How to use the AutoRecover and AutoBackup Features in Excel

How to use the AutoRecover and AutoBackup Features in Excel

How to use the AutoRecover and AutoBackup features in Excel is a great tool to know. Sitting down and writing, creating, documenting, your information for work can all go down the drain because it was not saved. Now you have to try to recover information from your brain memory.

Accidents Do Happen

Fortunately for the consumer, Microsoft has come out with some solutions to reduce the chance of:

  • Forgetting to save
  • Power outages
  • Spilled coffee on keyboard
  • Crashes
  • Blue Screen
  • Computer restarts
  • Accidentally deleting documents
Food for Thought

Always remember to stop, think, and proceed on the task at hand because trying to do all the things you would like to do in one day will make you forget to save your progress that you’ve been working on.

Configure Options

Configuring both options, AutoRecover and AutoBackup can secure a better chance of you not losing your important information that you’ve been working on. This is an important step to saving time and money!

Cloud Options

New versions of Office allow you to have AutoRecover and AutoBackup options to the your cloud file sharing app. Saving to a cloud app is an excellent option if say, your hard drive crashes.

How to Use the AutoRecover and AutoBackup Features in Excel

AutoRecover: Click on File and then Options. Click on Save in the left-hand menu and you’ll see the AutoRecover option under Save Workbooks. By default, AutoRecover information is saved every 10 minutes. Which you can configure to your liking.

AutoBackup: First, go to save your file to get to the Save dialog box. If you already have a saved Excel document, go to File and then Save As and choose a location. When you do this, it’ll bring up the Save As dialog. In the dialog, click on the Tools button that is to the left of the Save button. You’ll see a couple of options, one of which is General Options. When you click on General Options, a small window will appear with some more options. Go ahead and check the Always create backup box. Click OK and now when you save the file, an Excel backup file will also be created with a .XLK extension.

Conclusion

We hope this helps shed some light on How to use the AutoRecover and AutoBackup Features in Excel and makes your life easier by saving you time at a critical moment. There is a more play by play in the Read More Button below if you need more help.

 

Contact IT Support 587-355-1566 for assistance.

IT Support Services and Websites Done Right!

Check us out in ‘Business in Calgary’ magazine

4 Levels of Present Day Security your Business should Obtain

4 Levels of Present Day Security your Business should Obtain

The 4 Levels of present day security your business should obtain include Network, Device, Application, and File Levels. You need to ensure modern day methods are deployed to protect you from the ever growing and mutating malware as it continues to hunt our businesses.

Present Day Security

Have you put any thought into your current security as it stands? At times believing that, what is installed on your existing computer will keep you secure is totally false and you could be in serious trouble of leaking out client information.

1. Network

Hackers are trying anything they can like spear-phishing, unsecured file share monitoring, and following traffic flow over the web. Network security is a great start including secure Firewalls, Encryption, and Authentication techniques.

2. Device

As mobile devices are becoming the new laptop in a pocket. Securing that device is necessary. I am sure you are hearing stories over the news about peoples mobile devices being hacked, and there is a good chance of you being the next story. Device encryption and container-tools are options to consider.

3. Applications

With the ever growing leakage of user information, Studies show 45% of apps on iOS and 87% of apps on Android have privacy-invasive behaviors. By locking down your business critical apps with a device containers like Samsung’s KNOX can keep you safe.

4. Files

File Sharing and cloud apps are fast becoming the bread and butter of all businesses. Entry level file sharing is typically very weak. Deploying end-to-end, in-transit, on-server, and on-device encryption on all devices, is now the modern way of living.

4 Levels of Present Day Security your Business should Obtain

Now that you have an idea of the 4 levels of present day security, what can you do to make your company thrive without breaches? We obviously only touched the surface of what security measures can be taken but its a start.

So don’t wait for something to happen!

 

Contact IT Support 587-355-1566 for assistance.

IT Support Services and Websites Done Right!

Check us out in ‘Business in Calgary’ magazine

Who Is The Threat To Your Company’s Security

Who Is The Threat To Your Company’s Security

Who is the Threat to your company’s security? have you thought about it? Would you guess its you? Well no doubt you’ve spent the time and money into making sure your security is in tip top shape. YOU SHOULD NOT HAVE CLICKED THAT LINK IN THE EMAIL!

Don’t worry, because you know us and trust us it’s OK!

