Blog

  • Master OneNote in no time

    Master OneNote in no time

    OneNote is a useful but underutilized program that comes with Microsoft Office. With OneNote, you can create and share digital notebooks that contain handwritten or typed notes, drawings, screen clippings, audio commentaries, and more. This takes your note-taking to another level, allowing you to integrate multimedia as well as share notes and collaborate with other users. Here’s how you can master this app.

    Organize your digital notebook

    While both Microsoft Word and OneNote let you create text-heavy documents, they store and display saved information differently. Word displays one document at a time, but OneNote shows you all your documents at once.

    When you open the desktop version of OneNote for the first time, it shows you a default Notebook called “My Notebook.”

    If you want to create another Notebook, click on the < beside the name of your current one, then choose +Notebook at the bottom of your screen.

    You can customize a Notebook by separating it into subcategories called Sections, which are like dividers in a physical notebook. For instance, you can dedicate one Section for the notes regarding a particular client. Sections are shown as color-coded tabs along the top of the screen, next to the name of your Notebook. You can add more by clicking on +Section at the bottom left of your screen.

    You can add individual pages to a Section by clicking +Page, and you can use this feature to separate information. For example, you can add pages pertaining to a client’s contact details, project statuses, and billing information.

    You can rename your Notebook, or any Section or Page, by right-clicking on it and choosing the rename option.

    Start experimenting

    There’s no hard-and-fast rule to enjoy OneNote because each person’s note-taking habits are unique. The only way to find out if OneNote works for you is to try out all the features and decide which method is most effective. Here are some things you can try to get a feel of the OneNote experience.

    • Add tags to your notes so you can search for them efficiently
    • Instantly turn your drawings into shapes or text using the Ink to Shape and Ink to Text functions, respectively
    • Solve equations by using the Ink Math Assistant (which can help you graph or solve math problems)
    • Use Immersive Reader to read texts out loud
    • Write on a web page in Microsoft Edge and save your annotations to OneNote

    Keep in mind, however, that these only work in OneNote for Windows 10. If you’re using an older version, you’ll need to upgrade to the latest version to enjoy these benefits.

    Share your OneNote

    So, you’ve created a detailed plan for an upcoming event complete with visual pegs and handwritten instructions, and you want to share this with your team. That’s easy as pie with OneNote. Just go to the upper right corner of your ribbon, click on the Share button, and type in the email addresses of the people to whom you wish to send your notes. You can also set the sharing permissions to either “can view” or “can edit,” giving you more control over your data.

    Published with permission from TechAdvisory.org. Source.

  • HOW TECHNOLOGY MADE IT EASIER TO WORK FROM HOME

    HOW TECHNOLOGY MADE IT EASIER TO WORK FROM HOME

    Dee Dee Silverstein shares the story of SF Investments’ transition to a remote workforce

    Read the interview highlights

    Most of us are facing the situation where all of our employees have to work from home. And working from home presents all kinds of IT and computer challenges. Can I be productive when working from home, especially as it relates to my IT and computer systems? And while working from home, we want to make sure that we’re taking care of our employees and our clients and our customers.

    We’re talking to Dee Dee from SF Investments about how her team went from working in the office to everyone working from home. And we’ll talk about some of the challenges that Dee Dee and her team faced and how they overcame it. We specifically focus on the IT and computer systems. The goal is to share real world tips that you can quickly and easily implement in your business. And we’re not going to talk about theory and pie in the sky scenarios.

    Can you tell us a little bit about yourself, your company and the size of your team?
    Of course, David, and it’s good to talk to you. I work at SF Investments. I’m the office manager and used to be sort of the IT person I guess. I know a little more IT than other people at my office, but not an IT specialist by any stretch of the imagination. I have an office of about 11 or 12 people. We are a broker dealer and an investment advisor. And the reason I find that important is because when you’re an investment advisor, you’re picking up the phone and calling a broker dealer to place your trades. We actually have to physically be able to always place our trades on the spot when the market fluctuates. I won’t get into too much other than to say that there is a slight difference between the two so my trading room is immensely important to me and that functionality. We’re not a big office, but we’re an intense office. We manage hedge funds, we’re a broker dealer and a wealth management advisor so technology is very important.
    At what point did you and your team make the decision to go ahead and work remotely. Were you waiting for the governor? Or did you make a decision prior to that?

