Back to Top

Tech, Web, Cloud & Cabling Services

Category: News

South Jersey Techies

Shark Tank host, Barbara Corcoran loses $388,700 in phishing scam

Barbara Corcoran of ABC’s “Shark Tank” has lost nearly $400,000 in a phishing scam this week. Corcoran told “People” that she was tricked as a result of an email scheme sent to her team.

The high-powered businesswoman told People that she received a scam invoice approving a real estate renovation, but she didn’t think twice about verifying it because she invests in real estate. It was only until her bookkeeper caught Corcoran’s assistant’s email was misspelled by 1 letter and it was later found to be the address used by the scammer.

“I was upset at first, but then remembered it was only money,” Corcoran told the magazine.

Corcoran’s assistant Emily Burke told CNN Business that the “Shark Tank” star wouldn’t provide any additional comment “at the advisement of her attorneys until the authorities are done investigating.”

However, Corcoran tweeted: “Lesson learned: Be careful when you wire money!” with a link to a TMZ story.

In addition to being an investor and a judge on the hit ABC show, Corcoran formerly owned the global real estate agency that shares her name. She sold it for $66 million in 2001.

Corcoran fell for a phishing scam. It’s common, too: Nearly 30,000 people reported being a victim of that type of scam last year. Together they reported nearly $50 million in losses, according to the FBI’s 2018 Internet Crime Report.

Phishing attacks are common methods of stealing usernames, passwords and money. Hackers pretend to be a trustworthy source to convince you to share personal data. To be safe, it’s important to make sure the sender is authentic before clicking on a link. Google has rolled out security protections that warns people of potential unsafe emails.

If you or your team have any questions or concerns please contact support at (856) 745-9990.



If you’ve ever owned a PC with a DVD drive, you may get a $10 settlement

Don’t expect your money anytime soon, however.

DVD drives may be a thing of the past, but the past could pay you $10 via a proposed settlement from a class-action suit.

If you purchased a DVD-ROM, DVD-RW or combination drive between April, 2003 and December 31, 2008, a collection of DVD drive manufacturers have tentatively agreed to pay you $10 per drive, whether you purchased the drive as part of a PC or by itself. You’ll simply need to visit the claim site and testify (under penalty of perjury) that you indeed purchased those drives within the given time period, and live in one of the 23 states (plus the District of Columbia) covered by the suit. The deadline to file is July 1.

Why this matters: Though the optical drive market continues to decrease—“the physical disk format is somewhat obsolete in the era of content streaming,” IDC wrote last year—that wasn’t the case fourteen years ago, when virtually all software was distributed via DVD-ROM. Fortunately, the settlement site isn’t asking for proof of purchase yet, but it reserves the right to do so. Filing a claim can take literally seconds, but don’t hold your breath—you’ll probably receive compensation, but there’s no guarantee.

The wheels of justice turn slowly

Simply put, a group of 23 plaintiffs sued virtually every DVD drive manufacturer, alleging that they collectively conspired to keep drive prices higher than they normally would be, in violation of antitrust laws. Though the defendants denied they did anything wrong, several—Hitachi-LG, Panasonic, NEC, and Sony—settled and agreed to pay a collective total of $124.5 million into four separate settlement funds.

(Note that only DVD drives for PCs are covered; a DVD player, such as the one gathering dust in your living room, isn’t.)

If you do submit a claim, however, the chances of receiving your settlement soon are slim. That’s because seventeen more defendants, including various subsidiaries of BenQ, Philips, Samsung, TEAC, and Pioneer, have yet to settle, and the suit will continue until all of the claims are resolved.

“Because other defendants remain in this litigation, the plaintiffs are proposing that distribution of the settlement funds not occur at this time,” the settlement site reads. “This is to save the expenses associated with distribution.”

In fact, the settlement hearing to finally approve the Hitachi-LG-Panasonic-NEC-Sony agreement will be held on December 8. After that, payments may begin—which means that you’ll probably receive your $10 or less a year from now. Yes, less: Payments will be “up to” $10 per drive, according to the claims site.

