<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.gtconsult.com/blogs/tag/Tips/feed" rel="self" type="application/rss+xml"/><title>GTconsult - Blog #Tips</title><description>GTconsult - Blog #Tips</description><link>https://www.gtconsult.com/blogs/tag/Tips</link><lastBuildDate>Wed, 18 Feb 2026 07:35:50 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[To leave or not to leave.... what are the alternatives? ]]></title><link>https://www.gtconsult.com/blogs/post/to-leave-or-not-to-leave....-what-are-the-alternatives</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.comhttps://images.unsplash.com/photo-1522033601-8c44cd8cb261?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MXw0NTc5N3wwfDF8c2VhcmNofDV8fGVub3VnaHxlbnwwfHx8&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080"/>Whatsapp caused the first controversy of 2021. What would a fragmented messaging industry look like? are you prepared to chat to all of your current Whatsapp contacts across multiple platforms? What are your options come February 8?]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_dt5BF_VCSm-SRWf_gcbbew" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_hhbkLy5DSTOeMSLwSbfYfw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_h_2hNFsYRg2a3R5Vzafe5Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_fxXjK8IYS2aQN0CTzLrHzA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true">Whatsapp has caused the first controversy of 2021. What alternatives do you have come February 8?</h2></div>
<div data-element-id="elm_goW3nDIjRdCaaHokzTAXCw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;"><img src="https://images.unsplash.com/photo-1599382103240-5f2a57137d28?crop=entropy&cs=tinysrgb&fit=max&fm=jpg&ixid=MXw0NTc5N3wwfDF8c2VhcmNofDJ8fHdoYXRzYXBwfGVufDB8fHw&ixlib=rb-1.2.1&q=80&w=1080"><span><br></span></p><p style="text-align:left;"><span><br></span></p><p style="text-align:left;"><span>The dust has barely settled from the New Years celebrations and we are already into our first drama of 2021. Whatsapp has decided to update its privacy statement which apparently allows it to sell certain information to Facebook. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Predictably, this has left a sour taste in many peoples mouths with a significant number of Whatsapp users exiting stage left. The world is being run by data and we are very protective of our privacy. So, what are the alternatives to Whatsapp and are they any better? Let us unpack this debate. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Go back to the beginning</span></b></p><p style="text-align:left;"><span>To fully appreciate the issue, we need to start at the beginning. I read an interview on Moneyweb where Moneyweb journalist, Dudu Ramela, spoke to Arthur Goldstuck, CEO of World Wide Worx, to unpack the issue. The written transcript of the interview, as well as an audio version, <a href="https://www.moneyweb.co.za/moneyweb-radio/safm-market-update/updated-policy-results-in-mass-exodus-of-whatsapp-users/">can be found here</a>.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Ramela: What is it that one needs to know to make an informed decision about whether to stay or to go?</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Goldstuck: Thank you, Dudu. The first thing to know is that, if you do go, it means that you will not be able to keep in contact with most of your connections – family, friends, contacts – using WhatsApp as the main communication channel. If you use email primarily, if you use SMS or voice, or even Facebook Messenger for that matter, you will find that WhatsApp in South Africa is used by more than half the population. So, you have got to consider that before looking at all the other issues.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>There are two main issues that people are concerned about. The one is that people think this means Facebook would have access to the content of the chat – and that is not true. Facebook cannot access the content of any WhatsApp chat because it is encrypted. There are exceptions if you are involved in criminal activity, or [authorities] believe that you are a suspect or a person of interest in a terrorism case. Then they have the right to use various tools and techniques to access those messages. But besides those extreme circumstances, the contents of your messaging are completely secure.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The real issue here is that they are going to allow Facebook and WhatsApp to combine information about usage of the apps and your smartphone. So, if you use WhatsApp, for example, it automatically has access to your entire contacts list. And, in effect, that is what Facebook is telling you to share – from WhatsApp to Facebook – so they can target you more accurately based on how many people you are in touch with, what kinds of communication you have with those people, not what is in it. But the fact that you are involved in video communication, for example, could be used to target advertising at you.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>But, generally speaking, they can access your location data, the speed of your phone, or the battery level of your phone, to tell you are the kind of person who often lets your phone run down, for example, or who your real mobile operator is. All of that kind of information starts adding up to create a profile that allows their advertisers to target you more precisely.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Ramela: Is it just WhatsApp, or are there plenty of other applications that actually do this? Dies it really matter.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Goldstuck: If you consider the extent to which you have been giving permission to Google over the years, then you could say that it does not make a difference because, if you use an Android phone, really Google has access to all your phone information and your current behaviour – not the contents, but certainly the activity. And then if you combine that with Google Search, for example, and Gmail and Google Maps and YouTube, suddenly they have a vast picture of who you are, what you search for, and what you buy. That is where you have really given up your privacy. So, it is the same situation that applies now with Facebook and WhatsApp and Instagram, combining all the data on you so they start taking a big picture.&nbsp; So, to avoid that, you have got to go to a completely independent messaging app.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Ramela: Facebook has been hacked on a number of occasions. A lot of people are also worried about privacy in terms of security.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Goldstuck: Security of the contents of your messages tends not to be an issue. It is the security of your personal data that becomes an issue. Facebook has not plugged the hole that allowed hackers, for example, to send you a link pretending, for example, that it is a video that includes something about you, or something embarrassing about you. You click on that link and what you really do is give permission to access your account, and that then starts giving access to deeper levels of information about you. Ultimately, they are looking for bank-account information and the ability to access your financial data as well as the actual money.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Ramela: What are the alternatives?</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Goldstuck: Of two alternatives on the market at the moment the best known one is Telegram, which was started by Russian developers and in fact is not what you might call a pro-Russian app, because the Russian authorities banned it for two years because they refused to co-operate with them. That is perhaps the most widely used of the more secure apps. It does not share your information with any other application, so it does not allow any advertisers to build up a profile about you. You also have a desktop version of it, for example. So that is a little trick that WhatsApp introduced not too long ago.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The other big one is Signal. Signal was developed by, among others, the person who created WhatsApp, so he understands what it takes to create this kind of application, but also what the issues were. The reason that he left Facebook was because he disagreed with the direction of WhatsApp. And Signal is partly in response to that. So Signal is probably the most secure and the least likely to share your information or make your information available to any other application.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Ramela: Who is regulating all of these social media platforms in terms of making sure that users’ data is not abused, if you will.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Goldstuck: Here is the real problem. Regulators have been asleep at the wheel because it is technology and regulators tend to be the establishment’s real old-timers, even running governments around the world. They tend to have the courts behind the times in terms of the significance of these apps and also how widespread their use is. Only now, for example, are American antitrust authorities starting to look at the issue of whether Facebook should be allowed to integrate Instagram into its services. Because Instagram goes way back to 2011, at that stage the transaction was approved because the regulators had no idea of its significance.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The same with WhatsApp in 2014. So, Facebook is now arguing, hey, this is a moot issue because you already gave us approval back then. The difference is back then they had no idea of the extent to which so much information could be aggregated across all of these apps.