by Contributed | Feb 8, 2022 | Dynamics 365, Microsoft 365, Technology
This article is contributed. See the original author and article here.
The new era of digital has ushered in a once-in-a-lifetime opportunity, as well as make-or-break challenges. Fast-moving organizations are seizing the moment to capture a sizable audience. But keeping customers is more difficult than ever. Organizations, facing mounting privacy regulations coupled with wary customers, are moving beyond third-party data to zero-party data for powering customer experiences. They are taking a hands-on approach and amassing customer data directly, according to a front-page article in the Wall Street Journal.1 In the wake of disruptive changes, organizations are turning to trusted solutions like Microsoft Customer Experience Platform.
Savvy organizations see privacy as a challenge that can become a strategic opportunity to build trust with customers and differentiate themselves against competitors. They’re embracing transparent and ethical data practices built around zero-party data, which in combination with existing data, makes it easy to deliver highly-personalized experiences that customers actually wantand avoid privacy mishaps. Respecting customer privacy requires a holistic approach encompassing data collection, utilization, and governance. For example, organizations need to ensure that analytics and artificial intelligence initiatives utilize only permissible customer data, which may be highly-sensitive in nature.
Fuel personalization with zero-party data
The majority of consumers expect companies to deliver personalized interactions. However, this expectation is met with wariness about sharing personal information and fear that data will be misused, or that they will be inundated with a barrage of advertisements, emails, and intrusive outreach. Zero-party data is key to achieving privacy-aware personalization.
Zero-party data is a form of self-reported data a consumer willingly and actively provides a brand. Customers knowingly and intentionally share this data with an organization in order to get a more personalized experiencesuch as a tailored recommendation, pricing, or access to additional resources. Organizations have opportunities to collect this data across the entire customer journeywhile the customer is on the website, social channels, email, inside a mobile app, or even in personthrough loyalty programs and creative approaches like sweepstakes, newsletters, quizzes, polls, and QR codes. Unlike first-party data which is based on historical events and requires interpretation, zero-party data is explicit data that reflects customer motivations, desires, interests, and preferences. Just as important, zero-party data has moved from buzzword to data hero, becoming an essential part of an organization’s digital strategy and countering the eminent demise of the much relied upon third-party cookies.
Don’t count out other sources of data
Nothing beats zero-party data for quality and consent, but there’s still a role for other types of data in your marketing mix.
First-party data, for example, remains an essential source of customer insight. Like zero-party data, first-party data is data about a company’s customers collected and owned directly by the company. Types of first-party data include web and app behavior, purchase history, loyalty status, or call center interactions. And although the methods used to obtain first-party data aren’t always as straightforward or transparent as those used to obtain zero-party data, it’s nonetheless valuable data that will help accelerate the pivot from third-party data.
Third-party data, like those that come from external sources like third-party cookies that track web browsing or advertising, has a place at the table (along with second-party data, which is someone else’s first-party data). The goal is not to banish third-party data entirely; instead, it’s to decrease reliance on third-party data while simultaneously increasing the collection of zero-party and first-party data.
Approach privacy as a fundamental human right
As organizations across every industry face the imminent deprecation of third-party cookies and mounting regulations, the right partner and technology are key. With the right solutions, organizations can respect consumer privacy without compromising the personalized experiences that customers value. For organizations that approach privacy as a fundamental human right, the return on investment will encompass an entirely new relationship with customersone that is built on trust and mutual engagement.
That’s where Microsoft Customer Experience Platform comes in. Microsoft has worked with customers around the world, and their marketing leaders consistently emphasize that to meet today’s expectations of privacy and personalization, they need to deliver consent-aware engagement along the entire customer journey, powered by insights based on zero through third-party datasomething they struggle with because of the proliferation of data sources scattered across multiple systems, making it impossible to gain a complete view of the customer that’s essential for connected experiences. With privacy and consent built into the platform, organizations can be rest assured that data is responsibly collected, utilized, and governedthe foundation for meaningful engagement, raving fans, and lasting customer relationships. To learn more, read the related Microsoft Customer Experience Platform blog post and visit Microsoft Customer Experience Platform.
