Quadra

Connecting Technology and Business.

Don't live with a Cluttered Desktop

If you open the same folder again and again or if you open the same file very frequently, you can use various tricks to open them with just a click. So, don't save them on your Desktop anymore.

Here are the tips:

1. Right click the File Explorer icon pinned to the Task bar and you will see a pop-up with your frequently opened folders and files. You can also pin some of them for quicker access so that they are not lost when others are getting listed in due course.

2. If you are running Windows 10, the navigation pane also contains a Quick Access feature. Click this and you will see the frequently opened folders and recently opened files. Even here you can pin some of them for quicker access so that they don’t move away from the list in due course.

3. If you have pinned the Word, Excel or PowerPoint applications to the task bar then, there are jump-lists created for the respective applications that will help you to open the files. (Folders are not listed). Right click the respective icons on the task bar and you will see the recent files listed. Push-pinning some of the files listed will help here too.

4. If you are spending your whole day in Outlook, you can create Shortcuts to your folders and files in Outlook in the Shortcuts folder (7th from the Mails icon) also use Outlook to open it for you.


Create a new Shortcut group in the Shortcuts folder on Outlook. Open the File Explorer and drag the folder / file under the new Shortcut group.

Microsoft Leads in Gartner’s Magic quadrant for IdaaS

Gartner has positioned Microsoft in the Leaders Quadrant in the 2016 Magic Quadrant for Identity and Access Management as a Service, based on its completeness of vision and ability to execute in the IDaaS market.

Microsoft is currently the only vendor to be positioned as a Leader across Gartner’s Magic Quadrants for Identity as a Service, Cloud Infrastructure as a Service (IaaS), Server Virtualization, Application Platform as a Service, Cloud Storage Services, and as a leader across the data platform and productivity services.

Gartner believes this validates Microsoft as a leader across the full spectrum of cloud computing - with easily integrated offerings across cloud infrastructure services, platform services, SaaS, data analytics and hybrid solutions.

 


Microsoft's Azure Active Directory Premium offering provides features that are in line with other web-centric IDaaS providers, and includes licenses for Azure Multi-Factor Authentication (MFA). It also includes licenses for Microsoft Identity Manager (MIM) that are to be used with customers' on-premises systems. Microsoft also offers Azure Active Directory Premium as part of its Enterprise Mobility Suite (EMS), along with Microsoft Intune EMM and Azure Rights Management, and the on-premises-based Advanced Threat Analytics tool.

Strengths

  • Microsoft continues to leverage its current and substantial customer base for Office 365 and other products to add Azure Active Directory and EMS to contracts. The vendor has broad and deep marketing, sales and support capabilities, and it has been pricing EMS low, which has put significant pressure on other IDaaS players.

  • The vendor has already demonstrated high scalability with Azure Active Directory. The service underpins other Microsoft Azure services.

  • Microsoft has a strong international presence for its service offerings, and continues to expand its IaaS presence worldwide.

  • Through acquisition and development, the vendor has demonstrated advancement of its strategy to secure identities, data and devices.

  • Microsoft's strategy demonstrates a strong understanding of the technology, socioeconomic, security and jurisdictional trends that will shape its offerings going forward.

Cautions

  • The Azure Active Directory B2C and B2B Collaboration subservices were in public preview (beta) at the time our analysis was performed. These offerings will likely need time to mature relative to competition with established B2C and B2B use-case support.

  • Microsoft's on-premises "bridge" components for synchronization and federated SSO are now managed under one umbrella component, Azure Active Directory Connect. However, based on Gartner client interactions, these components generally need more infrastructure and more effort to manage than competitors' bridge technology.

  • Microsoft can manage the transition of organizations with multiple Active Directory forests to one tenant of Office 365; however, Gartner client feedback is that this transition is easier with competitors' IDaaS offerings.

