How to master Microsoft Office!
Despite Microsoft Office’s easy-to-use interface, mastering all the features in this suite of productivity tools requires time. But fret not, the following training videos will help you become a Microsoft Office expert fast.
Office Basics is a series of free Office training videos from Microsoft which cover different features and functionality.
Intro to Office Basics
This training video will help you use templates to create professional documents, learn the ins and outs of SmartArt and Charts to express complex data and ideas, and collaborate in shared documents whether you’re working online, offline, or simultaneously with others.
What is Office 365?
Discover the features and upgrades within Office 365 that aren’t available anywhere else, and learn how cloud versions of applications like Word, Excel, and Outlook differ from their desktop counterparts.
Word Training
These training videos will show you how to create and edit documents as well as create and format tables in just a few clicks. They also cover document makeovers, how to organize documents, creating mailing lists, and how to translate text instantly.
Excel Training
Creating, organizing, and analyzing data from charts and tables can be quite complicated, which is why these training videos are perfect for anyone looking to design workbooks, add text and data, format and analyze charts, and create pivot tables and formulas. Other tips include how to slice data and locate them using VLOOKUP.
PowerPoint Training
There’s more to PowerPoint than adding text to slides. These training videos will show you how to create presentations, add and format text, design presentations, add audio, video, and animations, and format images. You’ll also learn about nifty features such as how to match slide colors using the Eyedropper and how to export slides to videos.
Outlook Training
Organize your Outlook inbox with ease and learn how to add and format text and images, manage contacts, calendars, meetings, and to-do lists, as well as other tips such as how to spice up your email signature, keep your inbox clean, and hold meetings using Skype and OneNote.
Microsoft’s new training videos might not be jaw-dropping, but they will surely help users do more with Office. If you’d like to learn more about the benefits of Microsoft Office for small businesses, just give Multi IT a call on 011 435 0450 and we’ll be happy to help.
VIEW MORE
Cybersecurity Essentials: VPN
Whether it’s because of government surveillance or cyberattacks, internet users are more concerned than ever about the privacy of their online activities. Unfortunately, security measures like firewalls and antivirus software can’t help you in this case, but there’s one that can: Virtual Private Network (VPN).
What is VPN?
Simply put, a VPN is a group of servers you connect to via the internet. Once you’ve established a connection, your computer acts as if it’s on the same local connection as the VPN, making it seem like you moved to a different location.
When you surf the web through a VPN, all the data transmitted and received is also encrypted, preventing anyone -- from hackers to government agencies -- from monitoring your online activities.
Why should you have one?
Of course, security and privacy are major reasons why you would want a VPN. For example, if you’re connected to a public WiFi network -- like the ones you typically see in local cafes and airports -- using a VPN encrypts the information you’re sending or accessing online. This means things like credit card details, login credentials, private conversations, or other sensitive documents can’t be intercepted by a third party.
VPNs are also useful for accessing geo-restricted websites. If you’re traveling abroad and certain US websites are blocked in that region, you can simply connect to a VPN located in the US to access the sites you need.
Which VPN should you choose?
Given the increasing demand for secure online privacy, VPNs are surging in popularity. The following considerations can help you find the right one.
1. Cost
While free VPNs are available, we strongly suggest you avoid them. These keep logs of your internet activity, and in some cases sell them to the highest bidder. Maintaining a VPN service is also expensive, which means the free ones will likely plaster ads on your browser to make a quick buck.
Paid VPNs like SurfEasy and StrongVPN often come with more robust features and configurations that keep you secure. What’s more, they don’t keep a record of the sites you visit and hound you with pop-ups that lead to dangerous websites.
2. Location
The physical location of VPN servers is important if you want to access region-blocked websites. So if you’re planning on accessing a UK-based service, your VPN provider must at least have servers installed in London.
3. Capacity
Read through a VPN provider’s terms of service to determine how much data you’re allowed to use. If possible, find out how many servers a VPN provider has. If they have plenty of servers online, you can rest assured that they have the capacity to support your internet browsing.
4. Device compatibility
Another important factor to consider is whether the VPN can be used across multiple devices. Nowadays, employees work on laptops, tablets, and smartphones, so you’ll want a VPN that’s compatible with all these.
5. IP leaking
Finally, a great way to evaluate a VPN service is to sign up for their free trial service and visit https://ipleak.net/, which will allow you to check whether your real IP address is actually being leaked. If it manages to track your physical location, you need to opt for a more reliable VPN service.
VPNs are now a vital component of cybersecurity, and if you need help selecting the right one for your business, consult with Multi IT's security experts today on 011 435 0450. We also offer comprehensive cybersecurity services so no hacker or third party can get their hands on your data.