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Ramela: Interesting. It has got a lot of people talking, and we will see what happens come February 8, whether people will leave or stay with WhatsApp.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Greener pastures?</span></b></p><p style="text-align:left;"><span>So where to from here? It does sound a bit dodgy that Facebook does not want to read your messages but wants to access our personal information such as contact lists and geolocations. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>So, what are the alternatives? There are two that seem to be very popular in South Africa, and one that may prove to be popular going forward. A <a href="https://indianexpress.com/article/technology/techook/whatsapp-alternatives-signal-telegram-viber-faq-and-features-7138298/">recent article by the Indian Express</a> discussed these in detail. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Signal</span></b></p><p style="text-align:left;"><span>The article points out that, currently, the best alternative to WhatsApp if one were to consider the security features and the fact that this is run by a non-profit firm.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Security Features. It has end-to-end encryption based on the Signal protocol, built by American cryptographer Moxie Marlinspike, who is also the CEO of Signal. It means no third-party or even Signal can read your messages. The Signal protocol is open source, which is another good thing. Signal does not support third-party backups either, which is actually a good thing. All data remains stored locally on the device, and if you do lose access to the device and try to set up Signal on another phone, your previous chat history is lost;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Cross-Platform. Yes, the private messaging app can be used across platforms from Android, iOS, iPad, Mac, Windows and Linux as well. Signal is quite easy to use. The app shows the name of the contacts that are on Signal, which makes it easy for you to connect;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Free or paid? Ads? Signal is totally free. The app is run by a non-profit. Former WhatsApp co-founder Brian Acton helped found the Signal foundation along with Marlinspike, and has also poured in $50 million to fund the app. It does not sell your data or monetise it and does not have advertisements;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Groups, video, and audio calls. Yes, it supports Group features with a maximum of 150 members. It has recently added Group video calls. The app also supports regular video and audio calls, which are also end-to-end encrypted;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Disappearing Messages. Yes, you can turn on disappearing messages for each chat, which is great. The time can be set by you ranging from five seconds to one week;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Screen Lock, Other features. Yes, there is a screen lock feature. You can also set a PIN to the Signal account to keep your account secure. There is also an incognito keyboard option, which basically does not allow your keyboard to save what you are typing. Other features include fingerprint lock, read Receipts, location sharing, relay calls, archive chats, and more. There is also a feature called Message Requests, which gives you the option to block, delete, or accept messages from an unknown person. Signal lets you react to any message with emojis. You also get the option to not allow a user to take chat screenshots. In order to add anyone in a group, the individual will be required to accept the group invitation, unlike WhatsApp. The storage management of the app is really good and quite similar to WhatsApp. You can clear messages, remove videos or images, and check different files in the storage management tool;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Data collected. The key priority of Signal is user privacy, which is why the app does not collect any user data, as per the privacy labels provided on the App Store. The app only stores your phone number or contact information.&nbsp; When it comes to data collection, this is one of the most minimal apps out there. You can learn more about the Signal app here.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>Telegram</span></b></p><p style="text-align:left;"><span>The Indian Express article adds that Telegram is another popular alternative Whatsapp and you will likely find a lot of your friends there. A user will not really find it difficult to switch to this app as it is simple to use and has most of the WhatsApp users. In fact, some of the Telegram features are not present in WhatsApp.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Security features. Telegram is encrypted, and it is open source, though in the past issues have been raised about its encryption. While normal chats are not end-to-end encrypted, as they are on Signal and WhatsApp, if you start a secret chat on Telegram, it is secured and does not get saved. You can also set a timer to destruct these secret chat messages. To protect the data that is not covered by end-to-end encryption, the company uses a distributed infrastructure. Regarding the issue over end-to-end encryption, Telegram CEO Pavel Durov wrote in a blog, “We rely on our own distributed cross-jurisdictional encrypted cloud storage which we believe is much more protected,” compared to say Apple or Google;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Cross-platform. Yes, it is a cross-platform app, which is available on Android, iOS, Mac, Windows. Given it relies on its own cloud backup, Telegram ensures that when you set up the app on a different device, the entire chat history is retained;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Free or paid? Ads? Telegram is free. It is an ad-free service for now. But Telegram recently announced its monetisation plans as the company says the project of this “size needs at least a few hundred million dollars per year to keep going.” The service also confirmed that the advertisement interface will be user-friendly, and it will respect user’s privacy, which means no data will be taken. As per Telegram, it will soon launch premium features for business or power users. The current features will remain free for all the Telegram users, but the new ones might fall in the premium plan. The company will also add ads in massive public channels. Note that one-on-one and private group chats will not have ads;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Groups, video, and audio calls. Telegram is really popular for groups and allows more than 200,000 users in a group. It also supports audio and video calls as well. Interestingly all video calls are end-to-end encrypted;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Disappearing Messages. Disappearing messages are part of the Secret Chat feature and you can set a timer for messages. The time range offered is one second to one week;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Screen Lock, Other Features. The best part about Telegram is it is a cloud service, which is why you do not need to worry about backing up chats to other servers to restore them on a new device. With Telegram, you can access your data from any of your devices as the data is synchronised across all your registered devices through cloud-based service. The good part about Telegram is you can send up to 1.5GB of files, create channels, add up to 2 lakh users in a group, forward files without downloading them, schedule messages, archive chats, and more. Telegram allows users to find anyone by username or phone number. Further users can edit messages as well. Telegram even displays the name of the original source from where you have forwarded a message and once you tap on it, you will be redirected to that group or channel. Telegram supports Picture-in-Picture mode, which means that you can video call while using other apps like Instagram. On Telegram, a group admin can set different permissions for every user. Telegram offers really cool and fun animated stickers, which you will not find on any other messaging app. In order to create an account, you just need to provide your mobile number and some basic information;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Data collected. The data collected by Telegram includes name, phone number, contacts, and user ID, according to the privacy label on the Apple App Store.</span></p><p style="text-align:left;"><br></p><p style="text-align:left;"><b><span>Viber</span></b></p><p style="text-align:left;"><span>Viber is the wild card in the South African market as it has not received massive amount of airtime in terms of an attractive alternative to Whatsapp. However, the Indian Express article points out that it may be more attractive than we think. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Security Features. This is yet another privacy messenger app, which supports end-to-end encryption. All types of messages, photos, videos, voice and video calls and group chats are encrypted. The company says that everyone will have to make sure that they are using the latest version of Viber to get maximum protection. Similar to WhatsApp, all your chats can be backed up to Google Drive, from where you can restore your chats. Viber says that once you upload your chats to Google, it will not be responsible for your data protection and privacy will depend on Google’s policy;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Cross-Platform. Yes, Viber can be used across platforms from Android, iOS, and Windows as well;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Free or paid? Ads? Like all the other apps, Viber is also free. However, you will witness a few ads in the popular messaging app. The company says, “Showing you these tailored and relevant offers help us keep the app free for you to use.” “Since we do not have access to your chats, neither advertising providers nor brands can access your chats. The content of your chats stays in your chats always and never will be used for showing your relevant ads,” Viber said in a blog post;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Groups, video, and audio calls. Yes, it supports Group features with up to 250 members. One can only add members by sending an invitation to a Viber user. This feature works similar to Signal. The app also supports regular video and audio calls that are also end-to-end encrypted;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Disappearing Messages. Similar to Telegram, you get a secret chat mode here too. You can set the timer, and screenshot/forwarding feature is disabled. The time can be set by you ranging from one second to one week;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>Screen Lock, Other features. The screen lock feature is available, but not for the mobile version. You can send stickers and GIFs, delete, or edit messages, share location, voice messages, and share files. You can create your own GIF, search, and send YouTube videos in the app itself and do a lot of other things. However, the privacy features that Signal offers are not present in both Telegram and Viber;</span></p><p style="text-align:left;"><span>-<span style="font-size:7pt;">&nbsp; </span>What data does Viber collect? Viber collects location and device ID identifiers. It also collects device ID identifiers. It collects phone numbers, user ID, product interaction, purchase history, other contact information such as email ID, name, and contacts.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>In the end, privacy matters</span></b></p><p style="text-align:left;"><span>Privacy does matter. We want to be able to use these social media platforms confident that we can do so without any concerns about where Big Brother is watching. Privacy does matter. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>There are a few interesting questions that need to be asked at this juncture. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The first is, can we live without Facebook and other social media platforms in the modern age? While there are a lot of people in the world without a social media presence at all, there is a reason why Facebook has so many users. If Facebook were a country, it would be the third most populous country in the world. Facebook is mostly used to communicate with people in far flung corners of the world, to provide people with a platform to publicise their lives (vomit), and for people to consume news. It is also increasingly being used for people to do business and to connect with small businesses. If this is the case, why does Facebook have such an obsession with a free user model. Let us answer this. Facebooks current user base is 2,7 billion users. If Facebook charged its users $0.50 a year, it would generate an annual income of close to $1,3 billion. This is significantly less than what it made from advertising revenue in 2019, which was $69 billion. To get close to the last benchmark, Facebook would either have to reach 7 billion users, which is impossible considering that the world population is 8 billion (as of 2020), or it would have to charge its 2,7 billion users about $25/year. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Therefore, the advertising model is significantly more profitable. So how long will Facebook get away with this. In order to get more advertising revenue, advertising needs to be more relevant. In order for it to be more relevant, it needs to be targeted. In order for it to be targeted, it needs data. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>Facebook could just ask people about what their expectations are when it comes to advertising. But would they get a genuine answer? No. They only way to guarantee proper data is to use the methods discussed earlier in the blog. So, when will Facebook finally stop this? When the US will finally catches up with the rest of the world and entrenches the right of privacy as a Constitutional Right thereby forcing Facebook to take data privacy seriously. The UK led this with the GDPR, and many countries followed in its wake. By entrenching this right into the constitution, you are guaranteeing that companies cannot take advantage of the public’s right to privacy and it is punishable by law. Companies who do not comply with the GDPR face massive fines and a restraint of trade that is debilitating. A <a href="https://www.theverge.com/2020/12/15/22176008/twitter-gdpr-fine-protected-tweets-ireland-data-protection-commission">recent report</a> showed that Ireland’s Data Protection Commission (DPC) has fined Twitter €450 000 (around $546 000) over a data breach it disclosed back in January 2019, the regulator announced today. The security flaw exposed some supposedly private tweets from the service’s Android users for over four years. Twitter was found to have violated the EU’s General Data Protection Regulation (GDPR) because it failed to notify the regulator within 72 hours of discovering the breach, The Wall Street Journal reports.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The fine is notable because it is the first time a US tech giant has been hit with a GDPR fine in a cross-border case, meaning one in which the Irish regulator consulted its EU counterparts as part of the decision. The investigation was headed by Ireland’s DPC because Ireland is where Twitter’s international headquarters are based.</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>The major problem</span></b></p><p style="text-align:left;"><span>There are a few problems which sees Facebook, and Whatsapp, sitting in the pound seats. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The first is that Whatsapp are technically not doing anything wrong. Whatsapp is owned by Facebook and until the US has privacy laws which governs what companies can do with private data, companies will do what they like because they are not breaking any laws. Further, Whatsapp is telling you that this is happening and that you have to agree to these new updates (opt in), failure to do so will see you deleted from Whatsapp (forcibly opted out). This is taking compliance to a new level. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>The second problem is that almost half of the world’s population uses Whatsapp. Teleporting all of your contacts to a single platform is going to be a mission. The strength of Whatsapp – and they know this – is that the public has proven that Whatsapp is the best messaging software in the market, and until another platform can make same claim, the userbase will be fragmented in terms of multiplatform as opposed to the current single platform we see now. People also do not like having to communicate with half of their contacts on platform and half on another, so we will probably see a lot of people accepting the new terms come February 8. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><b><span>What is the fuss about? </span></b></p><p style="text-align:left;"><span>What is Facebook going to try and do with this information? Sell you stuff? Put more adverts on your timeline for stuff that you never told Facebook you were looking for? I have been doing some research for my wife on my birthday present for this year and guess what, Facebook placed adverts for those items on my timeline. So, Facebook does not need Whatsapp to spy on people. People would also like to think that their data is not being used in advertising. The spoiler alert here is that Facebook and Google are using your data for targeted ads. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>People are also waiting in anticipation for smart devices that help you live your life. Run out of milk, your fridge will send you a message about this and will inform you about all of the specials that grocery stores are having regarding milk. Will these devices not be using your data for targeted advertising purposes? Will it be ok for these advertisements to be targeted but others not? MMMMM…</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span style="color:inherit;"></span></p><p style="text-align:left;"><span>Data is running the world. It is what is making technology smarter, more convenient and life changing. Yes, companies will be chomping at the bit to get hold of this kind of data, and that may not be a bad thing. Would you rather see 100 worthless advertisements on your Facebook timeline of items that you do not actually want, or would you rather see 10 advertisements about things that you want and will make a difference in your life? And if you have such an issue with how Facebook uses your data, delete Facebook. Whatsapp is just doing what its owner is telling it to do.&nbsp;</span></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 12 Jan 2021 11:11:23 +0000</pubDate></item><item><title><![CDATA[Is cyber security still just a fad?]]></title><link>https://www.gtconsult.com/blogs/post/Is-cyber-security-still-just-a-fad</link><description><![CDATA[g&nbsp; This is the last week of Cyber Security Awareness Month, and hopefully you have navigated it with any incident. &nbsp; Risk management plays an i ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_2L32EXdTQgKydpDzmAbWXQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_yHK4fP1qQByOjroTd4VAOg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_ZUzXvOZmTbu3Zx-ua0bNag" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_yhBEDDFMRVGUm-3UIJM1yA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true"></h2></div>
