Windows tip of the week: Organize your cloud files the easy way

How to set up a Cloud Files library:

Cloud Solutions

You probably have two, three, or maybe even more folders that sync files from cloud to your PC right now: Dropbox, Google Drive, OneDrive, and so on. How do you keep track of all that cloud content? Set up a Cloud Files library in File Explorer. Here’s how:

In Windows 8.1 or Windows 10, right-click any empty space in the navigation pane on the left and make sure Show Libraries is selected. (Libraries are visible by default in Windows 7’s Explorer.)

Right-click the Libraries heading and then click New | Library. Change the default name to something descriptive, like Cloud Files.

Right-click the first locally synced cloud folder and select Include In Library, choosing the name of your newly created library.

Repeat that step for each additional local folder.

That’s it. You can now get a unified view of all your cloud files by selecting that library in File Explorer. Use the search box to quickly find any file, regardless of where it’s stored.

Have questions?

For More Tips & Info from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

Office 365 gets Six new Excel Functions

Microsoft made several new updates to Office 365 in February, including the addition of six useful functions for Excel.

EcxelOffice365

When it comes to general updates to Microsoft Office 365, February 2016 was a fairly significant month. Microsoft rolled out numerous improvements to Office 365, like better pen annotation integration, the ability to pin documents to the Start menu, a new feature that allows images to be inserted into documents directly from the camera, and the best—adding more functions to Excel.

Six new functions

Using, combining, and creating formulas in Microsoft Excel is where true Excel gurus separate themselves from the pretenders and wannabes. For an Excel aficionado, the satisfaction of creating the perfect nested formula is second to none when it comes to Excel coding. So when Microsoft adds six new functions to Excel in one month it is a very big deal.

Of course, while there is great satisfaction when you figure out the perfect formula, a certain amount of despair also goes with it—because now you have to apply that complicated nested formula over and over again. This is where the six new functions are supposed to help.

The first updated functions are TEXTJOIN and CONCAT, and they are replacements for the old concatenate function, which gave the user the power to join strings of separate text into one cell. This comes up with addresses all the time—a common task for spreadsheets since they were invented.

In the past, the formula would look something like this:

=CONCATENATE(A3, “, “, B3, “, “, C3,”, “, D3, “, “, E3)

With the new TEXTJOIN formula, the same process would look something like this:

=TEXTJOIN(“, “, TRUE, A3:E3)

This is just one example of how these new functions are designed to simplify users’ lives when it comes to advanced Excel tasks.

The next two new functions are IFS and SWITCH, which provide an alternative to using the infamous series of nested IF functions. The old IF function was the mainstay for Excel coders looking to apply logic to sets of data. You know what I mean: If this is larger than this, than this; but if it is larger than this but less than that, then this, etc. The more nested IF functions the more complicated the formula and the more likely you are to make a mistake.

The last two new functions are MAXIFS and MINIFS. They are designed to supplement the MAX and MIN functions by allowing users to apply conditions to the maximum and minimum calculations and thereby filter results. In the past you may have had to use the IF function to create your filtered conditions. These new functions eliminate the need and make your life just that much simpler.

Office365

Bottom line

When Microsoft began trying to convince us that subscribing to Office 365 was a better idea than repurchasing new versions every few years, the ability to update the productivity suite regularly at no extra cost was one of the main selling points. As the new six functions illustrate, that was not a false promise.

These functions are just the tip of the iceberg when it comes to Office 365 improvements. However, the problem with continuous updates to the software is that users have to try to keep up.

Even though there are some users out there who will keep using nested IF functions no matter what improvements come along, for example. But for the rest of us, it would seem to be worthwhile to pay attention to whatever improvements Microsoft rolls out each month. Because for better or worse, changes to Office 365 are going to keep coming.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

Exclusive offer from BigBeagle.com

Exclusive offer from: BigBeagle.com  |  24/7 Support: 8885051532
Amit Shah — Customer Number: 57156051

BigBeagle is a reseller of GoDaddy and offers GoDaddy products at a discounted price. Don’t forget to visit our coupon page at http://bigbeagle.com/coupons for the latest and greatest promotions.

Save upto 15% on new purchases and get everything you need. Hurry before the offer expires.

Coupon3-23-2016

Use promo code in your cart when you order.

*Some limitations apply. Applicable to new purchases only. Enter promo code into shopping cart to see full details. Offer expires Tuesday, April 12, 2016 at midnight (Mountain Time).

