3 Microsoft Excel tips to master
Every computer user must be well-versed in various office programs, including Microsoft Excel. If you only know a few basic commands, you haven't fully mastered Excel. Here are a few features that can make your life easier.
Pie and Sunburst Charts
Everyone knows that bombarding stakeholders with endless numbers and decimal points is the wrong approach. You need to compile data and develop comprehensive pie or sunburst charts to make life easier for clients and investors.
Here’s how to create a pie chart:
Select your data.
Click on the Recommended Charts tool to see different style chart suggestions for your data.
Click on the Chart Styles, Chart Filters, or Chart Elements button in the upper-right corner of the chart to personalize its overall look or add chart elements, such as data labels or axis titles.
Steps to create a sunburst chart:
Select all your data.
Click Insert > Insert Hierarchy Chart > Sunburst.
Go to the Design and Format tabs to tailor its overall look.
Pivot Tables
Pivot Tables might be one of the most powerful yet intimidating data analysis tools in Excel’s arsenal. It allows you to summarize huge chunks of data in lists or tables without using a formula. All you need to do is to:
Select the data, which must only have a single-row heading without empty columns or rows.
Click Insert > PivotTable.
Under Choose the data that you want to analyze, click Select a table or range.
In the Table/Range box, validate the cell range.
Under Choose where you want the PivotTable report to be placed, click New worksheet, or Existing worksheet and enter the location where you want to place the PivotTable.
Conditional Formatting
This tool highlights essential information within your dataset. For instance, you’re presenting the latest numbers on project efficiency and you use Conditional Formatting to highlight any number lower than 80%. The highlighted data will capture the audience's attention, allowing them to identify the bottlenecks in your projects. To customize how the data is displayed, simply:
Select the cell.
Click Home > Conditional Formatting.
Click Format.
Change your formatting preference in the Color or Font style box.
Excel is one of the most commonly used business software on the market, yet not everyone knows how to fully utilize it. If you want to learn more about other handy Excel features, give Multi IT a call on 011 435 0450 today and we’ll elevate your user status from beginner to pro.
VIEW MORE
Boost user productivity with MyAnalytics
Machine learning is all the rage nowadays, and few vendors are providing as many solutions powered by this new technology as Microsoft does. Office 365 includes “intelligent” functionality for analyzing your employees’ time and coaching them on how to use it more efficiently.
What is MyAnalytics?
MyAnalytics apply machine learning technology to your employees’ Office 365 data. By utilizing extremely powerful computing processes to analyze huge blocks of information, MyAnalytics can uncover trends and correlations that may be too complex for human discovery.
Every day, Office 365 users create several thousand new data points across Microsoft’s productivity suite, and there’s a lot of potential to rearrange meetings, project goals, and employee tasks to increase efficiency.
The most obvious improvement is with Outlook calendar. MyAnalytics tracks how much time you’re spending with each person in your office as well as the time you’re investing in specific projects. After sufficient information has been gathered, your Office 365 dashboard will begin coaching you on how to organize meetings and project goals based on your habits and past successes.
How can it improve your office?
Have you ever worked on a huge project that required multiple contributors? Did you all meet regularly to update each other? Users who add contacts — from both inside the company and out — and projects to MyAnalytics get reminders to stay in touch with co-workers most vital to project completion.
Every metric tracked by MyAnalytics can be shared with your team to make sure everyone is on the same page. So MyAnalytics is more than just a motivational tool, because sharing these metrics allows your team to identify bottlenecks and trends to smoothen the workflow process.
Response time is another key metric your employees are probably only vaguely aware of. MyAnalytics calculates average email response times — both from you and from contacts — to identify what time of day you’re best at communicating, and how you can adapt your schedule to get more work done in the same amount of time.
Privacy concerns
One of the greatest things about MyAnalytics is that it doesn’t introduce any new privacy concerns for business owners. All the data it uses to create customized coaching and advice is publicly available to everyone at your business — via calendar appointments, email content, and message timestamps. The only difference is that Microsoft is lending you the previously prohibitive computing power to sift through all of it.
