Connecting Technology and Business.

Protect your PC from viruses

There are many preventive steps you can take to help protect your PC from viruses and other threats.

  • Use an antimalware app. Installing an antimalware app and keeping it up to date can help defend your PC against viruses and other malware (malicious software). Antimalware apps scan for viruses, spyware, and other malware trying to get into your email, operating system, or files. New threats can appear daily, so check the antimalware manufacturer's website frequently for updates.

    Windows Defender is free antimalware software included with Windows, and you can update it automatically through Windows Update.

  • Don't open email messages from unfamiliar senders, or email attachments that you don't recognize. Many viruses are attached to email messages and will spread as soon as you open the attachment. It's best not to open any attachment unless it's something you're expecting.

  • Use a pop-up blocker with your Internet browser. Pop-up windows are small browser windows that appear on top of the website you're viewing. Although most are created by advertisers, they can also contain malicious or unsafe code. A pop-up blocker can prevent some or all of these windows from appearing.

    Pop-up Blocker in Windows Internet Explorer is turned on by default.

  • If you're using Internet Explorer, make sure SmartScreen Filter is turned on. SmartScreen Filter in Internet Explorer helps protect you from phishing and malware attacks by warning you if a website or download location has been reported as unsafe.

  • Pay attention to Windows SmartScreen notifications. Be cautious about running unrecognized apps downloaded from the Internet. Unrecognized apps are more likely to be unsafe. When you download and run an app from the Internet, SmartScreen uses info about the app's reputation to warn you if the app isn't well-known and might be malicious.

  • Keep Windows updated. Periodically, Microsoft releases special security updates that can help protect your PC. These updates can help prevent viruses and other malware attacks by closing possible security holes.

    You can turn on Windows Update to make sure that Windows receives these updates automatically.

  • Use a firewall. Windows Firewall or any other firewall app can help notify you about suspicious activity if a virus or worm tries to connect to your PC. It can also block viruses, worms, and hackers from trying to download potentially harmful apps to your PC.

  • Use your Internet browser's privacy settings. Some websites might try to use your personal info for targeted advertising, fraud, and identity theft.

    If you're using Internet Explorer, you can adjust your privacy settings or restore the default settings whenever you want.

  • Make sure User Account Control (UAC) is turned on. When changes are going to be made to your PC that require administrator-level permission, UAC notifies you and gives you the chance to approve the change. UAC can help keep viruses from making unwanted changes. To open UAC, swipe in from the right edge of the screen, and then tap Search. (If you're using a mouse, point to the upper-right corner of the screen, move the mouse pointer down, and then click Search.) Enter UAC in the search box, and then tap or click Change User Account Control settings.

  • Clear your Internet cache and your browsing history. Most browsers store info about the websites you visit and the info that you provide, like your name and address. While it can be helpful to have these details stored on your PC, there are times when you might want to delete some or all of them—for example, when you're using a public PC and don't want to leave personal info behind.

    -Microsoft Help pages

Increased spending on new IT

A Microsoft Asia Pacific survey of 291 IT decision makers of medium to large enterprises across 10 markets in Asia Pacific showed that IT leaders in the region are leading the charge to harness disruptive technologies enabling their transformation to a mobile-first and cloud-first world. More than half of CIOs (53%) polled allocated 11% to 30% of their budget towards using new technologies and another 27% of respondents allocated more than 30%.

In addition, majority of respondents no longer see the cloud as being new and disruptive. In fact, 71% expect to increase use of the cloud in the next three years, making it a necessary part of their IT strategy.

The survey also saw 62% of respondents highlighting the likelihood of increased IT spending on new technologies next year, indicating that IT leaders in the region are indeed pushing the envelope with new technologies to drive business transformation.

 “Technology is changing every aspect of our lives and it impacts the way businesses are interacting with their customers. Organizations today have to change how they operate to serve their customers at a whole new level. CIOs today have a critical role to play in this transformation,” said Alvaro Celis, Vice President, Microsoft Asia Pacific.