You should probably treat the settlement like one of those “print out your own rebate” slips from the turn of the century. Even under the best of circumstances, chances are you’ll have totally forgotten about your $10 windfall by the time the check arrives.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Microsoft teases Windows 10’s sleek new look for the future

“Project Neon” will give your Windows 10 PC a fresh coat of paint later in 2017.

Microsoft’s planning a sleek visual refresh for Windows 10, and the company quietly teased its first official glimpse of what’s coming in the future during the Windows Developer Day keynote on Wednesday.

There aren’t many details being shared about “Project Neon” right now—as the refresh was called in earlier leaks—but the new visual look will focus on animations and transitions. The basic concept is “to add fluidity, animation, and blur to apps and the operating system,” as first reported by Windows Central. The new design language also hopes to make it easier for developers to create attractive apps.

The design refresh should extend to all Windows 10 devices including PCs and tablets, HoloLens, Xbox, and the few surviving Windows Phones, according to Windows Central.

Twitter user Tom Hounsell shared a clean version of Microsoft’s first look at Windows 10’s forthcoming design tweaks. The image shown on the livestream had large text overlaid on top of the screenshot.

As you can see, this isn’t a huge change, but the visual refresh gives Windows 10 a sleeker, more modern feel. The taskbar icons look a little more dynamic and bolder. Cortana is using the icon instead of the search box, though it’s not clear if this will be the default look. The clock on the taskbar is also bolder, and the usual notification area icons including the Action Center are notably absent. The open Groove Music window itself looks more polished and Aero-esque as well, with no title bar to be seen—just unobtrusive options in the app’s upper-right corner.

The impact on you at home: Windows Central says that some of the code for Project Neon is already available in recent Insider Preview builds of Windows 10; however, it’s unlikely the visual refresh will be ready in time for the massive Creators Update this spring. Microsoft is expected to share more information about Neon during the Build conference in May. The Creators Update is expected to roll out in late March or early April, followed by a second major update later in 2017.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Microsoft IIS: Disabling the SSL v3 Protocol

 

Depending on how your Windows servers are configured, you may need to disable SSL v3.

Note that older versions of Internet Explorer may not have the TLS protocol enabled by default. If you disable SSL versions 2.0 and 3.0, the older versions of Internet Explorer will need to enable the TLS protocol before they can connect to your site.

For a Simpler Way to Disable the SSL v3 Protocol:

DigiCert is not responsible for any complications or problems if you decide to use this .zip file to disable the SSL v3 protocol on your server.

  1. Log into your server as a user with Administrator privileges.
  2. Download DisableSSL3.zip, extract the .zip file contents, and then double-click DisableSSL3.reg.
  3. In the Registry Editor caution window, click Yes.
  4. Restart server.

If you prefer to do it yourself, follow the steps in the instruction below.

Microsoft IIS: How to Disable the SSL v3 Protocol

  1. Open the Registry Editor and run it as administrator.For example, in Windows 2012:
    1. On the Start screen type regedit.exe.
    2. Right-click on regedit.exe and click Run as administrator.
  2. In the Registry Editor window, go to:HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\
  3. In the navigation tree, right-click on Protocols, and in the pop-up menu, click New > Key.
  4. Name the key, SSL 3.0.
  5. In the navigation tree, right-click on the new SSL 3.0 key that you just created, and in the pop-up menu, click New > Key.
  6. Name the key, Client.
  7. In the navigation tree, right-click on the new SSL 3.0 key again, and in the pop-up menu, click New > Key.
  8. Name the key, Server.
  9. In the navigation tree, under SSL 3.0, right-click on Client, and in the pop-up menu, click New > DWORD (32-bit) Value.
  10. Name the value DisabledByDefault.
  11. In the navigation tree, under SSL 3.0, select Client and then, in the right pane, double-click the DisabledByDefault DWORD value.Windows Registry Key
  12. In the Edit DWORD (32-bit) Value window, in the Value Data box change the value to 1 and then, click OK.
  13. In the navigation tree, under SSL 3.0, right-click on Server, and in the pop-up menu, click New > DWORD (32-bit) Value.
  14. Name the value Enabled.
  15. In the navigation tree, under SSL 3.0, select Server and then, in the right pane, double-click the Enabled DWORD value.
  16. In the Edit DWORD (32-bit) Value window, in the Value Data box leave the value at 0 and then, click OK.
  17. Restart your Windows server.You have successfully disabled the SSL v3 protocol.

