Check out iOS 12’s security & privacy features

iOS 12 brings a significant performance boost to both the previous and the latest iterations of Apple mobile devices, but that’s not all it has to offer. It also has an array of new and improved security and privacy features that you can tweak to better protect your iPhone or iPad and the data it contains. Read on to find out more.

Set a stronger passcode

iOS 12 now requires six-digit passcodes, and this means hackers will have a harder time cracking your passcode through a brute force attack.

That’s because you can now go above and beyond that by setting a passcode with 8, 12, or more digits, or even a combination of numbers and letters. To do this, go to Settings > Touch ID & Passcode (or Face ID & Passcode on iPhones and iPads with Face ID) and enter your current passcode. Next, tap on Change Passcode and from Passcode Options, choose between Custom Numeric Code and Custom Alphanumeric Code.

Enable two-factor authentication (2FA)

With 2FA, you’re required to input both your password and a unique code sent to your device as an extra layer of security. The latter is considered by many as the most annoying thing about 2FA. But iOS 12’s built-in 2FA feature eliminates this step by sending the code to your device’s keypad, where it should appear as an Autofill option. Simply tap on the code to auto-fill the security field.

To set up 2FA on your iPhone or iPad, go to Settings > Password & Security > Two-Factor Authentication, and follow the prompts.

Keep track of and change your reused passwords

You don’t need to be told what a security nightmare using the same passwords for multiple websites, apps, and devices is. Luckily, your iOS 12 device has a feature that will check for password reuse so you can finally kick this dangerous habit.

To use this feature, go to Settings > Passwords & Accounts > Website & App Passwords and enter your passcode or authenticate with Face ID. You’ll see a list of all the passwords that you’ve used, and iOS will tell you whether you’ve used certain passwords before for various sites and apps.

A small warning symbol will appear next to each account with a reused password. Change the password by tapping on Change Password on Website, and keep your device protected from password reuse attacks called “credential stuffing.”

Turn on USB Restricted Mode

This feature makes hacking into your iOS device through USB cables next to impossible. It’s not an entirely new feature, though, as you first saw it in iOS 11. Essentially, USB Restricted Mode locks down the charging port into power-only mode to prevent attempts to breach your iPhone’s or iPad’s security while it’s connected to a computer. However, the iOS 12 version does this after just one hour of being locked — far shorter than the seven days it takes the iOS 11 version to do so.

To enjoy this feature, go to Settings > Touch ID (or Face ID) & Passcode, and turn off the USB Accessories setting.

Enable automatic iOS updates

You probably don’t think about updating your device unless Apple releases a major one. But by not updating regularly, you may be exposing yourself to a raft of security risks. You may also be missing out on cool and exciting new features, just like iOS 12’s auto-update feature.

Go to Settings > General > Software Update and turn on automatic updates to get patches as soon as they’re released.

With iOS 12, Apple has made massive improvements in the way you can keep your device and the data it holds safe and secure. For more tips on securing your iOS device and personal data, call us today.

Posted in Apple, General Articles C | Tagged , , , , , , , , , , | Comments closed

iOS 12: Security settings to set up now

Just updated to iOS 12, Apple’s latest software for iPhone and iPad? Have you checked out its new security and privacy settings? It’s a good idea to set these up right now so you can take full advantage of your device’s robust features.

Set a stronger passcode

iOS 12 now requires six-digit passcodes, and this means hackers will have a harder time cracking your passcode through a brute force attack.

That’s because you can now go above and beyond that by setting a passcode with 8, 12, or more digits, or even a combination of numbers and letters. To do this, go to Settings > Touch ID & Passcode (or Face ID & Passcode on iPhones and iPads with Face ID) and enter your current passcode. Next, tap on Change Passcode and from Passcode Options, choose between Custom Numeric Code and Custom Alphanumeric Code.

