Categories
Blog

How To Add A Contact In Microsoft Outlook

Adding a new name and email address to your list of Microsoft Outlook contacts is pretty simple. There are two different ways you can do it depending on whether you want to add the contact information from an email or just want to create a brand new contact.

How to Add a Contact From an Email

1. Right-click the name of the sender in the heading of the email from whom you want to add as a contact.

2. Select “Add to Outlook Contacts” from the drop-down menu.

3. After clicking, you will see a form which is partially filled in with information such as the person’s name, email address, phone number, job title, etc. Fill in any missing information or make any other changes you want.

4. When you are satisfied, click on “Save & Close” on the menu bar at the top of the screen.

How to Add a Completely New Contact

1. Find and select the person icon on the vertical menu bar on the left side of the window.

2. Click on the “New Contact” button on the top menu bar.

3. This will bring you to a completely blank form which will allow you to add the person’s name, email address, and other personal information including a photograph.

4. When you finish adding information, select “Save & Close” on the menu bar at the top of the screen.

Microsoft Outlook

That is it!

Now whenever you want to email the person you just added, you will only need to type in the first few letters and Microsoft Outlook will automatically suggest the contact. Remember that you can always change or add to the personal information for each of your contacts by selecting the person from your contact list.

Categories
Blog

Microsoft Office 365 Business vs. Microsoft 365

Two subscription-based software programs available from Microsoft are Office 365 and Microsoft 365, both developed for small to medium-sized businesses and even larger companies. There are some similarities and differences between the two to help you decide which one you need for your organization. For even larger organizations there is Microsoft Enterprise that may have some security features that smaller companies should consider.

Office 365 is a cloud service platform that offers familiar Microsoft products like Word, Excel, PowerPoint, and other services either online or on-premises through a subscription plan.

Microsoft 365 is an all-in-one bundle that includes the Office 365 Suite, Windows 10 Pro and Enterprise Mobility+Security for a complete, interconnected experience.

Office 365 Business: This is a subscription-based version of Microsoft Office and is designed for organizations with 300 users or less and includes, 1TB of storage, basic data and app security and device management capabilities using Microsoft Intune and the Office 365 Suite, that includes the following:

  • Microsoft Outlook: Outlook is Microsoft’s personal information manager used mainly for email management. The program also includes a calendar task manager, contact manager, journal, note taking and web browsing.
  • Microsoft Word: Word is Microsoft’s word-processing program designed for creating documents like letters and questionnaires, as well as basic desktop publishing for creating brochures, flyers, posters postcards, and more. Word includes many features that make it easy to create professional looking documents and archive them.
  • Microsoft Excel: Excel is Microsoft’s spreadsheet program that allows users to organize, format and calculate data using formulas. It also features graphing tools and pivot tables. Excel uses a collection of “cells” arranged into rows and columns in order to organize and analyze data that can be displayed as charts, line graphs or histograms.
  • Microsoft PowerPoint: PowerPoint is a presentation program where users can design multimedia slide presentations. PowerPoint allows the user to attractively arrange photos, images and other graphics.
  • Microsoft Access: Access is a database management system that allows users to enter, organize and run reports on a large scale. It is used by larger teams and corporations with large amounts of data. Note: Access is only available for PCs, not Apple products.
  • Microsoft Publisher: Publisher is an easy to use, basic desktop publishing program with extensive tools needed to produce layouts using images, typography and other graphics. Publisher is perfect for creating business cards, promotional flyers, invitations, greeting cards, calendars, and newsletters, to name a few. Note: Publisher is only available for PCs, not Apple products.
  • Microsoft OneNote: OneNote is a program for taking notes, whether handwritten or typed, drawings, screen clippings and audio and sharing them with other OneNote users. It is meant as a free-form, collaborative program.

There are three tiers of Office 365 Business that include: Business, Business Premium and Business Essentials. Business is the basic level that offers desktop versions of all the office applications, file storage and sharing with one TB of OneDrive Storage. Business Premium and Business Essentials offer other services to not only organize your office but to nurture relationships, connect teams, and manage all aspects of your business. The subscription ranges from $8.25 per month per user for basic to $12.50 per month per user for premium.

