > Save As > Outlook template. Now when you want to send the message out to someone, go to New Items > Choose Form. Browse through your “User Templates in File System” to find the template and click on it.

Seasoned Outlook Vet?

Maybe you’ve been using Outlook for years and are ready to learn some new tricks. Below are a few amazing time-savers.

Schedule Email Delivery

Whether you’re running off to a meeting or rushing to the airport, you may want to send emails to special people later that day or even weeks in the future. First, write the email, then go to Options > Delay Delivery > Do not deliver before. and then simply type in the date and time you want the message sent out.

Make Folders for Emails

Organizing emails into specific folders is a great way to streamline your Inbox. A good folder system can save you time and prevent important messages from getting lost. Once you have your folders set up, simply drag emails into the right folder. Go to Folder > New Folder and enter a name for it. In the pull-down menu called “Folder Contains”, select “Mail and Post Items”, which formats the folder for email messages. Next, choose “Select where to place the folder” to assign a location for it, and click OK.

You can use this to create folders for people or businesses that you get regular emails from. You probably get daily emails from your boss, so it’s a good idea to set up a folder with his name on it. You may get emails from important clients, each one of which can have their own individual folder.

Once you get all your folders set up, be sure to create Rules so you can easily route mail to the correct folders. The easiest way to do this is to open the email message, go to the Move group on the Home tab and click on Rules. A list of suggested rules will appear.

Let’s say you wanted to set up all emails from your boss, Jay Jones, to go into a folder with his name on it. Click on “Always Move Messages From: Jay Jones”. Click on the “Jay Jones” folder to select it, and click OK. From now on, every message from Jay Jones will go directly into a folder with his name on it. No more searching endlessly for important messages from the boss.

Create Sticky Notes for Quick Reminders

Have a fun luncheon coming up with friends? There’s no need to create a calendar event for tasks like this. With Outlook open, you can create a new sticky note by pressing Ctrl + Shift + N. Your note can be dragged anywhere on the screen. Now you’ll have that little reminder so you don’t miss important events.

A Few More Quick Tips

Microsoft Outlook has many more fast, convenient ways to streamline your daily email experience. For example, it’s easy to group long email threads into one message. Simply click on the message, then click View > Show as Conversation.

Block emails from specific people by going to Home > Junk email options. A new window will open, in which you can select which senders you wish to block.

You can quickly Flag a message for further inquiry. Simply press the Insert key to toggle the flag off and on. In newer versions of Outlook, a small flag appears in the upper right corner. You can click on this flag to specify follow-up options.

Cloud Advantages

With everything moving to the cloud, newer versions of Outlook will have more features that are web-based, which users will be able to access from any device or location. This is the future of all Internet programs. Today’s savvy business people need to work on airplanes, in hotel lobbies and from phones, as well as laptops. With the cloud, you can take your work home or even on vacation with you. This can be a good thing and a bad thing. We all do need some time away from work each week.

The Future of Outlook

With millions of faithful users, Microsoft Outlook should remain the go-to email program for business owners. Microsoft has tweaked the program over the years to make it more intuitive and less intrusive. Their use of helpful built-in features appeals to business professionals.

As the program continues to expand, users can save time and get the drudgery of daily emailing completed much quicker. It’s a good idea to check the Microsoft website for new updates each year and become a true Outlook guru.

Skip to content