508-909-5961 [email protected]

Outlook tips to increase productivity

Microsoft is constantly updating and improving its Outlook email program, and some users struggle to keep up with all the new and exciting features. If you want to catch up on the latest productivity-enhancing tricks, this is the article for you.

Clean Up your inbox
No matter inbox how meticulously organized your Outlook inbox is, there's always room for improvement.

The post Outlook tips to increase productivity appeared first on Complete Technology Resources, Inc..

Outlook tips to increase productivity

Microsoft is constantly updating and improving its Outlook email program, and some users struggle to keep up with all the new and exciting features. If you want to catch up on the latest productivity-enhancing tricks, this is the article for you.

Clean Up your inbox
No matter inbox how meticulously organized your Outlook inbox is, there's always room for improvement. For a little computer-assisted help, try the 'Clean Up' feature.

  • From your Inbox, click the Home tab and choose from Outlook’s three Clean Up options:
    • Clean Up Conversation - Reviews an email thread or a conversation and deletes redundant messages.
    • Clean Up Folder - Reviews conversations in a selected folder and deletes redundant messages.
    • Clean Up Folder & Subfolders - Reviews all messages in a selected folder and its subfolder, and deletes redundant messages in all of them.

Ignore (unnecessary) conversations
An overstuffed inbox is often caused by group conversations that aren't relevant to you. The Ignore button helps you organize your inbox and focus on relevant emails.

  • Select a message, then click Home > Ignore > Ignore Conversation. You can also do this by opening a message in a new window and clicking Ignore under the Delete function. To recover an ignored message, go to the Deleted Items folder, and click Ignore > Stop Ignoring Conversation.

Send links instead of a file copy
Help your colleagues save storage by sending a link to a cloud version of a file instead of the file itself. This is particularly useful when sending massive files. You can also set permissions to allow recipients to edit and collaborate on linked files in real time.

  • Upload the file you wish to send on OneDrive and send it to your recipients. From the message box, click Attach File > Browse web locations > OneDrive.

Improve meetings with Skype and OneNote
Outlook allows you to combine Skype's HD video and screen-sharing features with OneNote's organizational and project planning functions. It’s easy:

  • Go to the Meeting tab in Outlook, then click Skype meeting and send the link to participants. After the meeting has started, select Meeting Notes (under the Meeting tab) and choose whether you want to Take notes on your own or Share notes with the meeting.

Tag contacts
To get the attention of a specific person in a group email message, use the @Mention function. This works particularly well for mails to multiple recipients or for if you simply want to convey the urgency of your message.

  • In the email body or meeting request, type the ‘@’ symbol followed by the first and last name of the person you wish to tag (e.g., @firstnamelastname).
  • To search for emails you're tagged in, select Filter Email from the Home tab and choose Mentioned, then choose Mentioned.

These are just a few strategies for getting more out of Microsoft's email platform. To unlock Outlook's true potential, you need the support of certified IT professionals. Give us a call today.

Published with permission from TechAdvisory.org. Source.

The post Outlook tips to increase productivity appeared first on Complete Technology Resources, Inc..

Read More

Which Windows 10 package is right for you?

With fast performance, regular updates, and a helpful digital assistant, Windows 10 is a must-have operating system (OS) for both individual consumers and entire businesses. But before you purchase it, you’ll have to decide between Windows 10 Home, Pro, and 10 S. So which one is right for you?

Windows 10 Home
This version, as you may have guessed, is designed for home and personal use.

The post Which Windows 10 package is right for you? appeared first on Complete Technology Resources, Inc..

Which Windows 10 package is right for you?

With fast performance, regular updates, and a helpful digital assistant, Windows 10 is a must-have operating system (OS) for both individual consumers and entire businesses. But before you purchase it, you’ll have to decide between Windows 10 Home, Pro, and 10 S. So which one is right for you?