Now moving on to Office 365 and what makes it different. Office 365 is an upgraded version of Office 365 Business that offers even more, especially in security. The main difference is all of the security features that are not available on Office 365 Business Premium. The following are Office 365’s security features:

  • Provides business protection from unsafe attachments, suspicious links, attachment checking and scanning
  • Provides information protection policies to help control and manage how information is accessed
  • Provides controls to protect company data on personal mobile devices
  • Provides archiving capabilities, data preservation and continuous data backup that is accessible from anywhere 24/7

Device management is another upgrade that is not available on Office 365 Business Premium. Subscribers will get upgraded to Windows 10 Pro from Windows 7, Windows 8 or Windows 8.1 Pro. There are also simplified controls to easily manage Windows 10 Pro PCs, self-service PC deployment with Windows AutoPilot and secure management for iOS, Android, Windows and MacOS devices.

The subscription fee is $20 per user (up to 300 users) per month.

Small-to-medium-sized businesses looking to transition to Office 365 need to buy Windows 10 Pro and then subscribe to a security service individually as well as making sure all of their users are properly connected and covered under the security subscription.

On the other hand, when transitioning to Microsoft 365 everything is integrated from the start. This makes it easier from a buying perspective and easier for end users to navigate. Deciding to subscribe to the entire Microsoft ecosystem from the beginning provides businesses the opportunity to have all the tools they need to successfully run their businesses.

There are many things to consider before deciding what is right for your organization. If you can answer, “yes” to the following questions, then Microsoft 365 Business may be for you:

  • Are you a small to medium-sized business with under 300 users?
  • Are the majority of your PCs not running Windows 10?
  • Is your business behind in security and device management?

It is important to note that some of the Microsoft Enterprise E3 security features (the price is the same as Business Premium) may be right for your business needs.

Microsoft Office 365 vs. Microsoft 365

Microsoft 365 has many features to offer businesses that haven’t transitioned to Microsoft Office 365 and need to get set up quickly. Microsoft 365 Business should be especially popular among new small to medium organizations that require a collaborative environment. For more information and guidance to research, compare and decide what is best for your business by referring to the following websites:

  • Office 365 Business: http://products.office.com
  • Microsoft 365 (includes video and guided tour): https://www.microsoft.com/en-US/microsoft-365/business#pmg-cmp-desktop
  • Office 365 Enterprise: http://products.office.com/en-us/business/compare-more-office-365-for-business-plans
Categories
Blog

How To Create Org-Wide Groups in Microsoft Teams

Microsoft Teams

As technology improves, so does the way professionals use their programming to increase productivity and efficiency. At one time, emails were the preferred communication between colleagues simply because it was the new form of a written message. Over time, people came to see email as being a bit clumsy for informal messaging, as social media and SmartPhones introduced text messages and chat rooms. You wouldn’t send your roommate a formal email to ask whether to pick up an extra coffee on your way home, likewise, it makes more sense to send a text to ask if there are any specific topics to be addressed in the upcoming meeting.

Why Create Teams

The fact is, teamwork relies on communication, and teamwork is a vital aspect of how an office functions efficiently. The definition of your team might vary over time, as it is on one level the entire office staff, but it might also reference your department, or a group of people within that department who are working together on a project. By using Microsoft Teams in conjunction with Office 365, you can quickly choose who to share information with, whether it’s a quick message or a formal document. Unlike email, you can easily choose the team to share with rather than sending the message to everybody on your contacts list who doesn’t need to know about it, or alternately, accidentally leaving someone out who does need to be informed.

Recommended Settings

Like other software, Microsoft Teams has recommended settings which have proven to work best for most offices. The most common initial setting allows only team members to post to the general discussion. This can allow people outside the team to view what’s going on without cluttering up the discussion by adding their own thoughts to a project they may not be working on. Outsiders can still message individual team members with relevant information, and then the member can decide whether it is important enough to post for further discussion. Another way to keep the conversation crisp without unnecessary clutter is to turn off the “@team” notification. Although not a setting, it is important for the team owner to remove accounts that no longer belong, as they no longer need access to your org-wide team.

Conclusion

Microsoft Teams really is a great new program which is changing the way office communication is handled. Although it is much more than social media, to an extent it uses such a concept to bring the ease of communication such sites have incorporated into a professional setting. It makes it easy to share information with the people who need it, without giving it to people who have no interest or leaving anyone out of the loop who does need to know.

Categories
Blog

What Do We Need To Know About Our Datto Storage Device?

Organizations around the world depend on Datto’s business continuity and disaster recovery (BCDR) solutions because they work – plain and simple. If you use Datto for your IT storage, you can stop worrying about whether or not that backup or restore will actually perform – it will!

That’s why Data Magic provides Datto devices for all of our clients. Datto provides protection for businesses of all sizes. Some of our clients have had questions about their Datto device. We’ve answered a number of them here.

What Happens If We Run Out Of Space On Our Datto Appliance?

