5 Handy tips to combat VoIP eavesdropping

Eavesdropping on VoIP calls is a serious business threat. This happens when someone uses a software program to record or listen in on VoIP calls without permission. This can be done to steal trade secrets or commit fraud. To protect your business from such attacks, here’s what you need to do. Change default usernames and passwords The first thing you need to do is to change the default password and username of your VoIP system. Many businesses don’t bother to do this, but it’s an essential security measure. By changing the default login credentials, you make it harder for hackers to gain access to your system. You can do this by logging into the admin panel of your VoIP system and changing the password. Keep your VoIP system updated Hackers are always looking for vulnerabilities in software. As such, it’s important to keep your VoIP system up to-date with the latest security patches. Check with your handset vendor regularly for updates and install them as soon as possible. Keep your session border controllers (SBCs) updated By doing so, you’ll be updating your VoIP’s antivirus software, which means your systems are better protected from all known types of malware. This also helps to ensure that your calls aren’t being rerouted through malicious VoIP servers, which could be used to eavesdrop on conversations. Use a VPN or SRTP Phone calls made over the internet are transmitted in the form of data packets. If these packets are intercepted, anyone can listen in on your conversations. To prevent this from happening, you need to encrypt your VoIP calls. You can do this by using a virtual private network, which encrypts all the data passing through your device. Alternatively, you can use Secure Real-Time Transport Protocol, a VoIP security protocol that encrypts voice calls. VoIP eavesdropping is a serious threat, but these steps you can take to protect your conversations. If you want to know more about how to secure your business, feel free to contact us today. Train your employees Your employees need to be aware of the dangers of VoIP eavesdropping. Teach them not to give out confidential information over the phone and make sure they know how to spot signs that someone may be trying to listen in on their conversations. VoIP eavesdropping is a serious threat, but these steps you can take to protect your conversations. If you want to know more about how to secure your business, feel free to contact us today. Published with permission from TechAdvisory.org. Source.
4 Ways to keep your servers cool

For any organization, servers are important for storing business data. This is why you should make sure that your servers are well-maintained. If not, their operating temperatures will rise, which can lead to server instability or even data loss. Read on to learn how to keep your servers at ideal temperatures. How does high temperature affect servers? A server’s reliability decreases if its temperature rises above 70 degrees Fahrenheit. When servers reach these temperatures, they will start to perform poorly, as will the computers connected to them. Maintaining a consistent temperature for your servers is critical for optimal performance and to avoid significant data loss and service outages. Methods to keep servers cool Here are the four best methods to keep your servers running at optimal temperatures. Pick the right air conditioning system Installing an air conditioner in your server room is the most effective method to keep servers cool. Choose industrial air conditioners over residential air conditioners. Industrial air conditioners can be a bit costly and require semi-annual maintenance checks, but they will ensure your servers are kept cool 24/7/365. Ensure your server room is well ventilated Server rooms are usually small and contain other hardware aside from servers. Without proper air circulation, all that hardware can raise the temperature of the room and your servers. Pick a room that has good circulation to keep your servers in. If you have no choice but to put your servers in a small room, make sure to install a ventilation system that will allow hot air to escape. Use cooling fans Cooling fans work well with a ventilation system to move hot air away from your servers. They’re also a more cost-effective alternative to air conditioners. You can place a small yet powerful fan next to the heat vent to prevent your servers from overheating. Use low-heat lighting Even lighting can affect your server’s temperature. Incandescent lights produce too much heat that can raise the temperature of your server room, so use low-heat lighting options such as LED arrays and fluorescent tubes instead. Not only do they produce less heat, but they also provide better illumination compared to incandescent bulbs. Servers work best if they are kept at a cool temperature constantly. While manufacturers continue to develop more resilient servers, proper care and maintenance still play a vital role in ensuring high operating quality and longevity. Contact us today if you need additional information about server management or have any other questions regarding your server setup. Published with permission from TechAdvisory.org. Source.
