Northern Computer

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, 18 February 2013

How to Set a Password to Microsoft Office Files

Posted on 14:48 by Unknown
With the Microsoft Office system, you can use passwords to help prevent other people from opening or modifying your documents, workbooks, and presentations. This can keep files safe and secure.

To set a password for a Microsoft file, first open any Microsoft office's component such as Word, Powerpoint, Excel etc and follow the instructions below for the version of software that you have:

MS Office 2007
1.       Click on the Office button
2.       Click on prepare and encrypt document
 
3.       Enter the desired password and click OK
 
4.       A new window appears asking to confirm the password. Click OK.
5.       Once your password is entered, you must save your document for the encryption to take effect.
6.       Now, whenever the file is opened, a password will be required in order to open the document.

MS Office 2010

1.       Click on “File” in the upper left-hand corner.
2.       Click on “Info”.
3.       Click on “Protect Document” then “Encrypt with Password”.

4.       You will be prompted to enter a password to encrypt your document

5.       You will be prompted to re-enter your password.
6.       Once your password is entered, you must save your document for the encryption to take effect.
7.       Now, whenever the file is opened, a password will be required in order to open the document.

Northern Computer - Your Trusted Partner
#1 - 495 Banks Road Kelowna, BC V1X 6A2
Phone: 250.762.7753 Fax: 250.861.1861 Toll-Free: 1.877.257.2896
Email: sales@northerncomputer.ca or service@northerncomputer.ca
Web: http://www.northerncomputer.ca
Read More
Posted in | No comments

Managing the ‘Bring Your Own Device’ Trend

Posted on 14:11 by Unknown
One of the changes occurring in the workplace over the last few years is the growing number of personal devices, such as smart phones and tablets that are being used for work purposes.

This ‘Bring Your Own Device’ trend, or BYOD, is certainly here to stay. But while this use of technology clearly has its advantages, the risks associated with this practice are often underestimated, not only by the staff but also by the company’s management.
To understand where these risks lie, let us look at the application that is most commonly used on personal devices, namely email. In a typical example, an employee’s smart phone will be configured to connect to the corporate Exchange server. This makes a lot of sense, because it allows that employee to access their email when they are on the road, out at lunch, or even just sitting in front of the television at night. And because Microsoft Exchange does a lot more than just handle emails, that staff member can also access the company contacts database, view his or her appointments, and so on. All of this means that the employee is able to communicate more effectively, while the company benefits from enhanced productivity. So why would anyone mind?

Well, the trouble is that a lot of confidential information is sent via email these days. Financial statements, management reports, HR documents, product development information and confidential client information, to name a few examples, are all sent via email. In the past, email was largely contained within the business premises, where it was safeguarded by the company’s security systems.
Of course, there were those roaming laptop users who carried data on their machines out into the wild. But those machines were still protected, to varying degrees, by the company’s security systems. Password complexity policies were enforced by the company’s IT department, who also managed the anti-virus protection, configured hard drive encryption, and so on.

With BYOD, however, that picture changes. No longer does the business control the device. It’s a personal machine, which has the staff member’s own software and data on it, as well as corporate data. The configuration of the machine is not managed by the company, so there is no way to control the security of that device. Even simple things, such as a suitable password policy, cannot be controlled by the business. Considering how easily these devices can be misplaced or stolen, the risks to the company are significant.
So what can be done about this, you ask? Start by drafting a clear BYOD policy that can help your company reduce the risks associated with BYOD. Considerations to implement might include:

1.       Specify What Devices Are Permitted – There are many device choices, from iOS-based phones and tablets to Android handhelds and many others. Make it clear to employees which devices you will support; in addition to whatever corporate-issued devices you continue to deploy—and which you won't.

2.       Establish a Stringent Security Policy for all Devices - Users tend to resist having passwords or lock screens on their personal devices. However, there is often sensitive information to which devices connected to your network have access to allow such easy access

3.       Make It Clear Who Owns What Apps and Data - While it seems logical, on the face of it, that your company owns the personal information stored on the servers that your employees access with their devices, it becomes more problematic when you consider the problem of wiping the device in the event it is lost or confirmed stolen. When you wipe the phone, traditionally all content on the phone is erased, including personal pictures, music and applications that in many cases the individual, not the company, has paid for.

4.       Define a Clear Service Policy for Devices under BYOD Criteria - It's important for employees to understand the boundaries when questions or problems appear. Considerations for IT support need to be defined.

5.       Set Up an Employee Exit Strategy – What will happen when employees with devices leave the company? How do you enforce the removal of e-mail access, data and or any other proprietary applications and information?
With these few steps, a company can significantly reduce the risks associated with BYOD. If you need assistance with creating a policy, please give us a call.
- Janet F, IT Consultant
 
Northern Computer - Your Trusted Partner
#1 - 495 Banks Road Kelowna, BC V1X 6A2
Phone: 250.762.7753 Fax: 250.861.1861 Toll-Free: 1.877.257.2896
Email: sales@northerncomputer.ca or service@northerncomputer.ca
Web: http://www.northerncomputer.ca
Read More
Posted in Email, PC, smart phones, tablets | No comments

Making the Most of HST While it’s Here

Posted on 13:48 by Unknown
On April 1st, 2013, small business owners across the province will face a big change as the HST system will be reverted back to PST/GST. The loss of the HST system will be felt by many businesses across BC; however there is also a tax planning opportunity that should not be missed.

