Northern Computer

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, 18 February 2013

How to Set a Password to Microsoft Office Files

Posted on 14:48 by Unknown
With the Microsoft Office system, you can use passwords to help prevent other people from opening or modifying your documents, workbooks, and presentations. This can keep files safe and secure.

To set a password for a Microsoft file, first open any Microsoft office's component such as Word, Powerpoint, Excel etc and follow the instructions below for the version of software that you have:

MS Office 2007
1.       Click on the Office button
2.       Click on prepare and encrypt document
 
3.       Enter the desired password and click OK
 
4.       A new window appears asking to confirm the password. Click OK.
5.       Once your password is entered, you must save your document for the encryption to take effect.
6.       Now, whenever the file is opened, a password will be required in order to open the document.

MS Office 2010

1.       Click on “File” in the upper left-hand corner.
2.       Click on “Info”.
3.       Click on “Protect Document” then “Encrypt with Password”.

4.       You will be prompted to enter a password to encrypt your document

5.       You will be prompted to re-enter your password.
6.       Once your password is entered, you must save your document for the encryption to take effect.
7.       Now, whenever the file is opened, a password will be required in order to open the document.

Northern Computer - Your Trusted Partner
#1 - 495 Banks Road Kelowna, BC V1X 6A2
Phone: 250.762.7753 Fax: 250.861.1861 Toll-Free: 1.877.257.2896
Email: sales@northerncomputer.ca or service@northerncomputer.ca
Web: http://www.northerncomputer.ca
Read More
Posted in | No comments

Managing the ‘Bring Your Own Device’ Trend

Posted on 14:11 by Unknown
One of the changes occurring in the workplace over the last few years is the growing number of personal devices, such as smart phones and tablets that are being used for work purposes.

This ‘Bring Your Own Device’ trend, or BYOD, is certainly here to stay. But while this use of technology clearly has its advantages, the risks associated with this practice are often underestimated, not only by the staff but also by the company’s management.
To understand where these risks lie, let us look at the application that is most commonly used on personal devices, namely email. In a typical example, an employee’s smart phone will be configured to connect to the corporate Exchange server. This makes a lot of sense, because it allows that employee to access their email when they are on the road, out at lunch, or even just sitting in front of the television at night. And because Microsoft Exchange does a lot more than just handle emails, that staff member can also access the company contacts database, view his or her appointments, and so on. All of this means that the employee is able to communicate more effectively, while the company benefits from enhanced productivity. So why would anyone mind?

Well, the trouble is that a lot of confidential information is sent via email these days. Financial statements, management reports, HR documents, product development information and confidential client information, to name a few examples, are all sent via email. In the past, email was largely contained within the business premises, where it was safeguarded by the company’s security systems.
Of course, there were those roaming laptop users who carried data on their machines out into the wild. But those machines were still protected, to varying degrees, by the company’s security systems. Password complexity policies were enforced by the company’s IT department, who also managed the anti-virus protection, configured hard drive encryption, and so on.

With BYOD, however, that picture changes. No longer does the business control the device. It’s a personal machine, which has the staff member’s own software and data on it, as well as corporate data. The configuration of the machine is not managed by the company, so there is no way to control the security of that device. Even simple things, such as a suitable password policy, cannot be controlled by the business. Considering how easily these devices can be misplaced or stolen, the risks to the company are significant.
So what can be done about this, you ask? Start by drafting a clear BYOD policy that can help your company reduce the risks associated with BYOD. Considerations to implement might include:

1.       Specify What Devices Are Permitted – There are many device choices, from iOS-based phones and tablets to Android handhelds and many others. Make it clear to employees which devices you will support; in addition to whatever corporate-issued devices you continue to deploy—and which you won't.

2.       Establish a Stringent Security Policy for all Devices - Users tend to resist having passwords or lock screens on their personal devices. However, there is often sensitive information to which devices connected to your network have access to allow such easy access

3.       Make It Clear Who Owns What Apps and Data - While it seems logical, on the face of it, that your company owns the personal information stored on the servers that your employees access with their devices, it becomes more problematic when you consider the problem of wiping the device in the event it is lost or confirmed stolen. When you wipe the phone, traditionally all content on the phone is erased, including personal pictures, music and applications that in many cases the individual, not the company, has paid for.

4.       Define a Clear Service Policy for Devices under BYOD Criteria - It's important for employees to understand the boundaries when questions or problems appear. Considerations for IT support need to be defined.

5.       Set Up an Employee Exit Strategy – What will happen when employees with devices leave the company? How do you enforce the removal of e-mail access, data and or any other proprietary applications and information?
With these few steps, a company can significantly reduce the risks associated with BYOD. If you need assistance with creating a policy, please give us a call.
- Janet F, IT Consultant
 
Northern Computer - Your Trusted Partner
#1 - 495 Banks Road Kelowna, BC V1X 6A2
Phone: 250.762.7753 Fax: 250.861.1861 Toll-Free: 1.877.257.2896
Email: sales@northerncomputer.ca or service@northerncomputer.ca
Web: http://www.northerncomputer.ca
Read More
Posted in Email, PC, smart phones, tablets | No comments

Making the Most of HST While it’s Here

Posted on 13:48 by Unknown
On April 1st, 2013, small business owners across the province will face a big change as the HST system will be reverted back to PST/GST. The loss of the HST system will be felt by many businesses across BC; however there is also a tax planning opportunity that should not be missed.

