Of course, you might just think you can do the exact same thing with a simple pen and pad of paper, and if you prefer to do it that way, that?s totally fine. But you?re going to be missing out on several great features that will help you keep track of your notes in the near future. We all know that notebooks disappear when we least expect them to, so it?s no surprise that OneNote helps users by keeping their notes in one single location on your desktop. That?s not all, though; there are countless other ways that the desktop version of OneNote can benefit your employees. Here?s how: It?s quite easy to review the notebooks that a user has access to. You can do this if you?re logged in to OneNote. On the home screen, you?ll see whoever is currently logged in to the application in the top-left part of the screen, right under the menu. If you click it, you?ll be shown all the notebooks that the user has access to. This makes it easy to shift from one to another. You can also create another notebook if it?s needed. Once you?ve created a notebook, you can add tabs to it, then group them together. These tabs can also be password-protected, but you?ll need to remember the password in order to access them. Microsoft cannot unlock these sections, and there is no option to recover the password, so make sure you want to do it before applying this measure. Each of these sections can have their own sub-pages, which can be added by using the Add Page button. You can merge your notebook sections by right-clicking on a tab and then selecting Merge into Another Section. The option to add formatting is also available. First, click on the View tab. Then, add Page Color and Ruled Lines. You can then save this as a template if you?d like to use it again in the future. Under the Insert Tab, you can access the menu under the Page Templates button. This gives you the option to apply different templates. You can also click on Save current page as a template to use it for later as a notebook?s default formatting. Once you have your formatting squared away, you can either use the traditional typing method to take notes or use your touchscreen and stylus instead. There is also the option for inserting pictures. You can also record audio that is linked to the note that was written as the audio is recorded, providing the opportunity to listen back and improve the notes at a later time. Add Tags to sort out your notes. You can then search for notes based on the tags. In the View tab, you can select Dock to Desktop. This basically enables you to take notes while something else is happening, like a presentation or a meeting. This splits the screen between your notes and whatever else you?re doing at that moment. To undock, just click on the arrow on the right-hand side of the screen. OneNote even offers solutions for collaboration, but there are far too many features to include here. Maybe we?ll cover them in a tip of the week in the future, so stay tuned to our blog!
What Are the Alternatives? Depending on a business? current needs, they will generally be taking advantage of two types of IT management. The first relies on a business being self-sustaining enough to be able to hire a full in-house IT department. There can be no denying how important technology maintenance and management is for businesses, but it is difficult to handle if your organization doesn?t have fully trained IT professionals at the ready–and these skills don?t come cheap. This prompts many organizations to simply get by without IT, or at the very most, have their current employees (who are unlikely to have proper IT skills) handle the maintenance. Hoping to find some other alternative to hiring internal IT help, businesses then turn to break-fix IT to get the help needed, but only when it?s actually needed. Break-fix IT might seem cost-effective at first glance, but it?s far from it. Since break-fix IT doesn?t aim to solve the root of problems, it?s frowned upon compared to managed IT, which takes a more preventative approach to technology maintenance. Trust us when we say that managed IT services is the better options. The Benefits of Managed IT If you?re looking to take advantage of technology solutions without hiring an in-house IT department (either because you can?t afford it, or you can?t find qualified technicians), managed IT is the right choice for your business. There are many ways that managed IT can provide value for your organization. Here are just a few of them: Less downtime: Downtime can be classified as any time your infrastructure is not working as intended. Naturally, you want to mitigate it as much as possible to preserve operational efficiency. Since managed IT takes a proactive approach to IT management, you?ll suffer from fewer problems and, therefore, less downtime overall. Fewer costs: If you?re preventing problems from hitting a boiling point, your hardware and software solutions should last longer. This leads to cut costs over time. Furthermore, since you?re only paying a monthly fee based on your service level agreement, you can say goodbye to high, up-front, unpredictable repair costs in favor of a more standardized payment structure. More flexibility: Many managed IT providers also include a remote service component, meaning that the technicians don?t even have to be on-site in order for them to do their jobs. This cuts travel costs out of the equation, but more than anything else, it means that when you need help, they can accommodate your organization almost immediately. More time: Managing technology can be time-consuming, and if you don?t have someone dedicated to handling it, you could be sacrificing countless hours of your work week needlessly. When you have trusted technicians on the job, implementations can go right the first time, and you don?t have to waste more time than necessary just to make sure projects are completed in a timely manner. Instead, you can devote any time saved to other parts of running your business–perhaps more lucrative parts. To get started with managed IT, give White Mountain IT Services a call at (603) 889-0800.
