The last day of the CompTIA Security + course with our intake 2 students at McBride career group in Edmonton. They have now completed their technical training part of the program and only have a few more weeks to go to complete their job search phase. All of them have work terms arranged and are eager to get into the IT field. Wishing each and every one the very best success.
The pictures show a group photo below and the 5 top achievers on the left. These amazing students did not miss a single day during the entire program. Here they are with their prizes.
GodMode is a special folder in Windows that gives you quick access to over 200 tools and settings that are normally tucked away in the Control Panel and other windows and menus. This Mode is most helpful for advanced Windows users that work in IT, or any advanced Windows enthusiasts.
Most customers, will not see a use for having this Mode enabled on their Windows 10 systems. It’s like having your developer settings enabled on your smartphone. If you want to try it out, though, here’s how to enter God Mode in Windows 10.
How to enter God Mode in Windows 10
Make sure your Microsoft system account has administrator privileges.
Right-click on the Windows 10 desktop and “Create a new folder.”
Right-click the the new folder and rename the folder: “GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}” press enter and you’re all set!
A CRM can transform your business or
become your worst nightmare.
Customer service good or bad can affect your business in
many ways. Small mistakes can lead to major issues down the line that could be
construed as bad customer service leading to one or more of the following
conditions.
Damage your company’s reputation
Stops leads or opportunities from converting to
business
Customer lifetime value drops
Great employees leave
And a downward spiral begins.
Situations that are usually unacceptable to a business are
long wait times, poor attention to detail, lack of experience or product
knowledge and unprofessional or impersonal actions by staff members that could
be caused by the CRM.
Businesses that are guilty of these unacceptable customer
situations above usually have a difficult time overcoming the loss of customer
confidence and could lead to the total businesses collapse. The good news is
that with the correct staff most customer related issues can be overcome if the
corrective action is taken speedily and effectively.
Many organizations falsely believe that by adding a Customer
Relationship Management (CRM) to the mix will resolve all of their bad customer
relationship issues. This is a gross misunderstanding of the actual issues that
caused the bad customer service in the first place, people.
A CRM is there to help good staff keep track of their
actions and transaction with your customers. It is important to have a CRM that
is accurate and up to date at all times. With incorrect policies a CRM will
become a company’s biggest nightmare. Quotes, orders and invoices all rely on
the accuracy of the customers information stored in the CRM, the policy should
include a customer creation and update procedures with staff training at the
top of the list. Creating duplicate accounts due to using different naming schemes,
assigning contacts to the incorrect accounts are just two of the most common
issues. These are introduced by untrained or dishonest staff with no
repercussions for sloppy work.
Migrating Data from old legacy or merging data from two or
more companies to a new CRM system always opens the door for introducing
errors. Before handing over a new CRM to the sales and marketing departments
one has to ensure that the data is accurate and complete, has no duplicate
companies or organizations, no duplicate contacts and must have a complete
management capability preventing staff from recreating duplicates. Your migration
should have verified that all physical, mailing and email addresses are
correct. That all related contacts either relationships within household,
businesses or networks are accurate. Employee, agents or brokers, suppliers and
their assets, and any channel partner data that helps your organization
understand the target market and serve your customers to the best of your
abilities needs to be verified before use. Remember that getting this data
accurate does not happen by chance, it requires a project with meticulous
planning and budgeting. If you skimp on this part of your CRM project, your
have a high probability of failure. Its not the fault of the staff that use the
data but the migration team that does not verify the data that are to blame. It
does not matter how much you pay for the use of the CRM or how good it is on
paper but a second-rate CRM with accurate data is far better that the costliest
or the very best one with inconsistent and incorrect data.
Clean up your data as soon as possible or suffer the
consequences of frustrated and disgruntled customers and staff. You could lose
both in a very short time.
open source product
A CRM is a complex tool and requires a lot of setup, choose
your CRM based on your requirements and not on what it could do for you. Many
aspects of a CRM are based on automation freeing up your staff to better
utilize their time with more important customer relations task. Please remember
a CRM does not sell products for you, sales people do this based on
relationships and bonds that are formed between your customers and your staff.
Support your sales staff in any way possible. The collaboration processes of
this tool should have great rewards as people share common information and
data.
