Spoofing emails are emails that look like they come from someone legitimate or from a well-known corporation. The most common spoofing emails is known as a whaling email, which is set up to be sent from a high-value target. Attackers will spend a lot of time on social media, discovering who is the CFO, CEO, or CIO of the company. An example of a spoofing email: Your CEO is requesting money or items be purchased through irregular channels. Luckily, there are ways to identify these and how to delete them.
1. Always check with the sender by phone call if you are unsure if they sent it. Take no action until you can verbally confirm that this is a legitimate email.
2. Look closely at the from address:
a. It may be spelled closely, but not exactly correct.
b. It may be from a domain that doesn't make sense the way it is spelled:
i. gogle.com instead of google.com.
3. The tasks in the email seem inconsistent with the personality or position held by the person it is said to be from.
Attackers are great at creating scenarios where the employee feels a sense of urgency or fear of consequences. Tools such as Microsoft 365 has advanced threat protection in place to help spot if a spoofing email has been sent to your inbox. Start protecting yourself and your business from spoofing emails by installing Microsoft 365. Want to learn more about how Microsoft 365 can benefit your business? Click the link below to read about the features and benefits.
Standard costing is an estimate of how much it's going to cost to produce a product. Business Central makes it easy to monitor and adjust the standard and actual cost of producing a product. Companies will be able to locate any variances between the standard and actual costing. Register for our webinar and learn how to:
● Overview of Standard Costing and Actually (FIFO)
● Differences Between Standard Costing and Actually (FIFO) Costing
● Variance Reporting
Date: Wednesday August 21, 2019
Time: 2:00PM - 3:00PM EST
Project Types in Microsoft Dynamics GP
The Project Accounting module in Dynamics GP is a very robust application enabling users to monitor the financial results of a project. One of the best features with this module is that it ties in with all the other modules within Dynamics GP. Therefore, if an invoice needs to be posted it can be done in the same system. For a company to use the Project Accounting module correctly it must first understand its current project structure and what is required in terms of KPI’s and reporting. Once this has been decided the company will have to choose the project type to use for this project. There are three types of projects in Dynamics GP:
Cost Plus – Customer pays for the actual project cost plus an added margin percentage
Fixed Price – Customer pays a fixed fee for the project
Time and Materials – Customer is billed for all costs that are incurred on a project
Watch this FREE 5-minute video reviewing the three different project types in much more depth.
That was a detailed breakdown of the different kinds of projects that are available inside Dynamics GP. The projecting accounting module offers a lot of features that would require some training to learn everything. WebSan University offers a 7-part series for Project Accounting in Dynamics GP. This can be completed at your own pace, there’s no need to spend thousands of dollars hiring consultants. The courses are available online and are done in an instructional video format. Each video is only an hour long and provides a deep dive into how to navigate the system. The 7-part series for Project Accounting is available for $50 and use the promo code SAVEONPA to receive a 20% off the series.
Microsoft Office 365 requires employees to use their username and password in order to log in. However, a common issue that you might come across is people forgetting their passwords. When this occurs, Office 365 admins have privileges to reset the password. To begin resetting a password, follow the steps below:
1. From the Microsoft 365 Admin Center
a. Look for the Active users" tile.
b. Select "Reset a password"
i. A side window will open and from there you can search for users for which you need to change their password, or you can scroll down the list of users.
1. From that list you need to click the check-box beside the user(s) who need a password change.
a. You can choose one or multiple users for resetting passwords
b. Your own password can not be changed with multiple selections
2. The next side window to appear will show you who has been selected and present you with the option to Auto-generate a password of all the manual creation of one.
a. You can choose the check box to make the user change their password when they next sign in. If it is unchecked, then the password will remain the same until the user changes it themselves.
3. Click the "Reset" button and the next window will show success of the password reset(s).
4. There is also a choice to send an email to a specified email address with the password. This is optional.
Microsoft Office 365 makes it easier than ever to manage users from the Admin Center. Want to find out how Office 365 can help your company? Click the link below to learn more about the features available in Office 365.
The admin user in Offer 365 can add, delete and even manage users using the Microsoft 365 admin center. To start creating users with the Office 365 Admin Portal it’s important that each employee has their own Office 365 license. After all the licenses have been purchased the admin users can start adding users one at a time. After completing all the steps below the user will have an Office 365 license, sign in credentials and an Office 365 mailbox.
Creating users in Office 365 is a straight-forward and easy process.
1. Within the Microsoft 365 admin center
a. Look for the "Active users" tile
b. Click on "+ Add a user"
i. The following side window will open asking for information about the new user is created
2. Fill in the appropriate information and be sure to enter the product licenses before clicking the "Add" button.
ii. A user can be created without a license by clicking the last choice under Product licenses.