Availability
This wonderful new tool comes with any Enterprise E5 plan, but can also be added on to E1 and E3 Enterprise plans for just a few dollars per month.
Increasing employee productivity is never as clear cut as it is with MyAnalytics. Install a solution, follow its advice, and start brainstorming about what to do with all your extra time. We’ve got plenty of other great solutions for streamlining your business processes — call Multi IT today on 011 435 0450 to find out!
VIEW MORE
Cyber Security Truths To Live By - Part 1
#1 It’s Not A Technology Problem. It’s A People Problem
When it comes to security, your organization is very similar to a house. For protection, you have doors, locks, windows and fences. To detect threats, you have alarms, motion detectors, monitoring and crime watch. To respond to threats, you might have your own arsenal or methods to this. But intruders can still gain access. Businesses are in the same boat and in many cases may have all kinds of next generation technology to protect, detect and responsd to threats and sure enough, intruders still gain access. Why? 95% of breaches are related to human error. This makes it imperative to focus on early detection and response to lower liability because there is no way to keep everyone out.
#2 Nobody’s “IT Guy” Has Everything Covered
While most organizations don’t have a solitary, in-house IT resource managing both IT applications and IT infrastructure, (because it’s impossible to find the specialization and bandwidth in one person), many companies still work with a third-party “IT guy.” Even if this individual is only focused on IT infrastructure, there are still significant skill and bandwidth gaps. The operative term is “single point of failure.” This was much less of a problem 20 years ago. However, IT systems have become much more decentralized and complex and now require oversight by specialists in diverse disciplines such as public cloud, security and mobility. Do any of your vendors still work with an IT guy? Remember, you are only as safe as your weakest link.
#3 Cybercrime Has Very Low Barriers To Entry
Cybercrime is increasingly accessible to everyone. There are online job postings, anonymous payment systems and marketplaces where personal data is bought and sold 24/7. You can even buy $40 software programs to hack into systems. Many come with ratings similar to Amazon Reviews and some allow you to choose options like gold, silver and platinum depending on the kind of support you want.
How scary is that?
#4 Cybercrime Is Deployed Via Social Engineering Tactics
Phishing is the most common form of social engineering. It often appears in emails, chat tools and web ads. It’s designed to look like it’s coming from a real company and delivers a sense of urgency or demands immediate action. A hacker could disguise themselves as a company emailing an end user an invoice. When they click the attachment, it will release a virus into the system. Or you could be reading on article on the New York Times website and unwittingly click on a Bing ad that redirects you to website equipped with an exploit kit that downloads a virus, malware or ransomware to your computer.
#5 You Do Not Have To Go At This Alone
There are several reasons your company is working with Multi IT. Security is certainly one of them. If you get any suspicious or random emails from Amazon, Microsoft Office, DropBox and LinkedIn (just to name a few), practice the 5 second rule and take a breather before responding or clicking. I would always call the sender to confirm any digital signing requests. And please forward any questionable emails to support@multi.co.za. We’re here to help.
VIEW MORE
Cyber Security Truths To Live By - Part 2
#6 Social Engineering Takes Many Forms
Baiting offers the reader something in exchange for private information. This could take the form of a free music download or a glimpse at once svelte movie stars who now look like train wrecks in their bathing suits. Quizzes on Facebook may seem perfectly innocent but, in some instances, you may be submitting answers that are the same as those employed for security questions with your on-line banking and mortgage accounts. Seen any offers for free credit reports lately? Proceed with caution. Better yet, don’t proceed at all. There are a number of scams offering free credit reports that include credit charges with account numbers you don’t recognize. Then when you call to dispute the charge, you may be lured into correcting the mistake by submitting your legitimate account number, your security code or even your social security number. Phone numbers can be spoofed which catches a lot of people off guard because most of us are used to trusting numbers from known entities as the gold standard of verification. Ditto on text messages. If you sign up for newsletters, gated content offers on Facebook, and participate in social media petitions, you could be agreeing to service terms that allow them to sell your number or you may be giving your number directly to a fraudulent entity. Social engineering is not always technology-centric. Tailgating happens when an unauthorized person follows an employee into a restricted area at their company. Fraudsters commonly ask unsuspecting employees to hold doors for them, claiming they forgot their badge or they may intentionally have their hands full and expect human empathy to take them over the finish line.
