Microsoft Office Basic Training: Add a Chart

Sometimes the best way to make complex data in your document understandable is to create a chart to display the data visually.

In this blog, we will show you just how easy this is in Microsoft Office!

  1. Select the place in the document where you want to insert the chart.
  2. Select Insert > Chart.
  3. Select the type of chart you want, and then select OK.
  4. In the spreadsheet, enter your data.

Check out Microsoft’s Instructional Video Below:

 

Here are a few things to keep in mind as you create the chart and enter your data –

  • The default selection for adding a chart is a Column, but you have different options to choose from.
  • As you fill in categories, the new names automatically appear in the chart as they’re typed in.
  • For the series, add headings—this might be a name that describes what each group of data is.
  • As you enter your data across cells, the chart updates to show the new values entered.
  • Finish entering your data, and then select Close.

We hope this post in our series of Microsoft Office training has been useful!

Cyber-slacking: The Challenges Facing Business Owners

Cyber-Slacking’s 3 Primary Areas of Impact:

Lost Productivity

Cyberslacking costs millions of dollars in lost productivity each year. Business owners are concerned about lost productivity as it affects the bottom line and impairs business efficiency and customer service. The U.S. Treasury Department monitoring discovered that over half of the internet use by IRS employees was for personal reasons. Another study found that visits to pornography sites during the 8-5 workday accounted for almost ¾ of all the visits to those sites. In a survey of online shopping, AOL and RoperASW found that 43 percent of people take time from their workday to shop. “Reasonable employers expect workers to handle some personal chores on the job,” says Lewis Maltby, president of the National Work Rights Institute. Most employees don’t intentionally violate workplace rules, but in many instances, some personal use turns into hours of lost productivity.

Employer Liability

Cyberslacking is also a problem from a liability and legal perspective, as businesses can now be held responsible for employee conduct while using the Internet. Liability might occur in areas such as breach of copyright, breach of confidentiality, loss of commercially sensitive information, and employee harassment. In addition to possible liability for acts committed by employees against other employees, a business owner also has potential exposure to liability for illegal online activities by an employee in the workplace. The common law legal doctrine respondeat superior may allow an employer to be held liable for the wrongful or unauthorized acts of its employees committed within the scope of employment.

Company Security and Resource Drainage

Controlling Internet usage is only one aspect of the e-business security issue. Business owners are implementing more cybersecurity measures to filter out spam emails from employees’ inboxes; however, a growing, less-addressed issue is employees accessing their social media accounts at work. For example, an employee might access their Facebook account, click on a phishing message that was sent to them by a friend’s compromised account. This attack would place the organization’s information at the same level of risk as email-based phishing schemes.

Cyberslacking also causes a drain on company resources and can include many factors, such as leaking confidential information, staff replacement, financial impact, financial drain, security costs, and legal costs. An estimated 10-20 percent of network traffic is non-work related. This traffic uses up valuable bandwidth and hampers mission-specific Internet use. Efficiency is impaired when a company’s resources are diverted from business use to non-business use.

Reducing Cyberslacking

It is essential that companies train employees and put Internet policies in place to minimize cyberslacking. Business owners must grasp the seriousness of the legal, ethical, and productivity issues that cyberslacking brings to the work environment. Written and enforced company policies concerning Internet use will establish clear ethical boundaries. An open dialogue and increased employee training will raise awareness and help employees personally define the legal and ethical line between use and abuse of the Internet.

If your business needs help establishing and communicating guidelines for Internet use, Garner IT is here to help. We have written policies in place for our own company and can assist in implementing your company policies. Give us a call at 850.250.3210 or stop by our office at 1330 Harrison Ave, Panama City, FL 32401 for more information.

Do You Accept Credit Cards? 5 Pitfalls That Could Lead To Lawsuits

If Your Company is not Fully Compliant with Payment Card Industry Security Standards (PCI SS), You Could be at Risk of a Serious Tangle with Attorneys.

Avoid These Mistakes to Keep Your Company Safe:

 

1. Storing Cardholder Data in Noncompliant Programs

Many states have laws regarding data breaches and, depending on where you accept cards, you may be subject to many of them. Massachusetts has 201 CMR 17.00, which requires companies keeping any personal data from its residents to prepare a PCI-compliant plan to protect that data. If a company fails to maintain that plan, the business may face state prosecution.

