Blog

September 19th, 2014

Security_Sep15_AData breaches are growing both in number and intensity. While many businesses have turned to cloud apps for better security measures, some experts and businesses worry about the cloud, mentioning that it could see an increased data breach risk. This leads to a collision course between data breaches and cloud usage. But it doesn’t have to end in a fiery crash, as there are steps you can take to prevent a cloud and data security breach.

The cloud opens up some great tech advancements for businesses and is here to stay. However, as with all tech developments, you need to also be aware of any vulnerabilities and security issues as they change and develop at the same time too. If you use the cloud and want to proactively prevent cloud-and-data security breaches then here are five tips to follow:

  1. Know your cloud apps: Get a comprehensive view of the business readiness of apps and which ones render you more or less prone to a breach. Ask yourself these questions: Does an app encrypt data stored on the service? Does it separate your data from that of others so that your data is not exposed when another tenant has a breach? The idea here is to know exactly what each cloud service employed offers and how your company uses them.
  2. Migrate users to high-quality apps: Cloud-switching costs are low, which means that you can always change and choose apps that best suit your needs. If you find ones that don’t fit your criteria, take the time to talk to your vendor or switch; now more than ever you have choices, and the discovery process in step one will help you find out what these are.
  3. Find out where your data is going: Take a look at your data in the cloud. Review uploads, downloads, and data at rest in apps to get a handle on whether you have potential personally-identifiable information (PII), or whether you simply have unencrypted confidential data in or moving to cloud apps. You wouldn’t want cloud-and-data breaches with this critical data.
  4. Look at user activities: It’s important to understand not only what apps you use but also your data in the context of user activity. Ask yourself: From which apps are people sharing content? According to tech news source, VentureBeat, one-fifth of the apps they tracked enable sharing, and these aren’t just cloud storage apps, but range from customer-relationship management to finance and business intelligence. Knowing who’s sharing what and with whom will help you to understand what policies to best employ.
  5. Mitigate risk through granular policy: Start with your business-critical apps and enforce policies that matter to your organization in the context of a breach. For example, block the upload of information covered by certain privacy acts, block the download of PII from HR apps, or temporarily block access to vulnerable apps.
The key to preventing a cloud-and-data security breach lies in careful attention to your cloud applications and user activity. Analyzing your apps and looking into user activities might be time consuming, but the minimization of cloud-and-data security breaches makes this task worthwhile. Looking to learn more about today’s security? Contact us and let us manage and minimize your risks.
Published with permission from TechAdvisory.org. Source.

Topic Security
September 18th, 2014

Productivity_Sep15_AAlmost every employee in every role relies on technology in order to do their job. When technology is working, everything hums along and productivity is solid. The second our technology stops working however, we can find ourselves struggling to even complete the most basic of tasks. The result can be a dramatic drop in overall productivity. The thing is, we know our systems will eventually breakdown. But, do you know what to do when this actually happens?

What to do when your systems stop working

Often, our first reaction when our technology or systems stop working is to either panic, or get angry. Once we are over this, we often feel desperate to get the problem fixed but may be at a loss as to what to do.

When technology does breakdown, here are some recommended steps you should take:

  • In the words of Douglas Adams, "Don't Panic!" - One of the more popular quotes from the immensely successful Hitchhiker's Guide to the Galaxy is "don't panic". This rings true for the vast majority of tech problems. While you may feel like you are facing a big issue at the time, most systems can be fully recovered. This is especially true if you have backup solutions in place.
  • Note what you were doing before the problem occurred - This is an important step, as when something does go wrong, one of the first things tech support will ask you is what you were doing before the problem occurred. The more information that you can give them, the more likely they will be able to solve the problem faster.
  • Ask your colleagues if they are having the same problems - Because so many business systems are networked together, many techs will want to see if problems are localized to your computer or are network wide. Armed with this information, it is far easier to work out the most effective solution.
  • Try turning it off and on again - When faced with many tech problems, you will be asked to turn the system - be it your computer, an app, server, etc. - off and on again. Sometimes the fault lies in the software or short-term memory (RAM) of systems, and turning the system off and on again is enough to fix this.
  • Google it - If an issue persists and it is related to the software on your computer, or a website, try searching the Internet for an answer. If the page doesn't load, you then know the problem is related to the Internet connection. Should the problem be with a cloud service, checking the provider's website or social media feeds is useful to check for post status updates of their systems.
  • Don't rush into a supposed fix - It can be tempting to try out the first supposed fix you come across or someone suggests. The problem is, some 'fixes' can actually end up harming a system even more. For example, you may find suggested fix for a phone that has been dropped into water that says to take the device apart and dry it with a blow dryer. This will damage components, and also void your warranty, which could make the issue even more expensive to deal with. Instead, you should seek the advice of an expert like us.
  • Don't overreact - Have you ever felt so frustrated you have wanted to reach out and smack your computer? While this may make you feel better on one level the reality is that you could make a bad situation worse. When faced with any tech troubles it is best to walk away for a short time so that you can deal with the situation in a calm and collected way.
  • Call your IT partner or IT helpdesk - If the system doesn't work after restarting we strongly recommend stopping there and reaching out to your IT helpdesk or an IT partner like us. We have the experience to investigate the problem, and we can usually come up with an answer and hopefully a fix in a short amount of time.