#7 Avoid Unauthorized Software & Devices
Don’t install unauthorized programs on your work computer or plug in personal devices such as laptops, USBs, MP3 players and smartphones without permission from your manager. Even a brand-new device or USB flash drive could be infected with malware. Devices can be compromised with code waiting to launch as soon as you plug them in. It’s also a good idea to turn off/disable Bluetooth and wireless services when not in use. Don’t give hackers any windows to visit any of your networks, no matter how insignificant they may seem. If you have an unprotected home network (non-password/user ID authenticated) and you happen to have banking statements on your laptop, threat actors in your parking lot can find the information if they happen to be looking for it. People like this do the same thing in parking lots at commercial establishments with Wifi.
#8 Simplify Your Digital Life
Unsubscribe from email lists - ones that crowd your work email inbox as well as your Yahoo or Gmail account. Less clutter means fewer opportunities to step on the proverbial grenade. This also allows you to focus on what’s actionable. Get anything of value off your desktop and into a file sharing schema that is secure and backed up. Post with caution. You don’t want Facebook to serve as a geo-tracking device to notify criminals that the coast is clear every time you upload a shot of your foot and a drink from a recliner in St. Croix. You should exercise similar caution with LinkedIn. Be careful about posting financial details, gripes about company policy or detailed technical information about your computer network. Certain phone systems have user manuals online that explain how to reset passwords which means a nefarious third-party could take down your entire voice system or rack up tolls charges in the thousands of dollars.
#9 Get A Password Manager
Passwords are a twentieth-century solution to a twenty-first century problem. Unfortunately, user names and passwords – the most common digital credentials used today – are all that stands between employees and vital online services including corporate networks, social media sites, e-commerce and many others. Sharing corporate email addresses and passwords with your Yahoo, LinkedIn and Facebook accounts is a bad idea. Therefore, one of the best security practices you can implement is to use a completely different password for every service you use. Sixty-percent of Americans follow this process but an astounding 40% do not. A simple password manager can make the transition a breeze. Popular options include Blur, Sticky Password, Keeper, Password Boss, LastPass and Dashlane. You only have to remember one master password and the password manager will store all of your sites, encrypt their passwords, allow you to activate 2-factor authentication, set reminders to create new passwords, and even help you generate new ones. It also helps you stay organized because all your most important sites are conveniently housed within the password manager portal.
VIEW MORE
Cyber Security Truths To Live By - Part 3
#10 Consider Identity Theft Protection
It’s not a matter of if, it’s a matter of when. Pardon the cynicism but we all have a 1 in 4 chance of getting hit. Long before the Internet took off, a lot of paper records included personal identifying information (“PII”) which is now at large. Georgia Driver’s licenses used to include your Social Security number. It would be safe to assume somebody with bad intentions either has your PII or will be able to locate it because paper records are digitized and put up for sale on the Dark Web all the time. If your identity is stolen it will take you a minimum of 80 hours to remediate with all the government agencies, credit bureaus, banks, credit card companies and other organizations you do business with. Can you imagine how disruptive that would be to your professional life? For pennies a day, a good Identity Theft Protection and Recovery Company can protect you and manage the recovery process if you happen to get hit. In the very least, keep your credit frozen and only unfreeze it when necessary.