Never forget to lay down some rules, your CRM can only be
effective if your company allows it to be. No CRM can function if it is being misused
by your staff, either intentionally or unintentionally. Creating some rules and
making sure that your workforce has been properly trained will alleviate some
issues and have a smoother transition to and a better acceptance of your CRM.
Building Revenue on
Relationships
We have all heard the term CLV or Customer Lifetime Value
and how important this is to a successful business relationship. A customer
strategy should be built on a culture of your customers success and tracking
their satisfaction. Some key factors to take into account when dealing with CLV
are:
Good communications, not too little and not too much as too much is construed as spam
Being sensitive to a person’s emotions and needs
Any issues and pain points should be noted and addressed
Always remember that these points may be multifaceted or layered
Knowing where your customer is at this point will help with any business transactions.
Your CRM should be the tool used by your workforce to track
the amount of communications, emotions or needs and their pain points.
Do factor in the 80/20 rule, also known as the Pareto
Principle, that is attributed to the Italian economist, Vilfredo Pareto. Applying
this principal to your business and your CRM configurations, helps keeping
track of the 80% of your company sales that come from only 20% of your
customers. These 20% are your core customers and need to be your top priority
for accuracy when updating or configurating a new a CRM.
A business analyst should be consulted to assist with the
elicitation of requirements before, during and after a migration is considered.
The stakeholders that will be using it as their sales tool, the templates used in
the sales processes, invoices used in the close process, and pricing with a structured
discount need to be considered and consistent throughout the elicitation
process. As I have said before, a CRM is only as good as its first implementation,
so make sure that it is done correctly before any access is given to the
stakeholders.
Windows Defender Offline has a powerful offline scanning tool that runs from a trusted environment, without starting your operating system. This topic describes how to use Windows Defender Offline in Windows 10, Windows 8.1, and Windows 7.
When should I use Windows Defender Offline?
Run Windows Defender Offline if:
Windows Security (named Windows Defender Security Center in previous versions of Windows) detects rootkits or other highly persistent malware on your PC and alerts you to use Windows Defender Offline. You might see a message stating that malware was found on your device, or receive a message in Windows Security notifying you that additional cleaning is required.
You suspect your PC might have malware that’s hiding on it, but your security software doesn’t detect anything. In this situation, you can start a Windows Defender Offline scan from Windows Security settings. Here’s how:
Select Start , and then select Settings > Update & Security > Windows Security > Virus & threat protection .
On the Virus & threat protection screen, do one of the following:
In an up-to-date version of Windows 10: Under Current threats, select Scan options.
In previous versions of Windows: Under Threat history, select Run a new advanced scan.
Select Windows Defender Offline scan, and then select Scan now.
You’ll be prompted that you’re about to be signed out of Windows. After you are, your PC should restart. Windows Defender Offline will load and perform a quick scan of your PC in the recovery environment. When the scan has finished (after about 15 minutes), your PC will automatically restart to Windows.
Notes
Before you use Windows Defender Offline, make sure you save any open files and close all apps and programs.
You typically need administrator rights on the PC on which you plan to run Windows Defender Offline.
If you experience a Stop error on a blue screen when you run the offline scan, force a restart and try running a Windows Defender Offline scan again. If the blue-screen error happens again, contact Microsoft Support.
Where can I find scan results?
To see the Windows Defender Offline scan results:
Select Start , and then select Settings > Update & Security > Windows Security > Virus & threat protection .
On the Virus & threat protection screen, do one of the following:
In an up-to-date version of Windows 10: Under Current threats, select Scan options, and then select Threat history.
In previous versions of Windows: Select Threat history.
Have you already tried using clipboard history? If enabled, it allows you to save multiple clipboard items to use later. Introduced during RS5 development, we’ve been getting great feedback from everyone on this experience, and one of the things we heard most is that the UI wasn’t compact enough – a large space was used for each entry even if it was just a small text fragment. We originally opted to show bigger entries so there was space to show an image preview nicely, but when we looked at our data, we found 90% of items in the clipboard history were text. Based on that and your feedback, we now optimizing the design for text snippets – shrinking the height of each entry and thus giving you access to more entries without needing to scroll the view. Hope you like the change we made! Copy some text and press Windows logo key + V to check out the updated design.
