Blog

  • How your RIA can make the most of Microsoft Word

    How your RIA can make the most of Microsoft Word

    Microsoft Word has become the go-to word processor for RIAs big and small. It is used by every department and almost every type of personnel, but its constant updates and huge number of features mean there are lots of functions unknown to most users. Here, we uncover some of the most useful tricks to help you get the most from it.

    Edit simultaneously

    You and your colleagues can now edit the same Word document at the same time. Just save yours in the cloud on OneDrive, click Share, then send the link to your colleagues. You’ll even be able to see them editing in real time.

    Continue your work with Word Online

    Don’t have the Word app on your computer, tablet, or smartphone? Go to word.office.com, sign in with your Microsoft account, and open Word Online, the browser version of Word. By clicking the blue Share button, your colleagues can access your document using Word Online or the Word app, which means anyone with the link and an internet connection can jump right in

    Keep editorial control

    With the Track Changes function, Word monitors all the edits that everyone makes to your document so you can go through the changes and accept or reject them accordingly.

    To turn on Track Changes, click on the Review tab then select Track Changes. When reviewing a colleague’s edits, you have control to click on Accept or Reject as you see fit.

    Format the easy way: Write first, format later

    The Style Gallery in Word makes it easy to format your document, despite the huge number of font types, sizes, colors, and effects to choose from. After finishing writing and editing your document, click the Home tab and you will see the Style Gallery prominently on top. Select the appropriate Headings in the font, size, and color that you like, and change any other text in any way you like — just make sure you don’t make any changes to the actual content that’s already been edited!

    Insert photos faster, more conveniently

    No need to open your browser to look for photos for your document. Just place the cursor on the area where you intend to insert the photo, click on the Insert tab, select Online pictures (type “clip art” on the search box if that’s what you need), select a photo, then click Insert.

    Edit a PDF file

    Click on the File menu, select Open, and choose Browse. Highlight the PDF you want to edit, then click Open. Word will convert files to the new format using text recognition, so double-check if the conversion is correct. Make the appropriate changes, then click File, then Save As, then Browse. A “Save as type:” dropdown menu will appear at which point you will choose “PDF” then click Save.

    These tips may seem straightforward, but over time they can make a big difference in helping you work faster.

    Published with permission from TechAdvisory.org. Source.

  • RIA Case Study: Not all clouds are created equal

    RIA Case Study: Not all clouds are created equal

    Technology shouldn’t limit the success or growth of a business. That’s what the owners of this Chicago-based RIA thought when they started to feel held back by their IT infrastructure. They were in growth mode and needed a better cloud-based solution that could help them achieve their goals.
    Key challenges

    • Required more reliable backup and security
    • Performance issues were frequent and persistent
    • Employees frustrated by a slow, difficult system
    • Frequent problems with system stability and downtime

    Key outcomes

    • Full compliance with best-in-class security, backup, and recovery
    • A reliable, cloud-based network that can grow with the firm
    • Employees have reliable access to email, files, and applications from the office or when working remotely
    • Issues are resolved immediately


    Read the full RIA case study here

  • Keeping RIAs Safe: Combating cybercrime on an SMB budget

    Keeping RIAs Safe: Combating cybercrime on an SMB budget

    When security breaches happen on a large scale to big businesses, it makes headlines. Yet little is mentioned when cybercrime hits small to medium sized businesses (SMBs). Very few people are aware that today’s cybercriminals are targeting smaller organizations, not just supersized global businesses.
    The whitepaper covers the following:

    • Why everyone is a victim when it comes to cybercrime
    • Cybercrime comes at a high price for RIAs
    • Why cybercriminals are zeroing in on SMBs: Your RIA is not “Too Small to Matter”
    • To stay secure, a good defense is the best offense
    • 4 steps to help keep your RIA safe without breaking your budget


    READ THE FULL WHITEPAPER

    THE 5-MINUTE IT RISK SCORECARD
    (FOR RIAS)

    Answer these 4 questions and get your IT risk and security exposure score in under 5 minutes.


    GET MY SCORE

  • Microsoft Teams gets new features to support your RIA

    Microsoft Teams gets new features to support your RIA

    Every business now needs a workplace chat platform to foster internal communication, and Teams is Microsoft’s answer to this demand. To improve convenience and user experience, Microsoft has just announced new features that will be added to Microsoft Teams.

    Cortana Integration

    One new feature that Microsoft will bring to Teams is Cortana, Microsoft’s virtual assistant. By integrating Cortana with Teams, users can use voice commands to make calls, join an ongoing meeting, or add other users to the meeting. This feature will also work with IP phones and conference room devices.

