For support call: 703-528-8300 x1 | Client Portal Login


View your inbox YOUR way, or many ways (3/15)

When you first open your inbox, a default view appears, but you can change it easily. You may not know it, but you have multiple preset Views that were there when Outlook was installed, or have been modified or created since that time. You can also create new Views for special uses. We’ll take a look at how to see what Views you already have, and create one new View for you to use when you are on vacation.

What Views do I have now?

To see the Views that have already been created, go to View- Change View and as shown below you will see the Views that have already been created:


In this example Views named Timeline, Vacation, Compact, Single and Preview have been created.

You can switch between these views by selecting them as shown above.

Creating a New View

To create a new View, start with one of your current Views, modify it and then save it as a new View. In the example below, we’ll create a new View called “Vacation 2″. Since we’re on vacation, we only want to see what we consider to be important emails. The other ones can be dealt with when we come back from vacation. There are many ways to determine this – we’ll use the Filter option to set this up. For the purposes of this example, we’ll say that while on vacation we only want to see emails that are marked as High Importance. To get here, we’ve selected

Change View – Compact – View Settings – Filter – More Choices – Whose importance is: high


Saving this by selecting “OK” twice will set this as your current View. Remember, this is only how your email is presented – everything is still there, but when you glance at your email while on vacation you will only see those that are set as “High” importance.

Some other interesting parameters you can set using View Settings:

  • Allow in-cell editing, so you can change the subject of an email (often you want to change the subject so it is actually relevant.)
  • Change where the reading pane is seen (Right, Bottom or off)
  • How email is sorted (most recent is common but there are many other options)
  • Set different fonts for different types of email, or for email from different people
  • Whether or not there are lines between emails
  • And much more!

Here are a couple of good sources to learn more:

Use your iPhone as a level (3/15)

On the second page of your Compass app is a level (the Compass is an undeletable utility in your app collection.) Most of us don’t use a compass very often these days – maybe when we are lost on a hike and can’t get a GPS signal!

The level is actually very useful and works quite well. Open the Compass App and swipe to the second page. You will see a image that looks something like this:


If you tilt your iPhone until it says “O°and turns green as shown below, you’ll be perfectly level!


Customize your LinkedIn URL (3/15)

LinkedIn is an increasingly important tool in business networking. If you have not yet created a customer URL for your profile, here is how to do it:

  • Move your cursor over Profile at the top of your homepage and select Edit Profile.
  • Click the URL link under your profile photo. It will be an address like (just an example!)
  • Under the Your public profile URL section on the right, click the Edit icon next to your URL.
  • Type the last part of your new custom URL in the text box.
  • Click Save.

A couple of notes:

  • Your custom URL can have between 5 and 30 letters or numbers. You can’t use spaces, symbols of special characters.
  • The URL you want may be taken, so be creative. You may need to use your middle name, etc.

For more information click here.

Think cyber criminals only target big companies? How to mitigate your risk… (3/15)

Criminals know that small and mid-size companies don’t have the resources that large organizations do to protect their data. Just like the home in a bad neighborhood, or the one house on the block without a burglar alarm, you can make your organization a target.

We all manage risk in our businesses by purchasing insurance, doing background checks on employees, and employing security measures with our data. We’ve made choices about how to weigh these risks, even if the choice has been to do nothing. As cybercrimes become more and more common, it makes sense to formalize your approach to managing this risk. Here are some things to think about:

  • Do you know what data you have on your network – are you storing credit cards, social security numbers or other personally identifiable information (PII – information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context.)
  • Do you know where your data is? Servers, laptops, flash drives, phones… there are an increasingly large number of devices that can cause of proliferation of your data to places you can’t, or don’t, track.
  • Has your staff been trained? Do they know how to mitigate risk using proper procedures and behavior?
  • Is your network setup correctly, and do you review it on a regular basis?
  • Do you dispose of equipment and documents in a safe manner?

If you are interested in a Security Risk Assessment, click here and we’ll get back to you.