    Of course, David, and it’s good to talk to you. I work at SF Investments. I’m the office manager and used to be sort of the IT person I guess. I know a little more IT than other people at my office, but not an IT specialist by any stretch of the imagination. I have an office of about 11 or 12 people. We are a broker dealer and an investment advisor. And the reason I find that important is because when you’re an investment advisor, you’re picking up the phone and calling a broker dealer to place your trades. We actually have to physically be able to always place our trades on the spot when the market fluctuates. I won’t get into too much other than to say that there is a slight difference between the two so my trading room is immensely important to me and that functionality. We’re not a big office, but we’re an intense office. We manage hedge funds, we’re a broker dealer and a wealth management advisor so technology is very important.

    It was a difficult decision. Because we’re a broker dealer and monitored by the SEC and FINRA, we have a very intense business continuity plan in place in the event of a power outage, or God forbid, fire in the building, or something of that nature.

    It never in a million years occurred to us something like this would happen. We had business continuity plans in place, so when this first started, I’m wanting to say mid to late February, I remember saying we might need to relook at our business continuity plan. I remember everybody looking at me saying “Oh, no, we have one.” But the plan for going remotely to someone’s house to work might not be the one we need. So, they did sort of wait a little bit on messages from the federal government and the governor. And we did start to implement it. We actually started implemented probably the week before the governor made his announcement. We finally decided that those who could work from home would work from home. But it wasn’t everybody at that moment.

    To give the listeners some background, you had an environment where you could work from home but with a company culture where generally, almost everybody came to the office and worked. Tell us about some of the challenges that you faced when you first started working remotely?

    The biggest challenge is my trading room. It is so difficult for my traders to not physically be in the office. So, I do have two people who still come in every day and it’s just those two and we protect them by not having anyone else go in. That’s the rule that we have now. They are set up to work from home, it’s just their job is much more challenging with regards to time stamping.

    Somebody at your firm had mentioned about a year or two ago that we should start converting over to docking stations with laptops as our primary computers so that in the event of an emergency, we could just pull the laptop and leave. And it’s because at my office, everybody has dual monitors because they’re running trading platforms and quotation systems like Bloomberg and Thomson Reuters and things like that.

    We have made a decision we were going to do that. But we had a lot of desktop computers that are relatively new within the past three years. So we made a decision that instead of just re buying everything, as a computer failed, we would then replace it with a docking station and a laptop, which we started to do. So, I currently have 3 of us converted over and we had one person who had a fully setup emergency laptop they kept at home so we considered that four.

    My biggest challenge became what do I do about the work computers at people’s houses? Because not everybody has a good laptop. One of my analysts and trading guys goes to India quite frequently so his personal computer has been set up on the cloud already. So, he was good to go.

    I suddenly found myself needing to get other traders set up at home. I got on the phone with your team and said I need to get laptops and docking stations and data set up so certain core people were switched to that system. And that’s what we did.

    I got on the phone with your guys, and they gave me what I needed to order. And then the biggest challenge became getting the equipment, but we did it.

    How do you and your team stay connected today? How are you guys keeping some of that company culture or that camaraderie because that is a big part of when you work together?

    We are a small office and we really do stay connected face to face.

    When this all came down, I asked your team about it and he said we could use Microsoft Teams and sent me a bunch of videos on it. I thought “oh, this is going to be a problem.” My office has the culture of meeting and talking face to face. They’re not into chatting. Or, you know, using those kinds of technology.

    I had a couple of users who were going to work from home with iPads. I had been downloading apps before we dispersed out into our homes. I made sure people were logging in with Teams. And it took me about four or five days to get people going.

    I immediately got on Teams. I got one of my millennials on Teams. And the two of us proceeded to do video chat, chatting, and I think within two hours, we basically understood most of what it could do or a lot of what it could do.