Prioritizing IT Needs in Asia Pacific

 The CIOs in Asia are grappling with new demands from customers, employees and business stakeholders. Microsoft asked them how they were prioritizing in the following areas as part of their transformation. Interestingly, respondents placed equal importance on:

•Enhancing customer experiences;

•Transforming into a digital business; and

•Becoming a more responsive organization

Current IT priorities include managing a myriad of new devices, applications and services hosted on the cloud. The Microsoft survey showed that device management is the number one issue which IT leaders are addressing currently. 92% of respondents polled said that they have either implemented or are planning to implement device and management initiatives within their organization as a way to manage the growing number of laptops, tablets and smartphones which access company resources. The number two and three current initiatives are: putting in place a hybrid IT infrastructure (90%) and collaboration projects (86%).

CIOs today know that they have a unique opportunity with disruptive technologies. According to the survey, respondents ranked mobility (52%), IoT (44%), big data (41%) and social (38%) as the top four technology disruptors to the organization.

However, in the next three years, CIOs in Asia are prioritising the Cloud (71%), mobility (65%) and big data (61%) as the most important technologies for them to harness to drive their business goals.

Barriers to New Technology Adoption

 While CIOs are planning to play a big role in business transformation, they do face challenges in being able to execute on their bold vision with new and disruptive technologies. The top 3 challenges are:

•Budget – 81% ranked lacked of budget as a barrier to adopting new technologies.

•Trust – 79% said that security, privacy, compliance and transparency of cloud-related solutions continue to be a concern

•Influence – 72% of CIOs felt that they are having to deal with more stakeholders with budget and decision making power, slowing down decision making

Jeff Bullwinkel, Associate General Counsel and Director of Legal and Corporate Affairs for Microsoft Asia Pacific & Japan, said: “Microsoft sees security, privacy, compliance and transparency as essential elements in building trust between a technology provider and its customers. Microsoft has continued to invest in building its trust with customers by further strengthening encryption to protect customer data, continuously designing and maintaining services that meet government and industry compliance standards, and increasing protection against government snooping.”

Influence and the Changing role of CIOs

 IT investment decisions no longer sit within the IT department. Of the key business stakeholders who are more influential today than three years ago, respondents polled said that the CEO is the most influential stakeholder in driving new technology trends (60%) in Asia Pacific, followed by the CFO (57%), the COO (55%) and CMO (38%).

When asked how they wish their roles to be perceived within the organization, it is clear that CIOs and IT leaders in Asia Pacific want to be viewed as innovators (69%) and growth enablers (62%). Respondents also hoped to be perceived as playing a key role in empowering the productivity of the next-generation of workers (64%).

Asia Pacific CIOs believe they are where they want to be, with more than two thirds of respondents saying that they are already viewed as key drivers of business innovation and growth and as enablers of new work styles by internal stakeholders.

Added Celis: “It is fascinating to see how cloud is everywhere today, and where mobility, IoT, social and big data are important technology disruptors for years to come. CIOs are indeed moving beyond keeping the lights on in IT to driving growth and business innovation. For Microsoft, it is an honour to be working with customers and partners to reimagine how business is done in the digital era.”

-Microsoft Asia Pacific News Center

Microsoft’s cybercrime fighters in Asia

In 2013, an army of five million zombie computers began taking marching orders from an Eastern European cybercriminal kingpin.

These computers weren’t in a dark warehouse or an abandoned strip mall, but in homes and offices across 90 countries. The infected PCs belonged to a vast array of unwitting users who detected nothing out of the ordinary. Meanwhile, when its malevolent creators issued the command, the zombie army lurched to life.

The zombies recorded keystrokes, capturing login passwords and Social Security numbers, spying on financial information, and logging people’s most sensitive and personal information.

Over the course of 18 months, this botnet, nicknamed Citadel, stole half a billion dollars from students, bankers, grandparents and businesses. It was only in June 2013 that a coalition led by Microsoft, together with FBI and partners in the technology and financial sectors, took down the botnet. Citadel is perhaps one of the most notorious botnets in recent history but it is certainly not the last we will see.