Preventative steps you should take

While it is inevitable that systems will eventually breakdown, it doesn't mean we are powerless to prevent this from happening, or at least minimizing the potential fallout. One of the easiest preventative measures you can take is to try and take care of your devices and systems. This includes being careful to not physically damage them, while also being sure to watch what you install on your systems, and implementing security standards.

We also strongly recommend working with an IT partner like us. We can help manage your systems and implement measures to keep them working long into the future. Beyond that, we can help monitor systems so that should something start to go wrong, we can begin to implement a fix even before you notice it. And, if something should break down, we can either fix it ourselves or recommend an expert who will be able to help.

Looking for help keeping your systems running and employees productive? Contact us today to learn more about our services and how they are designed to help.

Published with permission from TechAdvisory.org. Source.

Topic Productivity
September 17th, 2014

BusinessValue_Sep15_AOne way to really expand your online presence is through content marketing. Many business owners and managers are aware of this, but may be unsure as to how they can ensure that any content marketing is successful. There are many ways in which you can achieve a good result and here are four tips to help you achieve a great content marketing strategy.

What are the benefits of content marketing?

Before looking into ways you can implement content marketing that works, it is a good idea to look at the benefits of this type of marketing for businesses. One of the biggest pluses is that it boosts online engagement between you and your customers. If a customer sees that you are producing quality content that appeals to them, they will be more likely to interact and consider you when they need your products or services.

The other major advantage of a good content marketing strategy is that it helps show search engines like Google that your website and online presence are active. Because of the way search engines work, more active sites are usually ranked higher in results. If your website and overall Internet presence is seen to be active on a regular basis, you could possibly reach the first page of search results, which can lead to a boost in site visits, inquiries, and even sales.

If you have been considering implementing a content marketing campaign, or are looking to improve your existing efforts, the following four tips could help.

1. Always have a goal

The main thrust of many successful content marketing initiatives is that they tell a story. As with any narrative there needs to be an ending and in the case of content marketing this endpoint is a goal - something you want the reader to do. What do you want to achieve? Do you want customers to call? Do you want them to learn how to use your product?

By working backwards, you can then determine the right voice to use and best way to reach those customers who are most likely to react positively to the content. This also makes it easier for you to separate your campaigns and even launch multiple strategies at the same time.

Beyond this, having a goal can really help you narrow down the type of content you need to create. If for example, you know what customers you want to attract and how you want them to ultimately act, you can create content that is more appealing to them.

2. ABT

One of the most popular sayings amongst content marketers is to, "Always Be Testing (ABT)". When developing content you should be striving to test your content. Consider if certain images work better than others, as well as headlines, layouts, and content types, etc.

This could be as simple as developing three different social media posts and testing them with different market segments, or locations. You can then take what you have learnt from the tests and apply this to future posts.

The same can be said for more advanced content like blog posts or white papers. If you create different versions and layouts, and track the general downloads and interaction with the content, you can usually figure out how various people are reacting in different ways to a variety of content.

It is important to note here that content marketing is not a quick payoff style of marketing. You need to invest time, money, and effort into this and be willing to always be tweaking content. It takes time to pay off, but the time invested in testing what works and what doesn't work will help you develop better, more useful content.

3. Share and share alike

Creating content and just putting it on existing sites or sharing it with existing clients is not the most efficient way of making your content marketing show returns. Combine this with the fact that you will likely be using platforms like social media which are constantly changing and adding new content, and there is a good chance your content won't even be seen.