With any luck, it won?t be long before they won’t have to do anything. These kinds of scams are terribly familiar by now. At this point, most people have encountered this scam in one of two ways. Many have been a recipient of a scam call. They?ll have their phone ring, and habitually checked the caller ID. Seeing that the call came from a local number, and possibly even one they knew, they?ve answered with a ?Hello?? However, instead of a familiar voice returning the greeting, they are answered with a brief pause, followed by a prerecorded message. Only one thing is certain: that call didn’t come from a local number, much less someone the user knew. Many have also received unexpected calls from furious people, spitting fire as they rage about being called, repeatedly, from ?this number!? even though no calls were ever made. How often have you experienced either, or heard that it happened to someone you know? You aren?t the only one to fall for this scam, perpetrated by clever scammers. These calls have exploded in popularity, as scammers have found some way to cheat the system and leverage its flaws. This has enabled them to defy the controls put in place by the FCC (the Federal Communications Commission). The FCC has already tried to end these calls by utilizing the 2017 Call Blocking Order. This order gave telephone providers the ability to block calls that they identified as fraudulent, judged based on assorted criteria. These criteria included invalid numbers and numbers that weren?t assigned to a service. Unfortunately, these rules didn?t impede robocall scams for nearly as long as we would have liked. Instead, now we have neighbor spoofing, which has proved to be a very real annoyance to a huge segment of the population. Chances are, you?ve been involved with one of these calls, and if you?ve been lucky enough to avoid them, someone close to you have experienced their effects. Of course, before we continue, it would help to explain what ?neighbor spoofing? is. Caller ID is a common enough thing now that many people have gotten in the habit of checking the number before they answer the phone. The rule of thumb essentially dictated that a local number was safe to answer. Unfortunately, neighbor spoofing has broken that rule, and makes it feel like our thumbs are broken with it. Spammers have largely abandoned calling from fake numbers, and now make their calls utilizing an actual, in-service number from the target?s area. In some cases, people have thought their neighbors were calling them, but it turned out to be another instance of neighbor spoofing. Of course, this tactic has had the added effect of people receiving actual, angry calls from people, raging about the calls they have repeatedly received from the person?s number, that person?s number having been spoofed. Some people have even seemed to have their phone call itself, supposedly as the phone company?s method of reaching them to ?verify a hacked account.? Neighbor spoofing is now immensely popular because the protections currently enacted to stop scam calls are effectively fooled, just like a human target would be, and renders the Do Not Call list ineffective. While some apps may help, they don?t come without concerns as well. Smartphone application developers have […]
With the assistance of Microsoft?s Digital Crime Unit (based in Redmond, Washington, USA, and with offices around the globe) the authorities were able to leverage data analytics in order to bust multiple companies with illegal call centers. These call centers were running a tech support scam that targeted American Microsoft Windows users. Typical of a tech support scam, the employees at these call centers would first send their targets a fraudulent notification that claimed that their systems had malware on them. They created websites to further convince their targets of their legitimacy. When a victim called the number provided, the cybercriminals would charge them a sum anywhere between $100 and $500 to ?remedy? the apparent issue. The scammers would steal data and install malware once they were given access. It was through monitoring that an employee of Microsoft India, Nripenda Kashyap, was able to identify and report these activities to the DCU. His actions ultimately led to 10 call centers being raided and the arrest of 24 people, the owners of these businesses included. There are a few lessons that you can take from these events. First, you need to remember that no major technology company, like Microsoft, is ever going to reach out to you and inform you that your device is having issues. The only exception is if you?ve enlisted a service provider like White Mountain IT Services to actively monitor your computers and other devices. Otherwise, you?re essentially on your own. Second, having your own IT monitored isn?t something that you should postpone. Tech support scams like these claim $1.5 billion each year from 3.3 million users (and that?s according to a lawsuit that the DCU filed? in 2014) While you may see the dozens of errors that your computer tracks as some kind of catastrophe, a professional IT resource will be able to tell if something is actually wrong. When you do elect to have your devices monitored and maintained, try reaching out to us. We?ll work behind the scenes, actually preventing issues before they happen and identifying and mitigating threats. If you?re interested in learning more about our services, including our remote monitoring and maintenance solutions, reach out to us at (603) 889-0800.
Don?t believe us? After all, how can such a necessary task be harmful to your bottom line? Time to crunch the numbers. Eight days of productivity are lost every year due to moving back and forth with a mouse. That?s eight full, 8-hour workdays. Let?s assume that the average worker switches between their mouse and keyboard once a minute, and this switch takes up two seconds of time (or about 0.03 minutes). If the worker is typing for six hours a day (480 minutes) and they work about 240 days a year, we can build the following equation. [2 wasted seconds / min] * [480 min / workday] * [240 workdays / year] = 58 wasted hours / year! This creates a situation where the average worker spends almost 58 hours simply switching between the mouse and keyboard. Thankfully, keyboard shortcuts exist, so let?s dig into detail about how these can help you eliminate the time spent moving your hand back and forth, as well as the time wasted moving your cursor around. Here are some of the lesser-known keyboard shortcuts that can help you better navigate your toolbar, hopefully saving you time that could be put to better use on another task. Pressing CTRL+B will select an item in your System Tray, while the arrow keys can be used to select the one you need. To select an item in the Windows Taskbar, you can press the Windows Key plus the corresponding number to bring it up. When you hold Shift and press an arrow key, you?ll be able to select items without clicking and dragging the mouse. If you have your items selected, press the Menu Key (the one between the Windows key and the Ctrl key). This will work the same way as right-clicking the items. Once you?re done, close the program by pressing Alt + F4. On that note, just about anything you do on a regular basis probably has a keyboard shortcut that you can use to save time. You can also create your own keyboard shortcut by right-clicking on a program?s icon on your desktop and accessing its properties. Under the Shortcut tab, you can provide your preferred shortcut combo. Once you?ve finished, click Apply. What are some ways your organization improves productivity? Let us know in the comments.