-1
archive,paged,category,category-managed-it-services,category-46,paged-9,category-paged-9,qode-social-login-1.1.3,qode-restaurant-1.1.1,stockholm-core-1.1,select-child-theme-ver-1.1,select-theme-ver-5.1.8,ajax_fade,page_not_loaded,wpb-js-composer js-comp-ver-6.0.5,vc_responsive
Title Image

Managed IT Services

Microsoft Word Hacks And Tricks To Improve Productivity

Work online

Don’t have the Word app on your computer, tablet, or smartphone? Go to office.com, sign in with your Microsoft account, and open Word Online, the web version of Word. This is particularly useful for users who have limited free storage space on their devices, as the Word app can be pretty hefty in terms of storage space (2.11 GB for Windows and 1.2 GB for Mac). It allows for the same level of functionality without the storage burden.

Collaborate effectively

You and your colleagues can now edit the same Word document simultaneously and in real-time. Simply save the document to your Microsoft OneDrive account, click Share, and send the link to the file to your coworkers. People with the link can access and edit the document using the Word desktop app or Word Online.

Maintain editorial control

Use the Track Changes function of Word to monitor all edits made to your document. To turn on Track Changes, click on the Review tab, and then select Track Changes. You will then be able to view all changes made to the file by every user, and you will also have the ability to reject or accept suggestions and edits as you see fit.

Use Smart Lookup for research

The Smart Lookup feature helps you do online research while you’re working on a document — no need to open another tab and type in a query. Simply highlight and right-click the word or phrase you want to look up, and select Smart Lookup from the menu that appears. Word uses Microsoft’s Bing search engine to conduct a search on the selected word or phrase and displays the results in a pane that appears on the right side of your screen.

Format your documents

The Styles gallery contains predefined formatting options for text. You can also add your own styles or those you use frequently, to the gallery. By saving your own style preferences, you can apply them anytime without having to manually format everything. Just follow these steps:

  1. Select the text you want to format as a new style (e.g., a heading or a certain phrase).
  2. Specify the formatting you want on the mini toolbar that appears. For instance, click Bold and Red if you want the text to appear as such.
  3. Click the More arrow in the lower-right corner of the Styles gallery. Select Create a Style. This will open the Create New Style from the Formatting dialog box.
  4. Give the style a name and click OK. Your new style will appear in the Styles gallery, ready for you to use anytime.

Search and use images quickly

With Word, there’s no need to open your browser to look for images for your document. Just place the cursor in the area where you want to insert the photo, click the Insert tab, and select Online pictures (type “clip art” in the search box if that’s what you need), select an image, then click Insert.

Edit PDFs

Word’s PDF editing function allows you to make quick changes to PDF files without having to download and use a PDF editing app or software. But before you can edit a PDF file in Word, you have to convert it to a file format that Word can display. To do that, follow these steps:

  1. Click File > Open > Browse
  2. Choose the PDF file you want to edit, then click Open
  3. Click OK to make a copy of the PDF file and convert its contents into a format that can be opened in Word. (Note: The original PDF will be preserved.)
  4. Make edits to the copy of the PDF file.
  5. When you’re done, click File > Save as > PDF

 

Microsoft is constantly rolling out nifty new features for its popular word processor. To stay updated on the latest Word features and functionalities, reach out to Net Activity’s Microsoft experts now.

Is Shadow IT Creating a Problem with Your Remote Workforce?

With so many people working from home these days, IT teams have less control over the devices being used to access company networks and resources. Shadow IT in the remote working environment is running rampant as people have grabbed a hodge-podge of solutions to get work home. When they can’t get what they need or find what they need with company resources, they feel forced to find other alternatives.

It’s caused a myriad of security problems. Rather than using approved communication software, such as Microsoft Teams, people flocked to Zoom for video conferencing despite some security researchers calling it a “privacy disaster” during the early days of the pandemic. Many users failed to follow company security protocols and inadvertently exposed company data and networks to unnecessary risk.

It can feel like a losing battle. Even when everything’s in place, nearly a fifth of employees admit to not following security policies all the time. When Shadow IT is being employed, it’s an even bigger threat.

The best way to deal with Shadow IT is by putting in place systems to manage, monitor, and train employees on IT security.