In Asia, it is estimated that there are over 5 million IP addresses connected to millions of infected devices observed in the region, including India and China. And among the top 25 infected countries globally, eight of them are from Asia. The Asian countries in the list are India, China, Indonesia, Thailand, Vietnam, the Philippines, Malaysia and Sri Lanka.

These are but just two of the latest findings shared by the team at Microsoft’s Digital Crimes Unit (DCU). In fact, according to the latest third-party studies and statistics, Asia Pacific is currently the most actively targeted region for cybercrime attacks. It therefore comes as no surprise that 79% of CIOs in Asia are concerned about security, privacy, transparency and compliance of cloud-related solutions in a recent survey by Microsoft.

A white paper published by the National University of Singapore and market research firm International Data Corporation estimates that consumers in Asia Pacific would spend about US$10.8 billion (more than 40% of world total) in identification, repair and recovering data, and dealing with identity theft from malware on pirated software in 2014. The same study, also projected that infected pirated software and lost data would cost enterprises in the region around US$229 billion (more than 45% of world total) for the same year. Looking at the economic impact on both consumers and businesses, consider that the 2013 GDP for Cambodia is US$14.04 billion while Vietnam’s GDP for the same year is US$171.22 billion.

These alarming numbers have prompted Microsoft to take a more proactive stance in Asia, as part of its global fight against cybercrime. With the opening of the Cybercrime Satellite Centre in Singapore on February 16, 2015, the company stepped up its efforts to fight malware, reduce digital risks and protect vulnerable populations, to create a safe digital world for consumers, governments and businesses in this region.

“Microsoft is committed to expand its cybercrime fighting work across the globe to protect computer users, customers, and governments through threat intelligence sharing partnerships and public-private collaboration. Our Singapore, Tokyo & Beijing Satellite Centers are examples of that expanded commitment to bring more awareness and capability around cybercrime and help reduce malware threats and digital risks in Asia,” says Keshav Dhakad, Regional Director of Intellectual Property & Digital Crimes Unit, Asia, Legal & Corporate Affairs, Microsoft.

Taking the global battle against cybercrime to Asia

The Cybercrime Satellite Centre in Singapore will serve as the Asia Pacific hub for Microsoft to drive customer, industry and law enforcement engagement on cybercrime threats in the region. At the same time, it will be used to leverage cyber threat intelligence and use big data cyber forensics analytics to help Microsoft’s customers and partners make informed decisions on cybersecurity vulnerabilities and its link with unsecure IT supply chain. Last but not least, it will act as a nodal point to drive strategic threat-intelligence sharing partnerships and collaboration with key stakeholders such as National Computer Emergency Response Teams (CERTs) & Internet Service Providers (ISPs) to foster a more secure and safer Internet ecosystem in Asia Pacific.

Singapore was the natural choice for Microsoft to set up its Cybercrime Satellite Centre, given its strategic location in Asia-Pacific, financial sector leadership, diverse and cutting edge business environment and a high-tech and mature IT ecosystem. In addition to being home to Microsoft’s Asia-Pacific headquarters and Microsoft Technology Center, the island state now also houses the newly set up Interpol Global Complex for Innovation (IGCI), which will be the epi-center for Interpol to investigate and fight digital crimes at a global level. This will facilitate closer cybercrime disruption collaboration between Interpol and Microsoft and will eventually benefit computer users, organizations and businesses in the region.

With one of the largest IT footprints in the world, Microsoft has been protecting and securing its platform, products and services for several decades, but what is unique about Microsoft is its ability to play ‘offence’ against cybercriminals. Keshav explains, “It is just not about defending our platforms from cyberattacks and building better security and anti-malware features into our products and services. What is distinct and unique is our innovation to proactively fight cybercrime, hand-in-hand with key industry and government stakeholders.”

At the forefront of this battle is the state-of-the-art Cybercrime Center in Microsoft’s Global HQ at Redmond, US, a tangible example of Microsoft’s commitment to protect its customers from cybercrime. Keshav says proudly, “At the Center, our customers, partners and vendors can witness live global cyber threat intelligence, and learn a huge deal about malware and their threats as we research them. It’s a unique factor for us to stay ahead of the curve on cybersecurity, understand new threats, and build trusted applications, cloud services and products.”