As you can see adding a user into Office 365 is a very quick and easy procedure. Additional features for the admin user in Office 365 include but are not limited to: creating groups, managing resources and reviewing reports. Want to learn more about Office 365 and its benefits? Click the link below for more information.
Phishing emails are a form of fraud. These emails try to get personal information such as usernames, passwords, or credit card numbers. This is done by impersonating a reputable brand or person within an organization. If an employee opens a link that they don't recognize, it can be very harmful to your company. Start protecting your company by adding Microsoft 365 to your business and gaining an advanced level of security and threat protection. It's also recommended to educate employees on how to spot phishing emails to ensure that your business stays safe. Here are two tips on how to spot a phishing email.
Check the Sender's Email Address
There are so many emails that get sent to your inbox on a daily basis. Hackers can create a fake email address and select the display name that it will come from. Any from address that is not compliant with the RFC 5322 will be flagged and handled according to the phishing policy setup in Microsoft 365. When a suspicious email is received here are some things to watch out for:
1) Do you recognize the senders' email address, or it is a random string of letters?
2) You will see that the sender is not someone you work with.
3) There will be links that you are told to click on. The links will be to websites with malicious content, do not click them.
Check for Spelling Mistakes in the Body of the Email and/or in the Send Address
Hackers tend to live in different parts of the world and may not have the strongest writing skills. They rely on online translators to help them write messages, which is great for translating but not necessarily for making text grammatically correct. It's common for a phishing email to have spelling mistakes and be grammatically incorrect, which could be overlooked. If an employee receives a suspicious email, they should ask these two questions to help spot if it's a phishing email or not.
1) Does the message contain grammatical errors an English speaker shouldn't have?
2) Is the email consistent with previous emails I've received from this person?
It's essential for a small business to have security in place to detect these emails before they can cause any harm. Microsoft 365 has an ATP anti-phishing protection to protect your business from any malicious phishing attacks. Microsoft 365 offers a lot of security and advanced threat protection that small businesses should have to run a safe and successful business.
Microsoft’s newest update covers everything from compliance requirements, message encryption to Azure password protection.
Below is a list of Microsoft 365’s new updates:
Editor in PowerPoint
The editor in PowerPoint now has multi-language support. This update can support English, French, Spanish and German. The system will recognize which language is being used and suggests fixes and appropriate grammar and spelling rules in the correct language.
Brand New Icons in Office 365
There are nearly 350 new icons to choose from in Office 365. They include new categories like accessibility, holidays and process.
Microsoft Kaizala is an app created for large group communications and work management.
The new updates will enable you to access the app if you are a Microsoft 365 for Office 365 commercial customer. Kaizala features will also be available in Microsoft Teams over the next 12 to 18 months.
Power BI Web by Example Connector
It allows customers to scrape data from HTML pages. It supports ingesting any data element on the page, beyond just HTML tables. You provide sample values for what data you would like to be extracted, and it does the rest.
Compliance Manager makes it easy to manage your organization’s cloud compliance activities, from implementation to reporting.
This update will now allow you to create custom risk assessments of any application used in your business. These assessments enable your IT team to import their own security and compliance control into the Compliance Manager.
Office 365 Advanced Message Encryption allows admins to revoke or expire encrypted emails. Once an encrypted email has been revoked, the recipient attempting to open it will be notified that the message has been revoked by the sender and be unable to view it.
Multi-Geo in Office 365
SharePoint Online and Office 365 Groups will enable customers to control where sites are stored. Users will be able to work anywhere in the world as their data is stored in the location of your choosing.
Security Policy Advisor
Office Security Policy Advisor is a new intelligent service, now available in preview, that uses behaviour-based analysis to help IT admins to quantify the risks and benefits of applying a tailored policy and monitor policy health over time, for their Office clients.
Admins can now deploy policies with a single click and easily update, or even roll back policies. Once again, this service is now available as a preview for all organizations with Office 365 ProPlus.
Azure AD password protection
Azure AD Password Protection, now generally available, lowers the risk of a being compromised by what is commonly known as a password spray attack. This is when a malicious user attempts to use a single password against multiple accounts before moving to the next commonly used password.
The updated banned password algorithm uses both the Microsoft-defined global banned password list and the custom banned password list you define to help users avoid choosing weak and vulnerable passwords.
If you would like more information about Microsoft 365 update for April 2019, view this video: https://www.youtube.com/watch?v=nmFxEy-HtlU&feature=youtu.be
In order to use the manufacturing module, you need to a Business Central premium license. The manufacturing module will help shorten the time it takes to create BOMs, routings, work centers, and machine centers. In this new era of digital manufacturing, it forces businesses to work quicker and smarter to beat out the competition. By utilizing this module in Business Central your company gains the competitive advantage of creating more goods in a more efficient manner.