Enable two-factor authentication (2FA)

With 2FA, you’re required to input both your password and a unique code sent to your device as an extra layer of security. The latter is considered by many as the most annoying thing about 2FA. But iOS 12’s built-in 2FA feature eliminates this step by sending the code to your device’s keypad, where it should appear as an Autofill option. Simply tap on the code to auto-fill the security field.

To set up 2FA on your iPhone or iPad, go to Settings > Password & Security > Two-Factor Authentication, and follow the prompts.

Keep track of and change your reused passwords

You don’t need to be told what a security nightmare using the same passwords for multiple websites, apps, and devices is. Luckily, your iOS 12 device has a feature that will check for password reuse so you can finally kick this dangerous habit.

To use this feature, go to Settings > Passwords & Accounts > Website & App Passwords and enter your passcode or authenticate with Face ID. You’ll see a list of all the passwords that you’ve used, and iOS will tell you whether you’ve used certain passwords before for various sites and apps.

A small warning symbol will appear next to each account with a reused password. Change the password by tapping on Change Password on Website, and keep your device protected from password reuse attacks called “credential stuffing.”

Turn on USB Restricted Mode

This feature makes hacking into your iOS device through USB cables next to impossible. It’s not an entirely new feature, though, as you first saw it in iOS 11. Essentially, USB Restricted Mode locks down the charging port into power-only mode to prevent attempts to breach your iPhone’s or iPad’s security while it’s connected to a computer. However, the iOS 12 version does this after just one hour of being locked — far shorter than the seven days it takes the iOS 11 version to do so.

To enjoy this feature, go to Settings > Touch ID (or Face ID) & Passcode, and turn off the USB Accessories setting.

Enable automatic iOS updates

You probably don’t think about updating your device unless Apple releases a major one. But by not updating regularly, you may be exposing yourself to a raft of security risks. You may also be missing out on cool and exciting new features, just like iOS 12’s auto-update feature.

Go to Settings > General > Software Update and turn on automatic updates to get patches as soon as they’re released.

With iOS 12, Apple has made massive improvements in the way you can keep your device and the data it holds safe and secure. For more tips on securing your iOS device and personal data, call us today.

Posted in Apple, General Articles B | Tagged , , , , , , , , , , | Comments closed

Lock down iOS 12 devices with these features

iOS 12, Apple’s latest mobile software offering, is finally available, and it promises to be better at keeping your data locked down. Here are some tweaks that you can make to boost iOS 12’s security and privacy settings.

Set a stronger passcode

iOS 12 now requires six-digit passcodes, and this means hackers will have a harder time cracking your passcode through a brute force attack.

That’s because you can now go above and beyond that by setting a passcode with 8, 12, or more digits, or even a combination of numbers and letters. To do this, go to Settings > Touch ID & Passcode (or Face ID & Passcode on iPhones and iPads with Face ID) and enter your current passcode. Next, tap on Change Passcode and from Passcode Options, choose between Custom Numeric Code and Custom Alphanumeric Code.

Enable two-factor authentication (2FA)

With 2FA, you’re required to input both your password and a unique code sent to your device as an extra layer of security. The latter is considered by many as the most annoying thing about 2FA. But iOS 12’s built-in 2FA feature eliminates this step by sending the code to your device’s keypad, where it should appear as an Autofill option. Simply tap on the code to auto-fill the security field.

To set up 2FA on your iPhone or iPad, go to Settings > Password & Security > Two-Factor Authentication, and follow the prompts.

Keep track of and change your reused passwords

You don’t need to be told what a security nightmare using the same passwords for multiple websites, apps, and devices is. Luckily, your iOS 12 device has a feature that will check for password reuse so you can finally kick this dangerous habit.

To use this feature, go to Settings > Passwords & Accounts > Website & App Passwords and enter your passcode or authenticate with Face ID. You’ll see a list of all the passwords that you’ve used, and iOS will tell you whether you’ve used certain passwords before for various sites and apps.

A small warning symbol will appear next to each account with a reused password. Change the password by tapping on Change Password on Website, and keep your device protected from password reuse attacks called “credential stuffing.”