Managing IT in a Remote Workforce

Of course, the best approach is to use modern workplace tools, such as Microsoft 365, that provide a software suite to accommodate most business uses. When tools are tightly integrated, it makes it easier to work across apps and provides consistent data. It’s also easier to manage when everybody’s working off the same platform.

 

When workers are using company devices and working in the office, you have much greater control. You can restrict what software is installed. When they’re at home – especially if they’re using their personal devices – you’re giving up much of that control.

You can prevent any adverse action they take at home in a couple of ways:

  • Using mobile device management software that segregates personal data and applications from approved company apps
  • Requiring users to securely remote into their on-premises workstations and use app and access files just as if they were sitting at their desks
  • Completely virtualize your operations in a secure cloud environment

No matter which approach you use, you need to pay close attention to identity and access management (IAM). Using the principle of minimal privileges, users should only have access to the software and data that are necessary for them to do their job. This limits access in case an unauthorized user or threat actors gains access using their device or credentials.

 

IT teams should use a Zero-Trust approach for all contractors and employees, regardless of where they work. This requires an additional layer of authentication before users can connect to your network or critical applications. Consider two-factor or multifactor authentication if possible.

Monitoring Workflow for Remote Teams

Monitoring your network 24×7 to provide the visibility you need. Traffic logs can help identify which applications are running and who’s using them – or not using them. For example, if you’re company wants employees to use SharePoint for collaboration and you see that certain employees aren’t using it, you know they’re not following the procedures.

Monitoring helps you to:

  • Identify user behavior and traffic patterns
  • More easily identify threats (and respond)
  • Discovering unauthorized assets

When you see an increase in employee’s use of Shadow IT, in particular, it can signal one of two things:

  • You’re not providing the tools employees need to work productively
  • Employees need access and training to the tools the company does provide
  • Either one deserves some attention.

 

Training Employees on the Risks of Shadow IT

When people are working from home – and often using their own devices – it’s much more difficult for IT teams to monitor their usage. Remote workers often download free software from a variety of sources without asking for permission or thinking there’s anything wrong with doing it. Some of it contains malware. Other software might have flaws that can open your network to potential threats.

They’re also using their home internet or Wi-Fi connection and may or may not have routers or firewalls installed to filter traffic. Even if they are, they may not be configured properly. Firmware may be out-of-date or even end-of-life, which can create new attack vectors for threat actors.

Then, there’s the weak password problem. Despite the best efforts to control access, employees still use poor password security. Even if they take better precautions at work, many people aren’t doing it at home. That’s why passwords like 123456, 123456789, and password are still the most among the most commonly used passwords. This can’t continue.

Set very difficult passwords on all devices used during remote work.

A problem specific to Shadow IT is that employees may be using it to access company data, or plugging in data using a third-party application. You have no control over what happens to the data once they do or how seriously the app provider takes security. Now your data is at the mercy of an app provider that you haven’t authorized.

Not all Shadow IT is a high risk, but a lot of bad things can happen if users aren’t taking the proper precautions. You need to educate your employees on the risks their work-at-home environment poses and provide guidance on how to mitigate the threat. This includes discussing the risks of Shadow IT and what software is acceptable for use.

How big a problem is Shadow IT in today’s remote work environment?  Nearly half (47%) of IT professionals surveyed said shadow IT represents a major problem for their organization. To address these issues, get started with our simple guide to securing your digital landscape here:

 

5 Handy Tips For Organizing Your Desktop

1. Arrange, sort, and prioritize

Before you delete everything from your desktop, think about what you really want to keep. This will vary from person to person, but most people use their desktop for storing files, folders, and apps that they want to access quickly.

Take the time to sort your files and folders. An easy way to do this is to right-click on an empty area of your desktop (where there are no icons), mouse over on View, and select Auto arrange icons. This will organize your icons into a grid format. Then, right-click on the empty space and hover your mouse over Sort by and select Date modified to arrange the icons by the date they were last opened, with the latest on top.

 

2. Create a folder for holding files and another for keeping app shortcuts

People often use their desktop to store downloaded files, photos, screenshots, and even email attachments, which can lead to a messy desktop.