You’ll get a “Backup Skipped” message. This indicates that the Primary Storage size has reached capacity. The only thing to do is to free up storage space.

You may also get these alerts:

  • Alert: Device file system is full
  • Alert: Disk space critically low
  • Alert: Local storage has less than (amount) available
  • Error Alert: Backup skipped due to not enough free space
  • Device Alert: Device is protecting more than 50% of its storage capacity

When the space in your Datto appliance is lacking it will do two things:

  1. Fill up rapidly after deployment. This prevents future backups.
  2. Can’t maintain local or off-site backup chains.

When this happens, it’s time to call us. We can provide temporary relief until we get you a larger device.

How Do We Know It’s Time To Upgrade Our Datto Appliance?

  • When local backups fail.
  • When you have to sacrifice your local backup to protect your system.
  • When you no longer have the space needed to create a virtualized image of the volume for your most significant agent.
  • When your device is using between 75% to 85% or more of its local storage for backups

What Causes Space Limitations?

These are some of the reasons your storage device might be full:

  • The retention settings are too low.
  • A software conflict is causing large backups.
  • The storage array capacity is too small to match the amount of data you need to protect.
  • The retention policy isn’t enforceable because the device isn’t synchronizing to the Datto Cloud promptly.
  • The retention policy isn’t enforceable because current recovery points are preventing the deletion of data from the local device.

How Do We Resolve Space Limitations?

Our engineer will check for these and other reasons your device is full. He will open the Graphic User Interface to determine the Primary Storage which represents the total amount of space that’s used. Then he’ll compare the space you’ve used against the space that’s available.

As mentioned we might be able to provide temporary relief. But, unless we upgrade the appliance, you’ll run into the same space restrictions again.

How Do We Know How Much Space We’ll Need?

Our engineer will consider your current and future storage requirements. These are some of the questions you should consider to help him determine how much more space you need:

  • Are you storing data from workstations or servers?
  • How many computers must be protected?
  • What is the total protected size required?
  • Will you be using encrypted agents?

We don’t size a Datto appliance based on storage alone. You need enough storage to ensure all of your operations will run correctly.

Remember that all the devices you back up must be in line with your Datto storage appliance. If not, the virtualizations (image-based backups) won’t run correctly. Your virtualized machines need additional resources. If space requirements aren’t met, this results in slow-running virtual machines and, potentially, programs that crash.

How Do We Make Sure We’ll Always Have Enough Storage Space?

To ensure that your Datto’s device functions correctly, it’s usually best to consider a larger device that has more space. This way, other device operations will continue uninterrupted, and you’ll have plenty of room for backups and processes.

Plus, be sure to contact us to inspect your Datto appliance regularly to ensure it’s appropriately sized for your current and future needs.

Categories
Blog

Data Privacy Day: Respecting Privacy, Safeguarding Data, and Enabling Trust

data privacy day

There is no better time than Jan. 28 to turn your attention to the importance of data privacy and all that it entails. During National Data Privacy Day, numerous businesses, nonprofit organizations, government entities, and individuals will come together to spread awareness about safeguarding data, protecting privacy, preventing information theft, and other issues that affect managers, owners, employees, and consumers alike.

What is Data Privacy Day?

Data Privacy Day is an international effort held annually on Jan. 28. The purpose is to create awareness about the importance of privacy and protecting personal information. Many people are unaware of how their personal and professional data is shared and don’t take the necessary precautions to protect it, leaving themselves and/or the organizations they work for vulnerable. Data Privacy Day helps spark a necessary dialogue that educates business professionals and organizations, giving them a sense of empowerment as well as practical knowledge about which best practices should be implemented. This year’s theme is “Respecting Privacy, Safeguarding Data, and Enabling Trust.”

The Data Privacy Day campaign was initiated in North America in January 2008 as an extension of the Data Protection Day observed in Europe, also on Jan. 28. According to the National Cyber Security Alliance (NCSA), Data Privacy Day “commemorates the Jan. 28, 1981, signing of Convention 108, the first legally binding international treaty dealing with privacy and data protection.”

In 2014, the 113th U.S. Congress adopted a resolution expressing support for the designation of Jan. 28 as National Data Privacy Day, according to the NCSA. In the states, the National Data Privacy Day campaign is spearheaded by the NCSA, a nonprofit entity founded in 2011 that works with the Department of Homeland Security along with a number of private sector sponsors. The NCSA is advised by a distinguished advisory committee, whose members include experienced privacy professionals that help keep the campaign aligned with the most current privacy issues “in a thoughtful and meaningful way,” according to the NCSA. Although Data Privacy Day is perceived as the signature event sponsored by the NCSA, the organization is involved year-round in a comprehensive effort aimed at privacy awareness and education.