Turn on USB Restricted Mode

This feature makes hacking into your iOS device through USB cables next to impossible. It’s not an entirely new feature, though, as you first saw it in iOS 11. Essentially, USB Restricted Mode locks down the charging port into power-only mode to prevent attempts to breach your iPhone’s or iPad’s security while it’s connected to a computer. However, the iOS 12 version does this after just one hour of being locked — far shorter than the seven days it takes the iOS 11 version to do so.

To enjoy this feature, go to Settings > Touch ID (or Face ID) & Passcode, and turn off the USB Accessories setting.

Enable automatic iOS updates

You probably don’t think about updating your device unless Apple releases a major one. But by not updating regularly, you may be exposing yourself to a raft of security risks. You may also be missing out on cool and exciting new features, just like iOS 12’s auto-update feature.

Go to Settings > General > Software Update and turn on automatic updates to get patches as soon as they’re released.

With iOS 12, Apple has made massive improvements in the way you can keep your device and the data it holds safe and secure. For more tips on securing your iOS device and personal data, call us today.

Posted in Apple, General Articles A | Tagged , , , , , , , , , , | Comments closed

PC makers struggle to meet demand

Top PC makers are becoming more concerned as Intel CPU shortages continue to persist. According to several reports, Intel has struggled to keep up with the rising demand for high-performance computer chips, which will affect millions of businesses. Here’s a quick rundown on the Intel PC shortage.

Reasons for the shortage
There are many contributors to Intel’s long-running chip production problems. For starters, demand for Intel computer chips has been higher than expected as more businesses depend on resource-intensive applications, cloud computing, and state-of-the-art machines to gain a competitive edge.

Additionally, there are major delays in the production of Intel’s next-gen 10-nanometer processors, largely because the company is short on capacity. This means businesses will not have access to PCs featuring these processors until much later in 2019.

Intel also appears to be prioritizing development of server CPUs, as they make up a huge portion of the company’s revenue. Focusing on server chips, however, has resulted in slower production rates of consumer-grade CPUs. Desktop CPU revenues, in particular, lagged significantly behind notebook and server CPUs, which resulted in the shortage of chips for desktop PCs.

What’s being done
Experts predict that customers will have had enough server CPUs so production for these productions will slow down by the second half of 2019, freeing up enough capacity to meet the demands for desktop and notebook CPUs. In fact, according to Intel’s interim chief executive Bob Swan, “We are working closely with our customers to align demand with available supply while we add capacity and we expect supply-demand balance to improve by mid-year.”

Intel also promises that PC shortage issues will be completely resolved by the third quarter of 2019. In the meantime, computer hardware manufacturers like Lenovo and Asus have their work cut out for them. To make up for the Intel chip shortage, PC manufacturers are strongly considering switching to AMD processors for desktops and laptops.

What does the shortage mean for businesses?
Businesses who are unable to acquire the newest Core, Celeron, and Pentium series processors for desktops and laptops may have to look for alternatives compatible with non-Intel chips. But if your company is running on a tight budget, it may make more sense to wait until late 2019 to upgrade to computers equipped with next-gen Intel processors.

Sticking with older hardware does leave your business exposed to security and downtime risks, so it’s important to stay on top of the latest updates and regular maintenance. Fortunately, a top-notch managed services provider can proactively manage your hardware for a reasonable monthly fee.

If you want to hear more about the latest hardware news and developments, stay tuned to our blog. We also provide services for all things IT, so contact us today!

Posted in General Articles C, Hardware | Tagged , , , , , , , , , , , | Comments closed

Manufacturers concerned about PC shortage

The world’s largest computer manufacturers are growing concerned about the shortage of computer chips. Even though the issue was reported back in September 2018, Intel is still having trouble meeting the demand. So, what’s the cause of the major PC shortage and what does it mean for businesses?