Excel Course Overview
Students who attend these courses will gain the knowledge, and skills with a confidence to create, format, enhance and print spreadsheets.
What You’ll Learn
Upon successful completion of this course, you will be able to create and develop Excel worksheets and workbooks in order to work with and analyze the data that is critical to the success of your organization. You will:
Enterprise security is not always a top priority or even on the mind of employees, but it should be. Educated employee’s are the first line of defense against security breaches. In large multinational companies their best defence strategy is to partner with their employees, prepare them with knowledge and empower them to live a secure lifestyle both at work and at home. The graphic shows some tips on how to keep our employees informed about good practices in security measures.
The best way to protect against vulnerabilities at the enterprise level is to start by defining a plan that ensures security Education and Awareness is integrated into the business operational lifecycle as soon as possible.
To ensure key security messages arrive effectively, think about how best to share these messages. For security-related alerts that require employee action you might consider an email as the appropriate method. For general awareness and reminders, digital signage around buildings and/or informal meetings may work better. One thing to bear in mind, have consistent branding around every communication.
Informing employees of any new security policies or initiatives can help keep your security top of their mind. Have a clear objective of what you want your employees to learn and present the information in a way that is meaningful and memorable.
Start an incentive program where employees that participate in your campaigns get recognized for their efforts. The more fun you have around security awareness and education, the more employees will automatically tune in to the topic.
Cyber attacks will never stop targeting employees, so foster a workplace environment where employees feel comfortable sharing potential vulnerabilities they encounter without fear of reprisals.
Empowering your employees to take charge of enterprise security within their own space lets them “practice security” on a daily basis, eventually becoming second nature to them.
Add in a couple of worthwhile incentives, and you can have an army of security champions. Champions are a companies voices that help to influence employees and drive security awareness throughout the organization.
Always measure your success or failures and learn from the results to see if the employees gained anything from your communications plan. Create feedback through social channels like the companies intranet portal any other channels that work. Using surveys to evaluate the success is just one way to achieve these results.
Publish industry trends helps employees stay up to date with the latest attacks and can mitigate them. Employees need to know that not all organizations fall into the same category and what works in one organization may not work in another.
Encouraging employees to share their experiences, stories and insights with family and friends will help create public awareness, thus helping to enable a more secure environment for everyone.
Remember that a Happy Employee is a valuable asset to any organization.
Task links (dependencies) show the relationship in time of one task to another. Linking tasks creates task dependencies. The long chain of tasks determines the entire length and end of a project. You have both Predecessors and Successors, ones that a task relies on and those task that rely on the current one.
Project management tip As you link tasks in a project, a path of links is set up. This path determines the end of your project. Some paths that you create are paths and some are the critical paths. A critical path is that path that when any task is delayed this will make the total project late.
Link type Description
Finish-to-start (FS)
The dependent task (B) cannot begin until the task that it depends on (A) is complete.
For example, if you have two tasks, “Dig foundation” and “Pour concrete,” the “Pour concrete” task cannot begin until the “Dig foundation” task is completed.
When you link tasks in Project, the default link type is finish-to-start.
This link type is the default type. If you don’t specify a link type, the Finish-to-start relationship is assumed.
Start-to-start (SS)
The dependent task (B) cannot begin until the task that it depends on (A) begins.
The dependent task can start at any time after the task that it depends on begins. The SS link type does not require that both tasks begin at the same time.
For example, if you have two tasks, “Pour concrete” and “Level concrete,” the “Level concrete” task cannot begin until the “Pour concrete” task begins.
Finish-to-finish (FF)
The dependent task (B) cannot be completed until the task that it depends on (A) is completed.
The dependent task can be completed at any time after the task that it depends on is completed. The FF link type does not require that both tasks be completed at the same time.
For example, if you have two tasks, “Add wiring” and “add plumbing,” both must be completed at the same time before any inspection can be done.
Start-to-finish (SF)
The dependent task (B) cannot be completed until the task that it depends on (A) begins.
The dependent task can be completed at any time after the task that it depends on begins. The SF link type does not require that the dependent task be completed concurrent with the beginning of the task on which it depends.
This link type is rarely used in project management. An example would be roofing a home, and the two tasks: add roofing, supervise the work. In this case, the roofing can start, but the supervisor needs to show up at some point before the end of the roofing.