Addressing the security challenges Microsoft 365 users face

Microsoft 365 is one of the most popular suites of cloud-based tools and services used by businesses of all sizes. But while it offers robust security measures, the evolving cyberthreat landscape relentlessly puts Microsoft 365 users at risk. This is why Microsoft is constantly looking for ways to address security issues so that your IT environment and data are protected. In this blog post, we will discuss some of the most common Microsoft 365 security risks and how you can keep your business protected. Infected file synchronization Like most cloud services, Microsoft 365 allows users to automatically sync files stored on their devices to the cloud, such as in OneDrive. However, this useful feature is not without security risks. If a locally stored file is infected with malware, OneDrive will view the file as changed/updated and trigger a sync to the OneDrive cloud, with the infection going undetected. Microsoft Defender for Cloud Apps is a great tool against malware infection. Part of Microsoft 365 Defender, this app is designed to enhance protections for Office 365 apps. It also provides great visibility into user activity to improve incident response efforts. Make sure your organization’s security administrators set this up on your systems so you can detect and mitigate cyber risks as soon as they arise. Security risks in dormant applications Some organizations using Microsoft 365 often don’t use all the tools and services included in the productivity suite. For instance, your organization might use programs like Word, Excel, and SharePoint every day, but rarely use OneDrive. Unfortunately, dormant applications may be prone to attack. To counter this, it’s crucial to identify unused apps and have an administrator tweak user settings to restrict availability on these apps. Unprotected communication channels Phishing attacks and malware are two of the most common ways cybercriminals infiltrate a system, but there are other paths of attack that you may not be aware of. Microsoft 365 applications like Microsoft Teams, which can connect to external networks, may serve as a medium for ransomware and other types of cyberattacks. To fight against such threats, train your staff in identifying potentially malicious files and links. You can also offer guidelines on how to handle and route sensitive files and communications to safe locations. Vulnerabilities in SharePoint Businesses typically use SharePoint to store sensitive information like personally identifiable data, so failing to secure SharePoint content against unauthorized users is one way to expose data and your business to cyberthreats. This can be disastrous for companies that are required to comply with stringent data privacy and protection regulations. Failure to comply may result in serious consequences not only for businesses but their customers as well. To prevent this, limit administrator-level privileges and enable encryption. Additionally, set the necessary security restrictions per user for every application. This ensures that users and hackers who get a hold of user credentials cannot exploit or misuse privileges. Microsoft 365 provides a powerful and convenient tool for businesses. However, as long as cybercriminals exist, there are always security risks to be aware of. If you have any questions about Microsoft 365 security or would like help in implementing these tips, our team of experts would be happy to assist you. Contact us today! Published with permission from TechAdvisory.org. Source.
Get more done with these Google Chrome extensions

Google Chrome is one of the most popular and widely used web browsers in the world. It’s already powerful on its own, but you can increase its functionality by installing extensions. With so many extensions available, choosing the best ones for your needs can be tricky. We’ve compiled a list of extensions to help you get the most out of your Chrome browser. Grammarly Grammarly is the perfect extension if you want to optimize your content and check your work for plagiarism. Whether you’re writing a social media post, email, or blog article, Grammarly will check your work for grammatical, spelling, punctuation, and fluency errors, and highlight sentences that need correction. If you want clean and clear content, make sure to get Grammarly. Price Basic: Free Premium: $12/month Business: $12.50/month LastPass The LastPass extension for Chrome stores and tracks your usernames and passwords, making it easier for you to log in to your accounts. It evaluates your current passwords, giving you better insight into the strength of your passwords and providing suggestions to create stronger ones. Other features include: Dark web monitoring tools Two-factor authentication Fingerprint login Mobile app unlock pin Trial Free: Premium access for 30 days Premium: 30 days Families: 30 days Teams: 14 days Business: 14 days Price Free: $0 Premium: $3/month Families: $4/month Teams: $4/month Business: $6/month Evernote Web Clipper If you’re researching for a project or want to revisit a page you previously viewed, Evernote Web Clipper is perfect for you. This extension lets you save PDFs, articles, and web pages to your Evernote account so you can view them later. You can save a full page, a simplified page (no formatting and images), a page with its original formatting, or simply bookmark a page with a click of a button. Evernote can also sync across devices, so you can save a page on the mobile app and open it later on your desktop. Price Free: $0 Personal: $130/month Professional: $162.90/month Teams: $600/user/month Adblock Plus If you’re concerned about online privacy and security, then Adblock Plus is the extension for you. It’s an open source application that uses filter lists to: Disable tracking for better privacy Block annoying video ads, banners, and pop-ups Detect malware hiding in ads . Adblock is completely free, but a donation pop-up will appear after installation. You can simply close it if you don’t want to donate. If you don’t have Google Chrome, you’ll be happy to know that these extensions work with any Chromium-based browser like Opera and Edge. If you want to learn more about Chrome extensions, call our experts today. Published with permission from TechAdvisory.org. Source.