The malware threat intelligence data from the Cybercrime Center databases, under the program called “Cyber-Threat Intelligence Program (C-TIP)” is provided free of cost to around 45+ National Computer Emergency Response Teams (CERTs) in geographies across the world. The C-TIP enables CERTs to not only understand live malware infection landscape in their respective geographies, but also undertake awareness & notification activities, including dissemination of anti-malware tools to get rid of infections. Several ISPs are also taking advantage of this free program, which has been customized for them to identify, notify and remediate any internal malware threats impacting their subscribers. Keshav further explains, “Today, we are proud about the fact that our cloud customers on Azure & Office 365 can take benefit of the CTIP program. It allows them to run live security reports to detect whether any of their IP Addresses have infected devices behind them and lets them take corrective measures in real time. With this Microsoft has now brought malware threat intelligence to the door-step of its customers”.


Once the Cybercrime Center in Redmond identifies new malware threats, malicious strains are investigated to understand their risks, origins and engineering, and how widespread is their botnet impact and victimization. The research can ultimately lead to a court-supported legal disruption action of the cybercriminal network. The DCU team collaborates with law enforcement, anti-virus companies, IP owners, academia, and industry partners to investigate, research and undertake effective disruptive actions. DCU’s actions against financial malware bots such “Zeus”, “Citadel”, “Game-Over-Zeus” or “Caphaw” were also made possible through strong collaboration with financial industry partners, such as the Financial Services Information Sharing and Analysis Center (FS-ISAC). In September, 2014, FS-ISAC signed a threat intelligence sharing agreement with Microsoft to fight cybercrime and protect the financial services industry. A similar agreement was also signed with FIS Global, the world’s largest global provider dedicated to banking and payments technologies serving more than 14,000 institutions in over 110 countries.

The Singapore Cybercrime Satellite Centre is one of five such Microsoft facilities in the world, with the others located in Washington (U.S.), Beijing (China), Berlin (Germany) and Tokyo (Japan), and these numbers will only grow with time. The Centre will support all major Southeast Asian countries, Korea, Australia, New Zealand and India.

Keshav points out, “As a productivity and platform company in a mobile-first, cloud-first world, we strongly believe in trusted applications, devices and Cloud services. We want to deliver the best experience to our customers and partners, but with a deep commitment to cybersecurity, privacy, compliance and transparency, ensuring that users of our technology and Cloud services have a clear sense of ‘trust’.”

Fighting cybercrime pro-actively is one such way Microsoft demonstrates ‘trust’. Out of 15 global botnet takedowns in the last six years, 12 actions were led by Microsoft.

“The number of malicious codes (malware) are rising exponentially. Cybercriminals will strike where there is an opportunity for them to exploit IT supply chain and usage vulnerabilities and steal private, financial and confidential data from computers and misuse or sell it. The greater the malware infections, the more cybercriminals are able to cause massive disruptions and losses. With rising sophistication, everyone is vulnerable and the question is not who, but when one would be attacked.” says Keshav, emphasizing the rising global nature of cybercrime today.

Crucially, the battle against cybercrime doesn’t end there. All the learnings from Microsoft’s cyber threat intelligence and investigations against cybercriminals, helps build better security features back into our product and services. “For us Cybersecurity is not just one other important thing that we focus on. It is an integral part of building an IT ecosystem where people feel safe when they use technology,” highlights Keshav.

Microsoft has used this hands-on knowledge to strengthen the Windows Operating System over the years. “Any device that runs Windows 8 or 8.1 is protected by the most advanced and breakthrough cybersecurity features, including groundbreaking malware resistance and authentication features. Our Cloud cybersecurity, privacy standards and governance models are unparalleled in the industry,” says Keshav proudly. Microsoft is expected to take this to the next level with Windows 10 which will address modern security threats with advancements to strengthen identity protection and access controls, information protection and threat resistance. This new Operating System will move away from the use of single-factor authentication options like passwords, and deliver options to help enterprises protect against common causes of malware on PCs.

