As we all adjust to the new norms in our virtual workplace, we have witnessed colleagues struggle with adapting to remote solutions. In response, #BASICSLLC is launching a new #GettingBackToTheBASICS series. As part of the series, we’ve been polling our network to understand their challenges with common platforms or products. To date, the majority of the questions have been about #MSTeams, which is a great topic since MS is in the process of rolling out some great new features. So, to kick off the series, we thought we would share the YouTube video of OUR go-to resource, Kevin Stratvert, highlighting some of these features. Kevin is a former employee of MS and produces some of the best step-by-step tutorials.
We really recommend subscribing to Kevin’s YouTube channel! 📹🥇
⌚ Timestamps 00:00
- Introduction 00:27
- Noise suppression 02:31
- Transfer meeting devices 03:35
- Teams for personal use 04:40
- Switch accounts 05:07
- Polls during meetings 06:28
- Pin posts 07:29
- Additional status controls 08:28
- Improved notifications 09:06
- Mute attendees 10:52
- Insights 12:29
- Templates 13:27
- Emojis in Teams & Channels
- 14:00 Wrap up
Periodically, you will see me give a nod to someone else’s blog post. October is cybersecurity awareness month, so today BASICS is featuring a blog, ISO 9001 A Key to Cybersecurity? (Part 1), posted by the Michigan Manufacturing Technology Center (MMTC), written by Andy Nichols (10/9/20).
Not a day goes by without our news feeds sharing details of yet another cybersecurity breach. It seems large businesses tend to be the main victims, with Target, Equifax, Marriott and even the UK’s National Health System patient data recently being affected by cyberattacks. However, we rarely learn about the impact of information security attacks made on small to medium-sized businesses, partly because they aren’t given as much prominence in the media. Yet, attacks against these smaller companies can and do happen, often with disastrous consequences.
In fact, FEMA concluded that between 40 and 60% of small businesses fail within a year of any type of disaster – including cyberattacks – unless some type of continuity/resiliency plan is put in place. These business failures occur not only from the penalties of paying the ransom, but from the “hidden” costs associated with losing access to information regarding sales pipelines, accounts payable/receivable, as well as intellectual property. A simple “hack” could even change an organization’s bank account details and divert customer payments somewhere else.
So, what is needed to protect small and medium-sized businesses from such an attack? How can an organization become “cyber-resilient”? Read more…
The Materials Management Operations Guideline / Logistics Evaluation (MMOG/LE), developed by the Automotive Industry Action Group (AIAG) and Odette International, is a tool to assess supply chain operations that has been adopted by multiple OEMs within the automotive industry for use with their multi-tiered supply base. In 2020, MMOG/LE version 5 was released and included a new criterion (22.214.171.124) in section 2.5, Risk Assessment and Management, requiring organizations to develop policies regarding supply chain cybersecurity threats. This addition encourages more teamwork between all functional areas of the automotive industry and wants to ensure cybersecurity is addressed within the supply chain operations with the same diligence as other automotive safety issues. The combined expertise is required to ensure that the safety issues introduced by the ever-evolving computer technologies and digital solutions.
October is the month to unite in a joint commitment to raise awareness about the importance of cyber security and ensure all tiers of the supply chain are committed to staying safe and secure online while increasing our resilience against cyber threats.
A hallmark of the automotive industry is extraordinary innovation in the face of market needs. The auto industry has been a leader, steadily driving advances in safety features, safety engineering, and supply chain management in ways that software and cybersecurity disciplines must emulate.
Now the automotive industry faces a new challenge. Modern vehicles are computers on wheels and are increasingly connected and controlled by software and embedded devices. These newer technologies enable innovations designed to increase vehicle safety and bring other positive features. Vehicle-to-vehicle communication, driverless cars, automated traffic flow, and remote control functions are just a few of the evolutions under active development.
New technology and digital solutions introduce new classes of accidents and adversaries that must be anticipated and addressed proactively. Malicious attackers, software flaws, and privacy concerns are the potential unintended consequences of computer technologies driving this latest round of innovation. The once distinct worlds of automobiles and cybersecurity have collided, leading to the automotive industry and the security community to connect and collaborate toward a common goal.
When the technology we depend on affects public safety and human life, it commands our utmost attention and diligence. Our cars command this level of care. Every day, we entrust our lives and the lives of those we love to our automobiles.
Ensuring all tiers of the supply chain are well protected is now one of the critical cybersecurity strategy features because our industry’s defenses rely on suppliers further down the chain. Cybercriminals take advantage of smaller vendors’ poor security to gain access to the networks of large organizations. Consequently, More than 80% of organizations have experienced a data breach due to security vulnerabilities in their supply chains.
On this journey, the challenges will be many, and they will be significant, but together and through collaboration, we can rise to meet them. We look forward to having suppliers in all tiers of the automotive industry join in this endeavor.
B.A.S.I.C.S., LLC is the official MMOG/LE Help Desk for the North American Market
To A.I.D.E. entrepreneurs and small businesses with reimagining the workplace culture to strategically expand their business and sustain its competitive advantage by ensuring customer satisfaction and continual improvements, and by getting back to the B.A.S.I.C.S. Principles of Success.
You can become more productive if you learn the shortcuts to perform various regular tasks such as using virtual desktops, snapping apps and more. Below are the shortcuts to help you do things faster.
- Copy: Ctrl + C
- Cut: Ctrl + X
- Paste: Ctrl + V
- Open the clipboard: Windows logo key + J
- Open the clipboard: Windows logo key + V
- Open or close Start: Windows logo key
- Lock your PC: Windows logo key + L
- Minimize Window: Windows logo key + Up Arrow Key
- Maximize Window: Windows logo key + Down Arrow Key
- Switch between open app: Windows logo key + Tab
- Display and hide the desktop.: Windows logo key + D
- Open the Quick Link menu: Windows logo key + X
- Take a screenshot of part of your screen: Windows logo key + Shift + S
- Open emoji panel: Windows logo key + A