Copyright © 2016 BigBeagle.com. All rights reserved.

Windows tip of the week: How to save time with environment variables

Save time and keystrokes with environment variables:

When asked to open your user profile in File Explorer, you’ll probably type its full path: C, colon, backslash, Users, backslash, followed by your user name. But there’s a much faster way:

Type %userprofile% and press Enter.

Congratulations, you just saved a half-dozen keystrokes or so by using one of many useful environment variables in Windows. These are reserved names, enclosed between percent signs, that represent the current location of a specific system folder.

Here are a few other useful ones to know:

%localappdata% The hidden folder in your user profile where Windows apps store your data

%windir% The folder containing Windows system files; usually C:Windows

%public% A special user profile that contains folders for Documents, Downloads, Music, Pictures, and Videos, intended for sharing on a home network

%temp% or %tmp% The normally hidden folder where Windows and apps can store files necessary for one-time tasks

Some people write these variables using mixed case (%ProgramFiles%, for example) to make them easier to read. But they’re not case sensitive, so skip the Shift key if you want.

Have questions?

For More Tips & Info from Microsoft Cloud Solutions Partner!
Call us at: 856-745-9990

TECHIES is a full Managed IT Services Company headquartered in Marlton, New Jersey for over 20 years with a new location opening soon in Wilson, North Carolina. TECHIES provides Managed IT Services, Cybersecurity Solutions, Website Design ServicesDedicated Server SolutionsIT ConsultingVoIP Phone SolutionsCloud Solutions, Network Cabling and much more.

Beware downloading some apps or risk “being spied on”

Popular apps on your smartphone can be convenient and fun, but some also carry malicious software known as malware, which gives hackers easy access to your personal information.

A security firm found that between 75 and 80 percent of the top free apps onAndroid phones or iPhones were breached. The number jumps as high as 97 percent among the top paid apps on those devices.

Whether these apps help advertisers target you or help hackers rip you off, you’ll want to do your homework before downloading apps, reports CBS News correspondent Anna Werner.

California’s Susan Harvey said she was a victim after she used a debit card to download a slot machine game app to her cell phone through a Google Play store account.

“It was something you purchased once, for like $15,” Harvey said.

When she went to reload the game, she found hundreds of purchases had been made — by her math, more than $5,000 worth of transactions.

“My heart sank, I just sat there looking at it… I physically, I was sick, because I didn’t know what they were,” Harvey said.

That story’s no surprise to cybersecurity expert Gary Miliefsky, whose company SnoopWall tracks malware. He said certain apps are designed to steal your personal information.

“What are the consequences for me as a consumer?” Werner asked.

“You’re gonna lose your identity. You’re gonna wonder why there was a transaction. You’re gonna wonder how someone got into your bank account and paid a bill that doesn’t exist,” Miliefsky said.

Milifesky said when you download an app, you also give permission for it to access other parts of your phone, like an alarm clock app that can also track phone calls.

“You think an alarm clock needs all those permissions? Access to the Internet over wifi, your call information, calls you’ve made, call history, your device ID? This to me is not a safe alarm clock,” Miliefsky said.

And there’s the weather and flashlight apps that he says exploit legitimate banking apps to capture information, as he showed us in a demonstration of what could happen when someone takes a photo of a check to send to their bank.

“The flashlight app spies on the camera and noticed the check and grabbed a copy of it. Shipped it off to a server somewhere far away,” Miliefsky said.

Last year the group FireEye discovered 11 malware apps being used on iPhones that gathered users’ sensitive information and send it to a remote server, including text messages, Skype calls, contacts and photos Apple fought back by removing the apps and putting stricter security measures in place.

“They get at your GPS, your contacts list…to build a profile on you,” Miliefsky said.

Some apps are simply collecting information for advertising purposes. In 2014, the Federal Trade Commission settled a lawsuit with a company over its popular Brightest Flashlight app, alleging it transmitted consumers’ personal information to third parties without telling them.

But Miliefsky said he’s found another flashlight app that can do much more troubling things.

“This one turns on your microphone in the background, listens in on you, and sends an encrypted tunnel to a server we discovered in Beijing,” Miliefsky described.

“You’re saying that they’re actually listening to people’s conversations and sending that audio back to Beijing?” Werner asked.

“Yeah, we’ve tracked it. I can show you where it does it,” he said.

Miliefsky said it can be traced to a few blocks from Tiananmen Square on Information Drive in Beijing.