<div data-element-id="elm_2VXzld2qSxOhHxpeUScgSQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;"><img src="https://images.unsplash.com/photo-1586772002345-339f8042a777?ixlib=rb-1.2.1&q=80&fm=jpg&crop=entropy&cs=tinysrgb&w=1080&fit=max&ixid=eyJhcHBfaWQiOjQ1Nzk3fQ">g&nbsp;</p><p style="text-align:left;">This is the last week of Cyber Security Awareness Month, and hopefully you have navigated it with any incident.<br></p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Risk management plays an important role in the financial services industry. Insurers and credit providers take a serious look at risk and invest a lot of time and capital in developing models that will address the identified risk. It gives them an idea of where they are and where they need to be. Its true benefit can be seen in achieving identified deliverables. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Risk management also plays a significant role in the technology industry. However, because of the nature of the evolution of this risk, models need to be fluid and have to be extremely adaptable.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Serious complexity </b></p><p style="text-align:left;">Let’s revisit the financial services industry for a second. The reason why risk management plays an important role in this industry is that it is an effective way to address risk. This is only true because the risks that the industry faces haven’t changed much over the past ten years. The reason why risk management in the technology space becomes a challenge is because cyber security is <a href="https://www.forbes.com/sites/elenakvochko/2020/10/25/why-cyber-security-is-still-so-complex/#4bffb47ef974">seriously complex</a>. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article points out that consumers, businesses, and entire systems all over the world are under threat on a daily basis. Valuable personal and financial information is exposed and ready for the taking. Simple tasks like using a credit card, a phone, or a computer provide an opportunity to take our money, our identities, and your ways of life. Data breaches are capable of rendering large, powerful companies vulnerable.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">As the world evolved and became more technological, attacks evolved along with the new developments. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>A new window to climb through</b></p><p style="text-align:left;">The article points out that when humans learned to domesticate animals and grow food, larger settlements were established and societies started to flourish in multiple locations across the world. </p><p style="text-align:left;">Sedentary societies then placed value not only in food and clothing, but in things such as cattle, crops, land, houses, and machinery. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Commerce was created, value was placed on a new concept - money. Goods were then exchanged for precious metals such as gold, silver, and bronze in the form of coins and paper money years later. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article adds that the value of money prompted societies to create impenetrable fortresses and sophisticated vaults to keep valuables away from the hands of criminals.&nbsp; As societies became more complex, both crime and remediation efforts evolved along with them. Before the rise of computers, trespasses were much easier to prevent. All we had to do was keep a door locked. The internet has given a new window to climb through for digital assets.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">This tells us that security has also evolved alongside attacks to give rise to holistic security. Today, digital assets have the highest value. Our neighbourhood is now the entire globe. In response to this new type of cyber criminal, organizations have developed an equally evolved security system. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Be prepared!</b></p><p style="text-align:left;">The article points out that, because of our daily interaction with connected devices, computers, smartphones, and tablets, it’s important that everyone - from the CEO and software developers to suppliers and employees - to be aware. Everyone can play an important part in keeping information safe. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article adds that ransomware has become a headache for businesses and individuals alike. This type of attack can hold data hostage via encryption, which is the process of converting data into unreadable code to prevent access, until the victim pays a large amount of money to get the description keys. Organizations can fall victim to ransomware through drive-by downloads and phishing emails. Millions of people around the world reported encounters with ransomware.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">While attackers are finding new, innovative ways to threaten the security of an organization, holistic and complete security will give enterprises a chance to fight against any attack and protect their data.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article points out that everyone in the company should have the following questions in mind:</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;text-indent:0in;">-<span style="font-size:7pt;">&nbsp; </span>CEOs; how secure is your company? What risks are you exposed to?</p><p style="text-align:left;text-indent:0in;">-<span style="font-size:7pt;">&nbsp; </span>Technical Teams; how can you make data easy and accessible to your team without compromising security?</p><p style="text-align:left;text-indent:0in;">-<span style="font-size:7pt;">&nbsp; </span>Product Owners; at what stage do you integrate security? And </p><p style="text-align:left;text-indent:0in;">-<span style="font-size:7pt;">&nbsp; </span>Employees; what is your role in cybersecurity? What can you do to protect your company’s data?</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article pointed out that it is important for cybersecurity to be a company-wide approach - a combination of people, processes and tools. Organizations should develop security operation centres, which are intelligence-led and are focused on creating high-level defence, cyber hygiene, education, and awareness.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The goal? To stress-test your systems, identify, contain and remediate the negative impact fast.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Cyber literacy</b></p><p style="text-align:left;">When my parents were at school, my mom had to do typing lessons as a school subject. It was the same for me when I was at school where a module of Computer Literacy Classes focused on typing. Spoiler alert, I still type with a single finger on each hand looking at the keyboard the whole time. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">We digress. There is a significant push for subject matter such as coding and cyber security to be included in computer literacy classes in classrooms around the world. Cyber risk literacy should be <a href="https://www.helpnetsecurity.com/2020/10/27/cyber-risk-literacy/">part of every defensive strategy</a>.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article points out that while almost 95% of cybersecurity issues can be traced back to human error, such as accidentally clicking on a malicious link, most governments have not invested enough to educate their citizens about the risks, according to a report from the Oliver Wyman Forum.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Cyber risk literacy of the population</b></p><p style="text-align:left;">The article adds that cyber literacy, along with financial literacy, is a new 21<sup>st </sup>century priority for governments, educational institutions, and businesses.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“Cyberattacks are now one of the fastest growing crimes globally and are expected to cost organizations more than $600 billion dollars a year by 2021,” Paul Mee of the Oliver Wyman Forum told helpnetsecurity.com.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“The situation has become even more pressing during the pandemic as our reliance on the internet has grown. Yet many citizens still lack the basic skills to keep themselves, their communities, and their employers safe.”</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Fifty geographies were assessed, including the European Union, on the present cyber risk literacy of its population, and the nature of related education and training available to promote and enable future cyber risk literacy.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article points out that the index measures five key drivers of cyber risk literacy and education: the public’s motivation to practice good cybersecurity hygiene; government policies to improve cyber literacy; how well cyber risks are addressed by education systems; how well businesses are raising their employees cyber skills, and the degree to which digital access and skills are shared broadly within the population.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>How are assessed countries doing?</b></p><p style="text-align:left;">The article added that Switzerland, Singapore and the UK topped the list because of their strong government policies, education systems and training, practical follow through and metrics as well as population motivation to reduce risk.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Switzerland, the number one ranked country, has a comprehensive implementation document that lays out specific responsibilities along with what national or provincial legislation is required. Specific milestones are set, and timelines are assigned to ensure accountability regardless of who oversees the government.