508-909-5961 [email protected]

Improve your PowerPoint skills with these tipsOffice workers are far too familiar with slideshow presentations that are either more soporific than cough medicine or are horrible time sinks that make them miss their deadlines. To avoid becoming the next target of their ire and resentment — and perhaps become the presenter everyone actually enjoys — here are some tips on how […]

The post Improve your PowerPoint skills with these tips appeared first on Complete Technology Resources, Inc..

Improve your PowerPoint skills with these tips

Office workers are far too familiar with slideshow presentations that are either more soporific than cough medicine or are horrible time sinks that make them miss their deadlines. To avoid becoming the next target of their ire and resentment — and perhaps become the presenter everyone actually enjoys — here are some tips on how to use Microsoft PowerPoint.

Start slideshows instantly

The audience doesn’t want to see the speaker’s cluttered desktop or unread emails as the PowerPoint presentation is being set up. Therefore, while waiting for everything to be ready, make sure the projector does not display anything — either have the operator cover it or display something else via the dual monitor function. Take this time to introduce yourself and do a short spiel about what you’re going to talk about. Then, once the slideshow is ready, cue the operator to uncover the projector or switch the dual monitor screens.

If you’re both the presenter and the projector operator, you can take steps so that your PowerPoint file instantly opens as a slideshow (i.e., it bypasses PowerPoint’s editing mode):

  1. Before presenting, save your file as a PowerPoint Show in the folder of your choice.
  2. When you’re about to present, open the folder and double click your file.

It’s that easy! Take note that this won’t work if you try to open the file via any of PowerPoint’s Open functions — you have to go to the file’s location and double click from there. And to end the show, just press the Esc key.

Say no to bullet points

Audiences hate it when presenters just read walls of text off of their slides. It’s supposed to be a presentation, not a tedious read-along. Some say that bulleted items that have no more than seven words each is good, but both Steve Jobs and Tim Cook agree that bulleted lists aren’t the ticket. A better way to create lists is to drop each item in one at a time, if possible, next to a big image that is the main focus of your presentation. Don’t forget to talk about each individual list item, but not with bullets.

Insert pictures from Flickr and OneNote

Jazz up presentations by including images or memes that’ll make the audience laugh instead of doze off. Head to the Insert tab and select Online Pictures — you’ll see Office.com Clip Art, Bing Image Search, Flickr, OneNote, and even Facebook. A vast pool of online images is now at your disposal. Alternatively, you can just take photos of yourself and use those to help drive your point home in an engaging and relatable way.

Pull back the focus with blackouts and whiteouts

Audience members tend to lose focus or drift away when presentations are longer than usual. If you suspect audience members are starting to lose focus, hit the B key for a complete blackout or the W key for a total whiteout. Then hit any key or click the mouse to return to the slides — this technique helps get the eyes back on you, where they belong.

Chart animation

The challenge doesn’t lie in inserting a chart into the presentation, but in making it interesting. Enter chart animation. After inserting the chart, click the Animations tab and activate the Animations pane. From there, click Add Animation. Pick an animated effect. Then, in the Animation Pane where you see the entry for the chart’s animation, right-click and select Effect Options.

This lets you customize sound and animation timing. But on the final tab — Chart Animation — be sure to change Group Chart from “As One Object” to “By Category.” This displays charts one element at a time as you click, with bars or slices of pie arriving one after the other, as if each was its own slide.

Extend music over multiple slides

To add music to your slide, go to the Insert tab, select Audio > Audio on My PC. Then, in File Explorer, find the music file you want to use and then select Insert. But why confine your favorite tunes to just one slide? Expand it over the duration of your presentation by clicking on the speaker icon that indicates the embedded audio. On the Playback tab, choose Play in Background to have the audio play across the next few slides or until the music stops.

Duplication

If you are constantly reusing the same element throughout your presentation, the good old Ctrl-C + Ctrl-V keyboard shortcut is fine, but Duplication is better. Hold Ctrl while you click and drag on the object to create an exact dupe; keep selecting and making dupes and they’ll all space themselves out evenly. You can even duplicate entire sets of slides: simply select one or more slides on the left navigation pane, select Insert > New Slide > Duplicate Selected Slides.

Animate, animate, animate

Any element of a PPT slide can be animated. Choose the element, go to the Animations tab, and at the right end of the Animations Gallery, click the down arrow to get “More.” You can choose from many options about how an element appears, gets emphasis, or disappears — but for animated motion, go to the fourth section. If you pick Custom Path, you can get the object to do just about any wild motions you want on the screen before it settles down.

Use animations to add flair to your presentations. Don’t overdo them — you don’t want your audience to get motion sickness.