  • Microsoft lags behind competitors in the number of apps it can provision to, as well as the depth of SaaS account fulfillment that supports the provisioning of roles, groups and other attributes.

The high cost of a Data Breach

Data breaches caused by malicious insiders and malicious code can take as long 50 days or more to fix, according to Ponemon Institute's 2015 Cost of Cyber Crime Study while malware, viruses, worms, Trojans, and botnets take only an estimated 2-5 days to fix.

Unsurprisingly, attacks by malicious insiders are also the costliest to fix ($145,000 according to the Ponemon study), followed by denial of service ($127,000) and Web-based attacks ($96,000).

The consequences and cost of cyber-attacks are also unevenly distributed, with business disruption and information loss taking the biggest share, followed by revenue loss and equipment damages, according to Ponemon. But the cost of remediation in person-days can also be substantial. Involvement of a programmer, a QA person, project manager, product manager and corporate lawyer will cost you more than $300 per employee per day, according to data from payscale.com — and that's before you consider the cost of the CEO, CISO and CFO's time.

- Ponemon Institute's 2015 Cost of Cyber Crime Study

Delve Analytics for the Productivity Pros

Microsoft has announced an update to the Office 365 people profile experience under Delve, which consolidates the profile and activity pages to make it easier for users to discover relevant content, connect with colleagues and find experts inside an organization.

Learn more about your colleagues

The new profile page gives users a place to learn more about their colleagues, providing their contact information, a photo, who they work for and a summary of their experience and expertise, as well as discover their recent activity and a quick glimpse of what they are working on. The profile is actionable, too. Users can start a Skype chat, call or email to a colleague right from their profile page. Remember, Delve only shows content that the user already has permission to see.

The whole experience is responsive and looks great on any device.

https://officeblogseast.blob.core.windows.net/wp-content/2016/02/Updated-people-profile-experiences-coming-soon-to-Office-365-1-border-1024x579.png

Customize User profile and quickly find documents

Users can give their Delve profile a personal touch—upload a favorite profile photo, choose a unique background or edit your expertise. Up-to-date profiles make it easier for others to find out about the user and help the user when the user is looking for information. From the user’s profile, users can also quickly and easily get back to their documents, as well as see documents their most frequent contacts are working on.

Updated people profile experiences coming soon to Office 365 2 - crop

Delve is more useful and intuitive than ever thanks to the new profile page. By connecting the users with the content and the contacts who are relevant to them, Delve helps break down silos and keeps the user in the know.

The new profile experience has been rolled out to First Release Office 365 tenants over the past several weeks, and Microsoft expects it to roll out to all eligible Office 365 customers by the second quarter of 2016.

Delve is included in the Office 365 Enterprise E1–E5 subscription plans (including the corresponding A2–A4 and G1–G4 plans for Academic and Government customers, respectively). Delve is also included in the Office 365 Business Essentials and Business Premium plans.

Delve never changes any permissions and only shows the users content that they already have permission to view. Only they can see their private documents in Delve, and other people can’t see their private activities—such as what documents they’ve read, what emails they’ve sent and received or which Skype for Business conversations they have participated in. Other people can see that they’ve modified a document, but only if they have access to the same document.

Microsoft Password Guidance

Microsoft has come up with recommendations for password management based on current research and lessons from their own experience as one of the largest Identity Providers (IdPs) in the world. It covers recommendations for end users and identity administrators.


Microsoft sees over 10 million username/password pair attacks every day. This gives Microsoft a unique vantage point to understand the role of passwords in account takeover. The guidance provided here is scoped to users of Microsoft’s identity platforms (Azure Active Directory, Active Directory, and Microsoft account) though it generalizes to other platforms.