Why be involved in Data Privacy Day?

Any person or entity across any industry can be involved in the Data Privacy Day campaign. This includes businesses of all sizes; government organizations; nonprofit organizations; schools/school districts and other educational institutions; and individuals and sole proprietors.

Participating in this international initiative is a way to demonstrate your support and dedication to the idea of empowering businesses and individuals to take this issue seriously and giving them the tools to be part of the solution. Getting involved is as simple as signing up online. Upon signing up, your name, as an individual, business, or other professional entity, will be added to the Champions page. You also will receive resources, such as the #PrivacyAware Toolkit, to help you disseminate awareness and information throughout your organization, as well as the larger community that you serve. The toolkit includes templates for a press release and email; sample social media messages; and digital graphics to use online and in other promotional materials. These items can be used among stakeholders to create dialogue about advancing data protection and privacy.

You can also follow the Data Privacy Day Facebook page to stay abreast of any news or updates.

What does Data Privacy Day entail?

During the day of Jan. 28, the NCSA will provide access to the live streaming of a special Data Privacy Day event, titled A New Era in Privacy, which will be hosted by LinkedIn in San Francisco. During the event, privacy leaders with diverse perspectives will discuss how the technology landscape is rapidly changing and provide insight into what opportunities and challenges are likely to crop up in this new era of privacy. Presentations will come from representatives of the NCSA, LinkedIn, the Federal Trade Commission, Verizon, and other industry leaders.

Data Privacy Day is also a good opportunity to discuss security tips and best practices with your staff and/or IT consultants. Find out if there are any new regulations governing the handling or transmitting of data, discuss any current cyber-security threats, put together a plan for dealing with a data breach, and collaborate on any further steps required to better protect private information.

How are you protecting your data?

Managed Service Providers (MSPs) with expertise in IT can help you achieve the important mission of protecting your business or organization from unauthorized access to important information, identity theft, data loss, and other potentially crippling events. They offer a number of technology-related services to help you with systems analysis, email security, and archiving, mobile device management, keeping software up to date, web filtering, using firewalls, and other IT solutions.

Implementing these practices can help you encrypt data, mitigate the risks related to electronically transmitted communications, and comply with laws and regulations pertaining to the use of technology. Additionally, IT management companies and consultants can assist you with network monitoring and maintenance, which prevents smaller issues from causing your organization to lose productivity, experience data loss, or suffer financially in a more significant way.

Categories
Blog Cyber Security Blog Technology News

Why Do We Need A Single Sign-On Solution?

Regardless of how well you train your employees, sophisticated social engineering attacks can rob them of their identity and rob you of your data. To mitigate this risk, security-conscious organizations are increasingly putting identity and access management services like Single Sign-On (SSO) solutions at the center of their security strategy.

SSO not only strengthens your authentication management but your overall security. And it improves your employees’ sign-on experience by eliminating the need for password management when they access multiple applications.

How Does Single Sign-On Work?

Data Magic’s Single Sign-On Solution lets you and your staff authenticate just once rather than having to do so over and over again. You won’t need to separately sign on to applications and systems because once you sign on The Solution handles the rest.

This was once only cost-effective for larger enterprises. Now it’s affordably available to small and mid-sized businesses like yours.

How Will SSO Benefit Us?

  • It Protects Your Login Credentials: Along with ease of use, our Single Sign-On Solution can dramatically improve security across your entire organization. You can protect your users’ credentials, and prevent theft and account takeovers with centralized identity and access management.
  • Ease Of Management: Our SSO Solution allows for easy provisioning and de-provisioning of users, groups, and permissions policies. You’ll have greater visibility into users’ access to applications, services, and data. It provides the transparency you need to ensure only authorized employees are accessing your digital information.
  • It Reduces Your Attack Surface: Better management equals improved security. You can eliminate blind spots by knowing who has access to what. With our centrally managed and automated SSO Solution you’ll know when bad actors are trying to access your IT environment.
  • Improved Response Times: You’ll benefit from real-time visibility into authentication events that are tied to other security management tools. Our SSO Solution will take immediate action to challenge account takeover attacks as they occur individually or in multiples across your IT environment.

Will Your SSO Solution Work With The Applications We Use?

We can establish Single Sign-On across your entire IT environment. It will integrate seamlessly with the applications you use. And it can be used with over 5,000 cloud applications, as well as your legacy IT infrastructure and devices.

How Can We Learn More About Data Magic’s SSO Solution?

