Sunteți pe pagina 1din 3

******************************************************************

Sleep Easy with Office 365 Alerts


******************************************************************

It seems that Office 365 is getting bigger and better, with more features being
rolled out continuously.

With so much content being moved into Office 365 and with the increased user
adoption and access activities, it�s become a little harder to keep tabs on who�s
doing what with the content. That�s where Alerts come into play.

While the cloud certainly offers business owners a wealth of benefits, it isn�t
without its issues. One thing that puts many people off migrating their data to the
cloud is that doing so represents losing some degree of control. Microsoft�s Alerts
feature has been designed to allay some of this fear by sending account
administrators an email when action is taken that they should be aware of.

What�s really great about this feature is the vast wealth of things that you can be
informed of. The potential alerts are organized into a range of categories to make
them easier to find. Options include Application Administration, Exchange Mailbox
activities, User administration, File and Folder, Synchronization, Sharing and
Access Request, Group administration, and Application Administration.

Alerts can be sent via email or text messages (SMS) and people in different roles
can also be informed of different activities that are directly relevant to their
position and interests. Just some of the alerts that are available include
notifications of when a file has been added, modified, or deleted; when files are
shared outside the organization; and when files are synchronized to a new device.
In combination, these alerts can give users a greater level of visibility of what
is happening to important and sometimes sensitive data. In the past, companies
needed to invest in costly software to ensure they had access to this level of
detail.

Microsoft Alerts is perfect for business owners and administrators who are keen to
know who has access to data and where it is going. This is especially important
when remote working systems are in place, and people have the ability to work from
anywhere on any device of their choosing.

---------------------------------------------------------------------
---------------------------------------------------------------------

******************************************************************
Four Data Protection Steps That Are Essential in a Mobile World
******************************************************************

The contemporary mobile world offers businesses a wealth of benefits; however, it


has also led to a significant increase in security concerns and protecting
sensitive data is becoming increasingly challenging.

As preventing employees from using mobile devices is not a viable method of


controlling data access, there are a number of steps you will need to take.

Back to basics: Education


If there�s one thing that data breaches teach us time and time again, it�s that
people�s security habits are way off the mark.

Don�t leave it to chance that your employees know the steps they need to protect
their mobile devices, educate them on the security practices they need to follow
and make sure they follow them.
Develop bring your own device policies
Try as you might, you will find it very difficult to completely stop your employees
from using their own devices in the workplace. As such, you should accept the
reality and clearly define what employees are permitted to use their devices for in
the work environment. Develop a very clear BYOD policy that outlines the rules and
security requirements in no uncertain terms, and ensure employees adhere to its
terms.

Encourage data storage in a central location


Create a central repository for data and then offer employees the ability to access
it via their mobile devices. This will ensure employees can access the data they
require without transferring it to their own devices.

Limit what data employees can access


Even if all data is stored in a central repository, that doesn�t mean all employees
should have free and easy access to it. Start by defining what data requires
protection and then ensure only those employees who need access to that data are
able to view it. Run data audits on a regular basis to ensure that highly sensitive
data is limited to the proper audience.

---------------------------------------------------------------------
---------------------------------------------------------------------

******************************************************************
Six Top Tips for Getting the Most Out of Amazon Cloud Cam
******************************************************************

Amazon's Cloud Cam retails at just below $120 and is a cost-effective, simple to
use cam that you can setup and forget about.

Under the hood, it packs quite a punch, and there are some great features on offer.

1) Make the most of the mobile app

The Cloud Cam comes complete with an Android and iOS mobile app that you can use to
setup the cam, program alerts, access livestream viewing, talk through the camera�s
in-built speaker, and hear the sound in the room in which the cam is positioned.

2) View the cam via online streaming

One of the latest features to be introduced to the cam is the ability to access
online streaming of the cam via a web browser. Simply visit cloudcam.amazon.com
from your computer and sign into the Amazon account you used for the Cloud Cam.
From there, you can access both the live view and clips that were previously
recorded.

3) Integrate the cam with Alexa

It will come as no surprise that Amazon has integrated its Cloud Cam with its Echo
devices and, of course, Alexa, and this brings with it a whole host of
functionality. In addition to opting to receive alerts on Echo whenever motion is
detected, you can view your live camera feed on Fire TV.

4) Enhance motion detection with person detection alerts

The problem with motion alerts is that they can be triggered by even the most basic
movement. To avoid being bombarded with alerts on a continual basis, sign up for a
subscription plan and opt into person detection alerts. This handy feature will
scan the item that is causing the motion and send notifications only when a person
is detected.

5) Set up motion zones

In some cases, you may wish to set up motion zones so that you can ignore certain
areas of a room that may be a source of false alarms; for example, a wall that
light reflections frequently move across. To do this, sign into the Cloud Cam app
and select Settings > Zones. Tap the area of the image for which you want to add a
zone.

This is another feature that you will need to have a subscription to use, but it is
certainly very useful.

6) Activate geofencing

Whenever the Cloud Cam is turned on, it continually monitors and records everything
that is taking place within its immediate environment. This may not always be
desirable. To safeguard your privacy, you can activate the Home/Away feature so
that the camera automatically turns on and off depending on where the device that
is linked to the camera via the app is located. As such, you can set the cam to
automatically turn off when you enter the house and on when you leave again.

---------------------------------------------------------------------

******************************************************************
Why You Should Consider Revoking Facebook App Access
******************************************************************

Facebook has hit the headlines in style over the last few weeks following the news
that a data breach had affected over 50 million Facebook users. Ever since the
controversy was exposed, Facebook users have rightly started to express concerns
about what happens to their data.

If you�re one of the many Facebook users who want to limit access to your
information and ensure it doesn�t get into the wrong hands, this handy guide will
tell you how to quickly and easily get your data out of developers� hands for good.

The main methods by which Facebook collects data from your account is via apps. As
such, if you want to protect your Facebook privacy, you need to delete the apps
from your Facebook account. You can quickly and easily do this on both the app and
desktop versions of Facebook. However, this doesn�t ensure that the data the
developer has compiled on your account will be deleted from the developer's
database. To request this, you�ll need to use the desktop Facebook site to contact
the developer by following these steps:

1) Open your Facebook account


2) Click on the down arrow that appears on the top toolbar
3) Select Settings > Apps
4) Hover the arrow over any of the apps you want to delete and click on the X icon
5) A pop-up message will be displayed that will tell you how you can contact the
app developers to request the removal of your data. Note down the information and
then click on the Remove button
6) Follow-up with the developer and ask for all your data to be deleted by
following the instructions provided on the pop-up. Sometimes, it may be as easy as
completing an online form, other times you may need to send an email to the
developer

---------------------------------------------------------------------

S-ar putea să vă placă și