Who is the Threat to your Company’s Security

You are the weakest link in your security measures because by nature, we are imperfect and make mistakes. A Recent study was done showing 55 people out of 100 were susceptible to phishing attempts.

Partners and Contractors

Your vendors are threats. For example, a hacker will monitor information going to and from a restaurant your company orders food from. Do you know if that restaurant’s security is up to date?

Life, Family, and Company

Hackers don’t have much else to do but follow your every move and find out your personal information. You on the other hand have a life, family, hobbies, and a business to run.

Encryption

From March to July, Calgary was hit with 505 incidences of ransom-ware, what makes you immune? Time to see if your security and updates are in check. Hackers have the time but you do don’t.

Questions to think About

  • How easy is it for hackers to obtain access to restricted areas?
  • Have you thought about testing your systems?
  • Have you thought about seeing if your employees can pass a Phishing scam?
  • How thorough is your existing IT professionals now?
  • Is your personal information encrypted?

Can you pass an IT audit? Find out by contacting BlackBox Connections 24/7 IT Support.

And Stop waiting for something to happen.

Contact IT Support 587-355-1566 for assistance.

IT Support Services and Websites Done Right!

Check us out in ‘Business in Calgary’ magazine

You Think Pokemon Go has Full Access to Your Accounts?

You Think Pokemon Go has Full Access to Your Accounts?

You should know that the company that actually created the Pokemon Go app is Niantic. The developer is a former Google subsidiary run by a former CIA employee.

Do You Think Pokemon Go has Full Access to Your Accounts?

The Controversy

Click on that “learn more” button and you’ll be guided to a website with the following confusing information:

When you grant full account access, the application can see and modify nearly all information in your Google Account (but it can’t change your password, delete your account, or pay with Google Wallet on your behalf).

Certain Google applications may be listed under full account access. For example, you might see that the Google Maps application you downloaded for your iPhone has full account access.

This “Full account access” privilege should only be granted to applications you fully trust, and which are installed on your personal computer, phone, or tablet.

If you’ve granted full account access to an app you don’t trust or recognize, we recommend that you revoke this permission by clicking the Revoke access button.

Limit a potential security breach

Apps such as Pokemon Go do present a security breach. Employees are using their personal or company phone to access company data and install any App they want. You need to take precautions. Here are 3 quick steps to minimize Apps like Pokemon Go access to your accounts:

  1. Go to your Google Security page and look for Pokemon Go (and all other games and app)
  2. Select the games or apps title and remove or revoke the “Full Access”
  3. Remember to relaunch it to make sure it works still.

Its so simple – you just need to do it!

How do you ensure phones are secure all the time?

You need to secure your WiFi and any phone that has access to your company email and company files. Contact BlackBox Connections to find out how you can do this for FREE.

Call us 587-355-1566  for assistance.

IT Support Services and Websites Done Right!

Check us out in ‘Business in Calgary’ magazine

Tension Arises Impostor Emails Lurk

Tension Arises Impostor Emails Lurk

Tension arises impostor emails lurk, do you have a back up plan for your business? Well if you don’t, it may be time to get one. The growing threat is getting bigger than ever and impostors are not making it easier on you. There is a 260 per cent increase in identity theft since 2015 in impostor emails. It is also said that there has been a $3.1 Billion loss, due to email fraud worldwide, in the past 3 years to businesses.

Time for a Wake up Call

No one is immune to fraudulent emails or fake emails and businesses, small or large, are a huge target. This is a Global issue and sitting back and waiting for something to happen is not the key to success. Yes, large companies make the news but small businesses typically mean, that their business could end.

How Does it Work?

These types of impostor emails are well calculated, timed, researched, and executed. Impostors do their research well and easy enough because there is social media and company websites, which makes it possible to see patterns and structures of how the company operates. It has even been reported that they will wait for CEO or CFO to go on vacation and strike at a window of opportunity, an employee gets an urgent email completely identical to the CEO or CFO, follows procedure, funds transferred and impostor wins.

Is there a quick fix?

Unfortunately no, after a quick funds transfer not much can be traced for the impostor and the company is now at a loss. This is where extra precaution, procedure, and technology can take a huge roll in success over this overwhelming change of events and stolen goods. Our team here at BlackBox Connections would like to offer our services to show such proper procedure to combat this ever growing Virus.

Call us 587-355-1566  for assistance.

IT Support Services and Websites Done Right!

Check us out in ‘Business in Calgary’ magazine