" Online Security Addressing the Dangers of Browser Extensions " อันตรายแอบแฝงที่อาจเกิดจากการใช้งาน Browser Extensions▸Browser Extensions คือ ส่วนขยายใน browser เพื่อรองรับการทำงานที่หลากหลายมากขึ้น ของ Web Applications (โปรแกรมที่ใช้งานผ่าน browser) โดย web application ถูกออกแบบให้มีขนาดเล็กกว่าปกติเพื่อ Install ไว้เป็น add-on เพิ่มความสะดวกให้กับผู้ใช้โดยไม่ต้องออกจากหน้า browserฟังดูเหมือนจะดี ไม่มีอะไรยุ่งยาก แต่! อาจมี ความเสี่ยงต่อความปลอดภัยและความเป็นส่วนตัวทางออนไลน์ ไม่ว่าจะเป็น ● Privacy Intrusions การรุกล้ำความเป็นส่วนตัว ● Malicious Intent การมุ่งร้านทางใดทางหนึ่ง ● Outdated or Abandoned Extensions เอ็กเทนชั่นที่ล้าสมัยหรือไม่ได้ใช้งานแล้ว ● Phishing and Social Engineering ฟิชชิ่ง หรือหลอกลวงบนโลกโซเชียล ● Browser Performance Impact ผลกระทบต่อการทำงานของเบราเซอร์ 6 / 9 ● Conduct regular audits of the extensions installed on your browser. ตรวจสอบการใช้งานเบราเซอร์ของคุณอยู่เสมอ ● Remove any that are unnecessary or pose potential security risks. ลบสิ่งใดๆก็ตามที่อาจส่งผลร้ายหรือเกิดความเสี่ยงติดต่อเราเพื่อขอความช่วยเหลือเกี่ยวกับความปลอดภัยทางไซเบอร์ออนไลน์ สามารถติดต่อ Netway Communication ได้ ตลอด 24 ชม. ผ่านช่องทางเหล่านี้Contact Netway Communication (24x7) 📲: 02 055 1095 📧: support@netway.co.th 👨💻Web chat: [[URL]]/ 💙Facebook Messenger: @netway.official https://www.facebook.com/netway.official 💚Add Line ID: @netway https://bit.ly/line-netway#OnlineSecurity #BrowserExtensions #CyberAware #Cybersecurity #OnlineSafety #BrowserSecurity Browser extensions have become as common as mobile apps. People tend to download many and use few. There are over 176,000 browser extensions available on Google Chrome alone. These extensions offer users extra functionalities and customization options. While browser extensions enhance the browsing experience, they also pose a danger. Which can mean significant risks to online security and privacy. In this article, we unravel the dangers associated with browser extensions. We’ll shed light on the potential threats they pose. As well as provide insights into safeguarding your online presence. The Allure and Perils of Browser ExtensionsBrowser extensions are often hailed for their convenience and versatility. They are modules that users can add to their web browsers. They extend functionality and add customizable elements. From ad blockers and password managers to productivity tools, the variety is vast. But the ease with which users can install these extensions is a weakness. Because it also introduces inherent security risks. Next, we’ll delve into the hazards associated with browser extensions. It is imperative to strike a balance between the benefits and dangers. Key Risks Posed by Browser ExtensionsPrivacy IntrusionsMany browser extensions request broad permissions. If abused, they can compromise user privacy. Some of these include accessing browsing history and monitoring keystrokes. Certain extensions may overstep their intended functionality. This can lead to the unauthorized collection of sensitive information. Users often grant permissions without thoroughly reviewing them. This causes them to unintentionally expose personal data to potential misuse. Malicious IntentThere are many extensions developed with genuine intentions. But some extensions harbor malicious code. This code can exploit users for financial gain or other malicious purposes. These rogue extensions may inject unwanted ads. As well as track user activities or even deliver malware. These extensions often use deceptive practices. They make it challenging for users to distinguish between legitimate and malicious software. Outdated or Abandoned ExtensionsExtensions that are no longer maintained or updated pose a significant security risk. Outdated extensions may have unresolved vulnerabilities. Hackers can exploit them to gain access to a user's browser. As well as potentially compromising their entire system. Without regular updates and security patches, these extensions become a liability. Phishing and Social EngineeringSome malicious extensions engage in phishing attacks. As well as social engineering tactics. These attacks can trick users into divulging sensitive information. This can include creating fake