View and save Gmail attachment directly with Drive

Over the next few days, we’ll be rolling out a feature that lets you view Gmail attachments and save files directly to Google Drive without ever leaving Gmail. The next time you open an email with attachments, you’ll see new previews of the files at the bottom of the email. When you click on one of those previews, a full-screen view of the image or document will appear. You can now also save your attachments directly to Drive simply by clicking the Drive button that appears when you hover over the preview.

Release track:
Rapid release

Editions included:
Google Apps for Business, Education, and Government

For more information:
http://googledrive.blogspot.com/2013/11/attachments-in-gmail-now-with-power-of.html

Reference by: http://www.google.com/

Support for Windows XP is ending.

On April 8, 2014, Microsoft will end support for the decade-old Windows XP as well as Office 2003. This means you will no longer receive updates, including security updates from Microsoft.

Get Modern with Windows 8 Pro and the new Office.

The security and privacy implications of this event could have significant impacts on your business. Migration is a time-consuming activity, requiring extensive planning and preparation, so if you’re running either of these products you should take action soon.

Work more SecurelyWithout critical Windows XP security updates, your information may become vulnerable. Windows 8 Pro and the new Office offer enhanced security features like built-in firewall, anti-virus, rootkit malware protection and Rights Management for emails and attachments.
Get the latest SoftwareMany software and hardware vendors will no longer support their products that run on Windows XP. Newer versions of your line of business apps are supported on Windows 8. For example, the new Office takes advantage of the modern Windows and will not run on Windows XP.
Stay SupportedWhen problems arise, online and phone-based technical support will unfortunately no longer be available. Continue to work on a supported platform with Windows 8 Pro and the new Office.
Reduce DowntimeThe risks of business disruption could increase because of the lack of supported software and the increasing age of hardware running Windows XP. Moving to Windows 8 Pro and the new Office in a timely, planned manner will reduce downtime later.

This is your opportunity to see how 10 years of innovation in both Windows 8 Pro and the new Office (either Office 365 or Office Standard 2013) can help your business.

Reference by: www.microsoft.com

How To Share Your Username & Password

Not Recommend

Never Share Username & Password both on Email or on same communication.

Recommend

Send Username On Email & Password On SMS.

WatchGuard Dimension – Oceans of data instantly become SECURITY INTELLIGENCE

WatchGuard Dimension™ is a new cloud-ready network security visibility solution that comes standard with WatchGuard’s flagship Unified Threat Management platform.

comprompt-kb-WatchGuard-dimension_rightIt provides a suite of big data visibility and reporting tools that instantly isolate and distill key security issues and trends, speeding the ability to set meaningful security policies across the network.

WatchGuard Dimension offers users a menu of visibility and reporting options to present the information in the way they find most intuitive. we will show the 4 key features of WatchGuard Dimension and why you need them in your network environment:

  1. Executive Dashboard
  2. Summary Reporting
  3. Hierarchical TreeMap
  4. Global ThreatMap

Reference by http://www.watchguard.com/

New Google+ Features for Enterprises

On November 5th we are launching Restricted Communities as a feature in G+. This means that your Google Apps for Business customers will be able to restrict communities to only their organization. Restricted communities mirror the Public and Private communities in the consumer space, but these Restricted Communities can only be joined or seen by users in their organization.

The four types of restricted communities are:

 

The four types of restricted communities
Type of communityWho can joinWho can see posts and membersWho can find community via search*
1. Open within your domain – Anyone in your organization can join Everyone in your organizationEveryone in your organization Everyone in your organization
2. Open within your domain – Moderator approval needed to join Anyone in your organization can request to join, but moderators must approve membershipEveryone in your organization Everyone in your organization
3. Private in your domain – Moderator approval needed to joinAnyone in your organization can request to join, but moderators must approve membershipCommunity members Everyone in your organization
4. Private in your domain – Hide community from searchesOnly people in your organization who are invitedCommunity membersNot shown in search results**

*Restricted communities may not yet be searchable in your domain.

**The name and photo of a “private in your domain” community that’s hidden from search will still be visible to people in your organization who type in or follow a link to the community’s web address. The name and photo will not be visible outside your organization.