What you should aim to do is to share the content as much as possible. Share it on all of your social media platforms, link to it on your site, add it to emails, use the various social media content promotion features, and most of all: Share it again.

If you truly believe content is useful to your target market, you should aim to post it at least three to four times on social media. One of the most effective strategies is to share it on different days at different times, usually with a space of at least a week or two between posts. This can help maximize the numbers who see it.

4. Be prepared to fail

Failure is a part of business, and coincidently, it is also a part of content marketing. Face it, you might create content that just simply won't click as you intended. If this happens, your first reaction might be to pull the content and try something different. This may not be a good idea.

Sure, if the content is stirring up trouble, or has offended people, then it is likely best to remove it. But even if you aren't seeing the results you had hoped for, stick with the content for a bit. Try reposting it, and promoting more vigorously. It could very well be that users just didn't see the content.

As we stated above, successful content marketing takes time and effort. Once you realize this, and combine it with the fact that not everything will work, you should see a viable strategy surface over time.

If you are looking to learn more about content marketing and how our systems can help support it then get in touch and we can share our thoughts on how to be proactive and get results.

Published with permission from TechAdvisory.org. Source.

September 17th, 2014

iPhone_Sep15_AFor many Apple fans, September 9 was a big day; possibly the biggest day of the year. This was the day Apple announced not only new iPhones, but also a new smartwatch and some interesting changes to the upcoming update to iOS 8. If you missed the news then here is a quick overview of the announcements made by Apple.

The iPhone 6

Before the September 9 event, rumors were flying for months about a new iPhone that Apple was working on. The company did not disappoint and announced a new version of their staggeringly popular phone. Here's an overview of the iPhone 6 specs which business owners and managers will want to know about.
  • Screen: The iPhone 6 will have a 4.7 inch screen (measured diagonally), and will sport Apple's new display, Retina HD, which has more pixels for a much improved image quality.
  • Size: The phone will be 5.44 x 2.64 inches and .27 inches thick. The device's shape has also been changed slightly with a more rounded body (compared to the iPhone 5's squared body) which should make it easier to hold.
  • Processor: This device will have what Apple calls the A8 processor. This is an improved processor over the one found in previous devices like the iPhone 5, and offers 25% faster speeds and 50% better efficiency. In other words, the device will be able to do more than previous versions, and do it faster.
  • Storage: You can choose either 16GB, 64GB, or 128GB of storage space.
  • Battery life: Apple has noted that the iPhone 6 should have the same, or slightly better, battery life than previous models. While this may not seem like an improvement, you need to take into account the bigger screen which requires more power to run.
  • Pricing: In the US, the iPhone 6 starts at USD 199 for the 16GB of storage. It should be noted that this is the price on a two year contract. If you want to purchase the model outright, prices start at USD 649 for the 16GB. Both the on-contract and outright purchase prices go up USD 100 for each increase in storage.
  • Availability: You could pre-order your device starting September 12, with it being available in many stores September 19. Chances are, the device will sell out quickly, so you may be put on a waiting list if you decide to purchase right away.

The iPhone 6 Plus

Alongside rumors about the impending iPhone 6, there were also rumors that Apple would be introducing a larger version of the iPhone 6 that is designed to compete with the various "phablets" (small tablets with phone capabilities) which are immensely popular these days. They did indeed announce a new, larger version of the iPhone 6 called the iPhone 6 Plus. Here is an overview of the major details that will benefit business owners and managers.
  • Screen: The iPhone 6 Plus will have a 5.5 inch screen (measured diagonally), and will sport Apple's new display, Retina HD, which has more pixels, meaning image quality will be much improved.
  • Size: The phone will be 6.22 x 3.06 inches and .28 inches thick. The device's shape has also been changed slightly with a more rounded body. It may take time to get used to the screen size and some users may not be able to use the device comfortably with one hand.
  • Processor: This device will have what Apple calls the A8 processor. This is an improved processor over the one found in previous devices like the iPhone 5, and offers 25% faster speeds and 50% better efficiency. In other words, the device will be able to do more, faster, than previous versions.
  • Storage: You can choose either 16GB, 64GB, or 128GB of storage space.
  • Battery life: Apple has noted that the iPhone 6 Plus will have a larger battery that supposedly offers 24 hours of talk time. Because this device hasn't been fully tested yet, it's difficult to tell what the actual battery life will be like, but it will likely be enough to get you through a day of moderate use.
  • Pricing: In the US, the iPhone 6 Plus starts at USD 299 for the 16GB of storage. It should be noted that this is the price if you get the device on a two year contract. If you want to purchase it outright, the device starts at USD 749 for the 16GB. Both the on-contract and outright prices go up USD 100 for each increase in storage.
  • Availability: Pre-orders for the device started September 12, but it was quickly sold out. Apple has noted that it should be in many stores as of September 19.