    I have an investment team that usually meets all the time and or they just get up from a desk and go say “what do you think of this stock going down.” They needed that ability. Well, I got a video call on Tuesday with one of them who thanked me for putting Teams together. More of the investment team is making it to the meetings because they don’t have to physically be somewhere.

    For those not familiar with Microsoft Teams, talk a little bit about how you guys are using it and some of the biggest benefits that you guys have seen by using Microsoft Teams.

    The big benefit is with my investment committee. They were able to bring in two of our New Jersey partners into Microsoft Teams on video. That is something that normally they have to be in the conference room and make a conference call to do.

    Microsoft team enables you to send out a calendar invite like you would do with Outlook. Both people are familiar with that concept and Outlook, but you do it from Teams. It sends the people you want to join this meeting, whether it’s by video or phone, whatever their capabilities are on their end, or what they’re comfortable with, to click a link and launch a video meeting.

    You can share documents easier than you can in an email because you don’t have to look for it. It’s right there in your files and you just drop it in. Whoever you’re chatting with can open it.

    We learned you could collaborate on a document. They were writing an investor letter and rather than emailing back and forth, they all look at the same document and type their own notes or change words without having to tell another person to do it.

    During COVID-19, you’re seeing more emails from the clients and people like that? So, to be relying on email to communicate with your office is crazy to me now that I use Teams. It is so much faster for me just to send a direct message and a document than email.

    What are you doing for your phones externally for calls with clients and your customers?
    And I have to have so many phone lines in place for redundancy, that we all had a lesson on how to forward our lines to our cell phones. And that’s all we did. Because our phone system is a little bit older. I’m on a PRI on fiber and I have copper path line backups. I have five emergency cell phones which no one’s really using right now. I gave them the option to use those instead of their personal phone, but no one took me up on it.
    You’re running the Microsoft 365 platform, not to be confused with Office 365. Office 365 is part of Microsoft 365 but there’s more to it. When you’re in the office you’re using the Office Suite, Word, Excel, Outlook, and other software specific to your industry. Walk us through the transition from one day working in the office and the next from home.

    At my office I have a docking station, the laptop, a keyboard, a mouse, and two monitors. And then the software that you referred to were on the Microsoft Azure cloud. And a couple of my applications might be on the remote server. Before I picked up my laptop and took it home I had to make sure the automatic door locking mechanism, which is stored on my computer, and my accounting software which is on that remote server, I needed to make sure those were going to work when I picked up and walked away from my office.

    I took my computer, I packed a shopping bag with papers, I came home. The next day I opened my computer and it was like sitting at my desk except I was missing my keyboard and my two big monitors. Everything functioned exactly the same as it does at my office. It’s just I don’t have the flexibility of looking at an invoice on one screen and a spreadsheet on another screen. That’s the only thing.

    Everything else worked fine. I haven’t had an issue working from home. It was that simple.

    You don’t have to worry about a clunky VPN connection or remote desktop connection do you? You put in your username and password and you start working. Correct?

    That’s exactly right. When we’re done working remotely, the laptop will just go back to the office, and nothing will have to sink or anything like that. It’s just all done.

    One of my users does not have a laptop, could not take her equipment home, and had a Mac. She was able to go in through the Microsoft Office portal with Azure and do a little bit of what she needed. It is a little different, but she was able to access some files.

    Before we wrap up and conclude, how have we helped you in this process and what is one or two of the biggest benefits that you guys have experienced working with us?

    When I had secure emergency laptops, they gave me the specs and I had the laptops. They were helping me make sure I got the right equipment, even though you guys don’t procure equipment, you do give me the specs of what I need. And once I get those laptops I was literally on the phone with you getting them up and running and on each person’s ID, so that that would be their main computer.

    It was remarkable how we did that. I was sitting there, and your guys were working on those laptops with me eyeballing it and doing stuff as I needed to.

    I don’t know how we would have pulled off all this last-minute stuff. Getting laptops in an office on a Friday and a Monday when we’re trying to get everybody out of the office. I know your guys have been on the phone with each one of my guys trying to make sure everybody’s comfortable working at home and they’ve done a fantastic job. This couldn’t happen without that kind of dedication. I don’t ever feel like you were put on hold because someone else was more important. I never felt like that with this whole process.