He gave a report on that app to the FBI.

“Because to me, it’s spyware at the nth degree,” Miliefsky said.

His recommendation?

“We really have to look at our phone and say, ‘This is really a personal computer that fits in our pocket. Let’s shut down all the apps we don’t use. Let’s delete apps that don’t make sense and reduce the risk of being spied on,'” Miliefsky said.

The creator of the Brightest Flashlight app settled with the FTC, agreeing to change its policy and delete all the information it had gathered.

Harvey sued Google over her alleged hack, but a judge recently dismissed it, saying she and her attorney filed too late. Google said fewer than one percent of Android devices got bad apps in 2014.

Have questions?

Get answers from a Microsoft Cloud Solutions Partner!
Call us at: 856-745-9990

TECHIES is a full Managed IT Services Company headquartered in Marlton, New Jersey for over 20 years with a new location opening soon in Wilson, North Carolina. TECHIES provides Managed IT Services, Cybersecurity Solutions, Website Design ServicesDedicated Server SolutionsIT ConsultingVoIP Phone SolutionsCloud Solutions, Network Cabling and much more.

10 of the latest security products that can help you fight the bad guys

1. IBM z13s mainframeIBM z13s mainframe

Image: IBM

Security standards are constantly changing. Here are some of the latest software and hardware products to help keep your organization secure.

In February 2016, IBM announced the IBM z13s, a mainframe with cryptographic features built directly into the hardware. According to IBM it can decrypt at twice the speed of the generations before it.

2. Cisco Firepower NGFW

Cisco Firepower NGFW

Image: Cisco

Cisco recently announced its Firepower series appliances with its next-generation firewall (NGFW) technology. There are 16 models in the series that include integrated NGIPS and advanced malware protection.

3. Illumio

Illumio

Image: Illumio

Illumio is a startup that provides adaptive security for the data center and cloud environments. The company recently achieved unicorn status as its value topped $1 billion, and it is consistently named a top enterprise security provider.

4. GOTPass

GOTPass

Image: University of Plymouth, H. Alsaiari, M. Papadaki, P. Dowland, and S. Furnell

GOTPass is a graphical authentication system developed by researchers at the University of Plymouth. It uses images to authenticate instead of traditional passwords.

5. Skyport Systems SkySecure

Skyport Systems SkySecure

Image: Skyport Systems

SkySecure is an out-of-the-box enterprise security solution to protect application workloads. The systems includes hardware, software, and management tools.

6. Spikes Security Isla

Spikes Security Isla

Image: Spikes Security

The Isla is an enterprise appliance that “isolates and eliminates all browser-borne malware.” It was launched in mid-2015, but it was independently certified as invulnerable to web malware exploits in early 2016.

7. Blackphone 2

Blackphone 2

Image: Zack Whittaker/CNET

The Blackphone by Silent Circle is an Android-powered smartphone with a built-in security center to lock down your data. The most recent iteration, the Blackphone 2, released late last year.

8. Imation IronKey Enterprise H350

Imation IronKey Enterprise H350

Image: Imation

The IronKey Enterprise H350 is a rugged, military-grade encrypted hard drive. It is available in multiple capacities and is FIPS 140-2 Level 3 certified.

9. Bitdefender Total Security 2016

Bitdefender Total Security 2016

Image: Bitdefender

For home users and small businesses, the Total Security 2016 by Bitdefender is a great option. It stacks up well against key competitors and includes device anti-theft features.

10. Qubes OS 3.1 rc2

Qubes OS 3.1 rc2

Image: Qubes

Qubes OS is a Linux-based, security-oriented OS that is focused on compartmentalization using VMs. It’s been around for a few years, but the latest version released in January 2016.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Windows tip of the week: How to customize the Send To menu

Customize the Send To menu:

The Send To menu is a particularly useful feature in File Explorer. You can right-click any file or folder, choose Send To, and copy or move those objects to a folder of your choosing. You can also open compatible files by sending them to an application shortcut.

Unfortunately, the default list of Send To destinations is sketchy to say the least. But if you create a shortcut, you can customize that list to your heart’s content. The secret is to open the Run box (Windows key + R), type the command shell:sendto, and then press Enter.

The folder with all the items you see on the Send To list will pop up. To delete an item, just right click it and select delete. To add destinations, like the Videos or Music folders, by dragging them from the menu on the left.

Have questions?

For More Tips & Info from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

Yammer is on the way to Office 365: Are you ready?

