May 2014
In this issue
> |
Security Habits of Highly Effective PC Users |
> |
Android Antivirus Protection |
> |
The Internet of Everything |
> |
Cyber threats to Windows XP and Guidance for
Small Businesses and Individual Consumers |
> |
Filtering Charts in Excel |
> |
Business Continuity Tip |
> |
Cartoon/Quote |
|
Filtering Charts in Excel
used with permission from Microsoft Office Blogs
by Jeffrey
Johnson

Have you ever had a dataset but only needed to chart certain
parts of it? Here are 4 methods for filtering your chart so
you don€t have to edit or remove your data to get the perfect
chart: hide data on the grid, table filtering, filtering using
table slicers, and filtering directly from the chart.
Read more
|
|
Business Continuity Tip
|
Social Media & Disaster Recovery
There's no doubt about it - social media is changing the way we
communicate. These online tools, once thought to be for personal use
only, have asserted their dominance in times of emergency as go-to
sources for news and updates.
Here are two great resources to help bring sense to this subject. Check out this on-demand webinar "Social Media & Disaster Recovery" and this blog post, "The Link between Crisis Management and Social Media."
Databranch is currently active on the following
social media sites: Facebook, Twitter, LinkedIn,
Google+, and Yelp. Make sure to follow us for the latest
technology news! |
Please forward this newsletter to anyone else in your
organization who might be interested!

|
7 Security Habits of Highly Effective PC Users
used with permission from HP Technology at Work
You might not think about it when you€re browsing the web,
shopping online and interacting on social media, but you are
the first line of defense against cyber security risks. The
power to be safe is in your hands and at your fingertips. Developing
and maintaining good habits can make online activity much safer
and more enjoyable for you and your colleagues.
The following 7 good habits take only minutes to learn and
are easy enough to incorporate into your daily work life.
1. Create strong passwords
Passwords
are usually the first, and sometimes only, protection against
unauthorized access. They are the keys to your online kingdom,
so keep these guidelines in mind.
Read more |
|
Android Antivirus Protection: Security Steps
You Should Take
used with permission from Norton by Symantec
Android mobile devices are different from desktops and laptops,
so you don't have to worry about installing viruses or any other
type of malware on them, correct? Not so. In fact, according
to a recent report, the amount of mobile malware rose 58% from
2011 to 2012.
And while Apple's iOS had the most documented vulnerabilities,
Android led the way in the amount of malware written for mobile
operating systems. Its openness and large global market share
likely plays a strong role in attracting virus writers.
To combat this rise in viruses, Google has protection in
place to find and stop them on the Google Play store, where
you can buy apps for your Android device. But, this measure
alone doesn't guarantee your safety. Fraudulent apps can still
slip through. Cybercriminals want your private information.
They see it as easy money, even if it means crossing legal lines.
Avoid falling victim to them by following these helpful tips.
Read more |
|
The Internet of Everything: Four Technologies We'll Actually
Use within Three Years
Used with the permission of http://thenetwork.cisco.com
by
Kristi Essick
There is so much talk about the Internet of Everything, but
how much of it is a futuristic pipe dream? After all, for nearly
two decades, companies have tried to sell consumers Internet-connected
fridges and microwaves, automated home lighting and heating
systems, and smart entertainment devices, yet these devices
have never caught on in a big way.
Clearly, the IoE is colossal, and growing. According to a
January 2014 research report from Raymond
James & Associates, there were 12.5 billion devices
connected to the Internet in 2011, including nearly every computer
in the world and over a billion smartphones. By 2020, that number
will grow to 50 billion. To put this into perspective, today
80 "things" € including consumer electronics, machine tools,
industrial equipment, cars, and appliances € connect to the
Internet for the first time every second. By 2020 this will
expand to 250 new devices every second.
Read more
|
|
Cyber threats to Windows XP and Guidance for Small Businesses
and Individual Consumers
used with permission from Microsoft Security Blog
by Tim
Rains
It€s been well publicized
that on April 8th, 2014 Microsoft discontinued product support
for Windows XP. Released in 2001, the support policy for
the life of Windows XP soon followed in October 2002.
In September 2007, we announced that support for Windows XP
would be extended an additional two years to April 8 2014.
We are very clear about the lifecycle of our products,
deliberately communicating this information years in advance,
because we know customers need time to plan for changes to their
technology investments and manage upgrades to newer systems
and services.
We€ve also focused on communicating regularly, such as
an article posted in August of last year.
That piece focused on the fact that supported versions get security
updates that address any newly discovered vulnerabilities, which
Windows XP won€t receive after April 8, 2014. This means
that running Windows XP when the product is obsolete (after
support ends), will increase the risk of technology being affected
by cybercriminals attempting to do harm. This blog post
continues on from that article, and also provides guidance to
consider as people look ahead.
Read more |
|
 |
"The internet is the most important single
development in the history of human
communication since the invention of call
waiting."
-
Dave Barry
|
|
|
 |
Databranch, Inc.
132 North Union Street, Suite 108
|
Olean, New York 14760
(716) 373-4467 - Olean |
(607) 733-8550 - Corning/Elmira
www.databranch.com
|
|
|
|