5 Great Reasons to Move to Microsoft Bookings

5 Great Reasons to Move to Microsoft Bookings

Let your customers schedule and manage appointments online with Microsoft Bookings.

If your business involves scheduling appointments with customers, you need to give the Microsoft Bookings service a serious look. This online service, which is part of Office 365, simplifies the process of setting and managing appointments with customers. It’s ideal for businesses such as medical offices, law firms, consultants, advisors, auto shops, hair salons, or anyone who provides services on an appointment basis. Customers can set appointments themselves or you can do it for them.

Bookings has 3 primary components:

  • An online bookings page where your customers can schedule appointments with specific staff members. This page can be used as a stand-alone page or embedded in your website and works on desktop and mobile devices.
  • An online backend where you can view and manage appointments, set a staff list and schedules, specify your services and pricing, record customer preferences, and customize how the service works.
  • A mobile app you can use to view and manage bookings and access customer information from anywhere you can get an internet connection.

With Bookings, you can efficiently:

  • Bring in Business 24/7 – You get a customizable public web page your customers can use to book appointments around the clock.
  • Put an End to Phone Tag – Customers can view available times online and book the slot that’s most convenient for them. Customers who prefer to call can do so, and you can enter their information manually. Either way, confirmations are sent immediately and automatically.
  • Reduce No-Shows – Send automated appointment reminders to customers, on the schedule you define, with date, time, and directions. You can set the system up to remind staff members automatically too.
  • Offer Self-service Rescheduling and Cancellations – It’s easy for customers to change or cancel an appointment. All they have to do is click the link contained in the appointment confirmation email. You can control how much advance notice is required for cancellations.
  • Manage Bookings on the Go – With the mobile app, you can add or view appointments and access or change staff and scheduling info when you’re away from the office. You can also view customer information and call or text customers directly from your mobile device.

How it Works

Bookings appointments can be made two different ways: customers can schedule an appointment themselves using the online booking page or staff can manually enter appointments. To make an appointment, the customer first selects the service they want. Then, based on the availability schedule you created, they can choose a day and time and enter their contact information to book the appointment.

As soon as the appointment is submitted, the customer is sent an email confirmation notice. The notice contains details of the appointment and a link for directions. It also includes a link the customer can use to change or cancel the appointment.

At the same time, the date is automatically added to your calendar or your staff’s calendar. Bookings work with Outlook calendar and Google calendar. Your customers won’t see your linked business calendars; they’ll only see the Bookings calendar you publish online.

The configuration is highly customizable and easy to configure. To set it up, you simply:

  1. Enter your business information.
  2. Set your scheduling policies, such as length of appointments, acceptable cancellation times, and automatic notifications.
  3. Define your service offerings, including service name, description, location, and pricing. You can also add internal notes about the service.
  4. Create your staff list.
  5. Set employee working hours.
  6. Schedule business closures for vacations or other reasons.
  7. Publish your booking page.

Bookings is available to Microsoft customers who have an Office 365 Business Premium subscription. The Microsoft Bookings mobile app is available in the Itunes and Google Play app stores.

For more information on Microsoft Bookings or help getting started, contact Computer Network Systems today at 1.866.205.8123 or support.staff@compnetsys.com

Your best source for tips, tricks, and hacks

Computer Network Systems (CompNetSys),is your best source for tips, tricks, and hacks as well as news relating to the latest advances in technology to help you work smarter, not harder.

Call us @ 866.205.8123 or send us an email @ support.staff@compnetsys.com

Did you know spam has been around since 1864?

Did you know spam has been around since 1864?

More recently, people consider the first spam email coming out of Digital Equipment in 1978 which went to a total of 393 people promoting their latest computer model. You can thank a Monty Python sketch based on a cafe that only served the canned spiced ham SPAM for the origin of the name. Another early spammer was the lawyers Canter and Siegel posting their “Green Card Lottery” message to USENET, a shared messaging system.

What does all this have to do with today? You don’t want to be known as a spammer. There are three ways to attack the spam problem. First off, you don’t want your marketing emails to be classified as spam. Secondly, you don’t want your mail server to be abused where someone sends spam through your hardware. While this wasn’t sent to you directly, your hardware could be blacklisted, thus affecting your own emails. Lastly, you don’t want your employees to respond to spam. There are ways to filter this at the mail server to prevent them from seeing the messages, or at least classify messages as fishy before their opened. Our company {company} can help you to protect your business from being labeled a bad apple in the email business.