 

Summary of Recommendations

Advice to IT Administrators

Azure Active Directory and Active Directory allow Enterprises to support these recommendations:

1. Maintain an 8-character minimum length requirement (and longer is not necessarily better).

2. Eliminate character-composition requirements.

3. Eliminate mandatory periodic password resets for user accounts.

4. Ban common passwords, to keep the most vulnerable passwords out of your system.

5. Educate your users not to re-use their password for non-work-related purposes.

6. Enforce registration for multi-factor authentication.

7. Enable risk based multi-factor authentication challenges.

 

Advice to Users

Create a unique password for your Microsoft account

The security of your Microsoft account is important for several reasons. Personal, sensitive information may be associated to the user account such as their emails, contacts, and photos. In addition, other services may rely on their email address to verify their identity. If someone gains access to their email, they may be able to take over the user's other accounts too (like banking and online shopping) by resetting their passwords by email.

 

User Tips for creating a strong and unique password:

  • Don’t use a password that is the same or similar to one you use on any other website. A cybercriminal who can break into that website can steal your password from it and use it to steal your Microsoft account.
  • Don’t use a single word (e.g. “princess”) or a commonly-used phrase (e.g. “Iloveyou”).
  • Do make your password hard to guess even by those who know a lot about you (such as the names and birthdays of your friends and family, your favorite bands, and phrases you like to use).
Keep the security info up to date

Current security info (like an alternate email address or phone number) helps us to verify the user's identity if they forget their password or if someone else tries to take over their account. Microsoft never uses this info to spam the user or to try to sell them something.

Watch for suspicious activity

The Recent activity page helps the user to track unusual or suspicious activity. The user can see their latest sign-ins and changes to their account. If they see something wrong or unfamiliar, they can click "This wasn’t me" and Microsoft will take the user through a few steps to change their password and review the security info on their account.

Turn on two-step verification

Two-step verification boosts account security by making it more difficult for hackers to sign in—even if they know or guess the user's password.

If the user turns on two-step verification and then try to sign in on a device Microsoft doesn’t recognize, Microsoft will ask the user for two things:

  1. The user's password.
  2. An extra security code.

Microsoft can send a new security code to the user's phone or their alternate email address, or they can get one through an authenticator app on their smartphone.

Keep the operating system, browser, and other software up to date

Most service and app providers release security updates that can help protect users' devices. These updates help prevent viruses and other malware attacks by closing possible security holes.

If the user is using Windows, in order to receive these updates automatically, he / she has turn on Windows Update.

Be careful of suspicious emails and websites

The users are advised not to open email messages from unfamiliar senders or email attachments that they don't recognize. Viruses can be attached to email messages and might spread as soon as they open the attachment. It's best not to open an attachment unless they expected to receive it. They should also be careful when downloading apps or other files from the Internet, and make sure they recognize the source.

Install an antivirus program on your computer

Hackers can steal passwords through malware (malicious software) that's been installed on users' computer without their knowledge. For example, sometimes malware is maliciously downloaded with something they do want, like a new screen saver. The user has to take the time to check and clear their computer of viruses or malware before they change their password.

Is your computer running Windows?

Great! Windows Defender is free anti-malware software built-in to Windows 8 and Windows 10. It updates automatically through Windows Update. If the user is running an earlier version of Windows, they can download and install Microsoft Security Essentials for free.

After the user installs an antivirus program, they should set it to regularly get updates and scan their computer.

Gleaned from a paper from - Microsoft Identity Protection Team

Microsoft Cloud App Security

More and more cloud-based apps are being used by businesses, such as Dropbox, Box and Microsoft-created services like OneDrive and Office 365. Now Microsoft has launched Microsoft Cloud App Security, a service designed specifically to help protect companies and their employees who use cloud-based apps.