login pages or mimicking popular websites. These tactics lead unsuspecting users to unknowingly provide data. Sensitive data, like usernames, passwords, or other confidential details. Browser Performance ImpactCertain extensions can significantly impact browser performance. This can happen due to being poorly coded or laden with unnecessary features. This results in a subpar user experience. It can also lead to system slowdowns, crashes, or freezing. An extension's perceived benefits may attract users. But they end up unwittingly sacrificing performance. Mitigating the Risks: Best Practices for Browser Extension Security1. Stick to Official MarketplacesDownload extensions only from official browser marketplaces. Such as those connected with the browser developer (Google, Microsoft, etc.). These platforms have stringent security measures in place. This reduces the likelihood of encountering malicious software. 2. Review Permissions CarefullyBefore installing any extension, carefully review the permissions it requests. Be cautious if an extension seeks access to unusual data. Such as data that seems unrelated to its core functionality. Limit permissions to only what is essential for the extension's intended purpose. 3. Keep Extensions UpdatedRegularly update your browser extensions. This ensures you have the latest security patches. Developers release updates to address vulnerabilities and enhance security. If an extension is no longer receiving updates, consider finding an alternative. 4. Limit the Number of ExtensionsIt’s tempting to install several extensions for various functionalities. But each added extension increases the potential attack surface. Only install extensions that are genuinely needed. Regularly review and uninstall those that are no longer in use. 5. Use Security SoftwareUse reputable antivirus and anti-malware software. This adds an extra layer of protection against malicious extensions. These tools can detect and remove threats that may bypass browser security. 6. Educate YourselfStay informed about the potential risks associated with browser extensions. Understand the permissions you grant. Be aware of the types of threats that can arise from malicious software. Education is a powerful tool in mitigating security risks. 7. Report Suspicious ExtensionsIf you encounter a suspicious extension, report it. You should report it to the official browser extension marketplace and your IT team. This proactive step helps browser developers take prompt action. That action protects users from potential threats. 8. Regularly Audit Your ExtensionsConduct regular audits of the extensions installed on your browser. Remove any that are unnecessary or pose potential security risks. Maintain a lean and secure browsing environment. This is a key aspect of online security. Contact Us for Help with Online CybersecurityBrowser extensions are just one way you or your employees can put a network at risk. Online security is multi-layered. It includes protections from phishing, endpoint threats, and more. Don’t stay in the dark about your defenses. We can assess your cybersecurity measures and provide proactive steps for better protection. Article used with permission from The Technology Press.
Workspaces, a VPN & More - Learn the Newest Microsoft Edge Features " คุณสมบัติ Microsoft Edge Workspaces ฟีเจอร์ช่วยงานเรื่อง Productivity สำหรับคุณ " ล่าสุดที่ทาง Microsoft เปิดตัวฟีเจอร์ใหม่บน Microsoft Edge ที่มีชื่อว่า Microsoft Edge Workspacesเพื่อช่วยบันทึกและแชร์ชุดของแท็บเบราว์เซอร์ให้กับผู้ใช้ในลิงก์เดียว ด้วยเทคโนโลยี AI และ VPN ส่งผลผู้ใช้มั่นใจเรื่องความปลอดภัยและความเป็นส่วนตัว โดยทางไมครซอฟท์ ยืนยันว่าไม่มีการแชร์ข้อมูลส่วนตัวให้กับผู้ใช้อื่นเมื่อใช้ Wordspace รวมไปถึงรหัสผ่าน การดาวน์โหลด คอลเลกชัน ส่วนขยาย Cookies และยังไม่อนุญาตให้ผู้ใช้อื่นดู “เนื้อหาเว็บไซต์ที่คุณเข้าถึงได้เท่านั้น (website content which only you have access to)” เช่น inbox อีเมลของผู้ใช้ สำหรับคุณสมบัติใหม่อื่นๆ ที่น่าสนใจ Microsoft Edge Browser ก็คือ Autofill for Forms ช่วยกรอกฟอร์มอัตโนมัติ Web Capture รวบรวมบรรดาเว็บเพจที่สนใจไว้จุดเดียว Copilot (AI) จะแชท ถามตอบคำถามใดๆ ค้นหาข้อมูล ด้วยระบบ AI ได้ง่ายๆ เ Read Aloud ช่วยอ่านออกเสียงให้ ไม่จำกัดเฉพาะผู้พิการทางสายตา แต่คนธรรมดาก็ใช้ได้เช่นกัน ศึกษาเพิ่มเติมเกียวกับ Microsoft Edge ได้ที่ https://www.microsoft.com/th-th/edge หรือ สามารถติดต่อ Netway Communication ได้ ตลอด 24 ชม. ผ่านช่องทางเหล่านี้ Contact Netway Communication (24x7) 📲: 02 055 1095 📧: support@netway.co.th 👨💻Web chat: [[URL]]/ 💙Facebook Messenger: @netway.official https://www.facebook.com/netway.official 💚Add Line ID: @netway https://bit.ly/line-netway #MicrosoftEdge #WebBrowsing #VPNSecurity #EdgeFeatures #WebTech #MicrosoftEdge #WebProductivity #DigitalWorkspace Microsoft Edge continues to redefine user experiences. This is due to Microsoft’s commitment to innovation. The latest updates bring a host of features. These are designed to enhance productivity, security, and browsing satisfaction. Chrome may have been number one for years. But Edge has been steadily gaining popularity. It is now the third most popular browser worldwide. Overtaking Firefox a while back, it’s now just behind Chrome (1) and Safari (2). From personalized workspaces to a built-in VPN, Microsoft Edge is not just a browser. It's a comprehensive toolkit for users navigating the digital landscape. Let's delve into the newest Microsoft Edge features. They promise to elevate your online journey.A New Era of Productivity: Microsoft Edge WorkspacesIntroduction to WorkspacesWorkspaces in Microsoft Edge represent a paradigm shift. A shift in how users organize and manage their online tasks. Imagine having a dedicated space for each project. One that seamlessly integrates relevant tabs, documents, and websites. Microsoft Edge Workspaces makes this a reality. It allows users to create custom workspaces. Each workspace represents different aspects of their digital lives. Whether you're working on a project, planning a trip, or pursuing a hobby. Workspaces offer a tailored and organized browsing environment. Image source: Microsoft Key Features of Microsoft Edge WorkspacesPersonalization: Users can customize Workspaces with a unique name and color. This makes it easier to distinguish between different projects or activities. Easy Access: With a single click, users can switch between Workspaces. This instantly transitions them between different sets of tabs and online resources. Users associate each Workspace with specific projects or interests. Persistence: Workspaces keep their configurations. This is the case even when users close and reopen the browser. This ensures that users can seamlessly resume their work. There is no need to reconstruct their customized environments each time. Efficient Task Management: Workspaces make task-focused browsing easier, minimizing distractions. This helps users maintain focus on the specific project or activity at hand. Enhanced Security with Edge Secure Network VPN Built-in VPNMicrosoft Edge takes a giant leap in prioritizing user privacy and security. The Edge Secure Network uses a new built-in VPN. VPNs, or Virtual Private Networks, encrypt internet connections. This helps ensure a secure and private browsing experience. Microsoft Edge now provides users with 5GB of free VPN data per month. This further protects their online presence. Key Benefits of the VPN in Microsoft EdgeEnhanced Privacy: VPNs mask users' IP addresses. This makes it challenging for malicious actors to track their online activities. This is particularly crucial when accessing public Wi-Fi networks. As well as sensitive information. Secure Browsing: The VPN has an encrypted connection. This ensures that data transmitted between the user's device and internet is secure. It reduces the risk of interception by hackers. Geographic Consistency: Edge’s VPN will mask your specific location. Websites will see a location similar to yours. So, when you look up movie times or nearby services, you see what you expect. You cannot choose a specific region to route traffic from. Complimentary 5GB Data: Microsoft Edge users receive 5GB of free VPN data each month. To conserve the data limit, content streaming sites aren’t routed through the VPN. These are sites like Netflix, Hulu, Disney+, etc.Other New Features Added to Microsoft Edge BrowserMicrosoft is continuously updating Edge. Here are a few