VIEW MORE
How to extend your laptop battery life
These days, we get a lot of our work done on laptops, which means battery life is a huge priority for any laptop user. Wouldn’t it be good, then, to learn how to prolong the life of your laptop battery? Here are a few useful tips to do just that.
Some truths about your laptop battery
Batteries in many devices nowadays are lithium-based -- either lithium-ion or lithium-polymer -- so users must take note of the following guidelines for their proper maintenance:
They can’t be overcharged, even though you leave your battery plugged in for a long period of time. When the battery hits 100%, it’ll stop charging.
Leaving your battery completely drained will damage it.
Batteries have limited lifespans. So no matter what you do, yours will age from the very first time you charge it. This is because as time passes, the ions will no longer be able to flow efficiently from the anode to the cathode, thereby reducing its capacity.
What else can degrade your battery
Besides its being naturally prone to deterioration, your battery can degrade due to higher-than-normal voltages, which happens when you keep your battery fully charged at all times. Even though a modern laptop battery cannot be overcharged, doing so will add a stress factor that’ll harm your battery.
Both extremely high temperatures (above 70°F) and low temperatures (between 32-41°F) can also reduce battery capacity and damage its components. The same goes for storing a battery for long periods of time, which can lead to the state of extreme discharge. Another factor is physical damage. Remember that batteries are made up of sensitive materials, and physical collision can damage them.
How to prolong your battery life
Now that you know some facts about your laptop battery, it's time to learn how to delay its demise:
Never leave your battery completely drained.
Don’t expose your battery to extremely high or low temperatures.
If possible, charge your battery at a lower voltage.
If you need to use your laptop for a long period of time while plugged into a power source, it’s better to remove the battery. This is because a plugged-in laptop generates more heat which will damage your battery.
When you need to store your battery for a few weeks, you should recharge your battery to 40% and remove it from your laptop for storage.
These are just a few tips on extending the life of your hardware. There are many more ways you can maximize your hardware efficiency and extend its longevity. Call Multi IT's experts on 011 435 0450 today to find out more!
VIEW MORE
Microsoft’s new productivity apps are live
In July 2017, Microsoft announced three brand new apps for Office 365: Connections, Listings, and Invoicing. They were designed for businesses with fewer than 300 employees and after a few months of beta testing, they’re finally available to Business Premium users. Take a minute to learn about what they can do for your team!
Microsoft Invoicing
Word and Excel have hundreds of templates for generating company invoices, but this new app does much more than just create documents. Invoicing allows you to store the names, descriptions, and prices of your products and services in a connected database. You can also store your tax information, company logo, and a click-to-pay PayPal badge, which means half of the necessary information is automatically filled out the moment you click Create.
In addition to clean and professional looking documents, Invoicing also makes it easy to organize, store, and search past invoices thanks to a built-in QuickBooks integration. Last but not least, all of this is easily accessible from Microsoft’s mobile app.
Microsoft Listings
With its centralized dashboard, Listings allows you to manage and update company details displayed by Google, Facebook, Bing, and Yelp. It also helps you monitor your company’s online reputation by tracking page-views, company reviews, and Likes.
Microsoft Connections
Connections is the perfect app for small business email marketing. Similar to the Invoicing platform, Connections stores your company information and uses it to create personalized email marketing campaigns with the click of a button.
For example, templates for newsletters, referrals, and promotions include customizable discounts and offers that trigger pre-written follow-up campaigns. Connections tracks and analyzes the performance of all your email-based campaigns to make refining and improving your content a breeze, whether it’s from your desktop or the mobile app.
How to enable Invoicing, Listings, and Connections
As long as you have an Office 365 Business Premium subscription, accessing these apps requires only a global admin login. From the Admin Center, click the Settings tab on the left-hand side of the screen, followed by Services & add-ins and then Business apps. In this menu, you can grant specific users permission to use Microsoft’s newest programs.
Setting up these apps is fairly easy. However, it’s even easier to have your Office 365 account managed by us. We could have remotely installed Invoicing, Listings, and Connections for you almost a month ago, and with our information security expertise and unlimited IT support requests, there’s no limit to the value we can add to your Office 365 subscription. Give Multi IT a call on 011 435 0450 to get started!
VIEW MORE
The dangers of distributed spam distraction
Users get around 200 emails in their inbox a day, including work messages, automated payment slips, and everyone’s least favorite email, spam. Spam messages are mostly harmless, but when you get more than 10,000 of them flooding your inbox, you’re probably the victim of a special type of spam attack.
Understanding DSD
Distributed Spam Distraction (DSD) is designed to inundate your inbox with thousands of nonsense emails. There are no dangerous links, ads, or attachments involved, just random excerpts of text stolen from books and websites. What’s more, the email and IP addresses used are all different so victims can’t simply block a specific sender.