If you are planning a capital purchase for your business, make sure it is bought before April 1st, 2013. Capital expenditures include any item that costs more than $500 and will last you for more than a year. Examples of capital expenditures include equipment, hardware, software, tools, and office furniture to name just a few.
The reason it’s beneficial to make these purchases under the HST system is that you will only pay the net cost of the item and will be reimbursed for all taxes due. By waiting until after April 1st to make your purchase, the cost of the item to your business will increase by 7%.

For Example…                                                                                     
Let’s use the example of a purchase of equipment that costs you $10,000.

If that equipment is bought today, then your cost is $11,200 ($10,000 plus $1,200 of HST) - but your business will be able to deduct the $1,200 HST from the amount you owe to the CRA, from HST collected through your sales for the year. If the amount of HST your business has collected is less than $1,200, then your business will get a full refund of $1,200.

Under the PST/GST system, your cost will still be $11,200 ($10,000 plus $700 of PST and $500 of GST) - but now you will only be able to deduct the $500 in GST.
Comments drawn from original article as posted by Gabriele Loren for www.smallbusinessbc.ca.

Click here to read the remainder of the article.

Northern Computer - Your Trusted Partner
#1 - 495 Banks Road Kelowna, BC V1X 6A2
Phone: 250.762.7753 Fax: 250.861.1861 Toll-Free: 1.877.257.2896
Email: sales@northerncomputer.ca or service@northerncomputer.ca
Web: http://www.northerncomputer.ca

Read More
Posted in PC, purchase, tax | No comments
Newer Posts Older Posts Home
Subscribe to: Comments (Atom)

Popular Posts

  • Northern Computer - Your Trusted Partner.
    Northern Computer provides computer and telephone solutions to meet all needs from home based businesses to high-end wide area networks. Fou...
  • Remote Support in Kelowna
    We provide online computer help from 8 AM to 5 PM Monday to Friday. Our technical support staff can help take care of computer problems suc...
  • Disaster Recovery in Kelowna
    These services focus on assisting you to secure your data, maintain your Internet connection and keep your key business processes running. ...
  • Security Solutions in Kelowna
    Northern Computer uses Cisco and Watchguard network security products. We can increase your network security, unify your threat protection...
  • Backup in Kelowna
    Our Offsite Backup Service provides you with the peace of mind that comes from knowing that your important files are safe from the largest...
  • Software Solutions in Kelowna
    Northern computer offers a wide range of software solutions including: Microsoft Office suite, Windows XP and Vista operating systems A...
  • Depot Warranty Repair in Kelowna
    We repair most Windows computers and printer models as well as other computer related items both during warranty and outside warranty c...
  • Offsite Back Up Kelowna - Northern Computers
    NCI Offsite Backup provides you with the peace of mind that comes from knowing that your important files and photos are safe from the larges...
  • Technical Services in Kelowna
    Northern Computer is committed to providing high quality technical services throughout all phases of a technology lifecycle. These...
  • Managed Services in Kelowna
    Whether your business is small with one server and a few workstations, or large with multiple locations, we have the expertise t...

Categories

  • advertising
  • antivirus
  • application
  • Backup
  • battery
  • Cloud
  • computer
  • CPU
  • data
  • digital signage
  • Email
  • Hard Drive
  • hardware
  • Internet
  • IT
  • Laptop
  • marketing
  • monitor computer video hardware
  • Motherboard
  • Networking
  • Office Ergonomics
  • PC
  • Printers
  • purchase
  • RAM
  • Recovery
  • recycle
  • remote desktop
  • security
  • server
  • Service and Repair
  • signal
  • smart phones
  • Software
  • software server
  • tablets
  • tax
  • Tips
  • TV
  • Virus
  • VOIP
  • warranty
  • web
  • Windows
  • wireless

Blog Archive

  • ▼  2013 (23)
    • ►  November (1)
    • ►  October (3)
    • ►  June (2)
    • ►  May (2)
    • ►  April (4)
    • ►  March (3)
    • ▼  February (3)
      • How to Set a Password to Microsoft Office Files
      • Managing the ‘Bring Your Own Device’ Trend
      • Making the Most of HST While it’s Here
    • ►  January (5)
  • ►  2012 (25)
    • ►  November (2)
    • ►  October (3)
    • ►  September (1)
    • ►  June (2)
    • ►  May (2)
    • ►  April (3)
    • ►  March (5)
    • ►  February (1)
    • ►  January (6)
  • ►  2011 (56)
    • ►  December (5)
    • ►  November (8)
    • ►  October (3)
    • ►  September (3)
    • ►  August (3)
    • ►  July (7)
    • ►  June (6)
    • ►  May (3)
    • ►  April (8)
    • ►  March (5)
    • ►  February (4)
    • ►  January (1)
  • ►  2010 (29)
    • ►  December (5)
    • ►  November (3)
    • ►  October (4)
    • ►  September (2)
    • ►  August (1)
    • ►  June (1)
    • ►  April (13)
Powered by Blogger.

About Me

Unknown
View my complete profile