PowerPoint slideshows don’t have to be complicated. In fact, if animations and music cramp your style, then don’t use them. At the end of the day, it’s you who’ll be carrying the presentation and discussion. The slideshow is just a visual aid that helps people understand your points and remember them better.

If you have any further questions regarding our tips or how to execute them, please feel free to give us a call or send us an email. We’re more than happy to answer all of your questions.

Published with permission from TechAdvisory.org. Source.

The post Improve your PowerPoint skills with these tips appeared first on Complete Technology Resources, Inc..

Read More

Secure your data in the cloudData breaches are a common occurrence in today’s business environment. While many businesses have turned to cloud applications for better productivity, scalability, and savings, some business owners worry that the cloud is more vulnerable to data breaches than an on-premises data center. The truth is that any computing environment is vulnerable if you don’t take […]

The post Secure your data in the cloud appeared first on Complete Technology Resources, Inc..

Secure your data in the cloud

Data breaches are a common occurrence in today’s business environment. While many businesses have turned to cloud applications for better productivity, scalability, and savings, some business owners worry that the cloud is more vulnerable to data breaches than an on-premises data center. The truth is that any computing environment is vulnerable if you don’t take steps to prevent a data security breach. Here are simple steps to protect your data in the cloud.

Know your cloud apps:

Get a comprehensive view of the specific threats that business apps pose. Ask questions like: Which ones render you more or less prone to a breach? Does an app encrypt data stored on the service? Does it separate your data from that of others to limit exposure when another tenant has a breach?

Migrate users to high-quality apps:

Cloud-switching costs are low, which means that you can always switch to another application that best suits your needs. Take the time to consult with your vendor before switching to another app to make sure the new app is secure and compatible with your systems. Now more than ever, you have choices.

Find out where your data is going:

Take a look at your data in the cloud. Review uploads, downloads, and data at rest in apps to determine whether you have potential personally identifiable information (PII), or whether you simply have unencrypted confidential data. If you do have PII stored in the cloud, you need to make sure there are additional layers of security measures in place such as encryption. This is to avoid violating compliance regulations and paying hefty fines.

Look at user activities:

It’s important to understand not only what apps you use but also how these apps use your data. Determine what apps employees are using to share content and whether such apps have a sharing functionality. Knowing who’s sharing what and with whom will help you understand what policies to best employ.

Mitigate risk through granular policy:

Start with your business-critical apps and enforce policies that matter to your organization in the context of a breach. For example, block the upload of information covered by certain privacy acts, block the download of PII from HR apps, or temporarily block access to vulnerable apps.


The key to preventing a data security breach in the cloud lies in careful attention to your cloud applications and user activity. Analyzing your apps and looking into user activities might be time-consuming, but minimizing cloud and data security breaches makes this task worthwhile. Looking to learn more about today’s security? Contact us and let us manage and minimize your risks.

Published with permission from TechAdvisory.org. Source.

The post Secure your data in the cloud appeared first on Complete Technology Resources, Inc..

Read More

Make your desktop clutter-free with these tipsFilling your desktop with shortcuts to files and applications may seem practical because it lets you quickly access what you need. But when more than half of your desktop screen is filled with icons, your productivity can be affected. You may end up wasting time finding a file or opening a program. You can avoid […]

The post Make your desktop clutter-free with these tips appeared first on Complete Technology Resources, Inc..

Make your desktop clutter-free with these tips

Filling your desktop with shortcuts to files and applications may seem practical because it lets you quickly access what you need. But when more than half of your desktop screen is filled with icons, your productivity can be affected. You may end up wasting time finding a file or opening a program. You can avoid that by making your desktop clutter-free.

Do a bit of recon

Before you go on a deleting spree, sort out the files and folders on your desktop to know what you need to keep. An easy way to do this is to right-click on an empty area of your desktop and select Auto arrange icons. This will organize your icons into a grid format that makes it easier for you to view all the icons on it. Then, right-click on the empty space and hover your mouse over “Sort by” and select Date modified to arrange the icons by the date they were last opened, with the latest on top.

Create holding and app shortcut folders

People often use their desktop to hold downloads, photos, screenshots, email attachments, and other files, which easily messes up the desktop. In truth, you probably don’t need all these shortcuts on your desktop.

To prevent shortcuts piling up, create a folder on your desktop for all nonessential files and folders. Use this folder to store temporary items, including those you don’t intend to keep for long. Then, delete the files inside the folder once you no longer need them.

It also helps to create a shortcut folder. When you install new programs on Windows, a shortcut icon is often automatically added to your desktop. However, desktop shortcuts should be for frequently used programs only, so create a separate folder for shortcuts to seldomly used programs.