Marketing automation: Is it worth it for SMBs?

Traditional marketing strategies involve manually segmenting lists, sending emails, and tracking leads. However, these processes can be time-consuming, costly, and error-prone. Marketing automation fixes these issues, helping small- and medium-sized businesses (SMBs) acquire more leads and increase their revenue. Read on to find out the game-changing benefits of marketing automation solutions. 1. Automatic follow-ups Keeping in touch over the phone can be tough if both parties are always busy, which is why email is often the medium of choice for marketing campaigns. With an automated system, your company can log the time and date of contact with leads, and set follow-up reminders for you and your team. You can even automate follow-up emails with prospects. This way, no potential customer will ever slip through the cracks. 2. Comprehensive contact histories With each call and email you make and networking event you attend, you may obtain new contacts and leads. In the past, keeping track of these leads meant manually storing thick stacks of business cards and notes in your Rolodex. But today, cutting-edge marketing tools have made it possible to automatically capture contact information from any correspondence and record it directly onto customer relationship management databases. Previous calls, scanned business cards, and received emails all get organized into a single database without a single minute wasted on tedious data entry. Automated systems can also track specific information on new leads, such as product preferences, contact times, and demographic information. All this information can then be used to create more personalized sales pitches that increase the likelihood of conversion. 3. Instant responses to email requests Whenever prospective customers contact you via an email or web form, they usually expect an immediate response. Take too long to respond, and these customers can quickly lose interest in your company, ultimately costing you potential business. But if you have a marketing automation solution, you can customize automated emails to respond to these leads as soon as an email is received. These emails may include answers to frequently asked questions about your services or a simple acknowledgment that you will get back to them with an answer shortly. 4. Inbound lead assignment Keeping track of which customer service representatives (CSRs) are handling which clients can be tricky, especially as you acquire more leads. Marketing automation software fixes this issue by automatically assigning inbound leads to the most appropriate CSRs. It could assign clients to representatives based on availability, prior experience, and specialties. This way, you can improve customer experiences by having the right people talk to the right clients. 5. Streamlined content distribution Getting someone’s contact information is key to acquiring more leads and building relationships. The best way to achieve this is to offer relevant and valuable content that prospects actually want. For instance, you can offer webinars, how-to tutorials from your niche, or special product promotions in exchange for filling out a simple web form. When clients submit the web form with their contact information, you can then use marketing automation to deliver the content directly to their inbox. Not only does this save you time from having to manually send out each piece of content, but it also allows you to track which pieces of content are most popular and generate the most leads. This can inform future marketing campaigns and help you focus on what’s most important to your target audience. Wise business owners know that marketing automation is the key to saving time and unlocking their company’s competitive edge, helping them easily acquire and convert more leads. Contact us now if you want to elevate your marketing with cutting-edge automation tools. Published with permission from TechAdvisory.org. Source.
How to secure your data using File History in Windows 10

Whether you use a Windows 10 laptop or desktop for work or personal use, you’ll realize that it can quickly accumulate a large amount of data. Hardware failure, cyberattacks, and natural disasters can put this data at risk of being lost forever. Backing up your data regularly is the best way to prevent data loss, and here’s how you can do it. Setting up File History in Windows 10 File History is a Windows feature that allows you to create scheduled backups of your data on a removable storage device (e.g., external hard drive, flash drive). To set up File History, click Start > Settings > Update & Security > Backup > Back up using File History > Add a drive. Windows will search and display a list of drives connected to your computer. Choose the one you want to use, then click on More options. This will take you to the Backup options screen where you can set up the parameters for your backup. Under Back up my files, you can choose how frequently Windows will backup your files. Keep my backups lets you determine how long you want to keep your saved data. File History is designed to save common folders such as Downloads, Desktop, and Music by default. If you want to add more folders to save, scroll down the Backup options window and click Add a folder. A list of folders will appear and you can choose which ones you want to add. To remove a folder, just review the list of folders under Backup options, select the folders you want to exclude and click Remove. After setting up your backup parameters, click Back up now. Windows will create a backup of the folders you included in the Backup options. Once done, the system will give you an overview of the size of the backup and the time and date it was created. Restoring your files in Windows 10 If one or more of your files disappear or get corrupted, you can use the File History backup you created to restore them. Click Start > Settings > Backup > More options > Restore files from a current backup. You’ll see a list of all the saved folders. Choose the ones you want to restore, then click the green button at the bottom of the window to restore the folders. If the original files and folders on your computer disappeared, Windows will restore them to their previous locations. If the original files and folders still exist but are corrupted or inaccessible, Windows will give you the option to keep the original files, replace them, or compare them. Replacing corrupted files with the ones from your File History backup will allow you to access the most recent version of the file before it was backed up. In case you want to stop using File History, just go to Start > Settings > Backup > Back up using File History, and turn off the Automatically back up my files option. Backing up your data is an essential task that needs to be done regularly. Call our experts today to learn more about saving and restoring data in Windows. Published with permission from TechAdvisory.org. Source.
