Unlike the 2016 release, SharePoint Server 2019 is bringing a wide variety of new features to the on-premise platform. Many of these features have been rolled out to SharePoint Online customers over the last two years, so they are well tested and mature.
At the end of September, I once again attended Microsoft Ignite in Orlando. If you’re not familiar with Ignite, it’s a week-long conference focused on Microsoft’s enterprise products – Windows, Azure, Exchange, SQL, Office, SharePoint, Office 365, and the Microsoft cloud. As a long-time Office 365 and SharePoint systems integrator, I was especially interested in learning where Microsoft is taking SharePoint Communication Sites, Teams, and PowerApps and Flow in Office 365 and in understanding the roadmap for SharePoint Server 2019 (more to come on that in my next post). The Microsoft product teams did a great job providing insight into current and future capabilities of these Office 365 products – here are the highlights I brought back to our sales and implementation teams. Continue reading…
According to the Office of Management and Budget, legacy, paper-based filing systems cost the federal government more than $116 billion per year.(1) In addition, “The State of Workflow Automation in 2018” stated 55 percent of managers are spending 8 hours or more per week on administrative tasks, rather than the strategic, high-value initiatives that citizens want.(2) These stats just can’t be ignored.
Automating paper-based workflows gives state and local governments the opportunity to stretch their budgets further and accomplish more – in less time. To show you how to do this, General Networks teamed up with Nintex to provide you with an on-demand webinar that includes a workflow demo.
If you are looking to create efficient, time-saving workflows while stretching your budget, this is one webinar you’ll want to watch.
They say small businesses can’t afford enterprise-level document management software, we disagree!
Although most small business owners are convinced that they need some sort of proper filing for their growing content, they rarely make the decision to acquire one. The reasons vary and include tight budgets, no time to spare for implementation, doubting the ROI, and the lack of people resources to ensure the solutions are well maintained and users supported. Some will start using something like windows folder system, or light cloud-based solutions such as Box. And although Box provides a solid set of basic features for a low cost, small business owners tend to forget that they created their business to grow in the first place. The challenge they will soon face is with the explosion in their content size and the increasing complexity and reduced efficiency when trying to find content.
M-Files Back Office Vault addresses those challenges from Day 1. It is not only rich in features, inexpensive, secured, and can be cloud-based, it has so many other components that a small business, or any business in that matter, can and will require sometime in the future. By implementing M-Files Back Office Vault from the start, you avoid the inevitable–the complexity that accompanies moving content from your windows folder structure. With M-Files Back Office Vault, you can connect to your content, located in Box, Google Docs, and even windows folders.
M-Files Back Office Vault is pre-designed to provide the following:
The most commonly used process automations i.e. workflows are provided for your consumption in the Back Office Vault, such as A/P Workflow, Purchase Order Workflow, Employee Absence Workflow, Contract Lifecycle Workflow, and many others.
The M-Files Back Office Vault comes equipped with the ability to electronically sign documents using the DocuSign integration function. The solution can be accessed from the free mobile app available from the various app stores. Last but not least, the solution enables users to collaborate on documents using features such as Co-Authoring, Annotations, and Review Comments.
Contact us today. In a matter of 5 days, the General Networks’ team can deliver this solution for you. We’ll help your small business win big!
General Networks is sponsoring the upcoming SharePoint Saturday Los Angeles event on August 11th in Playa Vista. Held at the Microsoft Playa Vista Office, you’ll have a fun filled day with excellent speakers and opportunities to meet peers and experts in the SharePoint space. General Networks will have a booth with consultants on hand, including our very own SharePoint Practice Manager Ingrid Camill, to discuss your latest ventures in SharePoint.
SharePoint Saturdays are run by SPS Events, an all-volunteer organization that focuses on providing tools and information around SharePoint for the community. For over eight years, SharePoint Saturday’s have been held around the world. General Networks sponsored last year’s SharePoint Saturday in Los Angeles and was a Gold Sponsor for the SharePoint Saturday in San Diego earlier this year. We’re excited to be back at SPSLA this year and we look forward to meeting you all there!
For nonprofit Microsoft customers, as of May 1st, your process for ordering software and services from Microsoft has changed. In some cases just the authorization and purchasing method will change. In others, the prices will go up.
If you order through TechSoup and you work with a Microsoft Partner, you should have a discussion with your Microsoft Partner about what the new plans will mean to your organization. If you do not work with a Microsoft Partner (and are not big enough to have an Enterprise Agreement – over 500 users), you should find a partner that can help you navigate the new system.