    If you guys have not shown us the virtues of the Microsoft Azure Cloud, if we hadn’t made that migration years ago, we wouldn’t be able to do what we’re doing right now. I can’t even imagine doing the old hard server VPNs for everybody. I can’t even imagine what that would have taken to get everybody home.

    If you had to do it all over again, what would you do differently? What worked well and what didn’t?
    I would listen to the recommendation to put everybody on laptops and docking stations sooner rather than later. Then I would only be scrambling trying to get some docking stations and extra monitors for people at home. I think most people were thinking they were going to work from home for a day or two and would just pull their laptop and take it home and not worry about a second setup. It would have been so much easier if I had everybody on the laptop setup and extra docking stations and monitors. I think that would be the one thing I would have done differently.

  • M365 Email Security for RIAs

    M365 Email Security for RIAs

    EMAIL SECURITY CHECKLIST FOR RIAS REVEALS …

    8 Security Protections Your RIA Needs to Have in Place Now (especially if you are using Microsoft email)

    • Get this checklist and see if you can say “yes” to these 8 questions
    • Find out if you are missing a few critical pieces without realizing it
    • Learn how to set up enterprise level email security without spending more money. It’s all within reach.


    DOWNLOAD NOW

    SPECIALIZED IT SERVICES FOR RIAS

    YOU ACTUALLY UNDERSTAND OUR ISSUES AND ARE RESPONSIVE

    What I like best is your knowledge and response level. The biggest benefit for us is that we feel you actually understand our issues and are responsive. We never feel as if we have asked a dumb question.

    Dee Dee Silverstein

    New Vernon Wealth Management

    YOU FIX IT IN NO TIME FLAT

    Everyone is really helpful and has gotten to know us well. Each time something breaks, or isn’t working…. You fix it in no time flat. The biggest benefit for us is not having to hire someone in our office when we don’t need someone each and every day.

    Larry Levin

    Trading Advantage

  • Keep your home network safe in 10 simple steps

    Keep your home network safe in 10 simple steps

    Practical tips to better secure your home network.

    1. Change the default name of your home Wi-Fi
      The first step towards a safer home Wi-Fi is to change the SSID (service set identifier). SSID is the network’s name. Many manufactures give all their wireless routers a default SSID. In most cases it is the company’s name. When a computer with a wireless connection searches for and displays the wireless networks nearby, it lists each network that publicly broadcasts its SSID. This gives a hacker a better chance of breaking into your network. It is better to change the network’s SSID to something that does not disclose any personal information so you can throw hackers off their mission.
    2. Make your wireless network password unique and strong
      Most wireless routers come pre-set with a default password. This default password is easy to guess by hackers, especially if they know the router manufacturer. When selecting a good password for your wireless network, make sure it is at least 20 characters long and includes numbers, letters, and various symbols. This setting will make it difficult for hackers to access your network.
    3. Enabling network encryption
      Almost all wireless routers come with an encryption feature. By default, it is turned off. Turning on your wireless router’s encryption setting can help secure your network. Make sure you turn it on immediately after your broadband provider installs the router. Of the many types of encryption available, the most recent and effective is “WPA2.”
    4. Turn off network name broadcasting
      When using a wireless router at home, it is highly recommended that you disable network name broadcasting to the general public. This feature is often useful for businesses, libraries, hotels, and restaurants that want to offer wireless Internet access to customers. It is usually unnecessary for a private wireless network.
    5. Keep your router’s software up to date
      Sometimes router’s firmware, like any other software, contains flaws that can become major vulnerabilities unless they are quickly fixed by firmware releases from the manufacturer. Always install the latest software available on the system and download the latest security patches to ensure no security hole or breach is left open to online predators.
    6. Make sure you have a good firewall
      A “firewall” is designed to protect computers from harmful intrusions. Wireless routers generally contain built-in firewalls but are sometimes shipped with the firewall turned off. Be sure to check that the wireless router’s firewall is turned on. In case your router doesn’t have a firewall, make sure you install a good firewall solution on your system to watch for malicious access attempts to your wireless network.
    7. Use VPNs to access your network
      A virtual private network, or VPN, is a group of computers or networks that work together over the Internet. Individuals can use VPNs as a method to secure and encrypt their communications. When you connect to a VPN, a VPN client is launched on your computer. When you log in with your credentials your computer exchanges keys with another server. Once both computers have verified each other as authentic, all your Internet communication is encrypted and secured from outside prying.
    8. Have Anti-Virus Software on all devices in your home network.
      Most of all, check what devices connect to your home network and make sure they have reliable security software like Avast Cloud Care or similar Anti-Virus Software. A good free one is Avast Free Antivirus click here.
    9. Keep your operating system updated for connected devices
      Make sure the Microsoft or Macintosh Operating Systems updates are current and on all devices in your home network.
    10. Install a DNS solution to protect devices and for safe internet browsing
      Two wonderful free solutions are OpenDNS Family Shield and Open DNS Home. It will help websites load faster, you’ll have customizable filters for parents, and phishing websites are blocked.
  • Single sign-on: The key to user management