Reasons for the shortage
There are many contributors to Intel’s long-running chip production problems. For starters, demand for Intel computer chips has been higher than expected as more businesses depend on resource-intensive applications, cloud computing, and state-of-the-art machines to gain a competitive edge.

Additionally, there are major delays in the production of Intel’s next-gen 10-nanometer processors, largely because the company is short on capacity. This means businesses will not have access to PCs featuring these processors until much later in 2019.

Intel also appears to be prioritizing development of server CPUs, as they make up a huge portion of the company’s revenue. Focusing on server chips, however, has resulted in slower production rates of consumer-grade CPUs. Desktop CPU revenues, in particular, lagged significantly behind notebook and server CPUs, which resulted in the shortage of chips for desktop PCs.

What’s being done
Experts predict that customers will have had enough server CPUs so production for these productions will slow down by the second half of 2019, freeing up enough capacity to meet the demands for desktop and notebook CPUs. In fact, according to Intel’s interim chief executive Bob Swan, “We are working closely with our customers to align demand with available supply while we add capacity and we expect supply-demand balance to improve by mid-year.”

Intel also promises that PC shortage issues will be completely resolved by the third quarter of 2019. In the meantime, computer hardware manufacturers like Lenovo and Asus have their work cut out for them. To make up for the Intel chip shortage, PC manufacturers are strongly considering switching to AMD processors for desktops and laptops.

What does the shortage mean for businesses?
Businesses who are unable to acquire the newest Core, Celeron, and Pentium series processors for desktops and laptops may have to look for alternatives compatible with non-Intel chips. But if your company is running on a tight budget, it may make more sense to wait until late 2019 to upgrade to computers equipped with next-gen Intel processors.

Sticking with older hardware does leave your business exposed to security and downtime risks, so it’s important to stay on top of the latest updates and regular maintenance. Fortunately, a top-notch managed services provider can proactively manage your hardware for a reasonable monthly fee.

If you want to hear more about the latest hardware news and developments, stay tuned to our blog. We also provide services for all things IT, so contact us today!

Posted in General Articles B, Hardware | Tagged , , , , , , , , , , , | Comments closed

Expect CPU shortages until late 2019

Consumers and businesses increasingly rely on powerful computers to run high-tech applications. But in the coming months, they may have issues obtaining the PCs they need. Since 2018, Intel has reported a processor shortage, which some experts believe may not be resolved until the latter half of 2019. Read on to learn more.

Reasons for the shortage
There are many contributors to Intel’s long-running chip production problems. For starters, demand for Intel computer chips has been higher than expected as more businesses depend on resource-intensive applications, cloud computing, and state-of-the-art machines to gain a competitive edge.

Additionally, there are major delays in the production of Intel’s next-gen 10-nanometer processors, largely because the company is short on capacity. This means businesses will not have access to PCs featuring these processors until much later in 2019.

Intel also appears to be prioritizing development of server CPUs, as they make up a huge portion of the company’s revenue. Focusing on server chips, however, has resulted in slower production rates of consumer-grade CPUs. Desktop CPU revenues, in particular, lagged significantly behind notebook and server CPUs, which resulted in the shortage of chips for desktop PCs.

What’s being done
Experts predict that customers will have had enough server CPUs so production for these productions will slow down by the second half of 2019, freeing up enough capacity to meet the demands for desktop and notebook CPUs. In fact, according to Intel’s interim chief executive Bob Swan, “We are working closely with our customers to align demand with available supply while we add capacity and we expect supply-demand balance to improve by mid-year.”

Intel also promises that PC shortage issues will be completely resolved by the third quarter of 2019. In the meantime, computer hardware manufacturers like Lenovo and Asus have their work cut out for them. To make up for the Intel chip shortage, PC manufacturers are strongly considering switching to AMD processors for desktops and laptops.

What does the shortage mean for businesses?
Businesses who are unable to acquire the newest Core, Celeron, and Pentium series processors for desktops and laptops may have to look for alternatives compatible with non-Intel chips. But if your company is running on a tight budget, it may make more sense to wait until late 2019 to upgrade to computers equipped with next-gen Intel processors.