Microsoft is activating Yammer for every Office 365 subscription. But is this one collaboration tool too many?

On February 2, 2016, Kirk Koenigsbauer announced in the official Microsoft Office 365 blog that Yammer is now being activated for every eligible Office 365 subscription. In a nutshell, that means Yammer is going to be another app on the Office 365 app list unless an admin specifically turns off access. Your enterprise should plan accordingly.

Yammer

For those of you unfamiliar with the product, Yammer bills itself as an enterprise internal social network. It mixes the typical chat messenger application with collaboration tools available in Office 365.

Similar to the Delve tool we looked at last week, Yammer can serve as the central hub for team collaboration. From within a Yammer discussion, teams can set up meeting appointments using Outlook, switch to a full-fledged Skype for Business video meeting, and access OneDrive for Business to create collaborative documents.

The initial rollout of Yammer took place on February 2, 2016; the rest of the rollout will take place in stages. The next release is March 1, 2016, and the last is April 1, 2016. According to the blog post, the first wave is for “Office 365 customers with a business subscription who purchased fewer than 150 licenses that includes Yammer and who have zero or one custom domains for Yammer.”

The second wave is for “Office 365 customers with a business subscription who purchased fewer than 5,000 licenses that includes Yammer.” Customers with an education subscription are not included.

The final wave is for “remaining customers with a business subscription and all customers with an education subscription.” For subscribers who have never had a Yammer account, the rollout will take place last, in April. Alas, that is the wave I’ll have to wait for.

Collaboration

Yammer is the latest, and perhaps the last, major teamwork collaboration app to be added to Office 365. In Microsoft’s vision of a mobile-first, cloud-first enterprise, teams collaborate across distances using shared documents, video conferencing, and applications that tie it all together in one virtual location.

YammerForOffice365

With the addition of Yammer, Microsoft is offering several tools teams can use to manage and organize their collaboration activities. Teams can use Yammer, Delve, Groups, Sites, SharePoint, and OneNote to manage their shared conversations and documents across the enterprise. One of those tools should be able to satisfy even the most persnickety of teams.

Bottom line

But then again, that may be where we run into problems. One could argue that there are too many collaboration tools available in Microsoft Office 365. While all these wonderful choices may seem good at first glance, it is possible that subscribers may become overwhelmed.

Microsoft’s idea that teams can choose the best tool for them or for the project they are working on sounds all well and good, but it does still require someone to make an important initial decision. For some people, making a decision that will affect a project from start to finish can be a daunting task.

In the long run, it may be beneficial for organizations to establish guidelines for when each of the collaboration tools works best. They may even decide to block some of the tools from use altogether in favor of a recommended best practice.

Having myriad collaboration tools is generally a good thing, but it might help move things along if the enterprise establishes some well thought out guidelines.

Have questions?

Get answers from Microsoft Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

TECHIES is a full Managed IT Services Company headquartered in Marlton, New Jersey for over 20 years with a new location opening soon in Wilson, North Carolina. TECHIES provides Managed IT Services, Cybersecurity Solutions, Website Design ServicesDedicated Server SolutionsIT ConsultingVoIP Phone SolutionsCloud Solutions, Network Cabling and much more.

Apple CEO Tim Cook: FBI asked us to build a back door into iOS

The most important Tech Case in a Decade

Customer Letter – Apple

February 16, 2016

A Message to Our Customers

The United States government has demanded that Apple take an unprecedented step which threatens the security of our customers. We oppose this order, which has implications far beyond the legal case at hand.

This moment calls for public discussion, and we want our customers and people around the country to understand what is at stake.

Answers to your questions about privacy and security

The Need for Encryption

Smartphones, led by iPhone, have become an essential part of our lives. People use them to store an incredible amount of personal information, from our private conversations to our photos, our music, our notes, our calendars and contacts, our financial information and health data, even where we have been and where we are going.

All that information needs to be protected from hackers and criminals who want to access it, steal it, and use it without our knowledge or permission. Customers expect Apple and other technology companies to do everything in our power to protect their personal information, and at Apple we are deeply committed to safeguarding their data.

Compromising the security of our personal information can ultimately put our personal safety at risk. That is why encryption has become so important to all of us.

For many years, we have used encryption to protect our customers’ personal data because we believe it’s the only way to keep their information safe. We have even put that data out of our own reach, because we believe the contents of your iPhone are none of our business.