1. Managing Inventory
When using the manufacturing module in Business Central, your company will be able to better manage inventory. Within seconds, a list can be displayed with all the different items that are in stock. It will show whether the item is currently in stock, how many are on hand and how many are on order.
2. Integrate Your Business Processes
One of the biggest benefits of using the manufacturing module is having all the data in one place. Production managers can make updates instantly to keep the system up-to-date with all its inventory. Users working in the front and in the back office will have access to the same information creating a more harmonized work dynamic.
3. Unify Production Data
Another one of the biggest benefits of using the manufacturing module in Business Central is analytics. This goes beyond just knowing what is in stock and what needs to order but analyzing trends within your business. Such trends can be spotted in the supply chain, production process, inventory management, sales, profit margins, and even customer behavior.
4. Improved Product Quality
The customer’s expectations for product quality is higher than it has ever been before. Using the manufacturing module will make it easier for production managers to meet these growing standards. Having a system in place that provides traceability and tracking enables a company to monitor the quality status of all its centers and products. This will provide real-time reports on machines, components, stations, shifts, and even operators that were involved in the production. Production Managers can then ensure only the best quality products are being sent out to customers.
5. Decreased Production Time
Innovative businesses who use the manufacturing module in Business Central can optimize assembly time. The module will make a more efficient process by decreasing the overall creation time and cost of each product. Tools are available to take a customer’s order on-the-spot and list any alterations that need to be made. Once the production manager receives this order it can be finalized and then sent into production. There is no need for days or weeks of back and forth emails which can delay the cycle time of an item. By lessening the time-to-market process, companies can save time and money and allocate these resources elsewhere.
Being able to manage inventory, collect data, improve product quality, and decrease production time creates a stronger competitive advantage. Want to learn more about the manufacturing module for Microsoft Dynamics 365 Business Central? Click Here to register for our Business Central manufacturing courses at WebSan University for free and learn about all the different modules available to create a successful production.
Over the last few years, Microsoft has been making significant investments in the cloud. Unfortunately, that means that Windows Server 2008 and SQL Service 2008 will reach the end of support. But don’t worry, Microsoft has created a pathway for companies ready to make the switch to the cloud.
Why should I make the switch to the cloud?
Moving to the cloud is no longer an intimidating transition. Companies of all sizes have made the switch to the cloud, and we don’t see that trend slowing down any time soon.
Here are a few trends that are noteworthy:
- In 2016, 16.1 ZB of data was generated. In 2025, 163 ZBs of data will be generated.
- More than 80% of organizations now adopt cloud-first strategies as part of an overall digital transformation
- Investment in AI, top of mind for many companies, increase by an astounding 300% in 2017
When is the deadline and what happens if I do nothing?
It’s better that you act now and not later, time is running out. Extended support for SQL Server 2008 and 2008 R2 ends on July 9, 2019 and Windows Server 2008 and 2008 R2 ends on January 14, 2020. These deadlines are around the corner; you need to give yourself time to migrate and explore your options.
If you decide to do nothing, then be prepared for no security updates, compliance concerns and missed innovation opportunities.
What are your options?
You have options, for both on-premise and cloud migrations. If you plan to stay on-premise, you can upgrade to Windows Server 2016 and get cloud and DevOps ready. If you decide to move the cloud, you can migrate Windows Server 2008 and 2008 R2 workloads to Azure VM.
For more information about upgrade options across cloud and on-premise, visit: www.microsoft.com/lifecycle
1. IDC White Paper, Data Age 2025: The Evolution of Data to Life-Critical
2. Building Trust in a Cloudy Sky:https://www.mcafee.com/us/resources/reports/rp-building-trust-cloudy-sky.pdf
3. A Trillion-Dollar Boost: The Economic Impact of AI on Customer relationship Management: https://www.salesforce.com/content/dam/web/en_us/www/documents/white-papers/the-economic-impact-of-ai.pdf
Securing your company’s data is essential. Businesses are constantly avoiding cyber threats, security alerts, and maintaining infrastructure. With so many things going on, your IT team can sometimes miss vital security threats.
To combat this issue, Microsoft has introduced Microsoft Azure Sentinel. This SIEM tool is a cloud-native service that provides intelligent security analytics at cloud scale for your company.
Collect data across your enterprise easily
Azure Sentinel allows you to aggregate security data with built-in connectors, integration of Microsoft signals and industry log formats such as comment event format and syslog.
You’re able to import your Office 365 data at no cost to you and combined it with other security data.
Analyze and detect threats quickly with AI on your side
Azure Sentinel uses top-notch scalable machine learning algorithms to correlate alerts from different products manually or utilizing a correlation engine.
Automate common tasks and threat response
Microsoft’s SIEM tool provides built-in automation processes to respond to threats right away.
Learn more about Microsoft Azure Sentinel and how you can protect your company’s data through intelligent security analytics.