Sticking with older hardware does leave your business exposed to security and downtime risks, so it’s important to stay on top of the latest updates and regular maintenance. Fortunately, a top-notch managed services provider can proactively manage your hardware for a reasonable monthly fee.

If you want to hear more about the latest hardware news and developments, stay tuned to our blog. We also provide services for all things IT, so contact us today!

Posted in General Articles A, Hardware | Tagged , , , , , , , , , , , | Comments closed

Why should I use private browsing?

You may think that you’re not online enough to risk your safety, or that you never visit unsafe sites. However, the world wide web is a vast network where the exchange of information is often difficult to track. Here are some good reasons to “go incognito”.

With the headlines about data breaches and cyberattacks greeting you every time you go online, it seems impossible to have a surefire, foolproof way to keep your information secure. Sometimes cyber predators are relatively harmless, but oftentimes, their goal is to steal identities and financial information. Virus scanners and firewalls can definitely help, but here’s an added layer of protection when you go online.

What is private browsing?

Your web browser — whether it be Chrome, Edge, Firefox, Safari, or Opera — stores the addresses of the sites you visit, cookies that track your activity, passwords you’ve used, and temporary files you’ve downloaded.

This can be convenient if you frequently visit certain pages, can’t remember your login details, or if you’re trying to recall a website you visited a few days ago. But if someone else uses or gains access to your computer, your most private (and embarrassing) internet activities are exposed for anyone to see.

With private browsing — also called Incognito Mode in Chrome and InPrivate Browsing in Edge — all the information listed above does not get recorded. In fact, all the websites and information you accessed during a private browsing session is discarded without a trace as soon as you close the browser. This can come in handy when you’re using a public computer because you’re instantly logged out of all the accounts after closing the window.

Private browsing also prevents cookies from being stored on your computer. In a normal browsing session, sites like Facebook will inundate you with highly targeted ads based on the sites and pages you’ve visited. But in private browsing mode, your internet activity won’t be used against you by marketing companies.

Another benefit of private browsing is you can use it to log in to several accounts on the same site, which is useful if you need to log in to two different Google accounts at the same time.

Limitations of private browsing

Although private browsing does prevent your web browser from storing your data, it doesn’t keep your online activities 100% private. If your computer is connected to the company network, system administrators can still keep track of what you’re browsing, even if you’re in Incognito Mode. Also, if spyware or keylogger malware is installed on your computer, hackers will still be able to see what you’re doing online.

A keylogger malware records every key you punched in and may send this information to a predefined email address without you knowing. This means passwords, answers to verification questions, account numbers, credit card details, or even the words you type in a chat can be emailed to someone spying on your online activities.

Even though private browsing has quite a few benefits, you shouldn’t solely depend on it for online privacy. Your computers and mobile devices must be equipped with Virtual Private Networks that encrypt your internet connection and prevent anyone from intercepting your data. And don’t forget to scan your computer for viruses with a strong anti-malware program to keep spyware and other malicious web monitoring software at bay.

If you want to know where you can get these solutions or learn more about web browser security, call us today. We have the tools and expert advice you need to prevent anyone from snooping on your internet browsing.

Posted in General Articles B, Web & Cloud | Tagged , , , , , , , , , , | Comments closed

The dangers of the web and how to stay safe

You probably go to great lengths to keep yourself safe, whether at home or in public. But what happens when you get online? Learn more about how you could be exposing yourself and your personal information over the internet so you can stay safe.

With the headlines about data breaches and cyberattacks greeting you every time you go online, it seems impossible to have a surefire, foolproof way to keep your information secure. Sometimes cyber predators are relatively harmless, but oftentimes, their goal is to steal identities and financial information. Virus scanners and firewalls can definitely help, but here’s an added layer of protection when you go online.

What is private browsing?