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Singapore, which is ranked second, has prioritized cybersecurity education efforts from early childhood to retirees. It established the Cyber Security Agency of Singapore to keep its cyberspace safe and secure. Its cyber wellness courses occur over multiple grades and focus on social and practical safety tips such as understanding cyber bullying.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article pointed out that The UK ranked third, has the most integrated cyber system because it incorporates cyber risk into both primary and secondary education. The UK’s National Cyber Security Strategy of 2016-2021 is also one of the strongest plans globally. The US ranked 10th.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Countries that rank lower lack an overall national strategy and fail to emphasize cyber risk in schools. Some countries in emerging markets are only beginning to identify cybersecurity as a national concern.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“Governments that want to improve the cyber risk literacy of their citizens can use the index to strengthen their strategy by way of adopting new mindsets, trainings, messaging, accessibility and best practices,” Mee told helpnetsecurity.com. “With most children using the internet by the age of four, it is never too early to start teaching your citizens to protect themselves.”</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Problematic issues</b></p><p style="text-align:left;">Another article by helpnetsecurity.com pointed out that cybersecurity <a href="https://www.helpnetsecurity.com/2020/10/23/cybersecurity-is-failing-due-to-ineffective-technology/">is failing due to ineffective technology</a>.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">A failing cybersecurity market is contributing to ineffective performance of cybersecurity technology, a Debate Security research reveals.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article pointed out that, based on over 100 comprehensive interviews with business and cybersecurity leaders from large enterprises, together with vendors, assessment organizations, government agencies, industry associations and regulators, the research shines a light on why technology vendors are not incentivized to deliver products that are more effective at reducing cyber risk.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The report supports the view that efficacy problems in the cybersecurity market are primarily due to economic issues, not technological ones. The research addresses three key themes and ultimately arrives at a consensus for how to approach a new model.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Cybersecurity technology is not as effective as it should be</b></p><p style="text-align:left;">The article pointed out that 90% of participants reported that cybersecurity technology is not as effective as it should be when it comes to protecting organizations from cyber risk. Trust in technology to deliver on its promises is low, and yet when asked how organizations evaluate cybersecurity technology efficacy and performance, there was not a single common definition.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Pressure has been placed on improving people and process related issues, but ineffective technology has become accepted as normal – and shamefully – inevitable.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>The underlying problem is one of economics, not technology</b></p><p style="text-align:left;">The article added that 92% of participants reported that there is a breakdown in the market relationship between buyers and vendors, with many seeing deep-seated information asymmetries.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Outside government, few buyers today use detailed, independent cybersecurity efficacy assessment as part of their cybersecurity procurement process, and not even the largest organizations reported having the resources to conduct all the assessments themselves.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">As a result, vendors are incentivized to focus on other product features, and on marketing, deprioritizing cybersecurity technology efficacy – one of several classic signs of a “market for lemons”.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Coordinated action between stakeholders only achieved through regulation</b></p><p style="text-align:left;">The article pointed out that, unless buyers demand greater efficacy, regulation may be the only way to address the issue. Overcoming first-mover disadvantages will be critical to fixing the broken cybersecurity technology market.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Many research participants believe that coordinated action between all stakeholders can only be achieved through regulation – though some hold out hope that coordination could be achieved through sectoral associations.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">The article added that, in either case, 70% of respondents feel that independent, transparent assessment of technology would help solve the market breakdown. Setting standards on technology assessment rather than on technology itself could prevent stifling innovation.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Defining cybersecurity technology efficacy</b></p><p style="text-align:left;">The article pointed out that participants in this research broadly agree that four characteristics are required to comprehensively define cybersecurity technology efficacy.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">To be effective, cybersecurity solutions need to have the capability to deliver the stated security mission (be fit-for-purpose), have the practicality that enterprises need to implement, integrate, operate and maintain them (be fit-for-use), have the quality in design and build to avoid vulnerabilities and negative impact, and the provenance in the vendor company, its people and supply chain such that these do not introduce additional security risk.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“In cybersecurity right now, trust doesn’t always sell, and good security doesn’t always sell and isn’t always easy to buy. That’s a real problem,” Ciaran Martin, Advisory Board Member at Garrison Technology told helpnetsecurity.com.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“Why we’re in this position is a bit of a mystery. This report helps us understand it. Fixing the problem is harder. But our species has fixed harder problems and we badly need the debate this report calls for, and industry-led action to follow it up.”</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“Company boards are well aware that cybersecurity poses potentially existential risk, but are generally not well equipped to provide oversight on matters of technical detail,” John Cryan, Chairman Man Group told helpnetsecurity.com.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“Boards are much better equipped when it comes to the issues of incentives and market dynamics revealed by this research. Even if government regulation proves inevitable, I would encourage business leaders to consider these findings and to determine how, as buyers, corporates can best ensure that cybersecurity solutions offered by the market are fit for purpose.”</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“As a technologist and developer of cybersecurity products, I really feel for cybersecurity professionals who are faced with significant challenges when trying to select effective technologies,” said Henry Harrison, CSO of Garrison Technology told helpnetsecurity.com.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">“We see two noticeable differences when selling to our two classes of prospects. For security-sensitive government customers, technology efficacy assessment is central to buying behaviour – but we rarely see anything similar when dealing with even the most security-sensitive commercial customers. We take from this study that in many cases this has less to do with differing risk appetites and more to do with structural market issues.”</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Be cyber smart</b></p><p style="text-align:left;">Cyber security is advancing at a rapid rate. Companies are no longer able to keep a constant eye on their employees and offer the protection that they need. a measure of this responsibility rests on the shoulders of <a href="https://www.dqindia.com/5-cybersecurity-tips-secure-data-become-cybersmart/">those below board level</a>. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Use a strong password</b></p><p style="text-align:left;">The article points out that having to manage a large number of applications and software, the easiest option for most users would be to pick a password that is easy to remember, and then apply it across the board. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">While this might be a convenient option, it is definitely not the safest. Cybercriminals these days use tools that sniff out passwords reused on other sites to make their work easier and to make the stolen passwords and data more lucrative on the dark web. Hence, it is recommended that you choose strong passwords, using different alpha-numerical combinations, as well as change them periodically.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Opt for two factor authentication</b></p><p style="text-align:left;">The article adds that the rule of thumb should be when creating any digital account, always set up two-factor authentication (2FA). </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">It’s a common practice to login to accounts using multiple devices, most often of colleagues, or people we trust. Just trusting the person is never enough. It is their machines that you must trust. In case, you have logged into a network on a PC with malware, you are essentially letting cybercriminals access your data. In such cases, having 2FA, helps to prevent egregious attacks where a cybercriminal tries to login to your account and steal your data.