more new features you can enjoy. Autofill for Forms: Edge makes filling out forms online easier. It will suggest completions when you start typing into fields. This includes name, email, address, etc. Web Capture: Using Web Capture in Edge makes it easy to take a screenshot. You can select an area or a full page. Then paste it into any of your files. Copilot: Use the Copilot icon at the top of Edge to access AI features. This includes creating AI-generated images. As well as creating quick email drafts and more. Read Aloud: Need to step away from the screen for a moment? Let Edge read content for you out loud. Enabling you to multi-task like there’s no tomorrow! Get Help Exploring Your Microsoft ServicesMicrosoft Edge establishes itself as a comprehensive solution. It’s great for those seeking a more productivity-focused browser. As well as a secure and private online environment. Microsoft Edge's latest features enhance the way we work, explore, and connect. Is your company in need of help exploring what Microsoft has to offer? From Edge enhancements to Microsoft 365 tools, we have experts to guide you. Don’t miss out on all that these solutions have to offer. Our Microsoft experts can help set up, manage, and secure your digital workflows.Article used with permission from The Technology Press.
Examples of How a Data Breach Can Cost Your Business for Years " รู้ทันผลกระทบจากการละเมิดข้อมูล (Data Breach) หรือการละเมิดมาตรการรักษาความมั่นคงปลอดภัย " ยุคนี้ข้อมูล เปรียบเสมือนเส้นเลือดใหญ่ หรือทองคำสำหรับการทำธุรกิจ แต่ในยุคดิจิทัลที่ทุกสิ่งกลายเป็น data-centric แบบนี้ ก็จะมี ภัยคุกคามที่จะคอยละเมิดข้อมูลของเราอย่างต่อเนื่อง ผลกระทบด้านค่าใช้จ่ายอาจถูกตีค่าว่าเป็นความสูญเสียด้านการเงินประมาณ 51% ใบปีแรก แต่นอกจากนี้ยังมีเอฟเฟคอื่นๆ ที่กำลังจะเกิดตามมา อย่าง Financial Repercussions - ผลกระทบทางด้านการเงิน Reputation Damage - ความเสียหายต่อชื่อเสียง Regulatory Scrutiny - ผลกระทบต่อการตรวจสอบกฎระเบียบด้านอื่น Operational Disruption การหยุดชะงักของระบบปฏิบัติงาน Customer Churn and Acquisition Challenges การสูญเสียลูกค้า การป้องกันข้อมูลรั่วไหล เป็นจริงได้แค่เราเริ่มลงมือทำ อย่าปล่อยให้สายเกินไป จนเรารับมือไม่ทัน สามารถติดต่อ Netway Communication ได้ ตลอด 24 ชม. ผ่านช่องทางเหล่านี้ Contact Netway Communication (24x7) 📲: 02 055 1095 📧: support@netway.co.th 👨💻Web chat: [[URL]]/ 💙Facebook Messenger: @netway.official https://www.facebook.com/netway.official 💚Add Line ID: @netway https://bit.ly/line-netway #DataBreach #BusinessSecurity #Cybersecurity #DataSecurity #BusinessRisk #DataProtection In the digital age, data is the lifeblood of businesses. It fuels operations, decision-making, and customer interactions. But there is a dark underbelly of this data-centric landscape. It's the persistent threat of data breaches. The repercussions of a data breach extend far beyond the immediate aftermath. They often haunt businesses for years. Only 51% of data breach costs occur within the first year of an incident. The other 49% happen in year two and beyond.Image source: IBM’s Cost of a Data Breach Report 2023 We’ll take a look at the long-term consequences of a data breach. As well as examine a real-world example. You’ll see how a single breach can have enduring implications. Ones that impact a business's reputation, finances, and regulatory standing. The Unseen Costs of a Data BreachIntroduction to the First American Title Insurance Co. CaseThe 2019 cybersecurity breach at First American serves as a stark illustration. It reminds us of the far-reaching consequences of a data breach. In this case, the New York Department of Financial Services (NYDFS) imposed a $1 million fine. Cybersecurity sites announced the fine in the fall of 2023. The company’s fine was for failing to safeguard sensitive consumer information. The breach exposed over 880 million documents. These files contained personal and financial data. The breach represented a significant violation of data protection standards. This is one example of how costs can come long after an initial breach. Here are some other ways security incidents can haunt businesses for years. Lingering Impacts of a Data BreachFinancial RepercussionsThe financial toll of a data breach is significant. Immediate