However, you don’t need all these on your desktop. Instead, create a folder on your desktop that will serve as your dumping ground for all your nonessential files and folders. If you don’t intend to keep a file, icon, photo, etc. for long, put it in this folder. Revisit this folder every once in a while to delete the files you no longer need.

It also helps if you create a shortcut folder. When you install new programs on Windows, a shortcut icon is often automatically added to your desktop. But these desktop shortcuts should be for frequently used programs only. Create a separate folder for programs that aren’t used that often.

 

3. Clear out unnecessary files

Once you have your folders set up, it’s time to get rid of the clutter. If you haven’t used a file, folder, etc. in the past two months or so, get rid of it. Examine your desktop and uninstall programs you no longer use. You’ll also want to delete outdated files you no longer need and place the rest in relevant folders.

 

4. Use the taskbar or Start menu for apps

In Windows 10, you can pin apps to the Start menu and the taskbar. This is a great alternative to having program shortcuts on your desktop. To pin apps, open your apps list (i.e., click the Start button at the bottom-left corner of the screen) and right-click on the application you would like to pin. Select Pin to Start or Pin to taskbar for the option you want.

 

5. Choose a wallpaper you love looking at

An interesting way to minimize clutter is to pick a wallpaper that you enjoy looking at — whether it’s your favorite motivational quote, a photo of your family, or a picture of your dream house, car, or destination. Having an image you like serves as a reminder to keep icons to a minimum, so if you can’t see the image anymore, then you have too many icons, and it may be time to get rid of a few.

 

If you are looking to learn more about how to use Windows more effectively, contact us today.

The Easiest Way To Disaster-Proof Your Cyber Security

Although no one would dispute the increasing prevalence of cyber-attacks on businesses in recent years, many small-business owners believe themselves and their businesses to be immune to such attacks. Broadly speaking, many small-business owners are likely to think that cybercriminals will go after the bigger fish. However, the fact of the matter is that cyber-attacks are crimes of opportunity, and small businesses often have access to a good amount of sensitive data without many major safeguards. In other words, they’re low-hanging fruit, ripe for the picking.

Back in 2019, two-thirds of respondents to a survey about cybersecurity didn’t believe that their small to mid-size business (SMB) would fall victim to a cyber-attack. Consequently, only 9% of respondents said cybersecurity was a top priority for their business, and 60% didn’t have any sort of plan for deterring a cyber-attack. All of this, despite the fact that, according to a report from CNBC, SMBs endured 43% of reported cyber-attacks, and according to data from the Ponemon Institute and Keeper Security, 76% of SMBs in the U.S. alone reportedly endured a cyber-attack within the previous year.

Every small-business owner should have some plan for deterring cyber-attacks, so they don’t end up as another statistic. Here are a few strategies for keeping cybercriminals at bay.

Boost Your Cloud Security

Storing data in the cloud is easy and cost-effective, but you should take care to find the most secure cloud storage platforms. Not all cloud platforms make security a priority, but some do. A few of the top-rated, most secure cloud platforms, according to Cloudwards.net, include Sync.com, pCloud and Icedrive.

Secure All Parts Of Your Network

Our computers and the many smart devices hooked up to our network can become weak spots for hackers to get in. Taking steps to safeguard each device in your network with strong passwords and robust authentication measures will go a long way toward keeping the hackers at bay. In fact, one of the most basic security measures you can take for your network is to restrict access to your WiFi with a strong password.

Invest In Extra Security Measures

Virtual private networks (VPNs) and firewalls are tools that are highly effective in protecting against cyber-attacks, even if they can’t prevent 100% of them.

Pay Attention To Updates And Upgrades

When you get notified that one of the technological tools that you use has a new update, it’s easy to ignore it. However, you should commit to regularly updating and upgrading these tools because developers will often add patches to their programs that make them more secure against attacks with each update. So, it behooves business owners to regularly install updates for their tech tools.

Back Up Your Data

With one of the most common forms of cyber-attacks being ransomware attacks, where hackers will hold your company data hostage until you pay them a ransom amount, having your company data stored on multiple backups can ensure that your business won’t crumble due to your data’s inaccessibility.