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Safeguard your entry points</b></p><p style="text-align:left;">The article points out that all it takes is one weak entry point, to allow a cybercriminal access to your entire network. </p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">By forgetting to close down the access points that are not being used, this can be an open door for hackers to enter, and place malware on to your network.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Lookout for signs of a scam</b></p><p style="text-align:left;">The article points out that phishing attacks have become increasingly common these days, and are using several tactics to target vulnerable users. At the same time, there are often several tell-tale signs of a scam in the making, which you can easily spot, if you keep a sharp lookout for them. For example, emails with improper grammar, and spelling mistakes are one of the biggest giveaways. Additionally, links that promise freebies and then request you to enter card details too are illegitimate.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><b>Frequently update your system</b></p><p style="text-align:left;">The article adds that inexpensive home internet devices are prime targets for hackers. A best practice is to update these frequently, and apply all security patches quickly. In the case of older devices, which no longer receive firmware updates, they should be immediately switched out for newer models, to prevent hackers from controlling traffic through routers, and implementing various attacks.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">Cybercrime is advancing at a rate which we can no longer afford to take lightly, or ignore. No organization or user today can be considered too small to be a potential victim, hence there is a strong need to create awareness on phishing or targeted attacks. Furthermore, the increased dependence on technology to stay connected, and ensure business continuity, has opened the floodgates to a whole new set of potential cybersecurity vulnerabilities that users must be conscious of. By practising these simple tips and maintaining good IT hygiene, we can be cybersmart, and safe on the internet.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;">There are other helpful, yet simple, <a href="https://whnt.com/news/online-safety-tips-for-national-cyber-security-awareness-month/">tips to follow</a>: </p><p style="text-align:left;">- increase your online privacy. Protect your online accounts by implementing multifactor authentication and using strong passwords, which consist of letters, numbers and special characters. Individuals should also refrain from accessing banking information or making online purchases when connected to an unsecured public network;</p><p style="text-align:left;">- stay secure while you work. As more employees work virtually during the COVID-19 crisis, they should be more vigilant about internet scams and online fraud. Business and personal information should be treated with the same care; avoid sharing it with unfamiliar parties or over unsecured networks. It is important to keep the security software on your business devices up to date, because only one employee needs to be compromised for an entire organization to experience a data breach;</p><p style="text-align:left;">- use social media responsibly. Social media is a great way to connect with friends and family, but it can also allow scammers and cybercriminals to target you. Only accept friend requests from people you trust, avoid clicking links in messages from strangers, and refrain from posting your personal information online. Remember to be careful about what you share. Remember, there is no “delete” button online.</p><p style="text-align:left;">&nbsp;</p><p style="text-align:left;"><span style="color:inherit;"><span style="font-size:11pt;">“The responsibility to fight cyber crime is upon all of us. We cannot stand back and say that it should be an issue that needs to be tackled at board level. We are all exposed and we can all take a stand against this. Simple interventions, and being aware, can definitely go a long way to address this. Are you going to play an active role?” asks Craig Tarr, CEO of GTconsult.&nbsp;</span></span><br></p></div>
</div><div data-element-id="elm_0nA7lU8VRRKuqFetk31NYQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 27 Oct 2020 08:38:59 +0000</pubDate></item><item><title><![CDATA[Use PowerPoint Embedding to Streamline Status Reporting]]></title><link>https://www.gtconsult.com/blogs/post/streamline-status-reporting</link><description><![CDATA[PowerPoint is simply awesome! We are often caught singing the “I &lt;3 PPT” song within the GT team so we are always looking for fun, new ways to put ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_FfN92lF_TrijreM_lue_1w" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_0bt2rf8LTwmfdJqWcAWTVg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_YhdtxOabQgawSE4mexzoHA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_j9j0BoPETK6z2GxtbLgyRg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div><p>PowerPoint is simply awesome! We are often caught singing the “I &lt;3 PPT” song within the GT team so we are always looking for fun, new ways to put PowerPoint to work.&nbsp;This very simple trick for both SharePoint 2013 and Office 365 will up your game on delivering project status updates and enhance the experience on your project sites.</p><p>Ensure your project team members view your most up to date status by embedding a dynamic presentation into your p<img src="/wp-content/uploads/2020/06/EmbedPPT.gif" alt="EmbedPPT">](/wp-content/uploads/2020/06/EmbedPPT.gif)</p><p><span style="font-weight:bold;">Storing the Files</span><br> Upload the status report file as you normally would to any document library in the site. Ensure the people accessing the home page have access to view the file in the location you select.<br> Once the file is uploaded, click the file name to open in the PowerPoint web viewer.</p><p><span style="font-weight:bold;">Generate Embed Code</span><br> When the file is uploaded, do one of the following to generate the embed code.<br><em>SP2013 On-premise</em></p><ul><li>Click the FILE tab in the top left corner of the screen, click on Share, then select Embed.</li><li>On the resulting menu, select the size you would like the presentation to render</li><li>Click in the embed code box and select all of the code, copy (CTRL+C) the code.</li></ul><p><img src="/wp-content/uploads/2020/06/EmbedPPT2013.gif" alt="EmbedPPT2013"><br><em>SP Online / Office 365</em></p><ul><li>Click the elipses (“…”) at the top right corner of the screen, then select Embed.</li><li>On the resulting menu, select the size you would like the presentation to render</li><li>Click in the embed code box and select all of the code, copy (CTRL+C) the code.</li></ul><p><img src="/wp-content/uploads/2020/06/EmbedPPTo365.gif" alt="EmbedPPTo365"></p><p><span style="font-weight:bold;">Place on Your Page</span><br> Once your embed code has been copied, navigate back to your home page.</p><p>Edit the page by selecting the Page tab at the top of the screen and choosing Edit Page.</p><p>Insert a Content Editor or Script Editor web part through the Insert –&gt; Web Part option in the ribbon.<br> Note: the web parts are both located in the “Media and Content” folder in the App Part categories listing.</p><p>With the editor web part now inserted into your page, open the script editor by either clicking the “Edit Source” button on the ribbon or using the link in the web part that says “Click here to add content.”</p><p>Paste the code you copied from the embed option of your presentation into the script editor window. Click OK.</p><p><img src="/wp-content/uploads/2020/06/EmbedPPTCEWP.gif" alt="EmbedPPTCEWP"></p><p><span style="font-weight:bold;">WIN!</span><br> Just like that you now have a fully interactive status report embedded in your project home page. Your team members have several options to walk through the entire presentation, download or open the file straight from the web viewer you just placed at their fingertips. FANTASTIC!</p><p><em><strong>Added Bonus:</strong></em><br> If you update your status reports on a regular basis, you can either create a single master presentation&nbsp;that you overwrite with&nbsp;updates each reporting period,<br> OR<br> You can create a fresh report each period and simply update the embed code on your main page to seamlessly point to the newest file.</p><p>======</p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 19 Nov 2015 14:55:18 +0000</pubDate></item><item><title><![CDATA[Project Management Excellence: Documentation]]></title><link>https://www.gtconsult.com/blogs/post/project-management-excellence-doc</link><description><![CDATA[Documents, documents everywhere! We have all experienced document overload at one point or another, either through giant email attachments, clicking s ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_kcg63VrqSquPUMGw7gUWxQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_LB-T3Z75SKSPQFAO4Ziz7Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_1h6x_4_uRxKymSmj1lAPUw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_3EEI-nvrRUGPG9vDDvlRUw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_3EEI-nvrRUGPG9vDDvlRUw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p>Documents, documents everywhere! We have all experienced document overload at one point or another, either through giant email attachments, clicking six levels of folders to find the right version of the project plan or heaven forbid a pile of papers on your desk. During the thick of project activity these can become a daily frustration. In today’s final post in the series, we will explore the use of OneNote to alleviate some of the document overload woes.