HIPAA Compliance Services (3/15)

HIPAA compliance can be a nightmare for many healthcare-related businesses. HIPAA Compliance Services from BEI can take this headache away at a very reasonable price. As part of this service we’ll:

  • perform your Meaningful Use Risk Assessment;
  • write your Policies and Procedures;
  • train your employees;
  • provide access to our web-based compliance portal;
  • include $100,000 financial protection from HIPAA breach and violation expenses.

**Click here to receive a quote for HIPAA Compliance Services for your organization.

Tips for successful use of VOIP (3/15)

We thought this was a very good article on the mistakes that companies make when implementing VOIP (Voice over IP). The key points are summarized below:

  • Mistake #1: Note enough bandwidth
  • Mistake #2: Your network needs modifications to be properly configured for voice traffic.
  • Mistake #3: Not understanding the platform the VOIP company is operating on.
  • Mistake #4: Only realizing the level of support is poor the first time the phones go down.
  • Mistake #5: Not understanding the features and what your business will use.

Cyberattacks on the Rise as Confidence Sinks, Finds 2015 Cyberthreat Defense Report (3/15)

CyberEdge Group has released their second-annual Cyberthreat Defense Report. In surveying more than 800 security decision makers and practitioners, the Cyberthreat Defense Report found that more than 70 percent of respondents’ networks had been breached in 2014 — up from 62 percent in 2013 — with more than 20 percent breached six times or more. For the first time, a majority of respondents (52 percent) now believe a successful cyberattack is likely in the coming year — up from 39 percent in last year’s report. You can download the report here. Some key points:

  • 71% of respondents’ networks breached in 2014, up from 62%
  • 52% of respondents believe a successful attack is likely in 2015
  • 61% of IT security budgets are rising in 2015, up from 48%
  • Phishing, malware, and zero-days concern respondents most
  • 59% saw a rise in mobile device threats in 2014
  • Low security awareness among employees is greatest inhibitor
  • 67% intend to evaluate new endpoint security solutions

Health IT News for Metro DC: March The move to value-based care (3/15)

This is the first time in the history of the Medicare program that HHS has set explicit goals for alternative payment models and value-based payments. Needless to say, these are not minor changes. Physicians need to understand these changes and properly prepare to survive and thrive in this new era where payment is no longer fee-for-service, but rather based on outcomes.

This article by JT Treadwell of Symphony Technology Group provides a good overview of what to expect in the move to value-based care.

Google Search Tips (2/15)

Google Search is very powerful; here are some tips to hone your skills:

1. Advanced Operators – there are some very cool operators to use while you are doing a search:

  • AROUND – this lets you specify the number of words between two search terms. So for example, the search below would return only those pages where the word Oscars and the phrase “Lady Gaga” were separated by 3 words or less.

  • - (hyphen) – simply put a hyphen in front of any word you DON’T want in a result.
  • + (plus sign) – including a plus sign in front of a search term will ensure that it is in every result
  • If you only want results from one website, but that website doesn’t have the greatest search mechanism, you can put site:URL in front of the search, and you’ll only get results from that site. So for example, if you want to search the site for the term Office you would use the query shown below:


2. Find Competitors – you can use Google to find items that people typically compare a couple of ways:

  • Enter “better than XX” where X is what you are looking for alternatives to. For example, “better than Nike” yields comparisons, information about Under Armour, Adidas, etc.
  • Or, start typing “XX vs” and see what autocomplete suggests. So if you type “Nike vs” you’ll see a long list of suggestions, including Under Armour, Adidas, etc.

more to come next month

Customize Mail signatures in iOS 8 (2/15)

To replace the “ad” from Apple (Sent from my iPhone) with whatever signature text you want to use:

  • Navigate to Settings | Mail, Contacts, Calendars
  • Select Signature
  • Select All Accounts
  • Replace the text “Sent from my iPhone” with the signature text that you want to appear on emails you send in the future

Home|Success Stories|Events|BEI Blog|Partners|Who we are|Contact Us|RSS

© 2016 Business Engineering, Inc.

11130 Sunrise Valley Drive, Suite 202 Reston, VA 20191
P: 703.528.8300 F: 703.276.7938