#11 Two-Factor Authentication
Two Factor Authentication, also known as 2FA, is an extra layer of security that is known as "multi-factor authentication." This requires not only a password and username but also something else that is unique to that user. Using a username and password together with a piece of information that only the user knows makes it harder for potential intruders to gain access and steal that person's personal data or identity. 2FA can be implemented with enterprise grade solutions such as Duo Mobile, Okta, OneLogin and SecureAuth. It can also be implemented at no cost directly with online services such as Facebook, LinkedIn, Yahoo and Well Fargo, just to name a few. Once you log in with a user ID and password, a dialogue box prompts you to request a code which they send to your smartphone as a text message. A few seconds later you can enter the 6 to 8 digit code to gain access.
#12 Don’t Operate In The Shadows
Eighty percent (80%) of workers admit to using cloud applications that have not been approved by their company or IT provider. Thirty-Three (33%) of cyber breach incidents are triggered through shadow IT. Why? IT has been heavily “consumerized” making it easier than ever to do whatever you want on your own device. Users are constantly downloading free, unauthorized apps. They’re storing and transmitting sensitive data between personal devices, webmail and the organization’s email system. Employees are putting corporate data in personal, consumer-grade DropBox accounts. We’re all being automatically logged into free Wifi hotspots. Unregulated website browsing is out of control. And just about everyone is using corporate laptops at home for personal matters. Once a compromised machine or device is plugged into the network, your organization is exposed to a host of preventable problems.
#13 Make Sure You Are Really Unsubscribing
Clicking “Unsubscribe” in a fraudulent email does not mean your email address will be removed from the scammer’s hit list. Especially if it takes you to a website that prompts you to re-enter your email address. It will, however, do one or things – verify the address for the scammer or lead you to a malicious website that will download malware onto your computer and/or trick you into falling for some sort of scam. Reputable marketers don’t do this. Companies like Amazon, Apple, J. Crew, Bonobos, and Brooks Brothers, et al already have your email address and respect your wishes to be removed. The best approach is to handle the questionable spam barrage is to simply mark the suspicious or unwanted email as “SPAM” or “Junk” and then simply delete it. Resist the urge to open it.
VIEW MORE
Which web browser is perfect for you?
The battle of the web browsers has raged on for years. While the classic rivalry between Netscape Navigator and Microsoft Internet Explorer has long passed, we are now facing a broader field of competition. There are currently four web browsers competing for space in your hard drive, and we've drawn up this list of their advantages and disadvantages to help you choose.
Google Chrome
By just about any metric, Google Chrome has been the browser of choice for most internet users over the last couple years. It’s easy to use and its graphics interface has a low profile. However, if you want to customize Chrome with extensions and apps, there are more than enough options. The bottom line is: this is the best browser for users who spend a lot of time in G-Suite documents, or want the security benefits of frequent patches and updates.
Apple Safari
We might as well start off with the one, glaring drawback of Safari: It’s available only to Apple users. However, if you are working on a macOS or iOS device, Safari has a lot going for it. Ad blocking is built right into the browser, as well as RSS support for aggregating lots of information in one place. And because tabs can be automatically synced across all your Apple devices, we highly recommend Safari for anyone in a Mac environment.
Microsoft Edge
Note that Edge is a different browser than Internet Explorer. The latter still exists, but we’ve decided to skip it for various reasons. Although Edge works only on Windows 10 systems, it has two things going for it. First, Microsoft has announced a feature that will incorporate virtualization into Edge to quarantine downloads for testing before they’re opened on your computer. Second, the Windows 10 browser comes with some fantastic Office 365 integration. We highly recommend Edge for users working in a business enterprise environment.
Opera
We’ve saved the most controversial for last. The Opera browser isn’t one of the most popular browsers around, but it does deserve consideration. Although it requires more customization and under-the-hood-work than its competitors, its privacy settings are unmatched. With a built-in virtual private network feature and some of the most robust ad blocking on the market, Opera is a great way to take a break from cookies and targeted advertisements.
Choosing a web browser may seem like such an inconsequential thing, but just think about the rate of cloud adoption. If you plan on utilizing more software-as-a-service solutions in the coming years, one tiny feature in a browser could make all the difference. Contact Multi IT today on 011 435 0450 about planning your cloud deployment over the coming years.
VIEW MORE