The Apple Watch

Apple wasn't done with just two mobile devices however, they also proved rumors true and announced a new device - the Apple Watch. This is Apple's take on the smartwatch that appears to be gaining traction with many users.

The Apple Watch is a rectangular device that is worn on the wrist and, as the name implies, is a watch. Well, a watch with numerous features that many users will no doubt enjoy. The device has a knob at the top-left which Apple calls the "digital crown", that you use to navigate the device. For example, pressing it opens the device's home screen, while turning it will zoom the face.

You can also interact the device via touch. For example, you will be able to swipe up from the bottom of the screen to open a feature Apple calls Glance. This provides you with useful information like the date, weather, notifications, etc.

Because typing on a device that is on your wrist is pretty much impossible to do accurately, the device supports voice commands and even interaction with Siri. The Apple Watch also has a multitude of sensors including health related ones like a heart rate sensor.

So far, it appears like this device is mainly aimed towards individual users, but business users who are looking for a way to interact with their devices or a different way to keep track of their most important information like calendars, etc. may find it useful too.

If the watch sounds interesting, you are going to have to wait for a while, as Apple has said it won't be released until the spring of 2015. While this may seem like a long time to wait, it could prove to be positive, as it gives the company more time to perfect the device. When released, Apple has noted that the Apple Watch will start at USD 350.

New iOS 8 features

New devices weren't all that was introduced at the event, Apple also talked about some new features that will be introduced in iOS 8.
  • Near Field Communication (NFC) and ApplePay - Both the new iPhone 6s and the Apple Watch will ship with NFC chips in the device. These can be used in conjunction with Apple's new pay service, ApplePay. Like other similar apps, you will be able to use your phone as a wallet, and swipe it over pay terminals to pay for items. Your payment information is stored in Passbook which creates a unique ID for each credit card, but does not store your credit card information.
  • Enhanced navigation - With bigger screens on both of the new iPhones, many users will want to hold the phone in landscape (horizontal) mode for easier viewing of apps. iOS 8 will enable this.
  • New gesture - Reachability - Reachability is a new gesture that will allow users to quickly switch the content at the top of the screen by tapping twice on the Home button.
For those of you who have an existing iPhone or iPad, you should have been asked to upgrade to iOS 8 when it came out September 17.

If you are looking to learn more about the iPhone 6, 6 Plus, Apple Watch, or iOS 8, contact us today.

Published with permission from TechAdvisory.org. Source.

Topic iPhone
September 16th, 2014

GoogleApps_Sep15_AMany of us may feel uncomfortable about letting others use their computer to search the Internet. Our computer is often seen to be an extension of ourselves, and usually has private information that we would not like others to see. To protect your privacy, Google has released Chrome profile lock, a feature being tested that allows you to lock your Chrome session.

What is Chrome profile lock?

Chrome profile management system, as it is also known, allows you to lock your browser profile session, in a similar way to locking your entire desktop. What this means is that another user can still access apps and files stored locally, but won’t be able to sift through your personal data, bookmarks and personal apps because they will be using a Guest version of Chrome.

This eliminates the hassle of you having to quit your session or having to go through the process of creating a separate user account for the borrower to protect them from viewing your information.

How to lock your Chrome session?

  1. Open Chrome and in a new tab enter the following address: chrome://flags.
  2. Press Ctrl+F and search for Enable new profile management system.
  3. Click on the link to enable the feature (change default to enabled).
  4. Finally, press the Relaunch Now button at the bottom of the browser window.
When Chrome comes back you’ll see a drop down button with your Google account name in the title bar at the top-right of the screen. Click on this to reveal your user card, then click on the lock icon when you want to drop password-protection over your current Chrome activities.