The San Bernardino Case

We were shocked and outraged by the deadly act of terrorism in San Bernardino last December. We mourn the loss of life and want justice for all those whose lives were affected. The FBI asked us for help in the days following the attack, and we have worked hard to support the government’s efforts to solve this horrible crime. We have no sympathy for terrorists.

When the FBI has requested data that’s in our possession, we have provided it. Apple complies with valid subpoenas and search warrants, as we have in the San Bernardino case. We have also made Apple engineers available to advise the FBI, and we’ve offered our best ideas on a number of investigative options at their disposal.

We have great respect for the professionals at the FBI, and we believe their intentions are good. Up to this point, we have done everything that is both within our power and within the law to help them. But now the U.S. government has asked us for something we simply do not have, and something we consider too dangerous to create. They have asked us to build a backdoor to the iPhone.

Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation. In the wrong hands, this software — which does not exist today — would have the potential to unlock any iPhone in someone’s physical possession.

The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limited to this case, there is no way to guarantee such control.

The Threat to Data Security

Some would argue that building a backdoor for just one iPhone is a simple, clean-cut solution. But it ignores both the basics of digital security and the significance of what the government is demanding in this case.

In today’s digital world, the “key” to an encrypted system is a piece of information that unlocks the data, and it is only as secure as the protections around it. Once the information is known, or a way to bypass the code is revealed, the encryption can be defeated by anyone with that knowledge.

The government suggests this tool could only be used once, on one phone. But that’s simply not true. Once created, the technique could be used over and over again, on any number of devices. In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks — from restaurants and banks to stores and homes. No reasonable person would find that acceptable.

The government is asking Apple to hack our own users and undermine decades of security advancements that protect our customers — including tens of millions of American citizens — from sophisticated hackers and cybercriminals. The same engineers who built strong encryption into the iPhone to protect our users would, ironically, be ordered to weaken those protections and make our users less safe.

We can find no precedent for an American company being forced to expose its customers to a greater risk of attack. For years, cryptologists and national security experts have been warning against weakening encryption. Doing so would hurt only the well-meaning and law-abiding citizens who rely on companies like Apple to protect their data. Criminals and bad actors will still encrypt, using tools that are readily available to them.

A Dangerous Precedent

Rather than asking for legislative action through Congress, the FBI is proposing an unprecedented use of the All Writs Act of 1789 to justify an expansion of its authority.

The government would have us remove security features and add new capabilities to the operating system, allowing a passcode to be input electronically. This would make it easier to unlock an iPhone by “brute force,” trying thousands or millions of combinations with the speed of a modern computer.

The implications of the government’s demands are chilling. If the government can use the All Writs Act to make it easier to unlock your iPhone, it would have the power to reach into anyone’s device to capture their data. The government could extend this breach of privacy and demand that Apple build surveillance software to intercept your messages, access your health records or financial data, track your location, or even access your phone’s microphone or camera without your knowledge.

Opposing this order is not something we take lightly. We feel we must speak up in the face of what we see as an overreach by the U.S. government.

We are challenging the FBI’s demands with the deepest respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications.

While we believe the FBI’s intentions are good, it would be wrong for the government to force us to build a backdoor into our products. And ultimately, we fear that this demand would undermine the very freedoms and liberty our government is meant to protect.

TECHIES is a full Managed IT Services Company headquartered in Marlton, New Jersey for over 20 years with a new location opening soon in Wilson, North Carolina. TECHIES provides Managed IT Services, Cybersecurity Solutions, Website Design ServicesDedicated Server SolutionsIT ConsultingVoIP Phone SolutionsCloud Solutions, Network Cabling and much more.

Exclusive offer from BigBeagle.com

Exclusive offer from: BigBeagle.com  |  24/7 Support: 8885051532
Amit Shah — Customer Number: 57156051

BigBeagle is a reseller of GoDaddy and offers GoDaddy products at a discounted price. Don’t forget to visit our coupon page at http://bigbeagle.com/coupons for the latest and greatest promotions.

Save upto 10% on the purchases of $40 or more and grow your web presence. Hurry before the offer expires.

Coupon

Use promo code rs6216a in your cart when you order.

*Some limitations apply. Applicable to new purchases only. Enter promo code into shopping cart to see full details. Minimum purchase of $40 required. Offer expires Thursday, March 17, 2016 at midnight (Mountain Time).

Copyright © 2016 BigBeagle.com. All rights reserved.