We’ll make it easy for you. Just contact the team at Data Magic in Coppell, Texas, and we’ll be happy to provide a complimentary demonstration.

Categories
Blog

Inside The United States Of Cybersecurity

United States Cybersecurity

In March 2018, Alabama and South Dakota passed laws mandating data breach notification for its residents.

The passage meant all 50 states, the District of Columbia and several U.S. territories now have legal frameworks that require businesses and other entities to notify consumers about compromised data.

All 50 states also have statutes addressing hacking, unauthorized access, computer trespass, viruses or malware, according to the National Conference of State Legislatures (NCSL). Every state has laws that allow consumers to freeze credit reporting, too.

While those milestones are notable, there are broader issues when it comes to legislative approaches to cybersecurity across the United States. There are vast discrepancies and differences among states when it comes to cybersecurity protection.

What Laws Are on the Books About Cybersecurity?

In 2018, there were more than 275 cybersecurity-related bills introduced by state legislatures in 33 states, Washington, D.C., and Puerto Rico. The legislative action covers a broad range of cybersecurity topics, including:

  • Appropriations
  • Computer crime
  • Election security
  • Energy and critical infrastructure security
  • Government and private-sector security practices
  • Incident response remediation
  • Workforce training

For companies, especially those that work across state lines, the variances among state laws creates a challenge in tracking requirements and remaining legally compliant.

For example, while most states require immediate notification of a data breach “without unreasonable delay,” the deadlines are varied. Nine states require notification within 45 days, South Dakota allows 60 days and Tennessee allows as many as 90 days. In addition, most states require written notification while some allow for notification via telephone or electronic notice.

While states have focused much of their recent legislation on data privacy, there are many other components of cybersecurity. Again, there is no uniformity. In fact, most states do not have laws about other important cybersecurity issues:

  • Half the states have laws addressing denial-of-service attacks.
  • Just five states explicitly cite ransomware in statutes.
  • Phishing laws are in place in 23 states and Guam.
  • Twenty states, Guam and Puerto Rico have laws regarding spyware.

While broader laws addressing malware or computer trespass may be used to prosecute some of these attacks, the discrepancies further illustrate the different approaches and terminology states use.

What States Have Strong Data Privacy Laws?

Here are a few examples of states that have strong legal provisions within their cybersecurity and privacy laws:

  • Arkansas. Parental consent is required before student information can be shared with government agencies.
  • California. The state passed sweeping data privacy laws in 2018 requiring businesses to inform consumers of what personal information is being collected, disclosed or sold. The law, which goes into effect in 2020, contains provisions giving consumers the right to opt out of having their data sold to a third party. California is the only state with a constitutional declaration that data privacy is an inalienable right.
  • Delaware. Recently passed laws restrict advertising to children and protect the privacy of e-book readers.
  • Illinois. The state is the only one to protect biometric data.
  • Maine. It’s the only state that prohibits law enforcement from tracking people using GPS or other geo-location tools on computers or mobile devices.
  • Utah. The state is one of only two that requires ISPs to obtain customer consent before sharing customer data.

What States Have Weak Data Security Laws?

Despite the growing legislative controls on cybersecurity issues and public expectation for data privacy, there are many states that have laws that are lacking, including:

  • Alabama. There are no laws on the books that protect the online privacy of K-12 students.
  • Mississippi. To date, no laws exist that protect employee personal communications and accounts from employers.
  • South Dakota. Companies can retain personal information on employees indefinitely.
  • Wyoming. Employers can force employees to hand over passwords to social media accounts.

How Long Does a Company Need to Retain Personal Identifying Information?

Many companies struggle knowing when or if to hold onto personal information on consumers. The challenge is that laws vary greatly from state to state. As of January 2019, according to the NCSL, only 35 states have laws requiring businesses or government entities to destroy or dispose of this data at all.

Of those 35 states:

  • Only 14 require both businesses and government agencies to destroy or dispose of data.
  • Virginia requires government agencies only but excludes businesses.
  • Nineteen states do not require government agencies to dispose of or destroy personal information.

Where Is the Federal Government in Cybersecurity?

The federal government has many laws and rules regarding cybersecurity, from HIPAA to the Cybersecurity Information Sharing Act, which allows for the U.S. government and technology or manufacturing companies to share Internet traffic information.

Other proposed legislation has hit some roadblocks. Take the Data Acquisition and Technology Accountability and Security Act, which would have established a national data breach reporting standard. State attorneys general strongly opposed the legislation, introduced in March 2018. The 32 state AGs argued that the bill would weaken consumer protections, make state laws stronger, and exempt too many companies.