Microsoft says that, according to its surveys, each employee in a company uses 17 cloud apps and workers in 91% of organizations grant access to their personal accounts to their company's cloud storage services. Microsoft Cloud App Security provides those organizations the following features to protect their employees and the company as a whole:

  • App Discovery: Cloud App Security identifies all cloud applications in an enterprise’s network—from all devices—and provides risk scoring and ongoing risk assessment and analytics

  • Data Control: With special focus on sanctioned apps, enterprises can set granular controls and policies for data sharing and loss prevention (DLP) leveraging API-based integration. They can use either out-of-the box policies or build and customize their own

  • Threat Protection: Cloud App Security provides threat protection for the Enterprise’s cloud applications leveraging user behavioral analytics and anomaly detection

Attaching files to Outlook 2016

In Office 2016, Microsoft is also improving many aspects of Outlook 2016. For example, in the new version you can attach a recent file you have been working on to a new message. To do so simply click the Attach File (paperclip) button and you'll see a list with all the recent files. Then just pick the file and you're good to go -- no more spending time browsing your computer for a specific document.

http://www.windowscentral.com/sites/wpcentral.com/files/styles/larger_wm_brb/public/field/image/2015/09/attach-onedrive-file-outlook2016.jpg?itok=H6uUZauj

Also, Microsoft is making it very simple to attach OneDrive documents. The attachment works in the same way as a local file, but for OneDrive files, Outlook 2016 will create a special cloud attachment link. When the recipient double-clicks the attachment, the document won't download and open with the default app. Instead, the document will open in the web browser.

Real-time collaboration in Office 2016

Before you can collaborate in real-time with other people you need to save and share your document using OneDrive and Office 2016 makes it easy -- just follow the steps below:

1- Open to edit or create a document in Word, Excel, or using any of the other apps.

2- On the top-right corner of the app, click the new Share button. (Assuming, you're sign-in with your Microsoft account you'll see the following pane.)

3- Click Save to cloud, you'll then be redirected to the "Save As" section, pick you OneDrive account and the location to store the file.

Once you have shared the document through OneDrive, people with the editing permission can simply open the file with the desktop version of Office 2016 or Office Online and start collaborating automatically -- just like that.


If you're the person who has created and shared the document, you'll also get a notification alerting you that other people are editing the document. You'll be prompted whether you would like to share automatically changes as they happen. If this is something you like, simply click Yes on the alert.

http://www.windowscentral.com/sites/wpcentral.com/files/styles/larger_wm_brb/public/field/image/2015/09/editing-office2016-alert.jpg?itok=7xNmHy8W

Yes, it's amazing that you can collaborate in real-time with other people from the desktop and web version of the apps. However, this doesn't mean you can just jump to any line and edit whatever you want.

http://www.windowscentral.com/sites/wpcentral.com/files/styles/larger_wm_brw/public/field/image/2015/09/realtime-collaboration-word2016.jpg?itok=rq9AQjKT

When you're collaborating in real-time, you can only work and edit your content or any other content the other person isn't already editing. For example, if you're working on a paragraph, you can keep editing that content. But you can't edit another paragraph that is being edited by someone else until that person jumps to another new paragraph.

If there is something you need to communicate with the other person, go to the Share tab. This action will list all the people that are currently editing the file. Then hover over the person you want to contact and you'll see the choice to IM, voice, video chat, or send an email.

http://www.windowscentral.com/sites/wpcentral.com/files/styles/larger_wm_brb/public/field/image/2015/09/send-message-insider-office-2016.jpg?itok=m8arHHeB

Note: Keep in mind that you'll need to have Skype installed and setup before you can start a conversation.

Sharing a file in Office 2016 has become easier

It is easy to collaborate better using the new version of Office – Office 2016. Microsoft is focusing on collaboration, which means that more than ever, the desktop version of Office depends on the cloud.


Before you can collaborate in real-time with other people you need to save and share your document using OneDrive and Office 2016 makes it easy -- just follow the steps below:

1- Open to edit or create a document in Word, Excel, or using any of the other apps.

2- On the top-right corner of the app, click the new Share button. (Assuming, you're sign-in with your Microsoft account you'll see the following pane.)

3- Click Save to cloud, you'll then be redirected to the "Save As" section, pick you OneDrive account and the location to store the file.