Sources:
1- “Big Tech Privacy Moves Spur Companies to Amass Customer Data”, Suzanne Vranica, Wall Street Journal, December 2, 2021.
The post Zero-party data is more valuable than ever for customer experiences appeared first on Microsoft Dynamics 365 Blog.
Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.
by Scott Muniz | Feb 8, 2022 | Security, Technology
This article is contributed. See the original author and article here.
Mozilla has released security updates to address vulnerabilities in Firefox and Firefox ESR. An attacker could exploit some of these vulnerabilities to take control of an affected system.
CISA encourages users and administrators to review the Mozilla security advisories for Firefox 97 and Firefox ESR 91.6 and apply the necessary updates.
by Contributed | Feb 7, 2022 | Dynamics 365, Microsoft 365, Technology
This article is contributed. See the original author and article here.
For SOLEVO Grouplike many other businesseshaving a finance system that meets their needs for agility, flexibility, and scale was incredibly important, so in 2019, they implemented Microsoft Dynamics 365 Finance. Paired with interconnected tools such as Microsoft Power Platform, Dynamics 365 gave them a high degree of visibility into the past and present state of their business, but SOLEVO wanted more insights into where the business was headed.
SOLEVO was one of our first customers to implement finance insights, gaining access to more accurate payment predictions and cash flow forecasts, as well as prescriptive tools that would streamline the budgeting process. We recently sat down with Martin Sengel, the CIO of SOLEVO Group, and Vacaba Diaby, SOLEVO’s Global Credit Risk Officer, to learn about their experience working with finance insights and hear how it was transforming their business.
Interview with SOLEVO
What business goals and challenges are you trying to solve for? What are you hoping finance insights can unlock to help achieve this?
“Our Global Risk Officer at SOLEVO wanted to have more insights on Customer Payments, especially to take automatic actions based on the historical analysis for each customer. We hope that finance insights can help us setup a process more proactive and help him get a better overview. We wanted to have a Cashflow forecast directly in Finance Operations in combination with an optimization our budget for each department.”
Why was Microsoft the right solution? What were the key benefits that lead you to choose Microsoft for your business solutions? Were AI and machine learning (ML)-powered capabilities a key differentiator in your vendor selection process?
“Microsoft was the right solution for us to replace our old ERP systems back in 2019. We wanted a global solution that support not only ERP Processes but also a publisher who has a perfect fit and understanding of our business, offering regular updates and evolutions and a range of interconnected tools such as Power Platform, Cloud Azure and all Dynamics 365 applications. Dynagile Consulting was the right partner to help us integrate Dynamics 365 Finance Operations in all our countries and help us right now to leverage the ERP with the Power Platform, Azure Data and now AI and ML including of course finance insights. AI and ML-powered capabilities was indeed a key selection for us when we had taken this selection.”
How will finance insights help you re-imagine the way you operate your ERP business and respond to customers and trends? What is the impact of being able to operate in this new way?
“Finance insights will help us to have intelligence/insights on our data in the system. Top management of SOLEVO have already Power BI Reporting to investigate the past, but what about the future/predictions? Finance insights will provide for us directly in the ERP some key elements for our key users to take action. It will save time, and therefore money, with an end-to-end automated solution process. Budgeting processes will be reduced every year now, a more accurate and intelligent company cash flow and when we will receive payments. At the end, it will provide a rich and intelligent financial system that drives decision making and helps us take actions to respond effectively to current and anticipated business challenges.”
What kinds of insights do you hope to gain from the solution, especially with regards to revenue, growth, and planning? How will you be able to make more intelligent decisions and drive operational efficiency through these insights and business automations?
“With COVID-19 challenge, it was very important for us to have a better accuracy on the Customer Payment Predictions and an intelligent Cash Flow forecast. All the way of the three solutions provided by finance insights, this will speed up all our finance processes facilitating the planning of our teams. Of course, that will lead to drive operational efficiency and therefore to revenue.”
Do you have any details on specific scenarios being enabled or problems that will be solved by the deployment of these technologies?