Limit Employee Access To Your Network

As much as we’d wish it were true, many cyber-attacks don’t come from outside of your company. Instead, they originate from within. If you want to limit the amount of damage that someone inside your company can do in a cyber-attack, the best course of action is to limit their access to different parts of your network.

Train Your Employees

At the same time, just as many cyber-attacks occur not because of an employee’s malicious intent, but because of their ignorance. They click on a link in a sketchy e-mail and fall for a phishing scheme, volunteer their password info without thinking about it, or choose a weak password for their computer. That’s why you need to dedicate time to training your employees on best practices when it comes to security.

Set Up A ‘Security Culture’ At Your Workplace

You need to make cybersecurity a top priority, not just for your IT department, but for every department at your business. When everyone works together to protect their workplace from a cyber-attack, you have a better chance of actually succeeding.

Will protecting your business from a cyber-attack require a good amount of time and money? Absolutely. Can you afford to ignore the prevalence of cyber-attacks any longer? Statistically, no. The sad truth is that 60% of SMBs that fall victim to a cyber-attack end up shuttering within six months. Don’t put yourself in that kind of position. Instead, take your business’s cyber security seriously.

Remote Work Can Offer More Benefits than You Might Expect

Remote work has been embraced over the past two years, in no small part due to the impact of the pandemic. However, some of the impacts of remote work have made it clear to many businesses that its advantages shouldn’t be sacrificed once it is no longer necessary. Let’s review how businesses can improve by continuing the practices of remote work, even after the need for remote work has passed.

Redundant Business Travel Can Be Eliminated

Business travel hit effectively unprecedented lows throughout the pandemic, as many people remained secluded in their homes as much as they could. However, it quickly became apparent that the activity that business travel revolved around didn’t actually require a physical presence to be fulfilled. With the solutions that enable remote work in tow, employees can do more than just virtually commute to the office… they can effectively “travel” anywhere they are needed in a matter of moments. This can save you and your team members a hefty chunk of change in fuel costs alone.

Remote Tools Actually Aid Communication and Collaboration

We’ve found that so many of our preconceptions about the best way to do things are, in fact, not the best way to do things. Meetings that involved people present as well as people calling in often found those calling in overlooked more often than not. However, when everyone is relying on remote communication, the playing field is leveled out.

Security is Better with Zero Trust

As companies hurriedly adopted remote work processes, it had the unfortunate side effect of greatly expanding the threat surface of their infrastructures. After all, it isn’t as though your home network is exclusively dealing with work processes. There are other users doing their own thing on the same network, making a zero-trust security approach a necessity. By demanding verification and authentication for every device, user, or application that tries to access resources, the zero-trust model helps to prevent unauthorized usage.

Remote Work Benefits the Environment

With the environment becoming a greater priority for many people as time passes, green technologies and business practices have been emphasized. Remote work, by virtue of the eliminated commute, is a very effective way for each employee to cut down on their carbon footprint.

Hybrid Work is the Best of Both Worlds

As remote solutions continue to improve, a rift has grown. Some employees are perfectly content to continue working from home, while others want the ability to work alongside their teammates once again. This will likely result in the adoption of a hybridized work environment, where employees combine remote operations with in-person processes.

Net Activity can ensure that your business is in the position to operate wherever your employees may be. Give us a call at 216-503-5150 to find out how we can help.

Are Your Company Mobile Devices Really Protected?

Mobile devices are indispensable. Smartphones, tablets, and other mobile gadgets play a big part in everyday processes, especially for individuals and companies that value connection and convenience. But as the number of mobile devices used in business operations increases, so do the cyberthreats that target them. Be sure to follow these steps to safeguard company mobile devices.

Ensure mobile OS is up to date

The updates to Apple and Android operating systems (OS) improve overall user experience, but their most important function is to fix security vulnerabilities. Reduce your business’s exposure to threats by installing updates for all devices as soon as they become available. Don’t delay updates, as doing so gives cybercriminals ample time to exploit vulnerabilities on devices that run on an outdated OS.

Install business applications only

Downloading apps seems harmless. However, lenient policies on what should and shouldn’t be downloaded on company mobile devices could lead to staff installing non-business-related apps, many of which are notorious for malicious advertising codes and other threats. It’s imperative that employees download and install only business applications necessary for their work on their company-issued mobile devices.