If you choose not to have search engines index your community, the community itself won’t appear in Google search results. However, your community will still remain visible to anyone in your organization with the URL. Other pages and content (including websites, blogs, and Google products such as Picasa Web) that link to your community can still appear in search results. If someone outside your organization follows a link to your organization, they will see an error and won’t be able to view the community.

 

Reference by http://www.google.com

Google Apps New Update Information

  • End of support for Internet Explorer 9
  • Calendar events that update when Google Groups change
  • Domain-restricted Google+ communities

End of support for Internet Explorer 9

We would like to remind you of the Google Apps browser support policy, the set of guidelines for Google Apps services interoperability support. We support the latest version of Google Chrome (which automatically updates whenever it detects that a new version of the browser is available) as well as the current and prior major release of Firefox, Internet Explorer and Safari on a rolling basis. Each time a new version of one of these browsers is released, we begin supporting the update and stop supporting the third-oldest version.

Google’s test plans have been adjusted to now stop all testing and engineering work related to Internet Explorer 9 (IE9), as Internet Explorer 11 (IE11) was released on 17 October 2013. End users who access Gmail and other Google Apps services from an unsupported browser will be notified within the next few weeks through an in-product notification message or an interstitial pages with information about modern browsers and how to upgrade to them.

Editions included: 
Google Apps for Business, Education, and Government

For more information:

https://support.google.com/a/answer/33864

Calendar events that update when Google Groups change

Starting today when Google Calendar invitations are sent to members of a Google Group, the attendee list will automatically update as people join or leave the group. When you join a Google Group, you will be added to all of its meetings. And if you leave a group, those meetings will be removed from your calendar. Note that groups stop dynamically changing when the total number of guests in the event crosses 200.

Release track:
Rapid Release

Editions included:
Google Apps for Business, Education, and Government

For more information:
http://googleenterprise.blogspot.com/2013/11/calendar-events-that-update-when-google.html
https://support.google.com/a/answer/172013

Domain-restricted Google+ communities

Starting today, new Google+ communities will be restricted to your domain by default if sharing is restricted in the Admin console. Posts in these communities are only viewable by people within the domain. However, you can still choose to create communities with people outside your organization so clients, agencies or business partners can join in. You can also make your community open to anyone at your domain or private, joinable by invitation only. Community owners can easily change settings, manage membership or invite other team members to join.

Editions included:
Google Apps for Business, Education, and Government

For more information:

http://googleenterprise.blogspot.com/2013/11/private-conversations-with-restricted.html
https://support.google.com/plus/answer/3379754

Reference by http://www.google.com/

XP Retiral – Business is at RISK / Banks Face Security Risk/ Indian Govt Issues Advisory

  1. Windows XP is already significantly more likely to become infected with Malware. Post April 2104, attackers and hackers will take advantage of customers who continue to run on XP exposing their vulnerability. Do go through the attached document outlining the RISKS that business customers have.
  2. The article below outlining the risks that banks have if they stay with XP issued by US regulatory body
  3. The Government of India has also issued a letter to its departments to move off XP prior to the deadline. The letter is from the emergency response cell.

PCI DSS compliance at risk if banks use Windows XP after Microsoft withdraws support services, regulatory agencies warn.

Banks that use the Windows XP operating system will face a risk to their compliance with payment card data security rules if they continue to operate the software after Microsoft withdraws its extended support services, a US regulatory body has warned.

Windows XP End Of SupporApril 2014.pdf

Cert In Advisory Windows XP End Of Support.pdf

 

 