Starting with the most important avenue, ensuring your marketing messages get through, there are some best practices to know about. For starters, don’t just send emails directly to your clients. Putting everyone’s email in the “To:” field of a message is bound to cause problems when someone does a reply-all. If you absolutely have to send a message to LOTS of people, it is better to use the BCC (for blind carbon copy) field of a message. Better yet, rely on a mailing list management package like that offered by Constant Contact. Typically, you don’t want to add people to the mailing list yourself. Instead, people should opt-in. More importantly, with each message you send, there should be unsubscribed instructions.

Protecting your mail server is not an easy task. There are some simple steps you can do like requiring that users are authenticated before sending a message, but someone can just spoof the email headers to make it appear messages came through your server. To best protect your server, in 2012 DMARC, or Domain-based Message Authentication, Reporting, and Conformance was introduced. Combined with the earlier introduced SPF, Sender Policy Framework, this makes sure that any messages appearing to come from your mail server actually came from your mail server. {company} can help you keep up with the latest ways to protect your email servers and thus getting your marketing messages through.

Lastly, it is important to look at the inbound side of spam. With all the talk of Russians hacking servers and the release of inappropriate celebrity photos, most of these attempts are triggered by phishing attacks of targets. You still need to worry about viruses being sent through email, but phishing involves fraudsters sending what look like real emails in the attempt to reveal personal information like passwords and bank account info. You don’t want your employees giving away the farm so that others can then get into your company network or your employees worried about identity theft. Computer Network Systems (CompNetSys) can help protect your mail servers from letting these unsolicited emails through.

Your best source for tips, tricks, and hacks

Computer Network Systems (CompNetSys),is your best source for tips, tricks, and hacks as well as news relating to the latest advances in technology to help you work smarter, not harder.

Call us @ 866.205.8123 or send us an email @ support.staff@compnetsys.com

So You Want Highly Informative Excel Spreadsheets?

So You Want Highly Informative Excel Spreadsheets?

If you are giving a presentation and part of it involves a shared display or handouts of a spreadsheet what can you do to keep the group awake? Let’s face it, Microsoft Excel is an excellent tool for organizing and manipulating statistical data, but when sharing your spreadsheet with others, your spreadsheet has to be interesting and informative.

How Do I Get More Information into an Excel Spreadsheet?

Before you get more information into your spreadsheet, make sure that a spreadsheet is a right tool for the job. More often than you might think, we use spreadsheets inappropriately. Would an Access database work better? Should you use PowerPoint for your presentation.

If you have decided that Excel is the right vehicle for your presentation, include a text document that is a “welcome” or “about” for the Excel document. This keeps you on track and reminds others what the purpose and mechanics of the spreadsheet are.

While it’s true that most of the spreadsheets we use in our careers are for our own consumption, it is a good practice to talk about your spreadsheet with others. Find out what features they like and which they don’t favor. If you work collaboratively with others in your organization be generous with credit and be sure to mention their names in the about or welcome document.

PivotTables Help (A lot)

PivotTables are important as they take tables of data, often with hundreds if not thousands of rows and help you and others understand the data by summarizing them by the column fields.

For a PivotTable to operate correctly it has to be set up in a certain way; each column needs to contain the same kind of data that is in a “raw” state – that is the data has not been processed yet. The following are some advantages associated with using PivotTables in Excel:

  • Simplicity
  • Speedily produced
  • Multiple dimensions – you can sort data by row or by column
  • Allows for interactive analysis

Appearances Do Matter

Your Excel Presentation can be exciting and visually stimulating. Following are some tips that help you accomplish this.

  • Consistency: Your spreadsheets will be easier for others to understand if you use only one font, bold headings for data groupings and formulae, distinct shade categories of data (for example shade raw data gray and results in green) and analytical comments should be in italics.
  • Create a Logical and Natural Flow: This is done by using the order of Worksheets and the layout of calculations and data to read left to right and top to bottom. An excellent Excel presentation takes the reader through a story – from inputs and assumptions to calculations and finally the results.
  • I Want Highly Informative Excel SpreadsheetsMake Data Relevant: To be more informative, an Excel spreadsheet presentation needs to have relevant data and analysis stand out. To do this, try to downplay the non-data elements of your tables and graphs. While you might create axes and gridlines the same color, make them paler than the data points.