For companies, the variances from state to state present a complex technical challenge. To remain compliant, they need policies, tools and solutions that ensure data is protected and secure.

Managed service providers (MSPs) offer a powerful option to address many data issues. MSPs provide cloud-based, off-site, secure data storage and automated backups. Data, systems and networks are monitored 24/7 to detect and remove unwanted activity. The advanced firewalls, enterprise-strength anti-virus tools and employee education that MSPs provide help maintain compliance and keep data safe from the attacks that trigger responses.

The growth of state legislation to address cybersecurity issues is welcome. The challenge for companies is finding a reliable solution that allows for responsive and responsible action.

Categories
Blog

Windows 7: Under One Year Until Support Ends

Windows 7 End of Support

Use Windows 7? Do you love your Windows 7? Will your need or desire to continue to use Windows 7 surpass this year? If so, you should be aware that in just under one year — January 14, 2020, specifically — Windows 7 Extended Support ends for most users. As such, there are things you need to know and decisions you may have to make. This is your guide to understanding what the expiration of Windows 7 Support may mean for you in one year.

What is the Current Status of Windows 7?

Windows 7 is a reliable desktop OS for Microsoft users. When Windows 8 came out, the differences were so stark that most users preferred to stick to Windows 7.

Why would they stay with an outdated system?

Here’s what Windows 10 offers:

  • A straightforward interface that is well-designed and laid out;
  • A start menu that combines the old with the new;
  • A clutter-free and clean look that is familiar to you;
  • Thumbnail previews that allow you to automatically open an item;
  • Jump lists that allow you to quickly access files or documents you frequently use;
  • Performance that allows the system to boot up comparatively quickly;
  • A new calculator to convert units, figure out fuel economy, etc.;
  • A new WordPad that offers more formatting features; and — among many other features —
  • Upgraded and improved media player and center.

These are just a few of the reasons that so many PC users love their Windows 7 and do not want to particularly give it up, especially when they found Windows 8 a disappointment.

In fact, StatCounter suggests that 41.86% of PC users — who according to Statista makes up nearly 84% of the market share for desktop PCs — use Windows 7 still while another 42.78% use Windows 10 and a sad 8.72% use Windows 8. Those statistics say a lot about Windows 7 and suggest that a lot of people are going to need to figure out what they are going to do before January 2020, if they want their systems to be secure and updated.

Why is Microsoft ending support for Windows 7?

There is no specific reason why Microsoft is ending support for Windows 7 come January 14, 2020, except that this date is the date provided in Window 7’s lifecycle.

Windows 7 Lifecycle
October 22, 2009 Date of general availability for:

  • Windows 7 Professional
  • Home Basic
  • Home Premium
  • Ultimate
October 31, 2013 Retail software end of sales for:

  • Windows 7 Professional
  • Home Basic
  • Home Premium
  • Ultimate
October 31, 2014 End of sales for PCs with Windows preinstalled with:

  • Home Basic
  • Home Premium
  • Ultimate
October 31, 2016 End of sales for PCs with Windows 7 Professional preinstalled
January 13, 2015 End of mainstream support for Windows 7
January 14, 2020 End of extended support for Windows 7

As indicated in the above table, if you did not extend support for Windows 7, then the problem of extended support expiring on January 14, 2020, does not apply to you. If you had purchased that extended support, then you need to pay attention and determine what you want to do because a year will be over before you know it.

What will happen after extended support for Windows 7 expires on January 14, 2020?

Come January 14, 2020, if you are still using Windows 7, rest assured your desktop will still work; Windows 7 will continue to work beyond 2020. The issue here is your extended support.

Come January 14, 2020, extended support expires and with that expiration ends any updates to your PC. That means your system is vulnerable because the latest, most advanced security updates will not be available to you.

Who will be affected by Microsoft’s decision to end support for Windows 7?

It is important to be clear that not all Windows 7 users will be affected by the January 14, 2020 extended support expiration date. In fact, in September 2018, Microsoft announced that some business users can pay for an additional three years of security updates. Unfortunately, this does not extend to home versions.

In other words, if your windows license type is an original equipment manufacturer or a full package product, there will be no extended security updates for you, and this includes all home versions. However, if you purchased a volume license (i.e., Enterprise or Open Value) for Windows 7 Pro or Enterprise, then you can purchase the additional three years of security updates — so primarily only business users can receive the updates at a cost.

What are your options after Microsoft Windows 7 support expires?