For instructions about disabling browser support for the SSL v3 protocol, see Disabling Browser Support for the SSL 3.0.

 

Windows Server 2003 end of life guide

How to organize your migration from Windows Server 2003

 

Following on from end of support for Windows XP in April 2014, we are now rapidly approaching Windows Server 2003 end of life.

Despite Microsoft warning about end of life for Windows Server 2003 as early as April 2013, many organisations are yet to begin their migration away from the server platform. Worse still, many organisations and IT pros are unaware of the huge financial costs and security risks should they continue running Windows Server 2003 past the end of life date.

Reports from HP claim that more than 11 million systems are still running Windows Server 2003. With fewer than 240 days left until end of life, this a huge problem as the estimated time required to migrate a datacentre of 100 or more servers can range from a minimum of three months and upwards of 18 months.

If you own even one of those 11 million servers and you have yet to begin migration, you should be worried. Luck for you, the following guide will migrate you to a position of safety. We will cover the following:

• Windows Server 2003 End of Life date
• Understanding what end of support means for Windows Server 2003 and the associated impacts
• An outline of how to migrate Windows Server 2003
• Resources to aid migration

Windows Server 2003 End of Life date

According to the Microsoft Support Lifecyle section on 14 July 2015, Microsoft will end extended support on all versions of Windows Server 2003/R2.

Understanding what end of support means for Windows Server 2003

From then on, this means no more updates or patches from Microsoft, which can result a less secure and less stable infrastructure for your business. What this really means:

• Maintenance Costs – running legacy servers is expensive. Intrusion detection systems, advanced firewalls and network segmentation are required to protect a now vulnerable Windows Server 2003 platform. You will also have increasing cost from maintaining aging hardware. Current estimates in a TechNet post from Alex Fu place the cost of custom support post end of life at US$200,000 on average. In a Q&A with David Mayer, practice director of Microsoft Solutions for Insight Enterprises, he estimated a support cost of $1500 per server per year.

• No Updates – there will be no more updates to fix bugs, performance issues and security vulnerabilities. To put this into perspective, 2013 saw the release of 37 critical updates for Windows Server 2003/R2. Past the end of life date, these critical issues will remain unfixed leaving you open to cybersecurity dangers such as malicious attacks or electronic data loss.

• No Compliance – once support ends, your organisation will almost certainly fail to meet industry wide compliance standards. Regulations such as HIPAA, PCI, SOX & Dodd-Frank all require regulated industries to run on supported platforms. The impact is twofold: Non-compliance could result in the loss of business, while high transaction fees and penalties from non-compliance could dramatically increase the cost of doing business.

• Software and Hardware Compatibility Issues – new software and hardware devices will not be built to integrate with Windows Server 2003. Sticking with a legacy server means you will likely run into compatibility issues and may not be able to run new instances of software or communicate with the latest devices.

• No Safe Haven – without continued support from Microsoft, virtualized and physical instances of Windows Server 2003/R2 and Microsoft Small Business Server (SBS) 2003 will not pass a compliance audit.

How to migrate from Windows Server 2003

Do not underestimate the task that lies ahead. Migrating applications and server workloads is no easy task. Worryingly, a study by App Zero suggests that 62 per cent of organisations do not have a plan to upgrade or migrate, or even know that EOS is coming.

• Discover – first up is discovering and cataloguing all the software and workloads that are running on Windows Server 2003/R2 at present. Download the Microsoft Assessment and Planning toolkit as this will be a worthy support document.

• Assess – now you have a list it’s time to analyse and categorise all your applications and workloads based on type, criticality, complexity and risk. This helps you prioritise for migration as well as identify issues and opportunities.

