You are diligently working on a business project on your computer, then suddenly the application you are using freezes. Soon your frustration skyrockets while your productivity plummets as you try anything you can think of to resolve the problem. Sound familiar?
Here is how you can quickly get back to work when an application running on a Windows desktop or laptop computer freezes:
Do you use a laptop at home or in your business? If you do, chances are you store a lot of important data in it, from financial information to sensitive documents, that you need to protect if your laptop is lost or stolen.
Here are some basic steps that you can do to protect the data stored in your laptop from unauthorized access.
Password protect you laptop
A good password is one that is hard to guess but is easy to remember. Here is how you can create a good password:
Combine letters, numbers, and special characters such as %$* when creating your passwords. You can substitute a number for a letter, like 3 for E or 5 for S. Examples of good passwords are br34kf45T!, t0u3h&go$, and 2hotPi22a$.
Keep your password's length at least eight characters long — usually longer.
Some experts even suggest the use of passphrases instead of passwords. Longer and complicated passwords will make it hard for unauthorized persons to guess them. Example: UnitedWeStand can become Un1t3dW3St4nd.
Do not use your name, birthdate, zip code, or address as your password.
Memorize your password, never write it down anywhere.
As of February 2016, there is a new strain of malware circulating the internet, hidden in infected Microsoft Word documents. This ransomware, known as “Locky,” arrives in an user’s inbox as an email with a Microsoft Word document attached, containing malicious macros. Once enabled, the macros will scramble and encrypt files and the user must either pay a ransom, or hope that a recent backup will prevent any lost data.
How to Identify an Email Containing Locky
According to KnowBe4’s security awareness training blog, an email with ransomware will have a subject line similar to "ATTN: Invoice J-99223146" and a message such as "Please see the attached invoice and remit payment according to the terms listed at the bottom of the invoice." The content of the word document will appear scrambled and illegible with various fonts and symbols, and the top of the document will prompt the user to enable macros in order to read the document.
Screenshot of infected word document, courtesy of KnowBe4:
As we enter the new near, we’re all making plans for New Year’s resolutions. Why not take your resolutions into the workplace, starting with one of the things we all come in contact with the most in an office environment – email. It can be daunting and overwhelming to open a full inbox every morning. By the end of the year, we’re all happy to take a break from it and rest during the holidays – email free. As you go back to the work place after some restful time off, make it a priority to stay on top of your emails this year. Having a more organized inbox will reduce stress, and help you be more efficient in your work.
Outlook 2013 has several options you can set that help you automate and simplify your email experience. Here are five ways to make your Outlook experience more convenient.
If you use Microsoft Word, Excel, or PowerPoint, you probably know the keyboard shortcuts to select all (Ctrl+A), copy (Ctrl+C), and paste (Ctrl+V). Did you know there are other helpful keyboard shortcuts that you can use in all three applications? Being able to use the same keyboard shortcuts can make them easier to remember.
Here are nine keyboard shortcuts that you can use in Word, Excel, and PowerPoint to save time and effort.
In the spirit of technology, 501cTECH tried something new at the first 2015 Technology Innovation Awards judges meeting held on September 10th: we conducted voting through online polling application, Poll Everywhere. The application replaced traditional voting by show of hands with a simpler, anonymous system where judges voted from their computers or mobile devices. The judges responded to three polls, one in each of the three Technology Innovation Awards cause areas: PreK-12 and STEM Education, Skills to Succeed & Workforce Development, and Veterans and Military Families. Each poll consisted of a list of organizations who had submitted applications, and based on those lists, the judges voted for two finalists. As the votes came in, they were displayed in real time on a PowerPoint presentation screen.
Using Poll Everywhere was a resounding success. As a result of the time saved through online voting, we were able to place emphasis on discussing the applications themselves – exactly what was needed for the record number of applications that we received!
As a small team we are very fortunate to have a full roster of environmentally focused dev and mapping projects for the year, but when deadlines are tight it’s easy to let best practices fall by the wayside or go out the window all together. Chesapeake Commons and our partners at Viable Industries have been working to design, develop, and deploy open source tech solutions for just over three years. In that time span, three of the major take homes that we’ve learned as a team consist of the following:
Always question why the system is being built in the first place
Plan more so you can code less
Communicate openly and frequently
In nearly all the projects we’ve worked on, our attention to items 1 - 3 have directly correlated with the project outcome.