He concludes, “With fighting malware and cybercrime, we also want cybercriminals to know that Microsoft platforms will always remain hostile to their nefarious activities, and we will continue to invest in innovative technology and tools that help us fight new threats to protect our customers. That’s where we’ve been successful in creating a secure, trusted and reliable environment-be it on-premise or on the Cloud.”

With economic losses as a result of malware and pirated software expected to hit the Asia Pacific region hardest, the global efforts to fight cybercrime to create a safer world are more relevant than ever before!

-Microsoft News Center

Cortana – Your PA on the Mobile Phone

Cortana is your personal assistant on your Windows Phone. Like any good personal assistant, Cortana is ready to help whenever you need it, and she has a wide repertoire of things she can do. She's there to make things easier for you and keep you up to date on the things that matter to you.


Here are just some of the things Cortana can help you with on your Windows Phone:

•Make calls, send texts and stay organised – Cortana can help you make calls and send texts, see what's on your calendar this weekend and add events to it, set alarms and take notes.

•Interests – Did your favourite team win or did they get crushed? Is your flight running late? Let Cortana know what you care about – she'll find related articles, posts and updates on the web and have them ready for you when you want them. Keep on top of news, entertainment, weather, health and more. Your interests can even give you a glance at your day or help you prepare for a trip.

•Remind me – Need a nudge? Cortana can remind you to do something at a specific time, in a particular place or when you talk to a certain person.

•Get where you want to go – Cortana will give you help with directions or even let you know if traffic's bad enough that you should leave early to make your next appointment.

•Quiet hours and inner circle – Cortana will make sure you don't get calls or texts when you don't want to be disturbed (except from the people you tell her to let through).

•Cortana's Notebook – Your interests, reminders, favourite places, the music you've searched for, your quiet hours and inner circle – Cortana's Notebook is where she keeps track of the things you tell her about you. It's also where you'll find settings and where you go to turn Cortana off. When Cortana is on, some of the data in her Notebook synchronises to the cloud, where other Bing-powered services and apps will use it. To learn more, see the Managing Interests and Personalisation settings section in the Bing Privacy Statement.

•Get out on the town – Cortana can fill you in on events near you, help you pick a restaurant or tell you what's happening next month in Sao Paulo.

•Check the weather – Check the forecast for today. Or tomorrow. Or the week. In Dubai.

•Talk to me – You can chat with Cortana about whatever's on your mind. Ask her questions that you might ask a new friend, or tell her how you're feeling – she has opinions and stories to share. She'll even tell you a joke.


You can use your voice to tell Cortana what you'd like to do, who to call, what to text and more. Or if you're somewhere you'd prefer to keep quiet, you can type your requests. Cortana will then refrain from answering you with her voice too.


•Cortana is only available on phones with Windows Phone 8.1, and in some countries/regions. Check to see which software version you have and find out if an update is available.

•Some features for Cortana may not be available in all countries or regions.

•If Cortana isn't available, or you don't want to use her, you can still use the Speech functionality on your phone.

-Windows Phone pages from the internet

*Cortana is expected to be available on the iPhones and Android phones soon.

Spam, Hoax and Phishing Messages

Unwanted messages come in many forms, such as spam, hoax and phishing messages. Phishing Scams come in many varieties. Some are personalized, i.e. ‘spearphishing’, but most are sent out to the widest possible distribution. All these types of messages are broadly defined as unsolicited messages that try to deceive you and prompt you to act in a certain way.

You may be the target of a deceptive scheme if any of the following describes a message you receive, via messaging apps like WhatsApp or email:

  • The sender claims to be affiliated with the messaging app / WhatsApp.

  • The message content includes instructions to forward the message.

  • The message claims you can avoid punishment, like account suspension, if you forward the message.

The message content includes a reward or gift, such as an extended or free subscription. Please note, most of these app vendors work on a yearly service subscription model.