“For example, thanks to finance insights, one of our use cases will be automating credit collection letters and notifications to our Global Risk Officer with the Customer Payment Prediction based on each customer for each legal entity. Based on the confidence score and on the estimated average number of days late which is refreshed every day with our latest data from Dynamics 365 Finance and scored for new or updated rows we will send a notification via Power Automate to the end customer and the regional CFO, if we found this customer as high-risk.”
Learn more
In a short time, finance insights have already had a significant impact on SOLEVO’s business, bringing a layer of intelligence to their operations. Not only has it provided more accurate forecastscritical for strategic planningit has saved them time and money by allowing them to automate processes, such as automating credit collection letters and notifications. With a rich and intelligent financial system in place, SOLEVO is now better positioned to make strategic decisions and respond more effectively to current and future business challenges.
To learn more about how finance insights can transform your financial operations, read our finance insights announcement blog, check out our support documentation, or watch our webinar on reshaping the future of financials through AI with Ray Wang from Constellation Research Inc.
The post SOLEVO Group transforms their financial operations with finance insights appeared first on Microsoft Dynamics 365 Blog.
Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.
by Contributed | Feb 7, 2022 | Technology
This article is contributed. See the original author and article here.
It’s a challenging time in software security; migration to the modern cloud, the largest number of remote workers ever, and a global pandemic impacting staffing and supply chains all contribute to changes in organizations. Unfortunately, these changes also give bad actors opportunities to exploit organizations:
“Cybercriminals are targeting and attacking all sectors of critical infrastructure, including healthcare and public health, information technology (IT), financial services, and energy sectors. Ransomware attacks are increasingly successful, crippling governments and businesses, and the profits from these attacks are soaring.”
– Microsoft Digital Defense Report, Oct 2021
|
For years Microsoft Office has shipped powerful automation capabilities called active content, the most common kind are macros. While we provided a notification bar to warn users about these macros, users could still decide to enable the macros by clicking a button. Bad actors send macros in Office files to end users who unknowingly enable them, malicious payloads are delivered, and the impact can be severe including malware, compromised identity, data loss, and remote access. See more in this blog post.
“A wide range of threat actors continue to target our customers by sending documents and luring them into enabling malicious macro code. Usually, the malicious code is part of a document that originates from the internet (email attachment, link, internet download, etc.). Once enabled, the malicious code gains access to the identity, documents, and network of the person who enabled it.”
– Tom Gallagher, Partner Group Engineering Manager, Office Security
|
For the protection of our customers, we need to make it more difficult to enable macros in files obtained from the internet.
Changing Default Behavior
We’re introducing a default change for five Office apps that run macros:
VBA macros obtained from the internet will now be blocked by default.
For macros in files obtained from the internet, users will no longer be able to enable content with a click of a button. A message bar will appear for users notifying them with a button to learn more. The default is more secure and is expected to keep more users safe including home users and information workers in managed organizations.
“We will continue to adjust our user experience for macros, as we’ve done here, to make it more difficult to trick users into running malicious code via social engineering while maintaining a path for legitimate macros to be enabled where appropriate via Trusted Publishers and/or Trusted Locations.”
– Tristan Davis, Partner Group Program Manager, Office Platform
|
This change only affects Office on devices running Windows and only affects the following applications: Access, Excel, PowerPoint, Visio, and Word. The change will begin rolling out in Version 2203, starting with Current Channel (Preview) in early April 2022. Later, the change will be available in the other update channels, such as Current Channel, Monthly Enterprise Channel, and Semi-Annual Enterprise Channel.
At a future date to be determined, we also plan to make this change to Office LTSC, Office 2021, Office 2019, Office 2016, and Office 2013.
End User Experience
Once a user opens an attachment or downloads from the internet an untrusted Office file containing macros, a message bar displays a Security Risk that the file contains Visual Basic for Applications (VBA) macros obtained from the internet with a Learn More button.
A message bar displays a Security Risk showing blocked VBA macros from the internet
The Learn More button goes to an article for end users and information workers that contains information about the security risk of bad actors using macros, safe practices to prevent phishing & malware, and instructions on how to enable these macros by saving the file and removing the Mark of the Web (MOTW).