 

Your best source for tips, tricks, and hacks

Computer Network Systems (CompNetSys),is your best source for tips, tricks, and hacks as well as news relating to the latest advances in technology to help you work smarter, not harder.

Call us @ 866.205.8123 or send us an email @ support.staff@compnetsys.com

Additional reading that may interest you :The Truth and Lies Behind Common IT Security Myths

Flashback Friday – Remember Dialing Into The Internet?

Flashback Friday – Remember Dialing Into The Internet?

Who remembers dealing with dial-up? It was technology that changed the world, but how did it start?

There was a time when the telephone line ruled the world. It did more than making vocal connections from one person to the next; it was also the heart of transmitting written data. Its core concept began early in the 1960s and ended with the advent of broadband connections. In between those years, the ringing buzz of dial-up was the sound heard around the world. Today, dial-up service is all but obsolete in most metro regions, although, you might still hear its signature ring in remote areas. Take a minute to remember those days of dial-up service.

Finding the Right Number

Visionaries began conceptualizing computer networking as far back as 1962 with the Defense Advanced Research Projects or DARPA. In 1965, MIT researcher Lawrence Roberts connected his computer to one in California using a telephone landline and modem, but the phone system at the time was incapable of handling complex packet switching in a larger scale.

In the really early years, it worked more like a fax that transmitted from screen to screen after you physically establish the link between your computer and the phone using a clunky modem. You would pick up the phone receiver, dial a remote number and then wait to hear the ringing noise that indicated a successful connection. The next step involved placing the phone receiver on the modem and then sending whatever file you wanted through the line. It was a process that could literally tie up your phone line for hours and, of course, those long distance fees hurt.

Introducing USENET

At some point, the old-school dial-up becomes more commercialized and global. Even if you remember dial-up Internet, you probably know very little about its predecessor USENET. Developed by Duke University graduate students Tom Truscott and Steve Bellovin, USENET was a series of newsgroups, much like today’s Internet forum. USENET was conceived more than a decade before anyone was using the World Wide Web, but it set the stage for people wanting that kind of online communication. By the time dial-up hit the consumer marketplace, USENET had already established a market for it.

How Dial-Up Works

Dial-up connections work using telephone lines. The computer now makes a phone call for you via a modem. In order for data to travel through the phone lines, the modem must convert the computer’s signal into analog first. The call goes through using the public switched network, connecting it to modems operated by the service provider.

Once the computer call is initiated, the phone line remains tied up until the computer disconnects. You might remember a time when you picked up the phone receiver and heard a loud screeching noise that indicated the phone line was in use.

Even after homes installed dedicated lines for their dial-up Internet connections, it still took some time to turn on your computer and click the button that initiated the call to the service provider and wait for the connection to go through.

It sounds cumbersome but dial-up changed the world. Before we all become glued to our keyboards and smartphones, your best bet for fast, written communication was the telegram. From emails to social media, the world has become one global consciousness and it all started with old-school dial-up.

Twelve Shortcuts Saving Maximum Time Using Microsoft Outlook

Twelve Shortcuts Saving Maximum Time Using Microsoft Outlook

The latest version of Microsoft Outlook is designed to be a personal information manager, not just email. Learn the shortcut tricks and a user can become a power communicator very quickly.  

While many wish there might be another choice, it is unlikely that Microsoft Outlook as a user interface is going to go away anytime soon in the workplace. In this regard, those who see the long perspective focus far more on how to use Microsoft Outlook effectively versus trying to replace it. And that’s where power users are really pushing the boundaries of the tool for maximum performance and the least amount of time communicating.