    Single sign-on: The key to user management

    From complexity requirements to minimum lengths, creating a password for a new online account can be bothersome. If your RIA is struggling with your password policy, single sign-on (SSO) can help. This technology is secure, easy to manage, and eliminates the need to remember a long list of usernames and passwords.

    What is SSO?

    Single sign-on allows you to create one username and one password that thousands of websites will recognize. If you’ve ever clicked “Continue with Google” on a non-Google website, you’ve already enjoyed the benefits of SSO. It’s faster, simpler, and more secure. Now, small and midsized RIAs can accomplish the same level of efficiency between their employees and cloud platforms.

    Instead of requiring everyone in the office to track separate accounts for Office 365, Slack, Trello, and other cloud apps your company uses, you can give them a single set of credentials and manage what they have access to remotely. Employees come to work, enter their designated username and password, and they’re all set for the day.

    Why is SSO more secure?

    There are a number of ways to set up a small business SSO solution, but most of them focus on removing login information from your servers. Usually, you’ll provide your employees’ logins to an SSO provider (sometimes referred to as an Identity-as-a-Service provider) and each employee will receive a single login paired with a secondary authentication — like a fingerprint or an SMS code to a personal device.

    Every time one of your employees visits a cloud platform, such as Office 365 or Google Apps, the SSO provider will verify the user’s identity and the connection’s security. If anything goes wrong, your IT provider will be notified.

    Should your network or any of its devices be compromised, hackers would find nothing but logins to your SSO accounts, which are meaningless without fingerprints or mobile devices.

    How to get started with SSO

    The first step is making sure you have a healthy and responsive IT support system. You need a team that’s available to review suspicious alerts and troubleshoot employee issues. Contact us today and we’ll help you out!
    Published with permission from TechAdvisory.org. Source.

  • How to speed up Google Chrome

    How to speed up Google Chrome

    Google made its foray into web browsers in 2008 with Chrome. With its remarkable speed and ease, Chrome was welcomed by many users. However, over time, the browser becomes a bit sluggish, especially if you’ve installed extras such as extensions. Follow these easy steps to ramp up your Chrome browser’s speed.

    Clear your browsing data

    Chrome stores cached copies of websites you visit so it can load the page faster when you visit them again. It also keeps a database of your browsing history and cookies for the same purpose. As you visit more and more websites, these pieces of data accumulate in Chrome and can slow the browser down.

    Thankfully, the solution is easy: clear your cache. Simply access your browsing history by entering chrome://history in your address bar. From the left panel, select Clear browsing data. Choose which data to delete by clicking on the checkboxes of all items you want deleted, like cached images or cookies. You can also select the time range that will be affected by the deletion. You can delete your history for the past hour, the last 24 hours, the last seven days, and from the beginning of time. Once you’ve selected the files you want to delete and their corresponding time range, click Clear data.