If you absolutely must keep Microsoft Windows 7, then you have options, though they may not be optimal options. These options include:

  • Playing with the idea of purchasing an upgrade to Windows 10 and then downgrading your rights to Window 7;
  • Continuing to run Windows 7 without security updates, but this is not a good option because as computer desktops and software advance, so do the hackers capabilities (home users if careful, can consider it, but it is probably not an option for business users due to legal and liability risks);
  • Disconnecting any Windows 7 PC from the internet, but this means disconnecting you to the very thing that keeps you connected to the world, so it may not be your best option either.
  • Migrating from Windows 7 to another operating system, e.g. Windows 8 or preferably Windows 10.

What does Windows 10 offer you?

Some PC users are hesitant to switch to Windows 10 because it does have its drawbacks. Some specific Windows 10 drawbacks include:

  • The increased sense that Microsoft is invading our privacy with its default settings. Most of these setting can be changed but you must go in and manually make these changes.
  • The ability to control your updates is limited when compared to Windows 7. Plus, these updates are made without user knowledge — which only entrenches the sense that PC users are being spied on when something happens to their system without their knowledge, even if it is for their own security.
  • The interface is less customizable (e.g., can’t change colors) — and this is unfortunate in an age where we celebrate our differences, including how we set up our interface system.
  • Older programs do not run well on Windows 10, so if you have older programs, you may be in need of identifying additional and newer products or software.

That said, it is good to be reminded that even though you love your Windows 7 whether it’s because you simply love it or love it because it’s what you are familiar with, Windows 7 has its own drawbacks, too. Windows 7 drawbacks include:

  • Windows 7 was released in 2009. This was a time when iPad was a rumor and mobile phones were not as advanced. Today you want software that works across all your platforms. Windows 7 can’t do this most likely, but Windows 10 can.
  • If you ever needed to use a virtual desktop then you know this feature is not available in Windows 7 unless you use Desktops v2.0 software. Virtual desktops allow you to organize your space better and have become an essential tool for modern-day users. Windows 7 does not offer this capability easily but Windows 10 does.
  • We all know Apple’s Siri and Google Now. These are convenient built-in assistants to help us do anything from scheduling tasks or appointments, dictating notes, playing music, adding reminders, and much more. Windows 7 does not have a built-in assistant but Windows 10 does: Cortana.
  • Ever been in your Windows 7 and want to search the web from your desktop and then realize you can’t. To search the web, you have to navigate to the right tab and then look something up. Windows 7 does not offer a convenient search feature for the internet, but Windows 10 does: the search bar allows you to search anything from your folders, apps, files, Windows store, and the Internet.
  • Gaming is another thing so many of us like to do today aside from work. Windows 7 has always been a trusted gaming platform — so this is not a drawback except for the fact that Windows 10 has built on Windows 7 gaming capabilities to make it even better. So, if you like gaming, whether it’s DirectX 12, PC Game DVR, or Xbox one game streaming, among others that you like to use for gaming purposes, then Windows 10 offers the best performance for you.

How to determine what you should do about your Windows 7 come January 14, 2020?

If you are one of those PC users to be affected by the end of extended support for Windows 7 in January 2020, then you have to determine what you will do. The last section implicitly directs you in which way you may consider, but if you are not yet confident in Windows 10, ask yourself the below two sets of questions:

  1. Do you use your computer to access the internet? If so, do you keep private information online or conduct private matters online, i.e., financial information, tax information, banking, consumer purchasing via Amazon or other outlets, etc.?
  2. Do you like Microsoft’s operating system Windows? Do you want to stay with Windows (but not Windows 8)? If so, would you like something similar to Windows 7 but operates better?

If you answer yes to these questions, then it is safe to say you should consider Windows 10. A free upgrade to Windows 10 expired in 2016, but the price you pay today can save you in the long run.

So, now you have it. There’s a lot to consider if you use Windows 7 and like using it. If you are an owner of a volume license for business users, then you do have a viable and reasonable solution to the deadline: you can purchase another three years of security updates. This option provides you ample time to consider other options and train personnel on new desktop operating systems.

But if you are not a volume license holder, then you really need to consider what you intend to do. Security is highly important today in our virtual worlds and without it, you risk impacting your so-called “real” world. A hacker can destroy what you have built up over the years, from finances to projects to just about anything that is maintained or kept on your computer, in the cloud, or online. The issue of the January 14, 2020 expiration for Windows 7 extended support is indeed a serious one.

Categories
Blog

FBI Warns Businesses Of Cyber Attack From China

Chinese Hackers

Who Has Been Impacted by Chinese Cyber Attacks?

At the beginning of the year, the FBI warned businesses to protect themselves from cyber attacks by foreign entities, saying activity has spiked in the past 18 months.