Here are 12 shortcuts that really stretch Outlook for what it can do for a user:

  1. Keyboard Shortcuts – Yes, there are menu commands. However, it’s those who know the keyboard shortcuts who really get things done amazingly fast. Shortcuts go direct to the function needed, and it doesn’t take long to get used to them. Beginners often just print out a cheat sheet.
  2. Quick Steps – In addition to the keyboard shortcuts, Outlook has a number of Quick Steps. Started with the 2010 version, this is the macro version of shortcuts. They are customizable, so you can make personal multi-step tasks that happen with one code versus three or four menus.
  3. The Clipboard Email Creator – A neat feature, one puts the text in the clipboard and then with Ctrl-V Outlook will automatically convert it into a message, calendar post, or contact entry.
  4. Email Shortcuts – Outlook comes with a number of built-in sorting features for fast locating of a given email message. Learning them allows a user to control the mass of messages that come in daily.
  5. Limiting Notices – A default notice in Outlook will notice every new email, but these can be limited to just high priority parties, cutting down time and focusing attention better. It’s a simple rule creation in Outlook.
  6. Flagging – Ever had an important email that you needed to find later but couldn’t? Red flagging makes it easy to find a pin in a haystack of messages.
  7. Template Powering – Saved email templates for commonly sent emails cuts down a great deal of time, and it protects messaging when protocols have to be followed.
  8. Folders – Simple but effective, active sorting of emails into labeled folders makes them extremely easy to find, segmenting out other emails not needed at the time.
  9. Quick Message Saving – Many people use cut and paste or printing to an Adobe PDF file to save a message. Instead, one can just drag it to the desktop which changes the email to a .MSG format file, easy to open in Outlook.
  10. Utilize All the Features – Outlook isn’t just email, it’s also a task-minder, calendar and journal. Don’t ignore them.
  11. Use Priority Tagging – Outlook has a number of priority fields and color coding for tagging. Using these make it easy to sort and filter items for what’s critical versus fluff.
  12. Natural Language – The software includes a feature where natural language can be typed in to the date field. For example, type in “Christmas” or “four days from today” and Outlook will recognize it on the calendar and implement the item.
How To Avoid Computer System Infection

How To Avoid Computer System Infection

Wisdom Wednesday: How to Avoid Computer System Infection

Criminals want your company’s financial data, customer lists including credit card information, intellectual property, and anything else they can sell.

Cyber crime is a huge endeavor with severe consequences for organizations that are victimized. Criminals want your company’s financial data, customer lists including credit card information, intellectual property, and anything else they can sell.

Besides the immediate impact on your business’ ability to operate (for example ransomware can shut you down), there are significant costs associated with a data breach. These costs include:

  • Potential fines from regulatory agencies for failure to protect personal identification data (PI) or personal financial information (for example a credit card number). Some fines have been in million dollar multiples.
  • The cost of notifying all persons and businesses that had their data breached.
  • Costs of providing credit monitoring and identity theft protection for all involved.
  • The potential cost of defending a class action lawsuit against your company for failure to adequately protect sensitive information.
  • Loss of customers
  • Loss of business reputation
  • Inability to attract new customers or clients

Following are Best Practices for securing your computer system and company data.

Best Practices for Computer System Protection

The following list is the Best Practices for keeping your business’ computer system, programs, and data, safe from prying eyes.

  1. Make sure your firewall is on so that intruders cannot access your system from the internet.
  2. Install security software and keep it updated.
  3. Filter all email for computer viruses.
  4. The more popular a program used by your business is, the more appealing it is a target for cyber criminals. Criminals know that many users do not regularly patch their programs against malware infections, so popular programs give them a wider pool for targeting. Make sure that your computer programs are updated as soon as a security patch is released.
  5. Exercise caution when using free 3rd party software claiming they check for software updates. Free software may be bundled with malicious software.
  6. Instruct employees that they should never open emails from unknown senders since they might be a source of infection to your company’s computer system. Attached malware might be anything from a virus to ransomware.
  7. Tell your employees they should check with senders they know if an email has a suspicious attachment. A phone call to the sender can help avoid the consequences of a data breach.
  8. Inform employees they should not open websites they are not familiar with and they should make sure the address bar is the site they want to visit. A random click could take them to a website that is just waiting to download malware onto your company computer system.
  9. Buy your software from a reputable buyer and never use pirated software as it may be infected with malware.
  10. Before using thumb drives and other portable media, scan them with security software to ensure they are virus free.

Computer security may surpass your company’s IT capabilities. Accordingly, consider a computer managed services provider with a strong background in computer security. For more information about managed services and how an MSP can help your company contact Computer Network Systems at 866.205.8123 or contact us by support.staff@compnetsys.com