OneNote 2019 Will Never Exist… Yes, I’m SeriousLew Smith, Director of Consulting Services | August 15, 2018
In all seriousness, OneNote has been a great product, and for those of us who use OneNote daily, and perhaps have customized some processes based on its capabilities, this is not great news. In their Office 365 blog post on April 18th, Microsoft provides insight as to why this directional change has been instituted. Additionally, Microsoft has confirmed that OneNote 2016 will be an optional install within Office 2019, and the application will be supported through the end of Office 2016’s extended support date (October 14, 2025). This means you still have 7 years to use OneNote 2016 in a supported fashion.
Back to the bad news, the current OneNote for Windows 10 app is not the same as OneNote 2016, but Microsoft understands there are gaps that require updates. Over the last few years, the OneNote team has been working to improve this app and have actually brought some new features to the app, which are unavailable in OneNote 2016. In all honesty, the app is MUCH better now that it was a year ago. Here is where the bad news becomes good news. Microsoft is planning to release many additional updates based on user feedback (which you can provide via their feedback hub), in an effort to bring the Windows 10 app up to speed as quickly as possible. One noticeable change is the updated sync engine for the app, which is VERY fast and sync’s across your Windows 10, iOS, and Android devices.
With all of this said, jump on the feedback hub if there are features that are must-haves for you and your team. The earlier it is submitted, the sooner it has a chance to hit the Windows 10 app!
A truly comprehensive security system does more than just provide “locks” for the entrances to a network, it searches for and reacts to threats that may have already entered the system.
The Advanced Threat Protection integrated throughout Microsoft 365 monitors and protects everything from data, to endpoints, to user identities. These tools are always working behind the scenes to keep your business secure, keeping you in the loop without overwhelming you with information.
At Interphase Systems, Inc., we believe in securing your business with a holistic strategy. Contact us to learn more.
With a cleverly worded email and one unfortunate click, a hacker can gain access to your system within minutes, and stay there for an average of 286 days before being detected.
How can you avoid this scenario? Check out this infographic to learn about the three most common ways hackers can gain access to your system and the holistic approach Microsoft 365 takes to keep them out.
At Interphase Systems, Inc., our goal is to keep your business running without interruptions while remaining secure. Contact us to learn more.
With a sinking feeling, you discover your network has been hacked. Questions race through your mind: How did this happen? What have they done inside our network? What information have we lost?
With the right tools and a good incident response plan, there is no need to panic. Interphase Systems and Microsoft 365 E5 can help you visualize an attacker’s movement through your system, recommend where to focus your investigation, and help recover files in OneDrive.
Security breaches are never fun, but they don’t have to be devastating. Contact the Information Security team at Interphase Systems to learn more about how to better protect your business, even from the worst-case scenario. 610-276-5500 or firstname.lastname@example.org
As compared to most businesses, universities have significantly less control over endpoints, such as devices used and the thousands of student user credentials they must give out each year. This makes them especially vulnerable to cyberattacks.
The University of Arizona realized this, so when it came time to overhaul their internal network, CatNet, they prioritized the implementation of a holistic security solution. They found that the solution with Microsoft was uniquely prepared to deliver a forward-thinking security system designed to meet the specific needs of a university.
Even in “risky” situations, effective, holistic security and peace of mind is achievable. Interphase Systems helps organizations modernize their infrastructure and information security. We can help your team do the same. Contact us to learn more.
Botnets, hacker methods, and ransomware, oh my!
After compiling information across 100 countries and millions of computers, Microsoft has identified the latest threats affecting digital security. In this report, take a deep dive into the aforementioned topics to discover how your business might be at risk and steps you can take to protect yourself.
At Interphase Systems, Inc., we believe that protecting your business starts by arming yourself with information. We can help your firm enhance its information security. Contact us today to learn more. CE@interphasesystems.com or 610-276-5500.
“In more than 63 percent of data breaches, hackers gain corporate network access through weak, default, or stolen user credentials.”
Using outdated multiple-password security is like leaving your front door unlocked for attackers. That’s why Microsoft developed Azure Active Directory Premium, which keeps your front door locked and bolted with features such as a single, secure sign on for all apps for each employee and multi-factor identification to make your network less password reliant.
Microsoft recognizes the importance of identity-driven security and their holistic strategy doesn’t stop there. Check out this infographic to learn more and contact the Information Security team at Interphase Systems via 610-276-5500 or CE@interphasesystems.com for help with securing your company’s information.