Beware of Phishing Scams that Spoof Legitimate Web sites

One phishing email in particular is circulating the internet disguised as a notification from the popular messaging service, WhatsApp. This message looks legitimate. Of course, one sure way to tell it is fake is if you do not have a WhatsApp account. (WhatsApp says in its official page that it does not use WhatsApp to send messages to you. It also states that it also does not send its users emails about chats, voice messages, payment, changes, photos, or videos.

You can also hover your mouse over the button and see what URL it will take you to without actually clicking on it. The links embedded in the email direct your browser to a malicious or compromised website run by hackers. Once you’re on the malicious site, malware is downloaded to your computer.

Don’t Click the Links! – Dangerous Downloads

As you can see in this example, the button wants to take you to livetonline.com, a website that has no affiliation with WhatsApp. If you click the ‘Play’ button or any of the links contained in the email, your computer may become infected. The link will takes you to a webpage that is telling you that you need to download Adobe Flash Player before you can see the message. If you already have Flash installed, especially the latest version, this should be another tip-off that this is a scam. (Mac and iOS users cannot be affected by this, as it downloads an executable (.exe) file, which only runs on Windows. The file most likely contains a virus, but Apple products are not affected).

This strategic and clever tactic is typical. These scam emails started appearing only one week after WhatsApp launched its web client. Before that, there were similar phishing scams circulating, appearing to have come from a WhatsApp mobile user. However, the timing of these new scams makes them seem more legitimate.

This is just one particular example. There have been other emails circulating around that look identical or very similar to the one above, though they may try to get you to download something else malicious, or even display a login page to collect your email address and password (this is a phishing attempt).

Kuluoz is one of the malware downloads associated with such a phishing scam. Kuluoz is a Windows targeted virus designed to stealing documents in Microsoft Word and Excel format. It is also capable of stealing all passwords stored in popular browsers like Firefox and Opera.

The Android mobile platform

Because of its popularity, the Android mobile platform has become an extremely profitable target for malware creators. Many times Android targeted malware is distributed through phishing scams. Malware sites associated with the ‘WhatsApp Messaging Service phishing scam’ can detect Android users and download a virus targeted at Android mobile devices. One such virus is droidFennec.out. The droidFennec.out virus allows an attacker to send text messages, make phone calls and access the internet using your device. The droidFennec.out virus can also enable permissions which would allow a hacker to make payments using your accounts.

What to do if I receive these messages

Prevention is the Best Cure.

Block the sender, disregard the message and delete it. To avoid exposing your contacts to potential harm, please never forward these messages to them.  

If you think that your computer may be compromised, go to the Microsoft Malware Protection Center for information on how to detect and remove the threat.

A necessary defense against this type of threat is antivirus software. Android users should ALWAYS run antivirus software to help defend against the increasing threat of infection posed by Android targeted malware.

Malicious attackers are becoming more skilled at ‘spoofing’ legitimate emails and websites. If you receive an email notification from a website, go to the site by typing the URL in the address bar of the browser yourself! If the message is from a website for which you have no account or you think it may be fake, simply ignore it.

Sway your way to interactive presentations!

Why make a boring PDF that is hard to read on a phone when you can make a Sway? You can reimagine how ideas come to life using Office Sway. You can quickly create and share your thoughts with a variety of multimedia using Sway’s polished, interactive, web-based canvas.

Who can use SWAY?

Professionals will be able to use Sway to save time at work and easily create engaging, eye-catching interactive reports, presentations, and more which flow responsively across all device types. For example, marketing plans/campaigns, blogs, proposals and sales pitches, project plans/updates, brochures/digital fliers, newsletters, weekly /monthly / quarterly / annual reports, training manuals, and so much more. Visit https://sway.com/smith_fashion for a sample.

In education, teachers can use Sway to engage students by creating and sharing interactive lessons and study guides, field trip reports, assignments and class project recaps, which they can also share easily with parents. Many teachers also document their best teaching practices with Sway and share them with colleagues. Students can have fun while learning and stay engaged by using Sway to breathe new life into reports, assignments, projects, study materials, and portfolios. Try this https://sway.com/0WDQZ9MXgWcRtczE for a sample.