Your web browser — whether it be Chrome, Edge, Firefox, Safari, or Opera — stores the addresses of the sites you visit, cookies that track your activity, passwords you’ve used, and temporary files you’ve downloaded.This can be convenient if you frequently visit certain pages, can’t remember your login details, or if you’re trying to recall a website you visited a few days ago. But if someone else uses or gains access to your computer, your most private (and embarrassing) internet activities are exposed for anyone to see.

With private browsing — also called Incognito Mode in Chrome and InPrivate Browsing in Edge — all the information listed above does not get recorded. In fact, all the websites and information you accessed during a private browsing session is discarded without a trace as soon as you close the browser. This can come in handy when you’re using a public computer because you’re instantly logged out of all the accounts after closing the window.

Private browsing also prevents cookies from being stored on your computer. In a normal browsing session, sites like Facebook will inundate you with highly targeted ads based on the sites and pages you’ve visited. But in private browsing mode, your internet activity won’t be used against you by marketing companies.

Another benefit of private browsing is you can use it to log in to several accounts on the same site, which is useful if you need to log in to two different Google accounts at the same time.

Limitations of private browsing

Although private browsing does prevent your web browser from storing your data, it doesn’t keep your online activities 100% private. If your computer is connected to the company network, system administrators can still keep track of what you’re browsing, even if you’re in Incognito Mode. Also, if spyware or keylogger malware is installed on your computer, hackers will still be able to see what you’re doing online.

A keylogger malware records every key you punched in and may send this information to a predefined email address without you knowing. This means passwords, answers to verification questions, account numbers, credit card details, or even the words you type in a chat can be emailed to someone spying on your online activities.

Even though private browsing has quite a few benefits, you shouldn’t solely depend on it for online privacy. Your computers and mobile devices must be equipped with Virtual Private Networks that encrypt your internet connection and prevent anyone from intercepting your data. And don’t forget to scan your computer for viruses with a strong anti-malware program to keep spyware and other malicious web monitoring software at bay.

If you want to know where you can get these solutions or learn more about web browser security, call us today. We have the tools and expert advice you need to prevent anyone from snooping on your internet browsing.

Posted in General Articles A, Web & Cloud | Tagged , , , , , , , , , , | Comments closed

Invaluable tips for online safety

Let’s be honest, surfing the net in the comfort of your home or with the privacy of a small screen feels safe. However, certain sites could be snooping on your online activity by placing digital trackers called “cookies” on your devices. Here’s what happens to your personal details whenever you go online.

With the headlines about data breaches and cyberattacks greeting you every time you go online, it seems impossible to have a surefire, foolproof way to keep your information secure. Sometimes cyber predators are relatively harmless, but oftentimes, their goal is to steal identities and financial information. Virus scanners and firewalls can definitely help, but here’s an added layer of protection when you go online.

What is private browsing?

Your web browser — whether it be Chrome, Edge, Firefox, Safari, or Opera — stores the addresses of the sites you visit, cookies that track your activity, passwords you’ve used, and temporary files you’ve downloaded.

This can be convenient if you frequently visit certain pages, can’t remember your login details, or if you’re trying to recall a website you visited a few days ago. But if someone else uses or gains access to your computer, your most private (and embarrassing) internet activities are exposed for anyone to see.

With private browsing — also called Incognito Mode in Chrome and InPrivate Browsing in Edge — all the information listed above does not get recorded. In fact, all the websites and information you accessed during a private browsing session is discarded without a trace as soon as you close the browser. This can come in handy when you’re using a public computer because you’re instantly logged out of all the accounts after closing the window.

Private browsing also prevents cookies from being stored on your computer. In a normal browsing session, sites like Facebook will inundate you with highly targeted ads based on the sites and pages you’ve visited. But in private browsing mode, your internet activity won’t be used against you by marketing companies.

Another benefit of private browsing is you can use it to log in to several accounts on the same site, which is useful if you need to log in to two different Google accounts at the same time.