Be careful when connecting to public Wi-Fi networks

Emergencies may compel your staff to use password-free Wi-Fi networks in hotels, airports, cafes, and other public places. Connecting to an open network can expose your confidential information and sensitive company data to cybercriminals connected to the same network.

You can avoid this by providing a practical internet data plan, preferably one that includes roaming services, for remote workers. And if connecting to a public Wi-Fi network is really necessary, using a reputable virtual private network (VPN) can help protect your sensitive data. A VPN creates a direct, secure connection for data from your end to your intended point on the internet.

Enable phone tracking tools

Losing a company-issued mobile device is unfortunate. Devices can be misplaced or stolen, but enabling Find My iPhone for iOS devices, GPS Phone Tracker for Android, or any device-tracking app helps users locate lost phones. Some also have the option to delete data on stolen devices. Downloading and setting up such an app takes only a few minutes and it will give you peace of mind knowing that even if your phone is lost or stolen, its contents will not be compromised.

Screen SMS carefully

SMS phishing can be used to trick you into clicking malicious links. Cybercriminals send messages purporting to be from someone you know, asking you to urgently disclose confidential information. Should you encounter such an SMS, you can either delete it or alert your IT department. You can also block unknown senders without even opening their messages.

Mobile devices are becoming more critical to operations. And with more devices open to attacks, businesses must bolster their cybersecurity efforts. Malicious actors will exploit every possible vulnerability and that includes those in unsecured smartphones and tablets.

Get in touch with us if you need comprehensive security solutions for your business.

3 Reasons Your Business Needs to Upgrade Its Technology

For the average business, upgrading technology comes with some risks. Will you get the return on your investment back fast enough to make your investment worthwhile? Will the technology solve the operational problems you are trying to confront? Do you have the available capital to make significant upgrades? These questions and more can keep a business from taking advantage of the amazing benefits many new technologies can bring. Today, we thought we’d outline four signs that will tell you when it’s time to upgrade your business’ technology.

 

Falling Productivity

The first sign that you need to do something about your technology is when you have the human resources in place to efficiently do the work, but the technology you have them working on hinders their ability to do it effectively. This has a negative effect on operations, sure, but it also has a negative effect on your team’s morale, which any business owner worth his/her salt knows is an important, albeit unquantifiable metric to running a profitable business.

Newer technology can bring a lot of productivity benefits. It can enhance workers’ productivity individually. It can provide the base for better collaboration. It can even take pressure off of your entire staff by working to automate tasks that are chewing up your business’ profitability. The fact is that if your business is constantly dealing with failing and antiquated technology, it’s probably going to be felt by your workers first before it even shows up on the bottom line.

 

Security Issues

Today’s threat landscape is challenging, to say the least. Even the smallest business is now directly in the crosshairs of scammers and hackers looking to systematically scrape data and inject themselves into their process. This isn’t going to get better anytime soon. With a large chunk of the information services still being handled remotely, there are more opportunities than ever for hackers to get their greedy hands on your business’ information, or worse yet, saddle your business with malware that is sure to cause expensive downtime.

If your business isn’t doing everything it can to keep these thieves off of your network, you will eventually have one knock at your door. That’s just the reality of being a business in the 21st century. New technology typically comes with better security platforms and ones that are constantly being updated and improved upon. Today, you can’t just ignore the security aspect of your business’ technology deployment. You need to upgrade your systems and keep everything monitored around the clock to give your business the best chance to succeed.

 

Business Growth

The first two line items of this article are all doom and gloom, that’s true, and we do it because there are a lot of threats out there and if your tech isn’t good enough to keep your people productive, then you will fall behind. The last item, however, is sunshine and roses: You’ve found success. If your business is doing well, and you are starting to consider new ideas to enhance your business’s profitability, one of the first places you should look is to technology.

It’s true that a successful business may not want to change what works, but today there are technologies that can take a thriving business to a whole new level. From building efficiency to managing multiple revenue streams, to simply ensuring that the technology you have in place has the support it needs so you can continue to grow, making an investment in your business’s future through the integration of new technology is a responsible decision that, more often than not, will pay dividends.