• Target – in this step, you must choose a destination for each application and workload. This could be the perfect time to evolve your organisation to the next level and embrace the cloud. Microsoft offers a series of destinations for each application or workload which could include:

billionphotos-1008218 (1)

o Windows Server 2012 R2
o System Center 2012 R2 (Private Cloud)
o Microsoft Azure (Public Cloud)
o SQL Server 2014
o Office 365

• Migrate – now is the time choose a migration plan. Microsoft offers a fantastic Migration Planning Assistant which covers all four steps. Look for official Microsoft training courses to give you an in-depth understanding of the new platforms you are planning to migrate to.

Resources to aid migration

Due to the widespread requirement to migrate, there is a range of fantastic resources to aid migration. These include:

Microsoft Virtual Academy – arguably the largest and best collection of free self-study resources from Microsoft experts including videos, slide decks and self-assessments. Check out the section on migrating to Windows Server 2012, or the Microsoft zure JumpStart.

Windows Server 2003 Roles Migration Processdownload this document and turn it into an A3 poster, stick it on your wall and use it to visualise the whole process.

Microsoft Deployment Toolkitdownload this fantastic resource, which provides a collection of processes, tools and guidance for automating new desktop and server deployments.

Free Software Trials – Microsoft have a series of trials so you can check out the new software. Here they are:

Windows Server 2012 R2 trial
System Center 2012 R2 trial
Microsoft Azure one-month trial
Office 365 trial
SQL Server 2014 trial

Windows Server Migration Services – there are a series of organisations that offer assistance in migrating away from Windows Server 2003. Big players include:

• Dell
• RackSpace
• HP

Time is running out — start your migration away from Windows Server 2003 today. Fail to do so and you find yourself facing some organisation-crippling consequences

Have questions?

Our Business IT Server Migration Specialists in NJ, PA & DE are here to help.
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/server-support/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Massive Delta outage highlights need for quality data center power, backup plans

Business leaders must prepare for disasters made by man or Mother Nature with extensive, practiced recovery plans to avoid system shutdowns.

A Delta ground stop was lifted Monday morning following a 2:30 a.m. ET power outage in Atlanta that delayed and cancelled flights worldwide. Businesses should view this as a cautionary tale, highlighting the importance of quality data center power and disaster control systems.

Delta cancelled approximately 300 flights due to the outage. As of 10:30 a.m. ET, it operated 800 of its nearly 6,000 scheduled flights. However, Delta customers heading to the airport on Monday should still expect delays and cancellations, according to a press release. As inquiries are high and wait times are long, there may also be some lag time in the display of accurate flight status from the airline, it warned.

Last month, Southwest Airlines cancelled 1,150 flights after a system outage. Though the system came back online within the day, hundreds of flights were backlogged.

Based on recent research, it’s fair to say that what happened to Delta and Southwest could happen to a number of businesses. Some 57% of small and mid-sized businesses have no recovery plan in the event of a network outage, data loss, or other IT disaster, according to a Symantec study.

“Planning and executing disaster recovery exercises is something that should be done on a regular basis to find out these issues before they may be impactful,” said Mark Jaggers, a Gartner data center recovery and continuity analyst. “The issue, which was also the case with Southwest Airlines, is not planning for partial failure scenarios that are harder to get to the root cause of and work around.”

To avoid shutdowns like Delta’s, company data centers should have redundant power and networking, preferably from a grid and provider, respectively, that are completely independent from the primary ones, Jaggers said.

“Data centers are a huge piece of a disaster recovery plan,” said mission-critical facility management professional Christopher Wade. “To have a reliable infrastructure, you have to minimize single points of failure.” Business leaders should also ask about the experience levels of data center staff, as many of these companies are currently understaffed, Wade added.

Usually, large companies have a primary data center in one location and an alternate in another that is far enough away so the two do not experience the same disaster at the same time, said Roberta Witty, risk and security management analyst at Gartner.