Windows 10 Home
This version, as you may have guessed, is designed for home and personal use. It comes bundled with key Windows 10 features, including Microsoft Edge, Office 2016, smart pen support, and the Cortana voice assistant. Since Microsoft is pushing their cloud services, Home also provides 5GB of cloud storage in OneDrive for individual users.

In terms of security, Home has fairly basic protections. It has Windows Defender Antivirus software, Windows Hello biometric logins that use face or fingerprint authentication, and rudimentary device encryption to minimize data breaches. Those with multiple Windows devices will also love the mobile device management app, which allows them to track and control app usage for connected smartphones and tablets.

To explore new apps, Home users can sign up for the Windows Insider program, but since this version is light on features, there is usually a limited selection of early release apps to play with.

Windows 10 Pro
If you plan to use your computer for work, the Pro version is the right OS for you. One of its most notable features is Hyper-V, which allows you to create virtual machines (VMs) on Windows 10. These VMs can be used to deliver computing resources from a powerful computer to other machines connected to the network, making resource provisioning a breeze.

Considering that businesses are usually targeted by cybercriminals, Pro offers more robust security than Home. In addition to Windows Defender, this version comes with whole disk encryption, Enterprise Data Protection, and Azure Active Directory -- an identity management service used to set up and enforce access policies for apps and devices.

Rolling out updates for all computers is also incredibly easy with Pro’s Windows Update for Business service. From a central console, you can manage how and when Windows 10 devices are updated while making sure that the bandwidth used doesn’t disrupt day-to-day operations.

Windows 10 S
Released in 2017, Windows 10 S is focused on simplicity, security, and speed. Feature-wise, it’s about the same as Home, offering Office productivity apps and Cortana. But it comes with Pro functions such as virtual machines and increased security, too.

While it doesn’t possess as many features as Pro, Microsoft reported that 10 S-powered computers boot 15 seconds faster than Pro machines. Its relatively low hardware requirements also make it perfect for startups and schools that tend to purchase low-cost PCs. And if you want more features, 10 S allows you to upgrade to Pro at an affordable price.

The big difference between 10 S and the other Windows 10 versions is that it can only run applications available on the Windows Store. Although this restriction means you don’t get to enjoy third-party apps, it actually protects users from downloading dangerous apps and helps Microsoft easily root out malware.

So far, only a few devices -- including the Surface Laptop, Lenovo V330, and HP Stream 14 Pro -- are capable of running 10 S, but it’s only a matter of time before other devices are compatible.

Still not sure about which Windows 10 version you should purchase? Contact our experts today to get more advice. We’ll even install and maintain Windows for you so you can focus on being productive!

Published with permission from TechAdvisory.org. Source.

The post Which Windows 10 package is right for you? appeared first on Complete Technology Resources, Inc..

Read More

New scam freezes Chrome to panic users

Con artists have created a new method of deceiving Chrome users by freezing their browsers and displaying a security notification with bogus tech-support contact details. Their ultimate goal is to scare potential victims and trick them into dialing the fake hotline number on the screen.

The post New scam freezes Chrome to panic users appeared first on Complete Technology Resources, Inc..

New scam freezes Chrome to panic users

Con artists have created a new method of deceiving Chrome users by freezing their browsers and displaying a security notification with bogus tech-support contact details. Their ultimate goal is to scare potential victims and trick them into dialing the fake hotline number on the screen.

The End Game

The scam works by displaying an error message indicating a bogus security breach incident that renders a browser unusable. These scammers capitalize on the fact that a serious crash can't be solved by simply closing the site, thereby sending the users into a panic. This encourages them to dial the number listed on the warning message.

On the other end of the line, the scammers would pose as Microsoft or Apple representatives to convince users into surrendering their credit card details to repair a non-existing security issue. The scams are generally carried out through legitimate sites or malicious ads that have been hacked.