Once locked, the browser will vanish and the User Manager window will appear along with the Browse as Guest option for when someone else is using your computer. Keep in mind that the User Manager window will remain active until you re-enter your password; even after restarting Chrome or rebooting the operating system.

Be aware that this new Chrome profile management system is not yet enabled by default and is still in the testing phase on Windows, Mac and Linux. Looking to learn more about Google’s applications? There are lots of ways that we can help you and your business, so get in touch.

Published with permission from TechAdvisory.org. Source.

September 16th, 2014

Facebook_Sep18_AAs of the first quarter of 2014, Facebook has 1.28 billion active users (users who log in at least once a month). With around a fifth of the world's population using the service, you can bet that it is a target for spammers and hackers. If you use Facebook on a regular basis, there is a good chance that you have seen some suspicious or outright blatant spam links. Clicking on these could lead to sites that are set up to steal information so it is a good idea to be aware of the five most common spam and malware posts on this social media platform.

1. Statistics on Profile visits

Spend enough time on Facebook and you will likely see this type of post on your Timeline. The post usually shows itself off as an app that allows users to see who has been viewing their personal profile, or the statistics related to profile views. There is also a link to click to either go to a site or install an app.

These posts look legitimate, but Facebook doesn't actually allow these apps, so clicking on them usually leads to malicious apps or sites. As some of these posts contain links to Facebook apps, you will be asked to allow the app permissions like access to personal data, friends lists, etc. These apps won't work, but they do give the developer access to your information which could then be used to start other malicious hacks.

2. Changing the color of your Profile

With the wide number of apps, devices, and other tech available to us, developers are often keen to offer users the ability to customize how their app looks. For example you may have applied your own themes or changed icons with your browser. Therefore, it makes sense that some users might want to change the color of their Facebook Profile from the standard blue that everyone uses.

There are apps out there that supposedly allow you to do this. However, Facebook doesn't allow users to customize the color of their Profile - it's blue for everyone. Therefore, the apps and links that supposedly allow you to change the color are fake and likely related to spam or malicious content. It's best to not click on the links in these posts, or install apps that say they allow you to do this customization.

3. Check if a friend has deleted/unfriended you

This post seems to come up every six months or so on Facebook. Like the statistics on Profile visits, apps claiming to allow you to check if you have been unfriended are fake. The biggest giveaway that this is a fake app or post is the wording. When someone doesn't want to be connected with you on Facebook, they will 'unfriend' you, not 'delete' you as these posts often claim. Needless to say, it is best to refrain from clicking on these links and apps.

4. Free stuff from Facebook

If you are a Facebook fan then you might like a free Facebook t-shirt, hat, water bottle, etc. There is a known post that shows up from time-to-time declaring that Facebook is giving away free stuff, and that if you click on the link in the post you too can get hold of some freebies.

Facebook does not usually give away stuff via network posts. Those people you see walking around with Facebook apparel usually either work for the company, had it printed themselves, or attended a Facebook event. Therefore, if you see these posts, don't click on the link.

5. Revealing pics or videos of celebrities

With all the recent leaks of celebrity photos and videos, you can be sure that the number of posts popping up on you News Feed with links to these types images and videos will become increasingly popular.

Not only is this obscene, the posts are 100% fake. Clicking on any of the links will likely take you to a site with 'files' that you need to download. The issue is, these files are actually malware and can pose a serious security risk.

As a general rule of thumb: Don't click on any links in posts connected to celebrities and revealing images or videos.

What can I do about these posts?

These tips are mainly for individual Facebook users as this is whom hackers and spammers are targeting the most. How is this an issue for your business? Well, if an employee is browsing Facebook at work and clicks on one of the links in posts like the ones above, there is a good chance they could introduce malware into your systems and networks.

Therefore, you might want to educate your employees about common Facebook security threats like the ones above. Beyond this, you should encourage everyone to take the following steps when they do come across content like this:

  1. Click the grey arrow at the top-right of the post.
  2. Select I don't want to see this.
  3. Click Report this Post.
This will ensure that the post itself is deleted and that the content is reported to Facebook for followup. Usually, if there are enough reports, Facebook will look into the content and likely ban the user.
Published with permission from TechAdvisory.org. Source.

September 11th, 2014

MobileGeneral_Sep08_AWhen you go to upgrade your phone you may consider selling your old one. However, one issue you may face is having a number of apps on your device that contain personal information. You need to take care that you deauthenticate apps when you're considering getting rid of, or selling your upgraded devices. The next question is which apps should you be looking out for?

