Tech Tips

Clipboard History – No More Losing Text You’ve Cut or Copied!

Clipboard History – No More Losing Text You’ve Cut or Copied!

Have you ever cut and paste several times in rapid succession and accidentally cut twice in a row without pasting?  Unfortunately, now you’ve lost some of your work!  Or maybe you copy and pasted something an hour ago and realize you would like to use the same text in your current work.  In a newer version of Windows 10, Microsoft has implemented a clipboard history.  Clipboard history has a record of everything you have cut or copied since the last time you rebooted your computer.

Clipboard history is disabled by default, but you can easily enable it.  Simply go to a Word document and press the Windows Key + v.  The Windows Key is found on the bottom-left of your keyboard, between Ctrl and Alt. If you haven’t enabled clipboard history or haven’t copied anything to your clipboard since enabling it, you’ll see a message telling you that you either need to enable the feature or copy something before continuing.  If you have previously enabled it, you will be able to see all the items you copied or cut and can paste them again.  Currently, this clipboard history supports text, HTML, and images less than 4MB in size.  Larger items you copy will not be stored in the history.

Need to Manage and Delegate Tasks for Initiatives Try Microsoft Planner

Need to Manage and Delegate Tasks for Initiatives Try Microsoft Planner

Each plan in Microsoft Planner includes a dashboard. This is where you can analyze tasks according to their status or belonging to a plan. You keep an overview of all open or completed tasks. Different charts visualize project progress and show which tasks are overdue.

Each plan in Microsoft Planner includes a dashboard. This is where you can analyze tasks according to their status or belonging to a plan. You keep an overview of all open or completed tasks. Different charts visualize project progress and show which tasks are overdue.

Productivity with TEAMS Continue to Increase

Productivity with TEAMS Continue to Increase

At the beginning of the pandemic, organizations leaned more on the current technology to collaborate. As shelter-in-place orders grew state to state the use Microsoft technology grew as well.  With the isolation of remote work growing the need for human connection became crucial to business development and the use of video conferencing for meetings increased substantially on Teams. It should be noted that Microsoft has continued to make enhancements and improvements:
  • Custom backgrounds allow you to replace your background in Teams meetings with a new office look anytime.  You can also upload your own custom backgrounds as well. Unique backgrounds have become a spirited competition within designDATA.
  • To make video calls more interactive, the raise hand feature will be available to everyone by the end of the year. It will let meeting participants indicate they have something to say by clicking on a hand-raise icon in the meeting control bar. Academic institutions will probably see this feature first as it rolls out.
  • Meeting organizers can now end a meeting for all participants with the click of the “end meeting “button in the control bar.
  • Later this year, Microsoft will roll-out background noise suppression while in a Teams meeting which uses technology to reduce distracting background noise such as loud typing or a barking dog.

How To Keep Uninvited Guests Out of Your Zoom Event

Zoom is a videotelephony and online chat services through a cloud-based peer-to-peer software platform and is used for teleconferencing, telecommuting, distance education, and social relations.  With most of the country working from home and using Zoom as well as other cloud-based communications there has been an uptick in hacking stories.  So, what are we to do?  Let’s look at a few ways we can practice Zoom Safety. At designDATA we believe the following best practices will help:

  • Create separate passwords for each virtual meeting;
  • Establish a Zoom waiting room for meeting participants
  • Lockdown the meeting once everyone invited to attend has joined
  • Do not publicly post-meeting links on social media or any other public forum

How to Best Manage Passwords

How to Best Manage Passwords

The average person can have nearly 100 passwords (or more!) when combining professional and personal accounts and services. That is a lot to remember! Many often use the same email and password for many (if not all) accounts, so they have less to remember. This is the number one liability for accounts online: password reuse. If a popular streaming service suffers a security breach, you may not be too concerned with someone watching a show on your account. However, if your log in information for this service is the same for your banking or other sensitive accounts, the damage can be much more severe. When sites suffer a breach, the hackers immediately try those credentials on banking, email and other sites to see how many areas they can log into with one password. So, it is vitally important to have a different password for every account. In addition, to be really secure, your passwords should all be at least 15 characters (some cybersecurity analysts recommend 25 characters.) How is it humanly possible to remember up to 100 unique lengthy passwords? It’s not! That’s where password managers come into play. A password manager will become your best friend, because it takes care of three critical tasks for you:
  1. It generates lengthy, complex passwords for each of your accounts or logins
  2. It stores these complex passwords in a digital “vault”
  3. It automatically fills in this complex password every time you log into a site
People often say “I’m already using my Internet browser to save my passwords – isn’t that the same thing?” No! Browsers are designed for us to surf the Internet, and although they can store passwords, it doesn’t mean that your passwords are secure. It also means your passwords would be in one browser, so they wouldn’t be available if you use a different browser. Whereas with a password manager, you could log into your personal vault from any browser, making them much more versatile. What if the Password Manger is compromised? Great question! LastPass has been hacked multiple times, but the number of compromised passwords? ZERO. LastPass encrypts all passwords, so the company never sees your passwords, keeping your passwords secure even if a security incident occurs. To find the best password managers for you, your family, and/or your business, we recommend Googling “Best Password Managers”, and you will see a number of reviews of the top password managers available today. Also, please contact your Program Manager to ensure your organization is enrolled in designDATA’s complimentary Dark Web Scan offering which will notify you if any account in your organization has shown up on the Dark Web. Stay safe out there! by Imran Khan

How to Share Your Screen with Teams

How to Share Your Screen with Teams

Screen sharing is a very useful tool that will help coworkers view content together.  Below I show how I shared my screen with my coworker Ricardo to discuss a project we were working on together. (click on pictures to enlarge)
  • Join or start your meeting with the option of video or voice by selecting the icon on the top right corner of the screen
  • Move your mouse to the bottom-middle of the screen during a meeting in Teams.
  • Choose the chat control options.
  • Click the third icon from the left, the icon with the square box and arrow.
  • You can then choose to share your screens, desktops, windows, or programs.