</p><p><strong>Series Introduction</strong></p><p>In today’s diverse, fast-paced corporate environment we are often pushed to deliver quality projects with less time and budget than ever before. Fortunately for us, technology is giving us new ways to think about how we work together in order to keep up with demand.</p><p>Whether you are a seasoned project management expert or have just been handed your first ever project, there are tools at your fingertips to help you to successful execution. By making the most out of your company’s investment in SharePoint, you can capitalize on the platform’s ability to foster collaboration and communication.</p><p><strong>Documentation</strong><br> Great documentation makes great projects. Status reports, schedules, meeting minutes, action items, budget reports, technical specifications, training materials, the list goes on and on. Managing project documents is a job in and of itself. Because of the sheer volume and breadth of documents distributed during&nbsp;a project, establishing a mechanism for maintaining order in the chaos is always needed.</p><p><em>► Scenario<img src="/wp-content/uploads/2020/06/Fotolia_69652880_Subscription_Monthly_M-1024x683.jpg" alt=""></em></p><ul><li>In your last project you designated a SharePoint site as the repository for all project documentation but even still, your team members had a hard time finding the right documents due to buried folders and poor file naming habits. This time around, you want to try something new right off the bat to minimize the number of documents retained at the end of the project.*</li></ul><p><em>► The SharePoint Solution</em></p><ul><li>In addition to your critical artifact libraries on your site, make use of the OneNote Notebook for day-to-day project documentation and communications. Structure your notebook to include sections for meeting notes, technical specs, links to system locations or even handoff to offshore teams. The highly interactive nature of OneNote allows for great collaboration and information sharing. Once a team member opens the notebook from your project site, it will remain as a link in their own OneNote application for quick reference and access, allowing them to quickly and easily find information.*</li></ul><p>OneNote is the secret weapon on SharePoint sites and is invaluable to project management. Establishing a practice for standardizing the use of OneNote on project sites provides your team with quick, easy access to artifacts that generally get buried in email or document files. Some of the superstars in OneNote integration are the ability to add direct notes to Outlook meeting invites and distribute to all attendees, the ability to create and mark Outlook tasks and quick tagging (try hitting CTRL+1 on your action items). Through the use of tags you can quickly pull action items from the body of meeting minutes or get a condensed version of your content. Get creative with your use of the application and you can make a huge impact on the way your teams interact.</p><p><em>Behind the Curtain Tidbit: Here at GTconsult, we ALWAYS use OneNote to coordinate activities and help bridge the gap between the day and night shifts on our projects.</em></p><p><br></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 17 Nov 2015 10:12:21 +0000</pubDate></item><item><title><![CDATA[Project Management Excellence: Reporting]]></title><link>https://www.gtconsult.com/blogs/post/project-management-reporting</link><description><![CDATA[Ahh reporting! We all know how important it is and we all waste time trying to get that PowerPoint slide aligned properly or trying to get all the lin ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_uFH97DI-QGqykC3p4Mg2pw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_L8469ChHSWeX2oOezCHlCg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_ojVgcmQlR56QnWHQ0vzMIA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_vvv4Czp8RAGjhBHglA9wjw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div><p>Ahh reporting! We all know how important it is and we all waste time trying to get that PowerPoint slide aligned properly or trying to get all the lines of data to fit on one screen. Let’s take a look at how we might&nbsp;centralize data&nbsp;into a simple dashboard.</p><p><strong>Series Introduction</strong></p><p>In today’s diverse, fast-paced corporate environment we are often pushed to deliver quality projects with less time and budget than ever before. Fortunately for us, technology is giving us new ways to think about how we work together in order to keep up with demand.</p><p>Whether you are a seasoned project management expert or have just been handed your first ever project, there are tools at your fingertips to help you to successful execution. By making the most out of your company’s investment in SharePoint, you can capitalize on the platform’s ability to foster collaboration and communication.</p><p><strong>Reporting</strong><br> Crucial to the success of any project is reporting. Status reporting, issue reporting, budget updates, escalations, you name it. All of them matter and having a lag in reporting can severely impact the delivery of a successful project. However, it is easy to get lost in all the items that need to be reporting. Over sharing can cause data fatigue but sharing too little can result in items not being completed or roadblocks becoming disasters. In order to aid with the communication of critical items, grant visibility to project progress and provide access to information about project financials the use of a dashboard to centraliz<img src="/wp-content/uploads/2020/06/Fotolia_41104182_Subscription_Monthly_M-1024x682.jpg" alt="Alarm clock insomnia">on_Monthly_M-1024x682.jpg)](/content/images/2015/11/Fotolia_41104182_Subscription_Monthly_M.jpg)</p><p><em>► Scenario</em></p><ul><li>As a project manager you find yourself spending a significant portion of your time simply preparing status reports to send to the various key players for your project. You are thinking it may be time to start looking for a better way to deliver updates.*</li></ul><p><em>► The SharePoint Solution</em></p><ul><li>Create a list to serve as a repository for your status reports. Customize the form through InfoPath (accessed in the list ribbon) to configure the fields and design you need. Once your form is complete, provide a link to the list for your team members to submit status on a regular basis. When you are ready to publish a report, click the Export to Excel button from the list. Build your dashboard in the resulting file in order to maintain the data connection without any complicated configuration. In Excel, through the use of graphs and charts paired with pivot tables and slicers, you can build a very dynamic dashboard straight from your new status list’s data. Save the Excel workbook to a library on your site and your team will now have access to a live dashboard.*</li></ul><p>Through the use of a SharePoint list, InfoPath form and Excel workbook you can provide a dynamic dashboard in order to centralize not only the access to status reports but also the collection of status updates from your team. When a data connection is established between an Excel workbook and a SharePoint list, you have a vehicle to grab fresh data from your list at any time. You can even configure the workbook to refresh automatically. The use of SharePoint and Excel together makes for a very easy way to create centralized reports a very polished look and feel for relatively little effort. Excel Services or the Excel web viewer web part can further enhance delivery of Excel workbooks as dynamic web dashboards by placing your dashboard into the body of your SharePoint page.</p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 13 Nov 2015 11:37:03 +0000</pubDate></item><item><title><![CDATA[Project Management Excellence: Team Involvement]]></title><link>https://www.gtconsult.com/blogs/post/project-management-team-involvement</link><description><![CDATA[Today’s post takes a look at how the community site template can help bring your team together and encourage continued interaction. Series Introduction ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_7Nh460OySu-GLN5SqyXj-A" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Ze5ICdSgSem9F_jrydqw1A" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_tYCxIpKvQhG2_j0dTfQ4Kg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_5LIUI1tHS4axBF7j2cZoIQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div><p>Today’s post takes a look at how the community site template can help bring your team together and encourage continued interaction.</p><p><strong>Series Introduction</strong></p><p>In today’s diverse, fast-paced corporate environment we are often pushed to deliver quality projects with less time and budget than ever before. Fortunately for us, technology is giving us new ways to think about how we work together in order to keep up with demand.</p><p>Whether you are a seasoned project management expert or have just been handed your first ever project, there are tools at your fingertips to help you to successful execution. By making the most out of your company’s investment in SharePoint, you can capitalize on the platform’s ability to foster collaboration and communication.</p><p><strong>Driving Team Involvement</strong><br> Having a dedicated and involved team can increase your productivity. Keeping teams engaged and away from operating in a silo is always beneficial to project success. Everyone from the developer to the executive sponsor need to be operating under the same assumptions and with the same target in mind. Visibility and awareness play a key part in making sure your team is working together to deliver o<img src="/wp-content/uploads/2020/06/Fotolia_70823192_XS.jpg" alt="">](/wp-content/uploads/2020/06/Fotolia_70823192_XS.jpg)</p><p></p><p><em>► Scenario</em></p><ul><li>You have noticed that team members are only engaging during required status reporting meetings and management is beginning to question your team’s dedication to task completion despite the fact that the project is progressing as planned.