Limitations of private browsing

Although private browsing does prevent your web browser from storing your data, it doesn’t keep your online activities 100% private. If your computer is connected to the company network, system administrators can still keep track of what you’re browsing, even if you’re in Incognito Mode. Also, if spyware or keylogger malware is installed on your computer, hackers will still be able to see what you’re doing online.

A keylogger malware records every key you punched in and may send this information to a predefined email address without you knowing. This means passwords, answers to verification questions, account numbers, credit card details, or even the words you type in a chat can be emailed to someone spying on your online activities.

Even though private browsing has quite a few benefits, you shouldn’t solely depend on it for online privacy. Your computers and mobile devices must be equipped with Virtual Private Networks that encrypt your internet connection and prevent anyone from intercepting your data. And don’t forget to scan your computer for viruses with a strong anti-malware program to keep spyware and other malicious web monitoring software at bay.

If you want to know where you can get these solutions or learn more about web browser security, call us today. We have the tools and expert advice you need to prevent anyone from snooping on your internet browsing.

Posted in General Articles C, Web & Cloud | Tagged , , , , , , , , , , | Comments closed

How do I maximize my Microsoft Teams?

If you’re like most people, your chat app is limited to asking basic questions or maybe touching base with a colleague. You switch tabs to do one thing and toggle back to do another. It would be great if completing a task were just a matter of keyboard shortcuts and menu items in a single window. Perhaps you’re already using Microsoft Team to accomplish this, but are you getting as much out if as you can?

The convenience of chat apps has enabled workers to cut down on time spent away from their workspace to quickly exchange information with colleagues. And work-related software isn’t just becoming more mobile, it’s also getting more user-friendly, with apps like Microsoft Teams bringing together several different platforms. Here’s how you can use that to your advantage:

Use SharePoint to store and share files

You might already be using SharePoint to store files and collaborate with your teammates. But did you know that in every Teams channel, you can click the Files tab to share files from SharePoint with team members? You can also access SharePoint files that are already shared in the channel and use Office Online or Office Desktop to collaborate on those files.

Forward emails into a channel

You get countless emails every day, many of which might be lost in your inboxes. Fortunately, Microsoft makes it easy to forward any email message from Outlook to a channel in Teams so they show up in both platforms. Just click the ellipsis next to any channel name and select Get email address. This generates an email address for the channel, which you can copy and use to forward files, documents, and messages.

Stick with a few groups

While you can create as many groups within your organization as you like, going overboard can result in a cluttered messaging interface that overwhelms team members. We recommend you create groups based on the number of projects and team members involved; you can always add more if necessary.

Set up audio conferencing

Teams lets you host voice meetings with groups or with just one team member. This is particularly useful when communicating with remote workers or clients, in which case you can give them guest access to your Teams channel. Guest access ensures they’re able to communicate, but unable to view private information.

Test communication strategies

Just because some of the features in Teams overlap with other Microsoft platforms, such as Yammer and Skype for Business, doesn’t mean they’re all redundant. Think of it as a chance to test different communication strategies to find out what works best for you. For instance, if most of your clients have a Skype ID, you can use Skype for client calls and Teams for internal calls.

Share conversations with new team members

Teams makes onboarding new hires easy. Rather than forwarding numerous emails and documents to new employees, you can use Teams to share past conversations and projects with them. This enables everyone to catch up without having to deal with cumbersome documents.

Microsoft Teams and other Office solutions are equipped with plenty of useful features that can take some time to master. But by taking advantage of these tools, you’ll be able to save time and maximize efficiency, all without having to spend a dime. If you have any questions about Microsoft Office and how it can benefit your business, don’t hesitate to give us a call.

Posted in General Articles C, Office | Tagged , , , , , , , | Comments closed
  • Internet Presence Management for Small Business Owners

    pronto logoFull-service, pay-as-you-go all inclusive websites, from design and content to SEO and social media management for one low monthly price.

    Learn more about our small business online marketing services.