What exactly is deauthentication?

Some apps, although not all, require that you authenticate your device in order for them to work. Many developers who ask users to authenticate their device do so in order to either prevent copies of the software from being created and utilized, or to ensure that the device and app can communicate securely.

Some examples of apps that ask for authentication include those that use multi-factor authentication, password managers, and apps that require a subscription or credit card information, etc. On some devices you even need to enter a code or key, much like installing software on a new computer, in order to activate all the features of the app.

The main reason many developers require authentication is connected to security. As security is becoming an ever more pressing issue, there is a good chance that we will see more apps asking users to authenticate their devices in the future.

The issue with this is that when you go to sell your device you will likely need to purchase the app again or the buyer of the device won't be able to set up their own account.

Common apps you should deauthenticate

Apps with subscription services: This includes apps like Google Play Music, Spotify, Office for iPad, cloud storage apps that you have linked your device to, etc. These apps are usually either linked with your device or your phone number so it is a good idea to deauthenticate them.
  1. Kindle app: The Kindle app is actually linked to your device and users who want to use the app will likely not be able to if the device is linked to your account. You can unlink devices by going to the Amazon site, logging in and selecting Manage your Content and Devices when you hover over your account name.
  2. Password management apps: These apps usually require that you authenticate your device to use a particular service. If you try to log in on a new device, these apps may not work properly.
  3. Chat apps: Some chat apps like WhatsApp or Line require that you register for the service using your phone number. If you are keeping your number, you shouldn't have to deauthenticate, but if you are getting a new number, you should go into the account settings of each app and unlink your number. WhatsApp for example has a feature that allows you to move your number to a new device.
  4. Any app or service that you have linked credit card information to: While you ordinarily don't have to physically deauthenticate these apps, as the information is usually linked to an account and password, it is a good idea to unlink your credit card with any app on your phone before you hand it over. This will help ensure that credit card information is not stored or accessible.
When it comes to the major app stores, e.g., Windows Phone Store, Google Play, and iTunes, you will often see that your device has been linked to your account. If you are going to sell your device, the best course of action is to reset using the factory reset option. This will delete all data and installed apps on the device. This will often be enough to deauthenticate all apps.

If you are looking to learn more about getting rid of your older devices, contact us today.

Published with permission from TechAdvisory.org. Source.

September 10th, 2014

iPad_Seo08_AEarlier this year, software giant Microsoft released iPad specific Office apps, which many iPad users have been eagerly awaiting. While these apps bring full-versions of the four most popular Office programs to the iPad, you do need an Office 365 account in order to get the most out of them. Microsoft has also recently updated the Office for iPad apps, introducing in-app subscriptions.

Looking at the recent subscription update

When the iPad versions of the Office apps were released, users could download the apps for free but needed an Office 365 subscription in order to use the full features of the apps. Those who didn't have a subscription were limited to only being able to read and print Office documents, and present using PowerPoint.

Those who wanted to use all the features of the app needed to sign up for an Office 365 account. In order to do this, they had to physically go to the Office 365 site and sign up. They couldn't sign up via the app. While this process isn't overly taxing, it did cause some frustration for some users.

To remedy this, Microsoft has recently announced that users will now be able to sign up for an Office 365 subscription directly from the app. According to an article posted on the Microsoft Office blog, "Starting today [September 2, 2014], you can buy a monthly subscription to Office 365 from within Microsoft Word, Excel, and PowerPoint for iPad."

The subscriptions you can purchase

While Microsoft has noted that you can purchase an Office 365 subscription in-app, you should be aware that the subscriptions are monthly and for the Home or Personal versions of Office 365.

A monthly Office 365 Home subscription costs USD$9.99 a month and can be used on one iPad and up to five PCs or Macs, while an Office 365 Personal plan costs USD$6.99 a month and can be installed on on iPad and one PC or Mac.

What about business users?

For the time being, users can only subscribe to individual Office 365 accounts via the app. If your business has an Office 365 for Business subscription e.g., Office 365 Small Business Premium, etc, you should be able to access the full-version of the iPad app without having to sign up for a Personal or Home subscription, just log in using the same username and password you use to sign into Office 365.

If you don't have an Office 365 subscription, then it may be a good idea to get in touch with us to learn more about Office 365 business plans and how they can be successfully implemented into your business.

