Archives May 2011

Save Face at Work with Outlook

 

1. Save face with MailtipsHave you ever hit “Reply All” to an email when you didn’t mean to? Or sent important information to someone and never gotten a response, only to learn later their email address was invalid? Microsoft Exchange 2010 and MailTips, a new Microsoft Outlook 2010 feature, can help prevent embarrassing mistakes, save you time, and alleviate frustration.Learn more: Turn on or off MailTips
2. Share your scheduleYou can share your calendar with others on a Microsoft Exchange Server—with permission, of course. Or you can publish your default Outlook 2010 to the web, which can allow more people to view it. If you publish your calendar to the web, you don’t have to have an Exchange account, and anyone can see it, even if they don’t have an Exchange account, either.Learn more: Introduction to calendar sharing
3. Stop repeating yourselfDo you do a lot of the same things over and over with emails? Like frequently move messages to a specific folder that you’ve set up? Or often forward messages to your team? Quick Steps in Outlook 2010 can help by turning commands and procedures that you use most often into one click actions.Learn more: Automate common or repetitive tasks with Quick Steps
4. Get in on the conversation—and manage itAt work you may often have conversations over email, where several people are weighing in on important issues. Have you ever missed someone’s response in one of these email conversations? Now you can see your email within the context of the conversation, with Conversation View. See the overall conversation, including your responses, find the most recent response, and easily figure out the message that is most important to you.Learn more: View email messages by conversation
5. Get in on the conversation—and ignore itMaybe you are no longer needed in an ongoing email conversation—or maybe the subject matter is no longer important to you. Whatever the reason, you can prevent additional responses from appearing in your inbox. The Ignore command moves the whole conversation and any future messages that arrive in the conversation to the Deleted Items folder.Learn more: Ignore all email messages in a conversation
6. Let colleagues know when you aren’t aroundIf you’re going to be heading out on vacation or even just away for the day, you can let your colleagues know your schedule and when they can expect to hear from you again. Customize automatic responses to emails you receive whenever you are unavailable.Learn more: Automatically reply to email messages with an Exchange account.
7. Protect what you sendIt’s easy to communicate with pretty much anyone via email. But there are times when you don’t want email you send to be forwarded to others, or printed out, or copied. You can use Information Rights Management (IRM) to help prevent sensitive email from being read, printed, forwarded, or copied by unauthorized people.Learn more: Introduction to IRM for email messages
8. Have it all in one place—and hear it, tooWith Unified Messaging (UM), you can receive email, voice, and fax messages in your Outlook Inbox. If you have an Exchange Server 2010 account, you can get Voice Mail Preview, which delivers both a recording and text that’s been created from the voice recording using automatic speech recognition.Learn more: Introduction to Microsoft Exchange Unified Messaging
9. Contact info is at your fingertipsThanks to the Microsoft Outlook Global Address List (GAL), you no longer have to keep your contacts’ information stored on your computer–where it takes up space and gets out of date before you can manually update it. The Global Address List (GAL) tracks it all for you: phone numbers, building location, email addresses, and more.
10. Make sure they get itNeed to make sure your boss reads an email that you send her? Want to get your team to vote on their favorite restaurant for your team outing? You can add many different types of tracking to your email messages, including delivery and read receipts, voting buttons and follow-up actions.Learn more: Add tracking to email messages
11. Meet anywhere, anytimeGrab them for a meeting–just once or every week–find a meeting room, and even schedule meetings in a different time zone. Clicking the New Meeting button gives you access to everything you need to set up meetings with one or many.Learn more: Schedule a meeting with other people
12. Let someone else mind your calendarYou need to hand over your scheduling responsibilities to someone else—for just a bit, or for a good while. Or maybe you need to manage someone else’s schedule. The Delegate Access feature in Outlook lets meeting requests be received, accepted, and even sent for you by someone else.Learn more: Delegate access: Let someone else mind your calendar
13. Check email from any computerDon’t worry about dragging your laptop with you everywhere you go anymore: You can access your email from any computer connected to the Internet using any major web browser—even if it doesn’t have Microsoft Outlook on it. Outlook Web App (OWA) is a web-based version of Outlook that lets you access and send email, manage your calendar, and more.Learn more: Outlook Web App in Exchange 2010
14. It’s on your phone!Did we say forget about dragging your laptop with you? Well, forget about even needing to have a computer—Windows Phone 7 automatically comes with Office Mobile so you can check and send email, update your calendar, and keep on top of all that you need to.Learn more: Office Mobile site
15. No more extra gearIt used to be that when you were outside of your organization’s firewall, like when you were working from home or traveling, you’d need to log in to Outlook using a virtual private network (VPN) connection, which often required a smartcard or special tokens. Now Outlook offers Outlook Anywhere, an alternative to VPN connections that lets you use Outlook just as you normally do at your organization, without the need for special connections or hardware.Learn more: Use Outlook Anywhere to connect to your Exchange Server without a VPN

BBB Advises Internet Surfers to Use Caution

Protecting your identity is important and with Wi-Fi networks popping up nearly everywhere, many consumers don’t realize the dangers that come with using a Wi-Fi connection that is not their own. According to a recent poll conducted by Wakefield Research and Wi-Fi Alliance, 32 percent of respondents said they have tried to get on a Wi-Fi network that was not their own, a startling 18 percent more than a December 2008 poll. The Better Business Bureau, along with the Federal Trade Commission (FTC), urges consumers to think ahead before surfing the Web on a Wi-Fi hotspot.

Wi-Fi hotpots like coffee shops, libraries, airports, hotels and universities are all breeding grounds for hackers. According to the FTC, new hacking tools—available for free online—make hacking easy, even for users with limited technical know-how.

Consumers should be cautious before using a non-secure wireless network and before sending personal information via unencrypted websites. When surfing on a non-secure Internet connection, an individual’s personal information, private documents, contacts, photos and even login information can be up for grabs as other users on the network have the capability of seeing what is being sent.

Steve Cox, President and CEO of the Council of Better Business Bureaus, warns consumers against two popular security scams that can be associated with using an unsecure Internet connection. “Many consumers don’t realize the repercussions that come from using a Wi-Fi hotspot. Phishing, a popular e-mailing scam, and smishing, a SMS texting scam, grow exponentially when hackers obtain access to personal information on the Web via an unsecure Wi-Fi network.” BBB urges consumers to protect themselves from such scams by securing their Internet surfing.

In order to confirm that an Internet connection is secure, BBB advises consumers to follow the FTC’s top Wi-Fi tips:

Make sure the connection is protected by a unique password. If a Wi-Fi hotspot doesn’t ask for a password, the Internet connection is not secure. If a hotspot asks for a password just to grant access, consumers should proceed as if the connection were unsecured. Only trust home and work internet connections that are protected by a customized user password. Wi-Fi hotspot connections with generic passwords are vulnerable to hackers.

Transmitted information should be encrypted. When sending personal information like addresses, credit card numbers and Social Security numbers over the Internet, make sure the website is fully encrypted and the network is secure. Look for https (the “s” stands for secure) at the beginning of the URL address to confirm its security.

Don’t stay permanently logged-in to wireless hotspots. Never leave your Internet connection running while your computer is unattended and make sure to log-off after every use.

Change your passwords frequently. When creating new accounts, make sure you use different passwords. Do not use the same password for different sites. If one password is hacked, the chances of other accounts being hacked becomes greater with repeated passwords.

For more advice on security scams, visit www.bbb.org or to learn more about protecting your privacy online and what to do if your information is compromised, visit www.OnGuardOnline.gov and http://www.ftc.gov/opa/2011/02/wireless.shtm