2. Fibbing on the Self-Assessment Questionnaire

If you have considered tampering with the reports from your company’s Approved Scanning Vendor, think again. Time invested now in fixing any holes in your data security system could save you big-time from the penalties your company could suffer if there’s ever a data breach. The same thing applies to just “fudging the truth” on self-prepared compliance reports. Even if you think it’s a simple stretch of the truth, don’t do it.

3. Not Using the Right Qualified Security Assessor

Many companies use Qualified Security Assessors to help them maintain their PCI compliance. Every QSA does not necessarily know as much as another, however. It’s important to select someone who both understands your business and stays up-to-date on the latest version of PCI Security Standards.

4. Trying to Resolve Data Compromises Under the Radar

You may be tempted to fix a customer’s complaint yourself if they inform you of a data compromise. Not advising credit card companies of data breaches, however small, can lead to you no longer having access to their services. Those credit card companies can then file suit against your company, costing you big bucks in the end.

5. Not Checking ID for Point-of-Sale Credit Card Use

Sometimes it seems like no one checks IDs against credit card users, so merchants tend to be lax about doing so. Running just one unauthorized credit card could cost you a lot in the long run. Even if the state in which you do business does not have specific laws regarding PCI compliance, a civil suit may come against your company for any data breaches. The court will not favor you if you haven’t been PCI-compliant. All in all, it pays to pay attention to PCI compliance – a little time vested today could save you significant time tomorrow.

Are You a “Sitting Duck” (Or Turkey)?

Small Businesses are Under Attack

Right now, extremely dangerous and well-funded cybercrime rings in China, Russia, and Ukraine are using sophisticated software systems to hack into thousands of small businesses to steal credit cards, client information and swindle money directly out of your bank account. Some are even being funded by their government to attack small, virtually defenseless businesses.

Don’t think you’re in danger because you’re “small” and not a big target like a Target or Home Depot?

Think again.

Over 82,000 NEW malware threats are being released every single day, and HALF of the cyber-attacks occurring are aimed at small businesses. You don’t hear about it as much because most business owners aren’t aware it should be reported, or it’s kept quiet for fear of attracting lousy PR, lawsuits and data-breach fines and out of sheer embarrassment. The National Cyber Security Alliance reports that more than one in five small businesses have been victims of cybercrime in the last year – and that number is proliferating as more companies utilize cloud computing and mobile devices, storing more information online.

Quite simply, most small businesses are sitting ducks to hackers due to their lack of adequate security systems. As a local IT support company, we work day and night to protect our clients from these attacks – and unfortunately, we see, on a regular basis, hardworking entrepreneurs being financially devastated by these lawless scumbags. We are determined to WARN as many businesses as possible of the VERY REAL threats facing their organization, so they have a chance to protect themselves and everything they’ve worked so hard to achieve.

Our FREE Network Health Check Reveals All Your Network Vulnerabilities

If you’re ready to patch up your network vulnerabilities and stay protected, schedule your FREE Network Health Check today!

How to Make Any Shape You Want in Microsoft Word

Sometimes the best way to get your point across is to draw it!

In this edition of our Microsoft Office Basic Training Series, we’ll show you how Office comes with many ready-made shapes to help you create more dynamic documents.

Draw a shape

Select the Insert tab, and then click Shapes.

Screenshot in Microsoft Word, illustrating how to add shapes

1. Select the shape you want to add.

2. Click and drag to draw it.

With your shape drawn, you have many options to adjust it to your liking –

  • To create a perfect square or circle, press and hold the Shift key while you drag.
  • In order to resize the shape, drag one of the control handles on the corners or sides.
  • If you want to rotate it, drag the rotation handle at the top.

 

But wait, there’s more!  Some shapes have unique, yellow control handles, which you can drag to change other parts of your shape. Finally, to add text to your shape, select it and start typing.  The text you add is now part of the shape, which means, if you move the shape, the text moves with it.

We hope this has been helpful in showing you the many available options in Microsoft Office to get your point across visually.