3 Types of hackers: What you need to know

While there are many similarities among hackers, there are also some key differences among them. Some hackers want money for themselves and resort to evildoings, while others just want to make the world a better place. In this blog post, we will discuss the three main types of hackers and what you need to know about them. A complicated history In the 1950s, the term “hacker” was vaguely defined as someone who explored the details and limits of computer technology by testing them for a variety of purposes. But by the 1980s, when computers became more accessible, “hacker” became closely associated with teenagers who broke into government computer systems. These teens referred to themselves as hackers, perhaps because the word has an aggressive ring to it. Believe it or not, several of those pioneering hackers now run multimillion-dollar cybersecurity consulting businesses, while countless others still run amok online, hoping to make a quick buck off of hapless victims. 3 Types of hackers Knowing the history of hacking can give you a background on the different kinds of hackers, and this information can also help protect your business from cybersecurity threats. Let’s take a look at the three main types of hackers that can impact your organization. “Black hat” hackers Black hat hackers create programs and campaigns to commit all sorts of malicious acts. They’re what most non-IT people think of when the term hacker is mentioned. Black hat hackers typically use hacking tools to attack websites and steal data. They may also create viruses or malware to damage computers and other devices. They commit crimes such as identity theft, credit card fraud, and extortion for their sole benefit, but they can also work for a corporation or a state and commit espionage and cyberterrorism. Kevin Mitnick is a prime example of a black hat hacker. In the 1990s, Mitnick went on a two-and-half-year hacking spree, committing wire fraud and stealing millions of dollars of data from telecom companies and the US National Defense warning systems. After spending five years in prison, he set up his eponymous cybersecurity firm and became its CEO and Chief White Hat Hacker. “White hat” hackers Sometimes referred to as ethical hackers or network security specialists, white hat hackers are considered the good guys. They use their hacking skills to find weaknesses in websites and systems to help fix these vulnerabilities so that they can’t be exploited by black hat hackers. Whether it’s selling what they find to hardware and software vendors in “bug bounty” programs or working as full-time technicians, white hat hackers are interested in making an honest buck. Linus Torvalds is a great example of a white hat hacker. After years of experimenting with the Sinclair QDOS operating system, he released Linux, a secure open-source operating system. Linux is built to prevent malware, rootkits, and other computer pests from being installed onto your device and operated without your knowledge. This is because most infections are designed to target Windows computers and can’t cause any damage to the Linux OS. “Gray hat” hackers Gray hat hackers fall somewhere in between black hat and white hat hackers. Whether a gray hat hacker works as a security specialist or is a cybercriminal, the majority of their work is usually conducted over the internet. While most gray hat hackers usually enjoy the anonymity that gives them the opportunities to try their hands at both white hat and black hat hacking, not all gray hat hackers live in the shadows. For example, Marcus Hutchins is a known gray hat hacker. He’s most famous for stopping the WannaCry ransomware by finding a “kill switch.” However, Hutchins also created the Kronos banking malware. He was arrested in 2017 and pleaded guilty, accepting full responsibility for his mistakes. He now uses his talent by working for Kryptos Logic cybersecurity firm. According to Hutchins, he has since been using the same skills that he misused several years ago for “constructive purposes“. The rapid evolution of the cyber realm means there is more information available online every day, and there are many sorts of hackers looking to misuse it. While the purpose behind each hacker’s action varies, the danger they pose to your data and company is constant. If you think your website or data has been hacked, contact our cybersecurity experts as soon as possible. You can also contact us if you have any questions about how to secure sensitive business information. Published with permission from TechAdvisory.org. Source.
HDD vs. SSD: Which one should you get?