    Inline Message Translation

    While most people can communicate well in English, not everyone is comfortable using the language. Inline message translation allows these people to chat in their native language and then translate their messages into English. This will not only help them verbalize their thoughts better and faster, but you’ll also be able to understand exactly what you have to do to meet their demands.

    Cloud Recording and Automatic Transcripts

    Have you ever forgotten or overlooked important meeting details? This new feature will allow you to record meetings, store it in the cloud, and create a transcript of it. The ability to save the entire meeting also allows users to review everything or segments of it in the future at their convenience. This is particularly useful for meetings that are highly detailed or very long.

    Facial recognition, which will allow statements to be matched with the corresponding speaker, is expected to be included in the future.

    Background Blur Option for Video Calls

    Most people get easily distracted. But you want to minimize these distractions and have them focus on you when you have an important meeting like a business pitch. Teams’ latest feature allows you to blur your background during video calls so other people in the meeting can fully concentrate on you.

    Proximity Detection for Teams Meetings

    A feature that can make your meetings simpler is proximity detection. When you enter a room equipped with a Teams meeting room device, Proximity Detection will automatically detect your Teams-enabled meeting room laptop and prompt connection for you to join the Teams meeting room. This helps you save time finding an available room so you can immediately connect with other users.

    Mobile Sharing in Meetings

    Have you ever needed to join a sudden meeting but couldn’t perform as well as usual because you were on the go with only a mobile device? Mobile Sharing in Meetings solve this by allowing you to share a live video stream, photos, or your phone screen with other attendees immediately.

    If you’re interested in improving your company-wide communication and would like to learn more about Microsoft Teams, contact us today.

    Published with permission from TechAdvisory.org. Source.
  • Phishing hits businesses at tax time

    Phishing hits businesses at tax time

    Phishing schemes abound every season, and tax season is no exception. It’s an important time of year in the corporate world and cybercriminals are looking to take advantage of it, which is why your business must ensure that your confidential data is kept under lock and key.

    Phishing baits to watch out for

    Phishing attacks often consist of fabricated or compromised emails sent to finance/payroll or human resources employees that are made to look like they’re from an executive in your company. The message might contain a request to forward employee records, including their W-2 forms, but that’s not all…

    Another common scheme, which doesn’t only happen during tax season, involves getting a call from a person declaring to be an IRS employee. And no, caller IDs won’t save you because they can forge that, too. The phisher will inform you that you owe them cash from back taxes and they will threaten legal action if you don’t pay via credit card at that instant.

    Always remember, the IRS will never contact you on the phone to let you know that you owe them money. And they certainly won’t threaten you or demand payment over the phone. If they really need to notify you of such matters, they’ll use the postal service and will give you a chance to discuss payment terms.

    Standard protection protocols

    Don’t worry, the usual security measures against these phishing scams are pretty easy to integrate into your business. Begin by developing a policy that bans the request of private details through email. If an employee ever requires such info, they should get in touch with the person directly, follow your established protocols for the transfer of sensitive information, and minimize the number of people involved in the transaction.

    Taking security a step further

    Data loss prevention (DLP) systems are also valuable weapons against these types of phishing attacks. They evaluate traffic going in and out of your company, such as web usage, emails and instant messages, and virtually anything sent on your network. DLP systems can filter out private details, including Social Security numbers, and stop them from being sent out.

    But beware, DLP systems come with a minor drawback, as they can also block legitimate traffic, like when your accounting department sends tax info to your CPA. Fortunately, an MSP like us can properly segregate the good and the bad traffic to avoid confusing and/or frustrating your employees.

    Phishing schemes may be a normal occurrence during tax season, but that doesn’t mean you can’t do anything about it. Don’t let the vulnerabilities in your business, particularly the human element, fall prey to cybercriminals. Send us a message right away and we’ll conduct an assessment of the security of your business, as well as design a risk management plan to help counter future complications.

    Published with permission from TechAdvisory.org. Source.
  • Does private browsing secure your data?

    Does private browsing secure your data?

    If you’re getting targeted with surprisingly relevant ads, there’s a chance your internet activity is being tracked and analyzed by market researchers. While this doesn’t bother most people, private browsing mode can offer you some protection against online marketers and would-be data thieves.

    What is private browsing?
    Your web browser — whether it be Chrome, Edge, Firefox, Safari, or Opera — remembers the URLs of the sites you visit, cookies that track your activity, passwords you’ve used, and temporary files you’ve downloaded.

    This can be convenient if you frequently visit certain pages, can’t remember your login details, or if you’re trying to recall a website you visited a few days ago. But if someone else uses or gains access to your computer, your most private (and embarrassing) internet activities are exposed for anyone to see.