Microsoft has started rolling out Sway to Office 365 business and education subscribers. Features relevant to business (and education) customers—including simultaneous coauthoring, creating interactive charts and embedding Office documents (such as Excel charts and graphs) are added to the preview version. Sway will initially support English, Dutch, French, German, Italian, Japanese, Portuguese and Spanish, with more coming soon.


A “Sway” is what we call the canvas you create using Sway, and it’s much more than a document in the traditional sense. It’s built from the ground up for the web and devices. A Sway adapts to fit the device that it’s viewed on, large or small, so your ideas always get the best treatment.

Add your content easily

It is easy to collect your content from a variety of sources right within Sway. Sway shows you the stuff you have stored in the cloud: just tap or click, drag, and drop it right onto your canvas. Built-in content sources include OneDrive, Facebook, Twitter, YouTube, your devices, or even embeds for your other content (coming soon!). And we’ll be growing that list over time.


Sway’s built-in design engine takes the hassle out of formatting your content by putting all of it into a cohesive layout as you create. This means that from the first word, image, Tweet, or graphic you add, your Sway is already being formed for you.

Working in a SWAY

You can adjust and customize the format Sway has created in easy and intuitive ways. Want a picture to stand out? Don’t worry about exact pixel heights and widths or whether you have the design chops to keep things looking good. Just tap or click the image in your Sway and tap or click the star icons to emphasize it. Sway takes your natural feedback and works its magic almost instantly. Want to rearrange your ideas? Just drag and drop any set of your content where you want, and watch your Sway react.

SWAY will shape the future of productivity for sure.

Outlook is more brainy – lists Action items in a mail

Let us assume that you have received a mail, If a phrase in the e-mail suggests a possible action, the Action Items app in Outlook 2013 and Outlook Web Apps creates a suggested Task for the user to review: All you have to do is click the Action Items arrow appearing near the top of the message to the left of a grey bar.


You can also flag the item for follow up and it will become a task in your tasks folder. Once the task is completed, you can either mark it as completed from the tasks folder or from the mail itself.

See the address in your mail, don't jut read it!

Let us assume that you have received a mail and it contains an address. The Bing Maps app for Outlook is part of the new version of Office, so it’s already on your computer. When you open an email message that has a street address, the Bing Maps app automatically appears in a gray bar near the top of the message.

Note; If the Bing Maps app doesn’t automatically appear, your administrator might have disabled it or you might not be able to use apps for Outlook. To use them, you need Office 2013 and Exchange 2013, and your administrator needs to have enabled apps for Outlook.

To see the address on a map, click the arrow next to Bing Maps.


3 things you need to know in Outlook app for iOs and Android

Manage your Inbox effectively

The new Outlook app separates your mail into two tabs — Focused and Other. Important emails appear in your Focused inbox, while the rest remain easily accessible—but out of the way. If you move email in or out of your Focused inbox, Outlook learns this about you and gets even more tailored to your priorities. Outlook has a one-click unsubscribe to help you stop unwanted mail.

Outlook Inbox in iOS and Android.png 

The Focused Inbox works across all of your email accounts to help you focus on what matters.

With Outlook's customizable swipe gestures, rapid email triage is literally a one touch experience. You can swipe right or left to take actions like archive, delete, move, flag, mark as read/unread or schedule. Unlike other email apps, Outlook lets you personalize these swipe gestures to match your unique email habits. For email that you want to handle later, the 'Schedule Email' feature temporarily removes email from your inbox, to return at the time you choose.

Outlook Inbox in iOS and Android 2.png 

Schedule messages to temporarily leave your inbox and return at the time you choose.

Finding important emails is now lightning fast. Outlook's predictive search quickly finds the right emails, people and files as you type just a few letters. Outlook also lets you pivot on People, so you can see the people you email with most often and easily find all the emails, meetings and files shared with those people.