“In today’s world, the business expectation is that you’re up and running quickly after a disaster,” Witty said. “The ‘always on’ driver is changing the way organizations deliver IT in general, and so they are building out their data centers to be more resilient.”

Faster recovery times

About 60% of organizations are moving to a recovery time objective of four hours or less, Witty said. Doing so successfully involves extensive planning. First, determine what business operations are mission critical. Then, consider factors that impact recovery time requirements, such as revenue loss, safety, and brand reputation, and build your recovery infrastructure accordingly. As more companies outsource data operations, a key consideration should be the third party’s ability to meet your recovery requirements, she added.

Crisis management practices, such as the procedures Delta used to notify management and deal with customer fallout, usually get exercised every quarter. “The more you practice your crisis management procedure and communicating with your workforce, customers, suppliers, and partners, the better off you are,” Witty said. “A plan that hasn’t been exercised is not a workable plan.”

Disaster recovery can’t be something a company reviews once a year, Witty said, but rather an ongoing part of every new project.

“Your recovery environment has to stay in sync with production, which is where a lot of organizations fail,” Witty said. “Build disaster recovery into a project lifestyle—whether it’s a new product or a change in management, you have to go back and revisit your recovery plans.”

The 3 big takeaways for readers

  1. Delta experienced a massive networked service stoppage Monday morning after a power outage in Atlanta, which offers a lesson in disaster preparedness and recovery for other businesses and data centers.
  2. About 57% of small and mid-sized businesses have no recovery plan in the event of a network outage, data loss, or other IT disaster, but these plans are key for mitigating natural and manmade disasters and keeping business operations running smoothly.
  3. Companies should build crisis management and proper communication into all new projects and management changes to ensure consistency.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

South Jersey Cyber Crime

The hackers used “ransomware” to lock the hospital out of its own medical records.

Not all kidnappers grab your loved ones.

A growing online threat – ransomware – essentially abducts your computer system, putting data and services off-limits to users and demanding a payment to restore access.

“We are seeing more cases of this – sometimes almost on a daily basis,” said New Jersey State Police Capt. Steve Jones. “And we’re not seeing all of it, because people may be too embarrassed or don’t believe it can be helped.”

Ransomware viruses are a plague. Once infected — installed to your computer by a website you’ve visited, a rogue email attachment or link, or instant message — your computer will lock up. With names like CryptoWall, these types of viruses may create a popup window or Web page warning you that you’ve broken some law and have to pay a fine, anywhere from hundreds to thousands of dollars, according to the FBI.

These scams threaten to encrypt your files forever or destroy them unless a ransom is paid, according to the FBI.

Once paid, your computer is unlocked or a code is sent to unlock the machine, authorities said.

Between April 2014 and June 2015, the FBI received 992 CryptoWall-related complaints with victims reporting a loss of more than $18 million.

The state’s top cybersecurity unit recently launched an online effort to help people guard against ransomware.

“For many organizations, preventing ransomware entirely is nearly impossible,” says the New Jersey Cybersecurity and Communications Integration Cell (NJCCIC), which introduced a Ransomware Threat Profile page at its website in February.

But it notes individuals and companies can take measures to prevent infections and to limit their impact.

Although ransomware can lock up laptops and desktop computers, the risk is particularly great for data-dependent organizations like hospitals and accounting firms, said Jones, the State Police spokesman.

So far, at least three hospitals have been hit nationwide – in California, Kentucky and the Washington, D.C., area. South Jersey hospitals are well aware of the menace.

“It’s a big concern. It’s something that has really spiked,” said Tom Handlon, chief information security officer for Kennedy Health, which operates three acute-care hospitals in South Jersey.

Handlon gave no details, but said Kennedy seeks to protect itself through protective measures inside its computer system and by promoting safe conduct by employees.
“We’re monitoring it constantly and updating as we go along,” he said. “We are really educating the staff and our entire organization that we are a target.”

A similar view came from Tom Rubino, spokesman for Cooper University Healthcare System in Camden.

“We have tracked the recent wave of ransomware attacks that have targeted hospitals across the nation,” Rubino said. He said Cooper’s IT security team “is proactively taking measures to prevent ransomware infection of our computer systems.”