The Ingenious Process

This new scam operates against Chrome by corrupting the window.navigator.msSaveOrOpenBlob programming interface, which basically uses it as a form of distraction. The hackers manipulate the browser and forces it to save a random document on a disk repeatedly at super fast intervals that are impossible to notice. After five to 10 seconds, Chrome will be completely unresponsive.

The Easy Fix

To recover, Windows users simply have to open Windows Task Manager (press ctrl + shift + esc keys) and stop the process there. On the other hand, macOS users just need to wait until a system message prompts them to close the unresponsive Chrome tab. Typically, the latter is a more appealing option since users would have the freedom to close only the corrupted page. Manually closing the whole browser means possibly losing unsaved files in any open Windows.

When faced with IT-related issues, you need to determine how you can approach them calmly. The threats in the digital world may be terrifying and intimidating, but causing a panic in your workplace isn’t the answer. Call us as soon as any problems arise, and we’ll help you as soon as we can. We can even hook you up with other security measures to beef up your network security.

Published with permission from TechAdvisory.org. Source.

The post New scam freezes Chrome to panic users appeared first on Complete Technology Resources, Inc..

Read More

Simple security tips for Mac devices

Contrary to what you may believe, cyberthreats don’t only target Windows computers. Even small-business users can click a seemingly harmless link and become a victim of a cyberattack. If you don't want this to happen to you, there are a few simple things you can do.

The post Simple security tips for Mac devices appeared first on Complete Technology Resources, Inc..

Simple security tips for Mac devices

Contrary to what you may believe, cyberthreats don’t only target Windows computers. Even small-business users can click a seemingly harmless link and become a victim of a cyberattack. If you don't want this to happen to you, there are a few simple things you can do.

Check your Privacy Settings

Begin by making sure that your Mac settings are set up properly to keep your information safe. Click System Preferences (the gear icon along the bottom of your screen), then open the Security & Privacy pane, which contains four tabs that allow you to manage different security features. You should do this with an administrator account so the changes affect everyone who uses this computer.

Take Advantage of the Firewall

One of the biggest steps you can take to protect your computer is to enable macOS's built-in firewall to block unwelcome network connections. Just go to the Firewall tab in the Security & Privacy settings, click on the padlock at the bottom of the screen, and key in your username and password. Then enable firewall by clicking on Turn On Firewall.

To modify its settings, click on Firewall Options just below the Turn Off Firewall button. A dialog box will pop up and you can click on Enable Stealth Mode. Turning on Stealth Mode will make your Mac invisible on public networks (like an unsecured coffeeshop WiFi).

In the Firewall Options, you will also find a list of services and apps that are allowed to receive inbound connections. If you want to add an app or service to the list, just click the ‘+’ button below the list itself. However, we recommend keeping this list as short as possible because any app connected to the list can be exploited.

Set Up a Firmware Password

Nowadays, macOS/Mac OS X automatically turns on FileVault encryption. This means that it encrypts the hard drive by default, and the only way it can be accessed is by logging in. Keep in mind, though, that this feature won’t necessarily save your account in case someone reinstalls macOS/OS X, or when they use a USB memory stick to boot the Mac and possibly remove all data from your hard disk.

To increase protection, set up a firmware password. To do so, restart your computer, and then press and hold down Cmd+R before the Apple logo shows up on screen. You can let go of the keys once the progress bar pops up.

Choose your location and language when asked, then click on the Utilities>Firmware Password Utility menu. Simply follow the instructions here, and make sure to never forget or misplace your password. Forgetting your firmware password can be quite a hassle because only Apple technicians can recover it.

Ensure that your confidential data remains confidential simply by performing minor tweaks on the system settings. It takes only a few minutes of your time to ensure lasting online protection. If setting up a firewall or firmware password sounds a little too advanced for you, don’t hesitate to get in touch with our experts.

Published with permission from TechAdvisory.org. Source.

The post Simple security tips for Mac devices appeared first on Complete Technology Resources, Inc..

Read More