These attacks last anywhere from 12 to 24 hours and can flood inboxes with as many as 60,000 messages. While they may seem like harmless annoyances, the true purpose of DSD is to draw victims’ attention away from what hackers are doing behind the scenes.
And what they’re doing is exploiting your personally identifiable information (PII) to make unauthorized purchases or pilfer cash directly from your accounts. The DSD acts as a sort of smokescreen to hide payment confirmation messages behind a deluge of spam messages.
New tactics
Over the years, hackers have developed new tactics involving DSD. Several reports have shown that, instead of nonsensical emails, hackers are using automated software to have their targets sign up for thousands of free accounts and newsletters to distract them with authentic messages. This allows DSD blasts to slip past spam filters that have been designed to weed out malicious code and gibberish text used by traditional DSD attacks.
What’s even more worrying is that any ill-intentioned individual can go to the dark web and pay for DSD services. They just have to provide a hacker with their target’s name, email address, and credit card numbers -- all of which can also be purchased in the dark web -- and pay as little as $40 to send 20,000 spam messages.
How to stop it
DSD is a clear sign that one of your accounts has been hijacked, so whenever you receive dozens of emails in quick succession, contact your financial institutions to cancel any unfamiliar transactions and change your login credentials as soon as possible. It’s also important to update your anti-spam software (or get one if you don’t have one already) to protect your inbox from future DSD attacks.
Hackers only initiate DSD attacks after they’ve obtained their target’s email address and personal information, so make sure your accounts and identity are well protected. This means you should regularly change your passwords and pins, enable multi-factor authentication, set up text alerts for whenever online purchases are made in your name, and be careful about sharing personal information.
For more tips on how to deal with spam, DSDs or other cyberattacks, call Multi IT today on 011 435 0450. We offer powerful tools and expert advice that will ensure your business’s safety.
VIEW MORE
A Path to Great Technology for Nonprofits
Nonprofit organizations face many challenges when it comes to technology including restricted budgets and limited in-house IT resources. This makes it difficult to own, implement, manage and leverage mission-critical technology.
Gartner Group reports that businesses spend an average of 2.3% of annual revenues on IT. Regardless of whether your tech budget is higher or lower than 2.3%, it’s important to have a strategy and invest in IT systems, apps and support services that move your organization forward.
A comprehensive IT strategy helps nonprofits:
Increase earned revenues
Track donors more reliably
Use volunteers more efficiently
Better meet the needs of constituents
Discover new opportunities
Deliver new services
At Multi IT, we collaborate with your nonprofit to identify technology solutions that address your unique needs. With Multi IT, nonprofits can leverage technology to better serve constituents and cultivate donors while still keeping costs down. Multi IT has a history of supporting nonprofits and experience with programs specifically designed for nonprofit organizations.
Reliable, current technology is possible on a limited budget
Multi IT consults with nonprofit clients to identify current objectives and your vision for the future. With that insight, we help you create a strategic direction for your technology environment that complements your short, medium and long-term goals.
Typically, a plan is laid out prioritizing items of concern and scheduling replacements and upgrades over the course of the year. By working with a professional managed IT provider, your nonprofit can put plans and budgets into place to routinely replace equipment. This rotation not only saves money but keeps systems working efficiently and securely, including donated workstations which may be at the end of their usefulness even at the time they’re donated.
With donated hardware or even new consumer/professional or “prosumer” equipment, workstations can be flimsy and won’t integrate seamlessly with other parts of your environment. Prosumer devices can also create security problems, make it more difficult to access key line of business applications, and cause bottlenecks with higher-speed internet services. For instance, you might upgrade to a 100Mb internet connection only to find your current firewall only has enough throughput to handle a 50Mb connection. Now you’re paying for a service you can’t even use. You should be operating with business-grade technology which Multi IT has the resources and expertise to deliver.
With the advice of IT professionals, nonprofits can benefit from IT standards, have less downtime and enjoy a much higher quality of service than they’d get with on-call, break-fix technology support.
Break-fix doesn’t make sense in the long run
It may seem like a good idea to only retain professional IT assistance when something isn’t working, but in the long run, this approach costs more and damages the overall performance of your organization.
Downtime is expensive. If your system goes down, you need the issue addressed quickly. You don’t want your IT person to be learning as they troubleshoot your problem. To make matters worse, many break-fix companies only look at the immediate issue, not the big picture. This sets you up for a merry-go-round of break, fix, repeat. This means more visits from your IT provider and more expenses for you.
Cost management is almost impossible in a break-fix IT set up. Systems aren’t routinely monitored and managed so breakdowns are unpredictable. Break-fix support costs are uncertain and risky.
Multi IT has first-hand experience working closely with nonprofits and brings a wealth of expertise to implement useful, reliable and cost-effective technology. Be proactive about your technology today – contact Multi IT online or at 011 435 0450.
VIEW MORE