“Additionally, as a critical component for preventing all computer viruses, we are increasing our employee education efforts.”

A key precaution is to back up your computer’s contents on a frequent basis, Jones said. “But you’ve got to keep the backup drives disconnected,” he warned. “Otherwise, the ransomware can migrate to the backups.”

The State Police in March 2015 investigated a hacking incident that disabled much of the computer system for the Swedesboro-Woolwich school system. In that case, a hacker demanded more than $125,000 in the form of a digital currency called bitcoins.

The district, which did not pay the ransom, had to wipe clean its email servers and cafeteria lunch-ordering system to rid itself of ransomware. Only a handful of classroom computers were infected.

Hackers exploited a gap in the district’s computer security system and a vendor’s “weak” passport to take over the computer system, Michael Procopio, Educational Information and Resource Center’s director of technology, said at the time. EIRC experts helped the district restore its system.

The district’s hacker was believed to have struck from abroad – a familiar pattern, according to the State Police.

“Many of these messages and attacks are coming through foreign servers,” Jones said. “The countries that house these servers are not often countries that have a real open relationship with law enforcement.”

Tools have been available to help decrypt older versions of ransomware, said Dave Weinstein, New Jersey’s director of cybersecurity.

“At this point, the strain has morphed to the point where there is no releasing your files,” said Al Della Fave, a spokesman for the Ocean County Prosecutor’s office. “The lock these cybercriminals put on your files is foolproof at this point.”

Unless you’ve backed up your computer prior to the infection, Della Fave said, “The only way you would get your files back is to pay.”

“Ransomware is working” for cyberthieves, said Ben Johnson, chief security strategist at Carbon Black Inc., a  computer security firm in Waltham, Massachusetts. “People are paying.”

In the last few weeks, cybercriminals have come up with some new twists, he said. For instance, one version encrypts files more quickly after someone opens up a malware-filled Microsoft Word document or some other attachment.

Other versions encrypt the computer at its most basic level so it can’t even power on, or use the computer’s own system administration tools to infect itself, he said.

The best course of action is to make sure you don’t get the virus. “You must be super careful what you click on,” Della Fave said.

Here’s what you should do, according to Johnson and the Ocean County prosecutor’s office:

  • Keep your computer’s security software up to date.
  • Keep your network firewall turned on.
  • Do not open spam email messages or links to suspicious websites.
  • Back up your files, such as documents, photos and music, to a secondary storage device.
  • Be careful when you browse the web. Use ad blockers to help protect yourself.

Have questions?

Get answers from Microsofts Cloud Solutions Partner!
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LL C is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

Announcing Extended Support Hours

To better serve our customers, we are pleased to announce that beginning Tuesday, March 1st, 2022, we will be extending our regular office hours to 8am-8pm, Monday-Friday. We will continue to have emergency support technicians available after-hours from 8pm-8am and weekends.

We appreciate our clients’ loyalty to South Jersey Techies over the last 18+ years. Whether a new, existing or soon-to-be client, we value your support and business to our team. As our business has grown, so has our team. This has given us the capacity to extend our regular office hours to provide your company the best possible support throughout the day.

Our hope is that the new extended hours will be more convenient for some of your users and allow us to provide support to those users at the regular rate.

If you or someone from the team needs support during those hours, please email support at support@sjtechies.com or call (856) 745-9990 to get scheduled with a member of our team

10 ways Microsoft Office 2016 could improve your productivity

Microsoft wants Office 2016 to be the last office productivity suite you will ever need. Here are 10 things you should know about how it plans to make that happen.

Microsoft Office 2016

On September 22, 2015, Microsoft released Office 2016 to the masses. At first glance, you may not notice much has changed since Office 2013. But when you look deeper, you will find some interesting and productivity-enhancing differences.

For years we’ve been promised wonderful benefits from cloud computing, and Microsoft Office 2016 is trying to deliver on those promises. It’s designed to meet our expectations of what a cloud-based, mobile-ready productivity suite can and should be. Only time will tell if Office 2016 actually delivers the goods, but the initial reviews are promising.