*</li></ul><p><em>► The SharePoint Solution</em></p><ul><li>Establish SharePoint as the communication hub for your project. Create a project site where all documents, plans and status reports are to be housed. In addition to the standard document storage, create a community site where your team will interact with each other to solve problems and collaborate in real time. Make use of the category functionality to provide a quick and easy way for team members to find the conversations they need. Lead by example and encourage the use of the medium by posting your own communications and @ replying those from whom you request input.*</li></ul><p></p><p>The community site template in SharePoint 2013 has social collaboration features that greatly improve upon the 2010 discussion boards. With a much more user friendly interface, built-in category filtering and fantastic notification capabilities the practical application of conversational communication is now a reality. With the ability to like, follow and @ reply, users are typically familiar with the operation and where they are not, the learning curve is manageable. While still remaining under used, the capabilities of this site template range from true social interaction to quick turn process and decision making. As with anything “social” there may be a resistance to immediate adoption but leading by example and showing your users how to benefit from rapid communication tools can lead to a greatly beneficial new medium for communication and transparency.</p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 12 Nov 2015 08:08:05 +0000</pubDate></item><item><title><![CDATA[Project Management Excellence: Project Plan]]></title><link>https://www.gtconsult.com/blogs/post/project-management-project-plan</link><description><![CDATA[Continuing with this series exploring key factors to project success and how SharePoint can enable increased effectiveness, we take a look into how yo ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_0o5CcVbmTle2l3107jTSkA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_XRLBttMEQKO20SijDiB6ew" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_8YHhVMscQcWZ1poyGE53GA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_6pG7Z47XToapasgtqDqrCQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6pG7Z47XToapasgtqDqrCQ"].zpelem-text { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_6pG7Z47XToapasgtqDqrCQ"].zpelem-text { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_6pG7Z47XToapasgtqDqrCQ"].zpelem-text { border-radius:1px; } } </style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;">Continuing with this series exploring key factors to project success and how SharePoint can enable increased effectiveness, we take a look into how you can improve project planning.</p><p><strong>Series Introduction</strong></p><p style="text-align:left;">In today’s diverse, fast-paced corporate environment we are often pushed to deliver quality projects with less time and budget than ever before. Fortunately for us, technology is giving us new ways to think about how we work together in order to keep up with demand.</p><p style="text-align:left;"><br></p><p style="text-align:left;">Whether you are a seasoned project management expert or have just been handed your first ever project, there are tools at your fingertips to help you to successful execution. By making the most out of your company’s investment in SharePoint, you can capitalize on the platform’s ability to foster collaboration and communication.</p><p style="text-align:left;"><br></p><p><strong>Establishing a Clear Plan</strong><br></p><div style="text-align:left;">When preparing to move into the execution phase of your project, you will need a mechanism for tracking the who-what-when-where of your project. Constructing a clear project plan will help to ensure your resources understand their tasks and allow you to keep an eye on progress. However, simply creating a plan is not the only piece to this puzzle. You will also want to ensure your plan is kept up to date and that all team members can view <img src="/wp-content/uploads/2020/06/Fotolia_81659727_Subscription_Monthly_M-1024x670.jpg" alt=""></div><p></p><p><em>► Scenario</em></p><ul><li style="text-align:left;">Historically, your project plans are maintained and shared in Excel but the process for updating and version control is cumbersome. The risk for errors is also quite high since some of your resources are not savvy in updating a complex spreadsheet.*</li></ul><p><em>► The SharePoint Solution</em></p><ul><li style="text-align:left;">Create a “Tasks” list on your project site to serve as the “one source of the truth” for task management and updates. Ensure your plan is clearly represented through the use of sub-tasks designated under each major phase. Assign predecessors when tasks require certain steps before additional action can take place. By assigning tasks to your resources in a SharePoint Tasks list your resources will gain the ability to sync with Outlook and even export to Excel for reporting.*</li></ul><div style="text-align:left;"><br></div><p></p><p style="text-align:left;">SharePoint’s full featured out of the box task management capabilities greatly improve upon static tracking in Excel or PowerPoint. With the ability to assign tasks directly to resources and filter views accordingly you don’t have to worry about sifting through massive spreadsheets. As a bonus, your seasoned project managers can open the project plan directly from the list into MS Project for updates. Simply “add an app” to your site using the pre-defined “Tasks” list template, then start populating your own tasks.&nbsp;</p><p style="text-align:left;"><br></p><p style="text-align:left;">For some added clarity when viewing your project plan, make good use of the “indent” and “outdent” functionality as well as the “add to timeline” option for a more visual representation of upcoming tasks.<br></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 11 Nov 2015 05:22:12 +0000</pubDate></item><item><title><![CDATA[Project Management Excellence: Communication]]></title><link>https://www.gtconsult.com/blogs/post/project-management-communication</link><description><![CDATA[In today’s diverse, fast-paced corporate environment we are often pushed to deliver quality projects with less time and budget than ever before. Fortu ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_QmynR3BTQYa831TMEaYOyg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_gqMNHXs6QySfNH-QQ0G6ag" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_hbg0-94MRdepMyT_SwgO3A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_9kG8P5vdS0qjNKFOw3FIog" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div><p>In today’s diverse, fast-paced corporate environment we are often pushed to deliver quality projects with less time and budget than ever before. Fortunately for us, technology is giving us new ways to think about how we work together in order to keep up with demand.</p><p>Whether you are a seasoned project management expert or have just been handed your first ever project, there are tools at your fingertips to help you stay on the road to successful execution. By making the most out of your company’s investment in SharePoint, you can capitalize on the platform’s ability to foster collaboration and communication.</p><p>There are several key factors that have a direct impact on project success. Over this series, we will explore a few of these critical areas and how SharePoint can enable you to increase effectiveness.</p><p><strong>Communication</strong></p><p>Communication is imperative to project management success. In fact, many projects that fail often cite lack of communication as the top contributing factor. There are many moving parts in a project where something could (and most likely, will) go wrong. Without a clear way to alert key participants in these potential areas, many of your team are essentially operating blind.</p><p><em>► Scenario</em></p><ul><li>Your project team has just wrapped a critical status update meeting with key stakeholders and during the debrief you notice that many of the team’s members have completely different ideas of the necessary next steps and who will be carrying out specific tasks.*</li></ul><p><em>► The SharePoint Solution</em></p><ul><li>Create a list on the project site that will serve as the one source of the truth for action items. Following every meeting, a designated team member will gather feedback and enter action items into the list with assignments made. Through the use of workflows or alerts, you can configure an email notification to go out automatically when an action item is created so the applicable parties are immediately aware.*</li></ul><p>At the core of SharePoint’s feature set lies a communication delivery vehicle. Through the use of the native list functionality and workflows, you can configure robust messaging and alert processes. These tools will allow you to communicate out to a team, keep up on task progress, approve or deny key items or even serve as a system of record to ensure a single source of the truth is available to those on the team and that everyone knows what is going on and how to get updates.</p><p>Stay tuned for more ways to foster&nbsp;project management excellence with SharePoint!</p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 10 Nov 2015 07:51:51 +0000</pubDate></item></channel></rss>