PCs and laptops typically came with hard disk drives (HDDs), but buyers can now also have the option to configure their system with either HDDs, solid state drives (SSDs), or in some cases both. In this blog, we’ll compare both storage drives so you can make the best decision for your needs. What is an HDD? An HDD is a spinning hard disk that reads and writes data on a metal platter with a magnetic coating. The internals of an HDD look similar to an old record player — there’s a platter or a stack of platters, which spin around a spindle, and an armature called a read-write head. Data is stored onto the platter via tiny magnetic particles. What is an SSD? Unlike an HDD, an SSD does not have any internal moving parts. Instead, it uses integrated circuit assemblies to store, retrieve, and cache data. An SSD has two key components: flash memory chips and the controller (i.e., an embedded microprocessor). Flash memory contains storage memory, while the controller executes firmware-level software. HDD vs. SSD: How are they different? We’ll compare the two storage devices based on these five categories. 1. Speed HDDs take a long time to access data because the disk must spin to find it. They typically have a spinning speed of around 5,400 to 7,200 rotations per minute. In contrast, SSDs can complete the same task 200% faster since they rely on instantly accessible memory chips. That’s why a computer equipped with an SSD can boot an operating system and load apps much faster than one that uses an HDD. An SSD can copy and move large files at 500 MB per second, while an HDD can do the same at 30–150 MB per second. This means you can copy a 20 GB movie in less than 10 seconds with an SSD, but you would need at least two minutes with an HDD. 2. Capacity Thanks to recent technological advancements, SSDs can now support terabytes of storage, just like HDDs. However, if you compare today’s lowest-priced laptops, you’d see that they’re either equipped with 128 GB SSD or 500 GB HDD. Why is there such a huge difference in storage capacity? It’s because SSDs come with prohibitively high price tags. Therefore, if you require a lot of storage space, HDD is the way to go. 3. Cost For the same storage capacity, HDDs are less expensive than SSDs, which is why they’re often bundled in budget laptops and PCs. To keep its price competitive, a budget laptop typically can have only up to 512 GB SSD storage. Some gaming laptops solve this speed-price dilemma by having both an SSD and an HDD — SSD for key applications and HDD for data. However, take note that most consumer and business laptops do not have room for multiple storage drives. Fortunately, you can easily find 1 TB external USB hard drives for under $50. 4. Durability HDDs are more susceptible to shock and damage because they have various moving parts and components. This means that if you accidentally drop your laptop, your HDD might get damaged and your data will be lost. Moreover, the longer you use your HDD, the more it wears down and eventually ends up failing. In contrast, because SSDs use a nonmechanical design of flash storage mounted on a circuit board, they are more durable and are better at keeping your data safe. 5. Noise An HDD emits some noise when the drive spins back and forth to process data. In contrast, SSDs do not have moving parts so it does not make any noise at all. Conclusion Overall, SSD is the clear winner over HDD. While more expensive, SSD is the faster and far more durable data storage option in the long run. If your computer can support multiple hard drives, you can use an SSD as the primary storage for your OS, applications, and most-used programs. You can then use an HDD to store pictures, documents, and other files that do not require quick access times and speeds. Planning to purchase new hardware? Let our experts guide you so you can confidently make the right IT investments. Get in touch with us today. Published with permission from TechAdvisory.org. Source.