Here are 10 things Microsoft Office 2016 offers as it aspires to be the last productivity suite you are ever going to need.

1: Real-time co-authoring

Co-authoring has been around for a long time for many Office apps, but with Office 2016 that collaboration can now take place in real time. That means you will be able to see what your co-conspirators are doing in a Word document or PowerPoint presentation as they do it—and conversely they will be able to see what you are doing. It won’t even matter where you are or what device you are using.

2: OneNote notebook sharing

OneNote is one of the most useful applications available in Microsoft Office, and it is also one of the least appreciated. Office 2016 allows you to share a OneNote notebook with as many people as you want. And because OneNote works with text, images, worksheets, emails, and just about any other document type you can think of, it can be a great central resource for a team working on a project. That is, if they know to use it.

3: Simplified document sharing

Office 2016 simplifies sharing of documents by adding a Share button to the upper-right corner of your Office apps. Clicking that button will give you one-click access to share your document with anyone in your contacts list. You don’t even have to leave the document to do it. That does sound pretty simple.

4: Smart attachments

If you’re like me, you have to send email attachments just about every day. In previous versions of Office, adding attachments to an email required you to navigate to the location where the document was stored. You can still do that in Office 2016, but if the document in question was one you worked on recently, it will now show up in a list of shareable documents right there in Outlook. Essentially, Office 2016 keeps a universal recently worked on list for you.

5: Clutter for Outlook

Like most of us, you probably get a ton of email every day. Wading through the Outlook inbox to prioritize each email takes time and hampers your ability to be productive. Office 2016 adds a new category to your inbox triage toolbox, called Clutter. You can designate certain emails as low priority and they, and future similar emails, will be deposited automatically into a Clutter folder in Outlook. So now you have four categories for email: important, clutter, junk, and delete.

6: Better version history

Collaboration and creativity can be a messy process, with shared documents changing drastically over time. Office 2016 compensates for potentially lost ideas by keeping past versions of documents and making them available directly from Office applications under the History section of the File menu.

7: New chart types in Excel

The ability to visualize data with an Excel chart has always been a welcome and powerful capability. However, the list of available chart types found in previous versions of Excel needed an update. Office 2016 adds several new chart types to the templates list, including Waterfall, which is great chart if you like to track the stock market. Other new chart types include Treemap, Pareto, Histogram, Box and Whisker, and Sunburst.

8: Power BI

Between the release of Office 2013 and Office 2016, Microsoft spent a great amount of time and capital acquiring technologies that shore up its business intelligence and analytical applications. Power BI, a powerful analytics tool, now comes bundled with your Office 365 subscription. Knowing every little detail about how your business is running is essential information, and Power BI can bring it all together for you.

9: Delve

Delve is another new tool that comes with an Office 365 subscription. The best way to describe Delve is as a central location that gives you access to everything you have created, shared, or collaborated on using Office 2016. It is another recently worked on list, only this version of the list is stored in the cloud—so you can access it from anywhere with any device using the Office 365 Portal.

10: Purchase choices

Office 2016 is generally available only as a subscription. Even if you buy a boxed version of Office 2016, you are buying access to an annual subscription, with one exception. If you purchase the Office Home & Student 2016 box, you pay a one-time fee of $149.99 for just the basic Office apps.

Microsoft has definitely stacked the deck so that the best bang for the buck is a subscription to Office 365, which includes Office 2016 plus all the cloud services. Businesses should be looking at one of the Office 365 for Business subscriptions. It is also going to be your best deal.

Have questions?

Get help from IT Experts/Microsofts Cloud Solutions Partner
Call us at: 856-745-9990 or visit: https://southjerseytechies.net/

South Jersey Techies, LLC is a full Managed Web and Technology Services Company providing IT Services, Website Design ServicesServer SupportNetwork ConsultingInternet PhonesCloud Solutions Provider and much more. Contact for More Information.

To read this article in its entirety click here.

CALL US NOW!