Outlook Inbox in iOS and Android 3.png 

People view shows people you email with most often and lets you conveniently drill down to see all related emails, meetings and shared files.

Best of all, these features work across your favorite email accounts, including Office 365, Exchange, Outlook.com, iCloud, Gmail and Yahoo! Mail.

Schedule a meeting quickly

In Outlook, your calendars are available right within the app, allowing direct interaction with your email, including features like viewing meeting details, invitees and their attendance status. The 'Quick RSVP' feature lets you respond to meetings (Accept / Tentative / Decline) right from your inbox, without even opening the mail.

The 'Send Availability' feature lets you find and share available meeting times in email with ease. Once you've settled on a time, you can even create a meeting invitation—all handled without leaving the app.

Outlook Calendar in iOS and Android 3.png 

With a few clicks, you can highlight available times on your calendar and insert a list into the body of your email.

Attach files easily


Outlook File attachments in iOS and Android.png 

Insert a link to file in the body of your email.R ecipients automatically are permissioned to view the file.

Outlook makes it simple to share files stored in the cloud.  With just a few taps, you can insert a link to any file from OneDrive, Dropbox and other popular accounts in your email message. Recipients are automatically granted permission to view these files, with no extra steps.

Need to find a file quickly? No problem. Outlook provides a view of your recently received email attachments, so you don't have to go searching through email to find that document you need. Outlook also lets you search across both your cloud storage and your email attachments at once, with Quick Filters to let you quickly sort by file type.

Designed for iOS and Android

The Outlook app feels natural on both iOS and Android. For example, on iOS, you will notice familiar icons and actions for creating new messages, identifying new mail and taking actions like archive and delete. On Android, we use the Navigation Drawer to house the multiple tools offered in the app and have common actions like settings available in the App Overflow menu.

Outlook Inbox in iOS and Android 4.png 

Outlook was built with the unique design principles of iOS and Android in mind.

Across both iOS and Android, the Outlook app works great on phone or tablet. For both the iPad and larger Android devices, additional screen size is used to unlock additional views like a two paned email list, week view in calendar and the ability to see a preview of your files.

Outlook Inbox in iOS and Android 5.png 

Outlook is adaptive to fit the device you are using, especially larger devices like the iPad and Android tablets.

-inputss from Office Blog

Protecting your documents and mails with the IRM feature

​Most of us handle confidential documents that need an additional layer of safety.

We handle a lot of information in mails that we don't want others to share further.

There are also some kind of documents that solely belong to the organization and should not be shared with anybody outside the organization (who does not have the company domain name in their email id).

We want to confine the document to only a set of users that can be identified by their email ids.

We want to share the document with others (through mail or using SharePoint/One Drive for Business) but we don't want them to edit it, copy it, modify the contents or even print it.

The IRM feature in Office 365 is a powerful feature that will safeguard our files, mails and company's intellectual property with an extra layer of security.

MS Office documents (Word, Excel and PowerPoint) can be protected with this IRM at the File tab. When we click on the File tab, we can see the "Protect document" feature.

IRM doc protection.png 

When we click this option, we can see "Restricted access" option. This will provide all the Safety policy templates provided by the Enterprise. (Unrestricted access will be the default). We can choose one of those templates to apply the respective policy. (If a policy is to be frequently used, a request to create the template can be sent to the O365admin)

We can also define our own customized safety policy by choosing "Restricted access" option. Here we can include specific email ids of users who can read or change the content (can't print).

IRM Permissions.png 

If we want allow printing or copy content (for read only users) or if we want to set an expiry date (time bomb) for the document, we can click on "More options on the "Permissions" dialogue box.

IRM Permissions(2).png 

IRM protection can be applied to PDF as well as XPS files too.

Any document with such an IRM feature applied carries with it this security policy and so travels along with the document – whether through mail or into SharePoint or OneDrive for Business. So, this policy gets activated at the time of opening the document.

Even mails from Microsoft Outlook can be protected likewise with an IRM policy. The permissions are found under the "Options" tab. Once applied, the mail will carry with it this policy and will apply this policy at the point of access.