Reference by http://www.microsoft.com

Exchange/Exchange Online – Top-10 Benefits

  1. Protect your sensitive data and inform users of internal compliance policies with Data Loss Prevention (DLP) capabilities: Keep your organization safe from users mistakenly sending sensitive information to unauthorized people. The new Exchange DLP features identify, monitor, and protect sensitive data through deep content analysis. Exchange offers built-in DLP policies based on regulatory standards such as PII and PCI, and is extensible to support other policies important to your business. Additionally, the new Policy Tips in Outlook inform users about policy violations before sensitive data is sent.
  2. Allow compliance officers to run In-Place eDiscovery across Exchange, SharePoint, and Lync – from a single interface: The ability to immutably retain and discover data across your organization is essential to ensuring internal and regulatory compliance. Allow your compliance officers to autonomously use the new eDiscovery Center to identify, hold, and analyze your organization’s data from Exchange, SharePoint, and Lync. And, the data always remains in-place, so you never have to manage a separate store of data. With the eDiscovery Center, you can reduce the cost of managing complex compliance needs, while ensuring you are prepared for the unexpected.
  3. Keep all of your important data in one place with Exchange archiving, large mailboxes, and retention policies: Empower your users with an in-place archive and large mailbox to allow them the flexibility to retain email in their primary mailbox, or to archive items. With flexible and powerful retention policies, you can take control of your storage and compliance demands – while keeping your users productive.
  4. Enable your users to collaborate on projects, get up to speed quickly on teams they join, and share information easily: Make it easier for your users to manage team and project communications. Allow users to see old communications on a project as soon as they join, have access to the current versions of their team documents, and access that information right from within Outlook. Your users will
    have powerful new tools to be productive on their teams and you will be able to
    manage information in the locations that this information was meant to be stored. Co-authoring, document storage and versioning is provided by SharePoint while messaging is handled by Exchange with a complete user experience within Outlook.
  5. Eliminate email threats before they reach your network: Exchange actively protects your communications with built-in defenses against email threats. Multi-layered anti-spam filtering comes with continuous updates to help guard against increasingly sophisticated spam and phishing threats, while multiple anti-malware engines work to protect your email data from viruses.
  6. Give your users an intuitive, touch-enabled inbox experience on just about any device: Enable your users to get more done from anywhere with an inbox that provides a clean and uncluttered experience, where the relevant and important information is optimized for different form-factors. The same thoughtful design in the Outlook desktop interface has been applied to both the browser and mobile interfaces.
  7. Move to the cloud on your terms with flexible options including Exchange hybrid deployment: Exchange provides you tools to move to the cloud on your terms – whether that’s onboarding to the cloud overnight or managing a hybrid deployment with mailboxes on-premises and online to meet your business needs. Provide your end users with a seamless experience including sharing calendars and scheduling meetings between on-premises and online users and limit user disruption when user mailboxes are smoothly moved across environments. Remain in control in the cloud by testing out upcoming enhancements with support for upgrade previews.
  8. Decrease the amount of time spent managing your messaging systems while maintaining control: Manage powerful capabilities including DLP, Apps for Outlook, and site mailboxes from the Exchange Administration Center – a single, easy-to-use, web-based administration interface. Role-based access control empowers your helpdesk and specialist users to perform specific tasks which are
    surfaced appropriately in the Exchange Administration Center – without requiring full administrative permissions. This streamlined and intuitive experience helps you manage Exchange efficiently, delegate tasks, and focus on driving your business forward.
  9. Customize Exchange by integrating relevant, web-based Apps for Office into Outlook and Outlook Web App: Help your users spend less time switching between apps and make their communications experience more powerful with an extension model that allows you to provide easy plugin access across both the rich client and web-based Outlook experiences. You can minimize complexity with single sign-on to multiple applications and securely give access designed to ensure only authorized individuals can use each approved application.
  10. Bring all of your contacts together in one place: People’s professional networks span many different places. You will have the ability to enable users to bring their contacts in from other networks so that they have all of their information in one place. Exchange will even find the same person across networks and consolidate their information into one contact card, avoiding duplication and multiple contact cards with different information.

Reference by http://www.microsoft.com

5 SIMPLE STEPS TO PREVENT SOFTWARE PIRACY ROULETTE

  1. Read the BSA “Software Management Guide.”
  2. Establish software management policies that protect computers from unlicensed software and educate employees.
  3. Use the tools on www.bsaaudit.com to inventory office software.
  4. Compare the number of software installations to the number of licenses and obtain any licenses needed for compliance.
  5. Schedule regular software audits to guard against piracy.

Reference http://www.bsa.org

6 TIPS FOR PREVENTING SOFTWARE PIRACY

 

  1. Read the BSA “Guide to Software Management.”
  2. Establish office policies for purchasing software and respecting intellectual property rights.
  3. Explain to employees the importance of protecting computers from unlicensed software.
  4. Compare the number of software installations to the number of licenses.
  5. Obtain any licenses needed for compliance.
  6. Schedule regular software audits to guard against piracy.

Reference http://www.bsa.org