    With private browsing — also called Incognito Mode in Chrome and InPrivate Browsing in Edge — all the information listed above does not get recorded. In fact, all the websites and information you accessed in the private browsing session is immediately discarded without a trace as soon as you close the browser. This can come in handy when you’re using a public computer because you’re instantly logged out of all the accounts after closing the window.

    Your cookies also won’t be tracked. In a normal browsing session, sites like Facebook will inundate you with highly targeted ads based on the sites and pages you’ve visited. But in private browsing mode, your internet activity won’t be used against you by marketing companies.

    Another benefit of private browsing is you can use it to log in to several accounts on the same site, which is useful if you need to log into two different Google accounts at the same time.

    Limitations of private browsing
    Although private browsing does prevent your web browser from storing your data, it doesn’t stop anyone from snooping on your current activities. If your computer is connected to the company network, system administrators can still keep track of what you’re browsing even if you’re in Incognito Mode.

    Also, if spyware or keylogger malware is installed on your computer, hackers will still be able to see what you’re doing online. Even though private browsing has quite a few benefits, you shouldn’t solely depend on it for online privacy.

    Your computers must be equipped with Virtual Private Networks that encrypt your internet connection and prevent anyone from intercepting your data. And don’t forget to scan your computer for viruses with a strong anti-malware program to keep spyware and other malicious web monitoring software at bay.

    If you want to know where you can get these solutions or learn more about web browser security, call us today. We have the tools and expert advice you need to prevent anyone from snooping on your internet browsing.

    Published with permission from TechAdvisory.org. Source.
  • Use Single Sign-On to Tackle Account Sprawl at Your RIA

    Use Single Sign-On to Tackle Account Sprawl at Your RIA

    No matter how valuable your cloud subscriptions are, each new set of login credentials employees are forced to create and memorize adds another level of inefficiency. With something called Single Sign-On (SSO), your RIA can create a single user profile for each employee that logs them into all their online accounts. If you’re overwhelmed by the number of passwords linked to your name, SSO is a dream come true.
    What is SSO?
    Single Sign-On solutions allow you to create one username and one password that thousands of websites will recognize. If you’ve ever clicked ‘Login with Google’ on a non-Google website, you’ve already enjoyed the benefits of SSO. It’s faster, simpler, and more secure. Now, midsized businesses, including RIAs, can accomplish the same level of efficiency between their employees and cloud platforms.
    Instead of asking everyone in the office to track separate accounts for Office 365, Slack, Quickbooks, and whatever other cloud applications your company relies on, you can give them one set of credentials and manage what they have access to remotely. Employees come to work, enter their ACME Inc. username and password, and they’re set for the day.
    Why is SSO more secure?
    There are a number of ways to set up a SSO solution for RIAs, but most of them focus on removing login information from your servers or network storage. Usually, you’ll provide your employees’ logins to an SSO provider (sometimes referred to as an Identity-as-a-Service provider) and each employee will receive a single login paired with a secondary authentication — like a fingerprint or an SMS to a personal device.
    Each time one of your employees visits a cloud platform, such as Office 365, the SSO provider will verify the user’s identity and the security of the connection. If anything looks amiss, your IT provider will be notified.
    Should your network or any of its devices be compromised, hackers would find nothing but logins to your SSO accounts, which are meaningless without fingerprints or mobile devices.
    How to get started with SSO
    The first step when setting up a Single Sign-On solution is making sure you have a healthy and responsive IT support system in place. You need a team that is constantly available to review suspicious alerts and troubleshoot employee issues. If you don’t currently have that capacity, contact us today and we’ll help you out!

    Published with permission from TechAdvisory.org. Source.

  • Differentiating Groups, Yammer, and Teams for your RIA

    Differentiating Groups, Yammer, and Teams for your RIA

    Yammer, Outlook Groups, and Microsoft Teams have plenty in common. They’re all Office 365 tools designed for sharing files and communicating with colleagues. So what differentiates each from the other and when should you use them? Here’s a quick rundown to help you decide.

    Outlook Groups

    With Outlook Groups, every member gets a shared inbox, calendar, project planner, notebook, and document library. You also get the ability to connect to third-party apps — like Twitter, Trello, and Mailchimp — so notifications are sent directly to your shared inbox.

    This means all relevant messages and information are contained in one place, so if a majority of your conversations occur via email then, Outlook Groups is the perfect choice. What’s more, HR and Sales departments that communicate with external parties will also find plenty of uses for its email features.

    One drawback with Outlook Groups, however, is email overload. Because all messages and notifications are sent to one inbox, users may be overwhelmed by the number of emails they have to sort through every day.

