Category: IT Infrastructure
Microsoft has announced the Viva Platform that lives within Microsoft Teams to enhance the remote workers environment.
If you are a home worker who is accessing a weather website to see tomorrow’s forecast, or a self-employed business person who obtains data from a supplier’s invoice, or even an employee of a large company who automates data entry on an ERP system, Power Automate Desktop is designed for you.
There is a simple way to check who created an appointment in an Outlook calendar.
To solve the problem, you will first need to switch the calendar to the List view and then customize it by adding the Organizer field. Follow the instructions below to do that.
You might have recently read news articles on the BCC website concerning how Microsoft had been attacked with a hack that affected Microsoft Exchange servers – see the first article published on 12th March Exchange email hack: Hundreds of UK firms compromised – BBC News and a further article published on 13th March Microsoft hack: 3,000 UK email servers remain unsecured – BBC News
We have published this update to reassure all GCC Group customers that have their IT support with us – this has no impact on you.
If you believe your backup strategy means you’re protected from the worst that cyber-criminals can throw at you, we’ve got some bad news. Ransomware creators know all about backups!
Did you know you can now dictate your documents in Word or emails in Outlook?
Dictation lets you use speech-to-text to author content in Office with a microphone and reliable internet connection. It’s a quick and easy way to get your thoughts out, create drafts or outlines, and capture notes.
Microsoft have just held their annual conference, Microsoft Ignite, for developers and IT Professionals. They announced some exciting innovation coming to Microsoft Teams to help people connect, collaborate and accomplish more together.
With record levels of Cyber Crime aimed at Business and Individuals alike, it is really important that you are aware of the risks. Criminals are using all methods of communication to target individuals including email, text messages, telephone calls, answer phone messages and social media posts.
Microsoft Internet Explorer, originally released in 1994, getting to its last version, number 11, in 2013, is finally being put to pasture.
If the images in emails you are receiving are not displaying correctly, then you may need to add the sender’s email address to your local Outlook clients Safe Senders list.