If you are planning a capital purchase for your business, make sure it is bought before April 1st, 2013. Capital expenditures include any item that costs more than $500 and will last you for more than a year. Examples of capital expenditures include equipment, hardware, software, tools, and office furniture to name just a few.
The reason it’s beneficial to make these purchases under the HST system is that you will only pay the net cost of the item and will be reimbursed for all taxes due. By waiting until after April 1st to make your purchase, the cost of the item to your business will increase by 7%.

For Example…                                                                                     
Let’s use the example of a purchase of equipment that costs you $10,000.

If that equipment is bought today, then your cost is $11,200 ($10,000 plus $1,200 of HST) - but your business will be able to deduct the $1,200 HST from the amount you owe to the CRA, from HST collected through your sales for the year. If the amount of HST your business has collected is less than $1,200, then your business will get a full refund of $1,200.

Under the PST/GST system, your cost will still be $11,200 ($10,000 plus $700 of PST and $500 of GST) - but now you will only be able to deduct the $500 in GST.
Comments drawn from original article as posted by Gabriele Loren for www.smallbusinessbc.ca.

Click here to read the remainder of the article.

Northern Computer - Your Trusted Partner
#1 - 495 Banks Road Kelowna, BC V1X 6A2
Phone: 250.762.7753 Fax: 250.861.1861 Toll-Free: 1.877.257.2896
Email: sales@northerncomputer.ca or service@northerncomputer.ca
Web: http://www.northerncomputer.ca

Read More
Posted in PC, purchase, tax | No comments
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Popular Posts

  • What the Heck's in Your Computer - Part 1: The Motherboard
    c The motherboard, also known as the main logic board, has been at the heart of every micro computer since its invention. Its function is si...
  • The Impact of Tablets – 5 Ways Businesses Are Using Them
    From just a few short years ago, tablets have gone from being non-existent to becoming a common device that is being adopted by many busines...
  • Power Protection for Your Computer Hardware - Surge Protectors and UPS'
    It's been said that there are two types of computer users: those who have lost data because of a power problem, and those who are going ...
  • Torture Tests of the Lenovo All-in-One PC
    200 test units, 10 torture tests, 20,000 hours of testing-Lenovo ThinkCentre All-In-One desktops are built tough. Northern Computer - Your T...
  • Office Ergonomics - Keyboard Setup & Usage
    The last area in your work station setup (see our articles on mouse and monitor ergonomics) that can cause injury from improper usage is the...
  • Hey Kelowna - Backup – Disaster Recovery – Are you prepared?
    We all know that we should back up our important data, but maybe we don't know what files we should back up on our systems or we don’t k...
  • Northern Computer and Nidana Networks have Merged
    and News Announcement As Northern Computer continues to grow, we are excited to announce our merger with Nidana Networks. This merger allows...
  • Should I Make the Switch to Windows 7?
    Windows 7 has now been out for a couple of years and yet there are still people who are hesitant to upgrade to it. For the most part this is...
  • 5 Reasons to Consider an All-in-One PC
    If you aren’t already feeling overwhelmed by the consumer devices available on the market today, AIO (All-in-One) PCs are striving for a pie...
  • 7 Reasons why it’s Time to give up on Windows XP Once And For All
    Although businesses have been getting rid of Windows XP for at least the last 3 years, the fact remains that as of March 2013, nearly 39% of...

Categories

  • advertising
  • antivirus
  • application
  • Backup
  • battery
  • Cloud
  • computer
  • CPU
  • data
  • digital signage
  • Email
  • Hard Drive
  • hardware
  • Internet
  • IT
  • Laptop
  • marketing
  • monitor computer video hardware
  • Motherboard
  • Networking
  • Office Ergonomics
  • PC
  • Printers
  • purchase
  • RAM
  • Recovery
  • recycle
  • remote desktop
  • security
  • server
  • Service and Repair
  • signal
  • smart phones
  • Software
  • software server
  • tablets
  • tax
  • Tips
  • TV
  • Virus
  • VOIP
  • warranty
  • web
  • Windows
  • wireless

Blog Archive

  • ▼  2013 (23)
    • ►  November (1)
    • ►  October (3)
    • ►  June (2)
    • ►  May (2)
    • ►  April (4)
    • ►  March (3)
    • ▼  February (3)
      • How to Set a Password to Microsoft Office Files
      • Managing the ‘Bring Your Own Device’ Trend
      • Making the Most of HST While it’s Here
    • ►  January (5)
  • ►  2012 (25)
    • ►  November (2)
    • ►  October (3)
    • ►  September (1)
    • ►  June (2)
    • ►  May (2)
    • ►  April (3)
    • ►  March (5)
    • ►  February (1)
    • ►  January (6)
  • ►  2011 (56)
    • ►  December (5)
    • ►  November (8)
    • ►  October (3)
    • ►  September (3)
    • ►  August (3)
    • ►  July (7)
    • ►  June (6)
    • ►  May (3)
    • ►  April (8)
    • ►  March (5)
    • ►  February (4)
    • ►  January (1)
  • ►  2010 (29)
    • ►  December (5)
    • ►  November (3)
    • ►  October (4)
    • ►  September (2)
    • ►  August (1)
    • ►  June (1)
    • ►  April (13)
Powered by Blogger.

About Me

Unknown
View my complete profile