    Disable extensions

    Extensions are downloadable programs from the Chrome Web Store that you can add to your browser to give it more functionality and a personalized touch. For example, you can add an extension that blocks ads, one that shortens URLs, or one that shows your most important tasks of the day. While these extensions are useful, they can slow Chrome down if there are too many installed at once.

    Most extensions will show on Chrome’s address bar, and you can quickly uninstall them by right-clicking on their icons and selecting Remove from Chrome. You can also manage all extensions by typing chrome://extensions in your browser and hitting Enter. From there, you’ll find a list of all the extensions you have (even those you don’t remember installing). Simply scroll through the list and click Remove to delete the extensions you don’t need.

    Remove ads and malware

    Sometimes, Chrome slows down because of malware or adware extensions. Extra toolbars, recurring pop-up ads, and web pages redirecting to other addresses are clear indications of these. Google once had a downloadable app developed for Chrome that scans and removes unwanted programs called the Clean Up Tool. In 2018, Google discontinued that app and made malware scanning even easier. Just type chrome://settings/cleanup in your browser and click on Find to detect and remove harmful software on your computer.

    A top-performing web browser benefits your business in many ways, including enhancing your employees’ productivity and speeding up communication. If your web browser is performing poorly or takes forever to load a page, don’t hesitate to get in touch with us so we can identify and fix the problem right away.

    Published with permission from TechAdvisory.org. Source.

  • Office 365 hacking: What you need to know

    Office 365 hacking: What you need to know

    With over 150 million active subscribers, Office 365 is, unsurprisingly, on top of hackers’ minds. And now, hackers are using a technique that doesn’t even require users to give up their credentials. Learn how they do it and get protected.

    A phishing scam that harvests users’ credentials

    The latest cyberattack on Microsoft Office 365 involves harvesting users’ credentials. Scammers use this previously unseen tactic by launching a phishing message to users, asking them to click on an embedded link. What makes this scam more insidious than traditional phishing scams is that the URL within the message links to a real Microsoft login page.

    How does it work?

    The phishing message resembles a legitimate SharePoint and OneDrive file-share that prompts users to click on it. Once they do, they are taken to an Office 365 login page where they will be asked to log in if they haven’t already.

    After they’ve logged in, they’ll be prompted to grant permission to an app called “0365 Access.” Users who grant permission effectively give the app — and the hackers behind it — complete access to their Office 365 files, contacts, and inbox.

    This technique can easily trick lots of users since the app that requests access is integrated with the Office 365 Add-ins feature. That means that Microsoft essentially generates the request for permission. No, Microsoft is not aiding hackers to breach systems. Rather, the scam is made possible by a feature that allows users to install apps that are not from the official Office Store.

    Ways to protect your Office 365 account — and your business

    Given their fairly advanced approach, these scammers could effortlessly prey on careless employees. There are ways to make sure that doesn’t happen.

    • Always check the email’s sender account before clicking on any link or granting apps access.
    • Implement a policy that prevents staff from downloading and installing apps that are not from the Office Store.
    • Regularly conduct security awareness training that covers essential cybersecurity topics. Educate employees on how to spot phishing scam red flags (e.g., unknown senders, grammatical and typographical errors, suspicious requests, and the like). Increase their knowledge about more sophisticated attacks and keep everyone informed about current and future cybersecurity risks.

    Successful attacks could result in an unimaginable catastrophe to your company. For tips on how to spot this and other nefarious scams and how to plan thorough security practices, contact our experts today.

    Published with permission from TechAdvisory.org. Source.

  • Cybersecurity: How to defend your RIA from insider threats

    Cybersecurity: How to defend your RIA from insider threats

    In the cybersecurity world, an insider threat is an individual or business partner who uses company data inappropriately. Today’s RIAs must take proactive steps to prevent insider threats, which is why we put together some tips and tricks.

    #1 Educate

    Teach your team to recognize personally identifiable information (PII) and understand the financial implications of a breach. Each employee needs to grasp the risks associated with violating specific state or federal regulations regarding data privacy and security.