What is Mark of the Web (MOTW)?
The MOTW is an attribute added to files by Windows when it is sourced from an untrusted location (Internet or Restricted Zone). The files must be saved to a NTFS file system, the MOTW is not added to files on FAT32 formatted devices.
IT Administrator Options
This chart shows the evaluation flow for Office files with VBA macros and MOTW:
Evaluation flow for Office files with VBA macros and MOTW
Organizations can use the “Block macros from running in Office files from the Internet” policy to prevent users from inadvertently opening files from the internet that contain macros. Microsoft recommends enabling this policy, and if you do enable it, your organization won’t be affected by this default change.
“Setting policy is a powerful tool for IT Admins to protect their organizations. For years we’ve recommended blocking macros obtained from the internet in our security baselines, and many customers have done so. I’m pleased Microsoft is taking the next step to securing everyone with this policy by default!”
– Hani Saliba, Partner Director of Engineering, Office Calc
|
Additionally, there are two other options to know your files are safe:
- Opening files from a Trusted Location
- Opening files with digitally signed macros and providing the certificate to the user, who then installs it as a Trusted Publisher on their local machine
To learn more about how to get ready for this change and recommendations for managing VBA macros in Office files, read this article for Office admins.
Thank you,
Office Product Group
VBA Team & Office Security Team
More helpful information on the threats of Ransomware:
Continue the conversation by joining us in the Microsoft 365 Tech Community! Whether you have product questions or just want to stay informed with the latest updates on new releases, tools, and blogs, Microsoft 365 Tech Community is your go-to resource to stay connected!
by Scott Muniz | Feb 7, 2022 | Security, Technology
This article is contributed. See the original author and article here.
The Federal Bureau of Investigation (FBI) has released a Flash report detailing indicators of compromise (IOCs) associated with attacks, using LockBit 2.0, a Ransomware-as-a-Service that employs a wide variety of tactics, techniques, and procedures, creating significant challenges for defense and mitigation.
CISA encourages users and administrators to review the IOCs and technical details in FBI Flash CU-000162-MW and apply the recommend mitigations.
by Contributed | Feb 6, 2022 | Technology
This article is contributed. See the original author and article here.
Move from: bobsql.com
I received a question from Jonathan as he read over prior posts on locking and I cannot take credit for the question nor the answer, just being the middle man for this transaction.
Question:
“The way I have understood lock partitioning and a regular index rebuild to interact, is that the final SCH-M lock for the object is taken by acquiring it across all of the lock partitions, in ascending order to avoid any deadlock conditions. More precisely I understood that it does not even attempt to acquire the SCH-M in lock partition 4 say, until it has acquired it successfully in lock partition 3. Once the SCH-M is acquired in the final partition it’s good to go.
If we attempt the same with low priority waits for the index rebuild … on a non-partitioned system it seems straightforward, if my SCH-M request is blocked by an existing SCH-S, and a new SCH-S request arrives, it is not blocked by me. If we apply the same behavior on each lock partition in ascending order, then at the point where I am trying to acquire SCH-M in the final partition, that would mean I already have acquired it in all the lower partitions, and I would be blocking processes on every other scheduler.
Do you know how this works?” – Jonathan Kehayias
The developer’s (Panagiotis) answer:
The goal of WAIT_AT_LOW_PRIORITY is to avoid blocking any other requests while waiting for a lock. In the case of lock partitioning, the lock might be acquired on a few partitions and then end up waiting on partition 4 because there is a conflicting lock being held there. If we simply waited with low priority on partition 4, we would not block any new requests on partition 4, but since we are holding locks on earlier partitions the user requests would be blocked. Based on that, when WAIT_AT_LOW_PRIORITY is used, we wait with low priority on the first partition and if acquired we attempt to lock all other partitions without waiting. If we can’t take the lock on partition 4, we will unlock all earlier partitions to eliminate blocking and start waiting with low priority on 4. Once the lock on partition 4 is acquired, we follow the same process of acquiring the next partitions without waiting, cycling back to partition 0 once we hit the last partition.
Bob Dorr
Recent Comments