Published with permission from TechAdvisory.org. Source.

Topic iPad
September 10th, 2014

Office_Sep08_AHave you ever been working with a list in Excel and had to combine more than two cells into a new cell? The seemingly easiest way to do this is to copy the contents from both cells and paste them into the new cell, then edit them for spacing. But, did you know that there is actually a formula called concatenate that you can use to combine contents and display this in new cells?

Using the concatenate formula to combine cells

If, for example, you have a spreadsheet with first names in column A, last names in column B, and want to combine them into column C to display the full name you can do so by:
  1. Clicking on cell C2 (or the row where the information you want to combine is)
  2. Typing =concatenate(
  3. Clicking on cell A2 and then adding a comma (,)
  4. Clicking on cell B2 and closing the formula with a closing bracket
  5. Hitting Enter
You should see the two cells are now combined in cell C2, with the formula for cell C2 reading:

=CONCATENATE(A2,B2).

The problem is, there will be no space inbetween the letters or numbers, so you will need to edit the formula to read:

=CONCATENATE(A2," ",B2)

The double quotations with a space in between them tells Excel to add a space to the cell in between the contents of A2 and B2.

If you have more than two columns you would like to combine, then simply add a comma after each cell. If for example you have three columns (A1, B1, and C1) you would enter the formula:

=CONCATENATE(A1 " ",B1 " ",C1) in column D1.

Combining two cells without concatenate

While concatenate works well, there is actually a shortcut that you can use which involves the ampersand '&':
  1. Click on cell C2 (or the row where the information you want to combine is)
  2. Type =
  3. Click on cell A2 and then type & in the formula.
  4. Click on B2 and hit Enter
You should see the contents of A2 and B2 combined together in C2. If you click on cell C2 and look at the formula, it should read: =A2&B2.

The only problem is, there won't be a space between the content. To add a space, you can edit the formula so that it reads:

=A2&" "&B2

Note the space between the two quotation marks. This tells Excel to add a space between the contents of A2 and B2.

Once you have the base formula on one cell, you can press the small box at the bottom of the cell and drag it down the row so that the other information can be quickly compiled. This makes it much easier than having to copy and paste the content individually. And, If you would like to learn more Excel tips, contact us today. We can save you valuable time and resources.

Published with permission from TechAdvisory.org. Source.

September 9th, 2014

GoogleApps_Sep08_AIf you are a Google Drive user, you may have noticed that Google has been implementing a number of changes over the past few months. First there was a change to the look of the file sharing service, then to how you accessed files. Now the tech company has announced that they have launched separate sites for their productivity apps.

About the recent change to Drive

In order to make users' lives easier, Google has decided to kind of spin off their productivity apps. What do we mean by this? Well, the company has announced that they are launching individual sites for Docs, Sheets, and Slides. Now, instead of going to Drive to open or create a new Doc, you can do so by going to the Docs site.

Each of the three major productivity apps - Docs, Sheets and Slides - now has their own site, and can be accessed here:

This isn't a full spin off because your files created and edited using the individual app sites are still stored on Drive. The idea here is that this separation is supposed to make it easier for users to interact with each different productivity apps and related files.

When will this shift happen?

Google has started to alert Drive users to the impending switch and has indicated that Docs will be the first to move over to the new system. That being said, you can actually access the three different apps now, or you can still use Drive to create your files for the time being, just be prepared for a shift in the near future.

Getting around the new sites

Each of the three new sites has pretty much the same layout, with the following elements being the most useful:
  • Plus button at the bottom-right: Pressing this will open a new Docs, Sheets or Slides file.
  • Three horizontal bars at the top-left: Will slide a menu in from the left with the options to open either the Docs, Sheets, or Slides sites, along with Settings and Drive.
  • File sorting icons at the top-right: The four horizontal lines button will switch files in between either List or Grid view. The button with A to Z is for sorting options which will allow you to configure how related files are sorted.
  • Folder icon at the top-right: Clicking this will open the File picker which will allow you to quickly navigate to different folders on your Drive, and also upload other files such as Microsoft Office documents or PDFs.
If you are a heavy user of one of the Google Drive apps, then these sites will likely be a welcome addition. The same can be said for those who use the mobile apps which were released earlier this year.

Looking to learn more about Google's systems? Get in touch and make a positive tech change today.

Published with permission from TechAdvisory.org. Source.