     

  • To stop sharing your screen click on the square icon with the X in the middle.

Article by Jose Vargas

Phishing Scams Aim to Exploit Coronavirus Fears

How To Keep Uninvited Guests Out of Your Zoom Event

Zoom is a videotelephony and online chat services through a cloud-based peer-to-peer software platform and is used for teleconferencing, telecommuting, distance education, and social relations.  With most of the country working from home and using Zoom as well as other cloud-based communications there has been an uptick in hacking stories.  So, what are we to do?  Let’s look at a few ways we can practice Zoom Safety. At designDATA we believe the following best practices will help:

  • Create separate passwords for each virtual meeting;
  • Establish a Zoom waiting room for meeting participants
  • Lockdown the meeting once everyone invited to attend has joined
  • Do not publicly post-meeting links on social media or any other public forum

Increase Productivity With macOS

Increase Productivity With macOS

Series Three 

Continuity Camera for Pictures and Scanning

Take a photo

Open a supported application on your Mac. Control-click or right-click in the document or window where you want the photo to appear Then select Import or insert from iPhone or iPad

(see below for requirements and supported applications)

You will then be prompted by your Mac to take a picture with your phone. It will look like this: 

When you take the photo with your phone, it will appear in your document, window or if you’re currently on your desktop, it will be on your desktop/

Scan a document

Open a supported application on your Mac. Control-click or right-click in the document or window where you want the scan to appear. Then select Import or insert from iPhone or iPad. 

Select Scan Documents

You will then be prompted by your Mac to take a picture with your phone. It will look like this: 

On your iOS device (iPhone or iPad), you will see a screen to scan. 

When you want to capture the text on the screen, press the circle button

The iOS device will then give you a preview and ask if you want to retake or Keep Scan. It will also give you an option to crop.

Crop to the text and then select Keep Scan. The preview on the iOS device will then disappear.

Your scan will now appear in PDF format on your desktop as shown:

The scanned document will be in high definition. Sample below:

Requirements:

Mac and iOS device have both wifi and Bluetooth turned on,
Mac and iOS device must be signed in to iCloud and with the same Apple ID that is using Two-Factor Authentication.
Your Mac is using macOS Mojave (or later), your iOS device is using iOS 12 or later.

Supported applications

O365 Suite, Finder, Keynote, Mail, Messages, Notes, Numbers, Pages, and Text Edit.

MAC Corner

By Shannan Sutherland

Manage Your Work Life Balance and Avoid Burnout

Internally at designDATA, we have been focused on staying connected and checking on each other.  Many times, we have heard staff say, “What day is it?” or “I feel like I work past 5 pm more often now than before.”  Are we showing greater loyalty by sending emails after 6 pm on a Friday because we work from home?  This is an interesting topic and can apply to most of us in this remote work environment.  The Harvard Business Review published some tips about this topic in the article, Avoid Burnout.  It’s important to manage your work-life balance, develop routines, and set boundaries.  It has been a challenge for all of us to some degree.

At designDATA, we share calendars to help with meeting scheduling and work management.  A new modification across the company is the use of unified colored categories in our Outlook calendars to categorize blocks of time.  As an example, block the time, “personal”(grey),  to remember to check on the kids who should be in Distance Learning, not playing FortNite.  Perhaps, you are scheduling team huddles or check-ins, use a specific color so at quick glance you could quantify how many reoccurring meetings you have for the week.  This tip should help avoid burnout and increase productivity with some planning and effort.  Plan your balance and set your boundaries.

Understanding Dual Band WiFi

Manage Your Work Life Balance and Avoid Burnout

Internally at designDATA, we have been focused on staying connected and checking on each other.  Many times, we have heard staff say, “What day is it?” or “I feel like I work past 5 pm more often now than before.”  Are we showing greater loyalty by sending emails after 6 pm on a Friday because we work from home?  This is an interesting topic and can apply to most of us in this remote work environment.  The Harvard Business Review published some tips about this topic in the article, Avoid Burnout.  It’s important to manage your work-life balance, develop routines, and set boundaries.  It has been a challenge for all of us to some degree.

At designDATA, we share calendars to help with meeting scheduling and work management.  A new modification across the company is the use of unified colored categories in our Outlook calendars to categorize blocks of time.  As an example, block the time, “personal”(grey),  to remember to check on the kids who should be in Distance Learning, not playing FortNite.  Perhaps, you are scheduling team huddles or check-ins, use a specific color so at quick glance you could quantify how many reoccurring meetings you have for the week.  This tip should help avoid burnout and increase productivity with some planning and effort.  Plan your balance and set your boundaries.