Hewlett Packard and IBM are among the businesses most recently targeted. There’s a National Counter-Intelligence and Security Center that manages intelligence efforts for the U.S. government. It recently launched a campaign to address continuing threats. The center warns that many companies need to be more to protect against cyber theft.

Foreign governments accused of cyber attacks against the U.S. include Russia, China, Iran and North Korea, with China receiving the most scrutiny in recent reports.

How Do Hackers Breach Company and Government Security?

According to Entrepreneur magazine, hackers create fake social media accounts to get people to reveal work and personal information. One of the ways to guard against bad actors is to carefully scrutinize social media requests from people that aren’t personal connections and to research apps before using or downloading them, as well as keeping antivirus software up-to-date.

The FBI warning included a brochure entitled, “Know the Risk, Raise Your Shield” that targets federal employees. The recent warnings follow a string of cases against individuals and organizations accused of stealing proprietary information from the U.S. government and businesses.

Nine cases filed since July 2018 include two hackers investigators say are linked to the main Chinese spy agency. Knicknamed APT 10, they allegedly stole corporate and government information via cyber attacks on employees.

Has There Been an Uptick in Recent Activity?

The breach of private businesses by Chinese hackers first hit news headlines in 2014, when Sony Pictures was hacked. This prompted an agreement in 2015 between Chinese President Xi Jinping and then-President Barack Obama that curbed cyber attacks for a while.

At FireEye, a cybersecurity firm, analysts track hackers working on behalf of the Chinese government. The firm’s representative says attacks are on the uptick recently. These hacking groups are referred to as Red Leaves, cloudhopper, and APT10.

Managed Service providers are among the groups targeted. MSPs supply technology, telecommunications, and other services to business clients. If they can break the security systems of such companies, Chinese hackers gain access to the sensitive data of the MSP’s clients.

APT10 has routed malware via an MSP network to its business targets. However, there are many steps businesses can take to protect their employees and data from prying eyes in cyberspace.

What Should Businesses Do to Raise Their Shields?

U.S. businesses should take proactive measures to safeguard against cyber-attacks from Chinese hackers via email, social media, and other points of entry.

This includes ensuring that advanced detection tools are utilized on network and email servers to safeguard access to company data. Regular threat assessments and employee training can help. This provides a diagnosis of the state of a firm’s cyber defenses regarding advanced persistent threats that attempt to find breaches in the company’s firewall. Precautions taken against the intrusion of foreign governments include:

  • Fortify access controls. Evaluate the plans, policies, and procedures that govern corporate technology to keep proprietary data safe. This could include the installation of multi-factor authentication (MFA), data encryption, and solidifying a layered defense system on all possible points of cyber attacks.
  • Training. Make cybersecurity education and training a top priority. Everyone from the Board of Directors and C-Suite to individual employees needs to understand how to avoid cyber attacks by avoiding fake emails, malware, and weak password strategies, among other efforts.
  • Incident response plan. Organizational leadership and key technical personnel must develop a protocol for dealing with threats. This should include representatives from business administration, information technology, and operations.
  • Crisis communications plan. Align the protection policy to risk management methodologies and the business needs of employees.
  • Adopt a monitoring, detection, and response plan. Quickly detect intrusions and breaches via rapid-respond plans to effectively eradicate the malware or other methods of entry.
Categories
Blog

How To Add A Column From an Example In Microsoft Excel

Microsoft Excel has been around for ages. However, did you know that there are a whole host of functionality features to simplify your workflow and help you save time? One of the most commonly used tools is the Add Column from Example option. Here’s what you need to know about it.

How Do You Add a Column from an Example in Microsoft Excel?

Start by selecting Query > Edit. Then select Add a Column. Choose Column from Examples and From All Columns. After a column is populated, go ahead and add sample data for the new column. Press the Ctrl + Enter keys to instruct Excel to populate the remaining fields.

When is Adding a Column from an Example in Microsoft Excel Useful?

The Add Column from Example feature is an instrumental part of Microsoft Excel’s Power Query functionality that saves users an immense amount of time. Examples of an ideal time to use this function in situations where you need a column that references another column, such as when you want to join two columns together. For example, combining city and state names together for an address.

Microsoft Excel

Is Add Column from Example a Feature for All Versions of Microsoft Excel?

Unfortunately, the Power Query feature of Microsoft Excel is a relatively new addition to the popular software program. You must have Excel 2016 or Office 360 to use it unless you install a free add-in from Microsoft to your version,

In short, the Add Column from Example feature is a practical and useful way to clean up data sets without additional time or effort.

Skip to content