    #2 Deter

    Put easy-to-understand policies in place to prevent an insider from breaching company data. And those policies must be strictly enforced. In fact, almost every regulatory framework pertaining to data security requires that these policies are published where they can be easily found and that you present them in company-wide meetings. In some case, you may be forced to put a person in charge of holding everyone in the company accountable to following the policies.

    #3 Detect

    RIAs must have systems in place to identify data breaches and their sources as quickly as possible. You should be able to see anytime someone accessed PII. This speeds up the breach response time by revealing when unauthorized personnel viewed something they shouldn’t have. It’s significantly easier to stem the spread of a breach with an effective audit trail in place.

    #4 Investigate

    When a privacy or security breach is detected, certain actions must be taken to limit the damages. For example, after the cause of a breach has been identified, your team should create new policies and procedures to ensure it can’t happen a second time. In the case of an insider threat, that might mean revoking data access privileges to a department that never actually needed them.

    #5 Train

    Since IT systems are constantly evolving and easy to accidentally bypass, your employees must undergo regular data security training. A one-day seminar is a great start, but incorporating short, weekly reminders or activities will go a long way toward keeping everything fresh in their minds. Consider using a variety of media, such as emails, break-room posters, and even face-to-face interviews.

    Is your company’s data secure from insider threats? Call us today for a quick chat with one of our experts for more information.

    Published with permission from TechAdvisory.org. Source.
  • 7 essential Office 365 add-ons for your RIA

    7 essential Office 365 add-ons for your RIA

    Microsoft Office 365 productivity applications like Word, PowerPoint, Excel, OneNote, and Outlook have allowed RIAs to meet client demands efficiently, and its numerous productivity add-ons have enabled users to deliver more in less time. Here’s a handful of Office 365 extensions that help you improve workflow.

    #1. Teams

    Teams is ideal for RIAs that collaborate frequently. It’s an instant messaging and document-sharing platform which seamlessly integrates with Office 365 programs and services. Users can create channels to work on projects, discuss topics, hold meetings, and more. And like similar programs such as Slack and Google Hangouts, Teams is customizable and accessible across mobile devices.

    #2. Office Tabs

    Office Tabs allows you to open multiple files in one window, which saves you from having to go through each opened document until you find the right one. It also lets you save or close the list of tabs in a single click, with an additional option to close everything except the active document. You can also directly rename files by clicking Rename, instead of going through the tedious process of clicking Save As and then changing the file name of each file.

    #3. Grammarly

    The last thing you want to send your clients is a confusing, poorly written email or document. Grammarly solves this by performing rigorous grammar, spelling, and plagiarism checks. It then provides vocabulary suggestions and recommends writing style changes to polish your writing further. This add-on is available in Word and Outlook, and its Premium counterpart is priced at $11.66 per month (annual plan).

    #4. Pexels

    Professional documents and presentations require high-resolution, blemish-free images, and Pexels helps you get them easily. Its free stock images are under a Creative Commons Zero license, meaning you can search high-quality images and use them in all your documents for any purpose with no legal repercussions.

    #5. DocuSign

    DocuSign for Outlook and Word lets you or a recipient securely sign a document electronically and send it through email, save it in the app, or store it in your company’s server. DocuSign complies with eSignature legal standards and is secured with end-to-end Digital Transaction Management, ensuring your files will never be leaked or breached.

    #6. FindTime

    Setting up a meeting time is tedious and difficult, especially if your employees have different schedules. FindTime scours every attendee’s schedule to locate open slots, and creates meeting time options for everyone to vote on. A meeting will then be scheduled according to whichever slot gets the highest vote within a specified amount of time.

    #7. Translator

    Businesses that deal with foreign companies will find communication much easier with Translator. This add-on recognizes and translates more than 50 different languages, including English, French, Spanish, and Chinese. Not only will you spend less time deciphering foreign-language documents, but you’ll also be able to work with clients from various parts of the world.

    Start improving work productivity and make the most out of your Office 365 with Microsoft productivity add-ons. To get started or to learn more about Office 365, Microsoft add-ons, or anything Microsoft Office related, contact us today.

    Published with permission from TechAdvisory.org. Source.