Be ruthless in decluttering

Once you have your folders set up, it’s time to get rid of the clutter. If you haven’t used a file or folder in the past two months or so, you should seriously consider getting rid of it. Uninstall programs you no longer use, delete images you no longer want or need, move unimportant files elsewhere, and place the rest in relevant folders.

Once completed, take a look at your browser to see where it stores downloaded files. If your browser downloads files to your desktop by default, go to Settings and change the target location to the Downloads folder.

Stick with your plan

Once you have decluttered your desktop, try to stick with the rules you’ve made. Whenever you download something, ask yourself whether it should go to the desktop or someplace else. Of course, sticking with these rules won’t always be easy, so aim to clean up your desktop at least once or twice a month.

Use the taskbar or Start menu for apps

Pinning apps to the Start menu and the taskbar is a great alternative to simply having program shortcuts on your desktop. To pin apps, open your apps list (click the down arrow from the Windows Start screen) and right-click on the application you would like to pin. Then, simply select Pin to Start or Pin to taskbar.

Strategically position your wallpaper

An interesting way to minimize clutter is to pick a wallpaper that you like, which could be your favorite picture or slogan. Frame the image so the focus is in the center of your desktop. Then, place your icons around the image in a way that allows you to still see the image. If you can’t see the image, that means you have too many icons and it’s time to get rid of a few. Having a wallpaper that you like can serve as a reminder to keep icons to a minimum.

If you are looking to learn more about using optimizing your Windows PC, contact us today for more tips and tricks from office IT experts.

Published with permission from TechAdvisory.org. Source.

The post Make your desktop clutter-free with these tips appeared first on Complete Technology Resources, Inc..

Read More

Boost your cybersecurity with security auditsAre your organization’s cyber defenses enough to protect it from a cyberattack? Unfortunately, just incorporating the latest antimalware software or firewall to your system won't guarantee your company's safety. Conducting a security audit will give you a complete picture of your company’s data integrity, giving you a greater chance of successfully meeting your cybersecurity goals. […]

The post Boost your cybersecurity with security audits appeared first on Complete Technology Resources, Inc..

Boost your cybersecurity with security audits

Are your organization’s cyber defenses enough to protect it from a cyberattack? Unfortunately, just incorporating the latest antimalware software or firewall to your system won't guarantee your company's safety. Conducting a security audit will give you a complete picture of your company’s data integrity, giving you a greater chance of successfully meeting your cybersecurity goals.

Auditing and the security strategy

Audits are necessary to ensure and maintain system quality and integrity. These system checks help identify security gaps and assure business stakeholders that your company is doing everything in its power to protect its data.

An audit is usually made up of three phases: assess, assign, and audit. Having a methodical way of auditing helps you avoid missing important details. It is also crucial that each stage is treated with the same level of importance to ensure thorough and comprehensive outcomes.

During the assessment phase, have your IT partner look at the security system you have in place. All of your business computers and servers, as well as every program and every user, need to be checked. The assessment should give you an overview of how secure your business currently is, along with any weak points that need to be addressed.

After the assessment, you need to implement the appropriate solutions and partner with the right providers. Ask your IT provider about solutions they can provide for each of your network/system gaps. And for issues that they can’t handle (perhaps because certain machines and software are highly specialized), ask your IT provider for their recommended list of partners.

Finally, conclude your audit cycle with an “audit,” which is one last look-around before releasing the system back into the wild. Make sure that installations, patches, and upgrades are integrated properly and working seamlessly. For future reference, take down notes just in case you need information about software and hardware improvements done during this audit cycle.

What exactly should be audited?

When conducting an audit, there are three factors you should focus on:

The state of your security
Security — especially digital security — is never at an impasse, and it is always in flux. That's because cybercriminals are always concocting new malware attacks and threats to infiltrate company networks. And that’s not even accounting for cyberattacks that exploit human error like phishing and other social engineering attacks. This means that system security has shorter and shorter expiration dates nowadays, making audits all the more crucial to implementing your security strategy.

The changes made
The key to having long-term data integrity is a continuity plan, and not just one that addresses severe business disruptions such as those caused by calamity or disaster. A true continuity plan tries to address every conceivable risk realistically, especially those that can trip up business operations, such as cyberattacks. This can only be possible if you know what kind of hardware and software comprise your system, as well as their respective updates and improvements.

Who has access to what
Data systems should allow administrators some control over who sees what. Total accessibility is a very dangerous prospect, especially since business nowadays is increasingly hinged on internet presence. An audit will let you check on user access so that you can make necessary adjustments to protect your data.

If you are looking for help in developing a security strategy for your business, contact us today to see how our managed solutions can help.

Published with permission from TechAdvisory.org. Source.

The post Boost your cybersecurity with security audits appeared first on Complete Technology Resources, Inc..

Read More