There are a lot of reasons why you may want to hold off on your new technology plans, but the more that you commit to your company’s future and its ability to support collaboration, efficiency, and dynamic productivity, the better off your business will be. If you would like to learn more about getting the custom technology solutions you need to solve your business’s most pressing problems, give the technology experts at Net Activity a call today at 216-503-5150.

 

Think Your Password Is Secure? Think Again

The problem

The issue isn’t that the NIST advised people to create easy-to-crack passwords, but their previous advice inadvertently made people generate weak passwords using predictable capitalization, special characters, and numbers, like “P@ssW0rd1.”

Such a password may seem secure, but the string of characters it’s made up of could easily be compromised by hackers using common algorithms.

Furthermore, while the NIST also recommended that people change their passwords regularly, they did not specify how and when to change them. Without proper guidance, many people assumed that this meant adding or changing one or two characters every year or so.
The NIST essentially forced everyone to use passwords that are hard for humans to remember but easy for a hacker’s algorithm to crack.

Eventually, the institution admitted that their recommendation creates more problems than it solves. The NIST has then reversed its stance on organizational password management requirements, and is recommending banishing forced periodic password changes and getting rid of complexity requirements.

The solution

Security consultant Frank Abagnale and Chief Hacking Officer for KnowBe4 Kevin Mitnick both see a future without passwords. Both security experts advise enterprises to implement multifactor authentication (MFA) in login policies.

MFA requires a user to enter one or more valid credentials aside from a password to gain access to an account. This could be a physical security key, a login prompt on a mobile device, or a facial or a fingerprint scan. Without the additional security requirements, hackers’ attempts to crack passwords would be futile.

Moreover, Mitnick recommended implementing long passphrases of 25 characters or more, such as “recedemarmaladecrockplacate” or “cavalryfigurineunderdoneexalted.” These are much more difficult to guess and less prone to hacking. Simply put, passwords should be longer and include nonsensical phrases and words that make them almost impossible for an automated system to crack.

What’s more, the NIST recommends making screening of new passwords against lists of common or compromised passwords mandatory. This is because a complex, 25-character password is already considered weak the moment it has been compromised.

 

Finally, you should also enforce the following security solutions within your company:

 

  • Single sign-on – allows users to securely access multiple accounts with one set of credentials
  • Account monitoring tools – recognizes suspicious activity and locks out hackers from the network OR keeps hackers from accessing the network.

When it comes to security, ignorance is your business’s kryptonite. If you’d like to learn about what else you can do to remain secure, just give us a call.

11 Ways To Use Microsoft Teams Like A Pro

We all know how much Microsoft Teams has revolutionized the digital workplace but as an ever-evolving collaboration tool, how can you make the most of Microsoft Teams? Here are 11 great tips on how to use Teams like a pro!

1. Use @mention tags to get people’s attention

Did you know that you can use the @ to tag people? You can tag people, tag teams, target a selected set of people in your organization or you can even tag the channel this way. So, this is a really great way to get someone’s attention. Depending on how everyone has set their notification level in Microsoft Teams, this is a really nice way to make sure that people see you’re trying to reach them.

2. Let the number of channels grow

You can’t invent everything, you don’t know everything, you don’t know how that team will evolve. So, don’t do too much work in the beginning. Set up a few of the most important channels and let them grow inside the team and let the people create the channels that it’s natural for them to create.

Reserve the “General” channel for team-wide announcements that need to reach everybody. Because you can’t get rid of it, use it for something specific.

3. Adopt a naming convention for channels with external users 

Be a little bit careful when you invite external users into your conversations because typically, if you invite an external guest into a team, they will see all of those conversations as well. So, make sure that people actually know they are talking with an external person. One practice worth considering is to add the word “external” at the naming convention because then everybody sees that you have external people in that team.

Adopt a similar naming convention across all of your channels.

4. Don’t forget to name your chats

If you have a lot of private chats and you don’t go in and give them titles/names, it will be really hard, later on, to understand what the chat is about, or even to find the right one. You can do this by opening up the chat and clicking the pen icon next to the people’s names on the top.

5. Mute yourself in meetings

While you’re in a meeting it’s really important to stay on mute when you’re not talking, because it helps to reduce background noise. So many people accidentally type on the keyboard, or go and make a cup of coffee, even take a restroom break. All that background noise is so distracting.