The business benefits of unified communications

Are you looking for a way to improve your business communication systems without breaking the bank? Unified communications (UC) might be the answer you’re looking for. UC is a relatively new concept, but it’s already gaining traction among businesses of all sizes. Let’s take a closer look at what UC is and how your business can benefit from it. What is unified communications? UC is a term used to describe the integration of different communication tools into a single platform. This includes just about every medium of communication, such as voice communication in all its forms — voicemail, phone calls, and voice memos — as well as multimedia services like video chat and web conferencing. Real-time communication, like call screening and call conferencing, can also be integrated. Even data services and transactions like eCommerce and online banking can be added to a UC system. How can small businesses benefit from UC? The most significant business benefit of UC is that it can help improve communication and collaboration between employees. This is because UC provides a single and flexible infrastructure in which you can streamline and enhance business communications and easily manage all the components. Here are other benefits of having a UC system: Hypermobility UC enables you to access your files via a wide array of mobile devices like laptops, smartphones, and tablets. This makes it easier to create an office environment and assist customers wherever you or your team might be. This opens up a world of opportunity for real-time collaboration and remote work. <li><b>Improved productivity</b> UC lets you enjoy productivity-enhancing communication features like call information and call routing. These capabilities enable users to work more efficiently and better tend to customers’ needs. For instance, web and video conferencing calls not only allow for real-time interactions but also for better collaboration. Delayed response times and gaps between dispersed teams are also minimized. <li><b>Real-time updates</b> With UC’s real-time presence updates feature, users can share their location and contact information — provided that you authorize the use of this capability. This allows team members to easily get in touch with the right person when they need to. <li><b>Single point of contact</b> Clearly defined points of contact ensure that stakeholders can reach you by email, phone, SMS, etc., whether they are reaching out to you via a softphone, an IP phone, email, or instant messaging. <li><b>Reduced costs</b> UC lowers phone bills since it uses the internet to make calls. It also limits the need for expensive on-site hardware, as one UC server keeps everyone connected using the aforementioned communication features. What’s more, it eliminates travel costs, because it allows you to join meetings without leaving your office or home. Even better, you can potentially save thousands of dollars on office overheads by allowing employees to work from home since they’ll remain connected through their softphones even when they’re not in the office. It’s only a matter of time before UC becomes the norm for business communications. Give us a call if you’re interested in learning more about how UC or VoIP can transform your business. We’ll answer your questions and help you devise an integration strategy that fits your business needs. Published with permission from TechAdvisory.org. Source.
How to improve your Excel skills

Microsoft Excel is a popular office application used by countless businesses around the world. Unfortunately, many employees are not using it to its full potential. If you’re struggling with Excel, these tips will help improve your spreadsheet skills. SUM and AutoSum SUM is a function that allows you to add individual ranges, cell references, values, or all three. To do this, follow these steps: Select a cell next to the values you want to add. Type =SUM(. Select or highlight the cells you want to add. Type ) then press Enter. Another way to add numbers in a row or column is to click on the AutoSum button on the Home tab, select the cells you want to add, then press the Enter key. Here’s a short video with examples of how to use SUM and AutoSum. COUNT and COUNTA The COUNT function lets you determine how many cells in a spreadsheet contain numbers. To use this function, click on an empty cell and type in the formula =COUNT(B1: B50). In this example, Excel will check column B, rows 1 to 50, for any numbers. If there are 25 cells with numbers, Excel will return a value of 25. The COUNT function only looks at numbers and will ignore text. If you use COUNT in a column full of text, it will return a value of zero. The COUNTA function is similar to COUNT, but it looks at cells containing text. So if you want to count how many cells in a column contain text, simply type this formula into an empty cell: =COUNTA(P1: P25). If there are five cells with text under that range, Excel will return a result of 5. Pivot tables A pivot table lets you summarize large amounts of information, analyze related totals, and present detailed reports in a simplified and user-friendly way. For example, you want to determine how many sales each person in your team has made during the past six months. Using a pivot table, you can easily display all the data grouped together under different categories (a task that would be time-consuming if you were just using functions and formulas). Here are the steps for creating a pivot table: Select the data on the spreadsheet you want to include in the table. On the Excel ribbon go to Insert > Tables > Pivot table. A Create PivotTable dialog box will appear, with the data range you selected. You can manually edit the data range as you see fit. This dialog box will also give you the option to create the pivot table in a new or in an existing worksheet. Once you’re done editing, click OK. After clicking OK, a blank table will appear along with a PivotTable Fields dialog box. In this box, you can select which fields in the data range you selected earlier will appear in the table. You can check out this short video if you want to learn more about creating a pivot table. Filter Filtering allows you to temporarily hide irrelevant data so you can focus on the ones you need. This feature is useful if you’re working on a spreadsheet with a large amount of data. For instance, you want to know how many students in Section 3 of your class got a midterm score of 90 and above. You can have Excel filter out the students in Section 3 who scored below 90, leaving you with a list of those who got a score of 90 and above. Here are the steps to use filtering in Excel: Highlight the data set you want to filter. This should include the headers of the chosen columns. On the Excel ribbon, go to Data > Filter. A dropdown arrow will appear on the headers of the column you’ve selected. You can use the dropdown menu to filter the data by text or number depending on the conditions you set. Check out this video clip about filtering data on a spreadsheet. Mastering these features will significantly improve your Excel skills and your productivity. To find out more about Microsoft Excel, give our experts a call today. Published with permission from TechAdvisory.org. Source.