General Networks can help you migrate the new licensing for nonprofits. If you need help please Contact Us
From the desk of Thomas F. Duffy, MS-ISAC Chair
The Federal Trade Commission’s definition of phishing is “when a scammer uses fraudulent emails or texts, or copycat websites, to get you to share valuable personal information.” When a user falls for a phishing message, the malicious actor achieves their purpose of getting the victim to hand over sensitive information such as login names and passwords. Though we count on technologies and controls to minimize threats, phishing exploits users through social engineering, which allows the malicious actors to side step these protections. This is why it is important that everyone learn to spot these fraudulent messages. Let’s take a look at some example emails of phishing messages.
Subject: Low Cost Dream Vacation loans!!!
We understand that money can be tight and you may not be able to afford to go on vacation this year. However, we have a solution. My company, World Bank and Trust is willing to offer low cost loans to get your through the vacation season. Interest rates are as low at 3% for 2 years. If you are interested in getting a loan, please fill out the attached contact form and send it back to us. We contact you within 2 days to arrange a deposit into your checking account.
Please email your completed form to VacationLoans@worldbankandtrust.com.
Your dream vacation is just a few clicks away!
Dr. Stephen Strange
World Bank and Trust
177a Bleecker Street, New York, NY10012
What did you notice in message #1?
In this message, you can see that the phisher wants to give us a low-cost loan with no credit check. They say we just need to send them our information and they will give us money, right? Not only does it seem too good to be true, but also when you hover the cursor over the email address to examine it further, you see that the link actually has a different destination. It is the email address of the attacker. Lastly, as much as you might like Dr. Strange, he’s probably not working for a bank part-time.
Subject: Free Amazon Gift Card!!!
You name has been randomly selected to win a $1000 Amozan gift card. In order to collect your prize, you need to log in with your Amazon account at the link below and update your contact information so we can put your prize in the mail. This is a limited time offer, so please respond to the request within 2 business days. Failure to respond will forfeit your prize and we will select another winner.
What did you notice in message #2?
Aside from this seeming too good to be true, you can see that “Amazon” is misspelled as “Amozan” on the link provided. If you read this quickly, you may think you are responding to the real company to get your gift certificate. In reality, you are providing your information to the attacker. For the purposes of this example, the link actually navigates to the Center for Internet Security, which is a trustworthy site.
Subject: Urgent – Take Action Before Your Email Account is Deactivated
Following changes to our Microsoft email systems, each user must authenticate their account to prevent it from being deactivated. You can accomplish this by heading to the link below and entering your Microsoft Outlook email account credentials, and then we will know your account is active and should remain so.
Helpdesk Support Team
What did you notice in message #3?
This email is fairly well crafted without errors. Note that it establishes a sense of urgency that the malicious actor hopes will cloud your judgment and threatens the deactivation of your email account. Additionally, the link at the bottom looks like a link to Microsoft, yet it is, in fact, heading somewhere else! Luckily, for the purposes of this example, that link simply leads to the Center for Internet Security, which is a legitimate site.
With these three examples considered, here are some basic recommendations to help protect you from becoming a phishing victim:
Additional information and a phishing game can be found on the FTC’s website, https://www.ftc.gov/.
Data science is a competitive weapon for organizations globally. Like other technologies and processes that can change the way businesses operate, there are a lot of contradictory information and myths around data science on social media, blogs, and case studies that causes considerable confusion.
While most business leaders are aware of the fact that people adept at data science can enhance operational efficiency and customer relationships, they do not have right guidance in place and take the wrong steps by considering myths as facts. Below are six myths around data science, which are good to know in order to to position yourself better in this realm.
Let’s get started! Continue reading…
General Networks is proud to announce that we were recently named among the top 5 IT consulting companies in the Los Angeles metro area by Clutch, a technology research firm. It was an especially competitive category with over 100 companies being considered. The rankings were determined by analyzing our past work, market presence, and client feedback.
Leaders Matrix for Top LA IT Services
One client, an agency from the California State Government, gave us a standout evaluation regarding a documentation management migration project. For this client, General Networks helped them migrate million of documents from eDocs to Content Server.
“General Networks does what they say they’re going to do for the amount that they’ve quoted, and their work product is very good….their team is just very friendly. They rarely, if ever, make mistakes.”
The General Networks team is dedicated to providing the highest quality work, and it is great to hear our clients validate our claims.