6. Keep the conversation on using the chat during meetings

One thing that I do like is to use the chat function during a meeting. It’s a great way to say something or get a point across without having to say it out loud and be on camera, which some people aren’t keen on. The chat is also a great place to keep the conversation going, especially if it’s for a recurring meeting.

7. Zoom in on presentation material during meetings

If you’re sharing a web page, make sure you zoom in, because your resolution is likely to higher than the other people’s. The Microsoft Teams window is pretty small and has all the things on the side, so make sure you zoom in if you can so that people will actually see what you’re showing.

 

Remember to zoom in. If your audience joins the meeting via their smartphones the presenter’s screen might get tiny.

8. Remember to stop the recording

Something we have noticed, especially with running a lot of online events, is that sometimes people forget to leave the meeting or stop recording it. if the meeting’s running, the recording keeps running unless someone stops it.

9. Use emojis in your writing

Use emojis in your channels to bring them alive! Emojis help to break up the text and they look a lot better in chats too. Plus, they help colleagues to feel appreciated and connected.

10. Set up your custom notifications

The out of the box notifications from Microsoft are really, really intrusive, because you are notified everywhere. To edit these, you need to go into the notification settings and select your preferred level, which will make your workday a lot more efficient if you choose so.

 

Setting up your Custom Notifications will make your workday more efficient.

11. Respect the availability status

Pay attention to your colleagues’ availability status. There is the “available” one and the “available out of the office” one. It’s really hard to notice the difference between them. Also, if a colleague has “Do not disturb”, respect that and don’t try to ask for a call.

Need help implementing Microsoft Teams to your best advantage? Reach out to Net Activity for more great solutions.

Recording Calls Is Good For Business-Here’s Why

Is your customer service department lagging in terms of quality? If so, it may be time to review the call quality of your customer service representatives. One of the best ways to do that is to use your Voice over Internet Protocol (VoIP) system’s call recording feature. By listening to recorded calls, you can find out what can be improved, reduce your team’s errors, and gain several other benefits, including the following.

1. Upgrade employee performance

According to Edgar Dale’s Cone of Learning, people only remember 10% of what they read, 50% of what they see and hear, and 90% of what they do. By providing your agents with actual recordings of good and bad calling examples during training sessions and having them simulate calls afterwards, they’ll be able to learn better and provide high-quality customer service faster.

2. Improve customer service

One of the most important reasons why businesses should always record their calls is to ensure high-quality customer service. By reviewing calls, managers can understand how their agents have been dealing with customers, find out whether or not they’ve followed company protocol, and pinpoint any aspects that can be improved on.

Without call recording, managers would have to listen to each call in real time, which is time-consuming. By recording each call, not only will your managers save time, but your employees will also be motivated to perform at their best, since they know their calls can always be reviewed.

3. Retrieve missed details and prevent potential lawsuits

Your employees handle hundreds of phone calls daily, so it’s understandable if they don’t catch every single detail. And for companies that require their agents to manually input information during calls, there’s always a possibility that they’ll forget or miss certain information, which could then lead to disgruntled customers. If not properly handled, this can harm your reputation, reduce work opportunities, and if things escalate, proceed to litigation.

VoIP’s call recording feature lets you replay saved audio files to make sure you haven’t missed any details, ensuring that all customer demands are met. And if you ever get into a dispute with your clients regarding who said what, you can always retrieve the exact audio file and have both sides listen to it, saving you thousands of dollars in legal fees.

4. Understand customer preferences

Have you ever received an inquiry about a product or service that’s not included in your offerings? While your agents usually jot these requests down and pass them on to the relevant personnel, they may overlook some of these if numerous calls are being made that day. Tiny issues like this can lead to potentially huge losses.

With call recording, you can review all your calls at the end of the day. You’ll have a better picture of what certain customers are looking for so you can address their needs better.

VoIP allows businesses to make on-demand calls affordably, and its call recording feature helps companies improve their customer service and prevent litigation. If you think Teams Voice or business VoIP is right for you, or if you have any questions, give us a call today.

Special Year End Pricing !!

Microsoft Teams Rooms Systems For Small/Medium Meeting Room