May 2014
In this issue

> Security Habits of Highly Effective PC Users
> Android Antivirus Protection
> The Internet of Everything
> Cyber threats to Windows XP and Guidance for Small Businesses and Individual Consumers
> Filtering Charts in Excel
> Business Continuity Tip
> Cartoon/Quote

Filtering Charts in Excel
used with permission from Microsoft Office Blogs
by Jeffrey Johnson

Have you ever had a dataset but only needed to chart certain parts of it? Here are 4 methods for filtering your chart so you don€t have to edit or remove your data to get the perfect chart: hide data on the grid, table filtering, filtering using table slicers, and filtering directly from the chart.

Read more


Business Continuity Tip
Social Media & Disaster Recovery

There's no doubt about it - social media is changing the way we communicate. These online tools, once thought to be for personal use only, have asserted their dominance in times of emergency as go-to sources for news and updates.

Here are two great resources to help bring sense to this subject. Check out this on-demand webinar "Social Media & Disaster Recovery" and this blog post, "The Link between Crisis Management and Social Media."


Databranch is currently active on the following social media sites: Facebook, Twitter, LinkedIn, Google+, and Yelp. Make sure to follow us for the latest technology news!

Please forward this newsletter to anyone else in your organization who might be interested!

7 Security Habits of Highly Effective PC Users
used with permission from HP Technology at Work

You might not think about it when you€re browsing the web, shopping online and interacting on social media, but you are the first line of defense against cyber security risks. The power to be safe is in your hands and at your fingertips. Developing and maintaining good habits can make online activity much safer and more enjoyable for you and your colleagues.

The following 7 good habits take only minutes to learn and are easy enough to incorporate into your daily work life.

1. Create strong passwords
Passwords are usually the first, and sometimes only, protection against unauthorized access. They are the keys to your online kingdom, so keep these guidelines in mind.

Read more

Android Antivirus Protection: Security Steps
You Should Take

used with permission from Norton by Symantec

Android mobile devices are different from desktops and laptops, so you don't have to worry about installing viruses or any other type of malware on them, correct? Not so. In fact, according to a recent report, the amount of mobile malware rose 58% from 2011 to 2012.

And while Apple's iOS had the most documented vulnerabilities, Android led the way in the amount of malware written for mobile operating systems. Its openness and large global market share likely plays a strong role in attracting virus writers.

To combat this rise in viruses, Google has protection in place to find and stop them on the Google Play store, where you can buy apps for your Android device. But, this measure alone doesn't guarantee your safety. Fraudulent apps can still slip through. Cybercriminals want your private information. They see it as easy money, even if it means crossing legal lines. Avoid falling victim to them by following these helpful tips.

Read more

The Internet of Everything: Four Technologies We'll Actually Use within Three Years
Used with the permission of http://thenetwork.cisco.com
by Kristi Essick


There is so much talk about the Internet of Everything, but how much of it is a futuristic pipe dream? After all, for nearly two decades, companies have tried to sell consumers Internet-connected fridges and microwaves, automated home lighting and heating systems, and smart entertainment devices, yet these devices have never caught on in a big way.

Clearly, the IoE is colossal, and growing. According to a January 2014 research report from Raymond James & Associates, there were 12.5 billion devices connected to the Internet in 2011, including nearly every computer in the world and over a billion smartphones. By 2020, that number will grow to 50 billion. To put this into perspective, today 80 "things" € including consumer electronics, machine tools, industrial equipment, cars, and appliances € connect to the Internet for the first time every second. By 2020 this will expand to 250 new devices every second.

Read more


Cyber threats to Windows XP and Guidance for Small Businesses and Individual Consumers
used with permission from Microsoft Security Blog
by Tim Rains


It€s been well publicized that on April 8th, 2014 Microsoft discontinued product support for Windows XP.  Released in 2001, the support policy for the life of Windows XP soon followed in October 2002.  In September 2007, we announced that support for Windows XP would be extended an additional two years to April 8 2014.  We are very clear about the lifecycle of our products, deliberately communicating this information years in advance, because we know customers need time to plan for changes to their technology investments and manage upgrades to newer systems and services.

We€ve also focused on communicating regularly, such as an article posted in August of last year.  That piece focused on the fact that supported versions get security updates that address any newly discovered vulnerabilities, which Windows XP won€t receive after April 8, 2014.  This means that running Windows XP when the product is obsolete (after support ends), will increase the risk of technology being affected by cybercriminals attempting to do harm.  This blog post continues on from that article, and also provides guidance to consider as people look ahead.

Read more 

Quote of the Month

"The internet is the most important single development in the history of human communication since the invention of call waiting."

- Dave Barry


Databranch, Inc.
132 North Union Street, Suite 108    |     Olean, New York 14760
(716) 373-4467 - Olean    |    (607) 733-8550 - Corning/Elmira
www.databranch.com


Databranch does not knowingly participate in SPAM.   If you wish to be removed from this list, please follow the link below and you will be taken off this list.  Thank you for your interest in our e-newsletter.