    Microsoft Teams

    Then there’s Microsoft Teams, a chat-based collaboration platform similar to Slack. It works with Skype for Business so you can text, call, video chat, and share files with colleagues. And thanks to its seamless integrations with other Office 365 programs, you can even work on shared files without having to leave the app.

    Unlike Groups, Microsoft Teams is designed for high-velocity collaboration, making it the best of the three for completing projects with tight deadlines or other tasks where employees need immediate feedback.

    Yammer

    Much like Groups and Teams, Yammer works well with other Office 365 tools like Outlook and OneDrive. But the big difference is Yammer is a social media app designed to foster open communication and break down barriers between teams.

    With Yammer, important files and announcements can be shared with the entire company like an office bulletin board. What’s more, users can see the most popular post on their feeds, follow it, and even provide their input by leaving a comment.

    Yammer also takes design elements and features from popular social media apps like Facebook, making it a popular choice for companies with a significant number of millennials in their workforce.
    Although we’ve discussed the fundamental differences between Groups, Teams, and Yammer, we’ve barely scratched the surface of what each app can do. To figure out which apps you need, you must understand how your employees work, how they prefer to collaborate, and what you want to achieve.

    But there’s another way to find the right app for your business. Contact us today for an IT assessment!

    Published with permission from TechAdvisory.org. Source.

  • 5 ways your employees will invite hackers into your network

    5 ways your employees will invite hackers into your network

    Whether they’re criminals or heroes, hackers in the movies are always portrayed as a glamorous group. When it comes down to the wire, these are the individuals who crack into the ominous megacorporation or hostile foreign government database, hitting the right key just in the nick of time. They either save the day or bring down regimes, empty the digital vault of the Federal Reserve or disable all the power plants in the country. It’s always a genius up against an impenetrable fortress of digital security, but no matter what, they always come out on top.

    In real life, it’s rarely that difficult. Sure, if you look at the news, you might believe hackers are close to their Hollywood counterparts, stealing data from the NSA and nabbing millions of customer records from Equifax. But the majority of hacks aren’t against the big dogs; they’re against small to mid-sized businesses. And usually, this doesn’t involve actually hacking into anything. A lot of the time – approximately 60% according to the Harvard Business Review – an unwitting employee accidentally leaves the digital front door open.

    The biggest threats to your company aren’t teams of roaming hackers; they’re your employees. Here’s why.

    1. They’ll slip up because they don’t know any better.

    With the proliferation of technology has come an exponential rise in digital threats of such variety and complexity that it’d be impossible for the average person to keep track of it all. Each of your employees’ lives are a labyrinth of passwords, interconnected online accounts and precious data. If their vigilance slacks at any point, it not only leaves them vulnerable, but it leaves your company vulnerable as well. For this reason, most cyber-attacks come down to a lack of cyber security education.

    2. They’ll let you get hacked on purpose.

    It’s a sad fact that a huge portion of digital attacks are the result of company insiders exposing data to malicious groups. Whether it’s info vital for your competitive advantage, passwords they can sell to hacker networks to make a quick buck, or sensitive data they can make public simply to spite your organization, it’s difficult to protect against a double agent.

    3. They’ll trust the wrong person.

    For many hacks, little code is needed whatsoever. Instead, hackers are notorious for posing as a trusted member of your own team. And if you believe that you’d be able to spot an impostor from a mile away, you may want to think again. Not only is it easier than ever to crack individual users’ e-mail passwords and login credentials, personal info is now littered throughout social media. A simple visit to Facebook can give a hacker all they need to know to “social hack” their way into the heart of your business.

    4. They’ll miss red flags while surfing the web.

    Clickbait is more than a nuisance plaguing your social media feeds. It can be a powerful tool for hackers trolling for easy prey. If an employee doesn’t understand what exactly makes a site or link look dubious, they may open themselves – and your company – to browser exploits or other types of attacks.

    5. They’re terrible at passwords.

    According to Entreprenuer.com, “3 out of 4 consumers use duplicate passwords, many of which have not been changed in five years or more.” Even more of those passwords are simply weak, inviting easy access for unsavory elements. Many people brush off the importance of strong passwords, but the risks posed by the password “123456” or “password” cannot be overstated.

    When it comes to defending your precious assets against digital threats, it can seem impossible to protect yourself at every turn. But there is one way you can make a concrete change that will tighten up your security more than you realize: educating your people. Through a comprehensive security training program, including specific examples of methods hackers use – particularly phishing – you can drastically minimize the risk of an employee accidentally opening up a malicious e-mail or posting sensitive info. When you make a concerted effort to make the entire organization vigilant against cyber-attacks, you’re much less likely to be targeted.

    You might also be interested in our free eGuide: What attacks aren’t you seeing? to learn more about protecting your business.

    Published with permission from TechAdvisory.org. Source.