costs include things like: Breach detection Containment Customer notification Beyond those, businesses face long-term expenses. These relate to legal battles, regulatory fines, and reparations. Regulatory penalties are just one facet of the financial repercussions. Others include potential legal actions from affected individuals. As well as class-action lawsuits adding to the monetary strain. Reputation DamageThe impact on a business's reputation is arguably the most enduring consequence. Customers lose trust in a company's ability to protect their sensitive information. This loss of trust can result in a decline in customer retention. As well as acquisition difficulties and long-lasting damage to the brand image. Rebuilding a tarnished reputation takes time. It also takes concerted efforts. These may involve public relations campaigns and enhanced security measures. These actions help assure stakeholders of renewed commitment to data protection. Regulatory ScrutinyRegulatory bodies increasingly hold businesses accountable for safeguarding consumer data. A data breach triggers regulatory scrutiny. This may lead to fines and ongoing compliance requirements. Regulatory authorities take a stringent stance on data security. As well as on companies that fail to meet cybersecurity standards. The fallout includes financial penalties. As well as increased oversight and mandatory security improvements. Operational Disruption The aftermath of a data breach disrupts normal business operations. Companies must take remediation efforts and put in place enhanced security measures. These can divert resources away from core business functions. The company feels the impact across departments, affecting productivity and efficiency. The ripple effect of operational disruption can extend for years. This impedes growth and hinders the organization's ability to adapt to market changes. Customer Churn and Acquisition ChallengesA data breach often leads to customer churn. Individuals lose confidence in the business's ability to protect their data. Acquiring new customers becomes challenging. Potential clients are wary of associating with a brand that has suffered a breach. The prolonged effects on customer acquisition can hinder the company's growth. As well as its market competitiveness. A Cautionary Tale for Businesses EverywhereThe repercussions of a data breach extend far beyond the immediate incident. They can impact the financial health and reputation of a business for years. As well as its regulatory standing. The frequency and sophistication of cyber threats continue to rise. Proactive cybersecurity measures are not just a necessity. They are a strategic imperative for safeguarding the long-term success of businesses. The true cost of a data breach is not always immediately evident. It's a complex interplay of things like: Financial penalties Reputation damage Regulatory consequences Operational disruption These impacts can persist for years. It’s important to learn from real-world examples. As well as focusing on robust cybersecurity measures. This helps businesses mitigate the risks associated with data breaches. As well as safeguarding their immediate interests and their long-term viability. Need a Cybersecurity Assessment to Prevent an Unexpected Breach?There are many ways that hackers can breach a network. From endpoints to cloud tools, you must run a tight security ship. Need some help? Schedule a cybersecurity assessment today. This is the first positive step into understanding and addressing your risk. As well as avoiding the consequences of a data breach. Article used with permission from The Technology Press.
These 7 AI Trends Are Sweeping the Cybersecurity Realm " 7 ประโยชน์ของ AI ที่ช่วยกวาดล้างภัยคุกคามทางไซเบอร์ " ศักยภาพของ AI ไปไกลกว่าที่เราคิด เพราะมันช่วยเพิ่มความสามารถให้กับองค์กรในการป้องกันภัยไซเบอร์ได้มากกว่าที่คุณคิด ไม่ว่าจะเป็น 1. ช่วยกรองและคาดการณ์ ภัยคุกคามด้านข่าวและข้อมูล 2. ช่วยวิเคราะห์พฤติกรรมออนไลน์ไซเบอร์ 3. รองรับระบบรักษาความปลอดภัยแบบอัตโนมัติ 4. Explanable AI (XAI) มีตัวช่วย อธิบายการตัดสินใจต่างๆของ AI รวมถึงแสดงหลักฐาน ที่มา ของการตัดสินใจนั้นๆ ส่งผลให้เราสามารถวิเคราะห์เบื้องต้นก่อนได้ว่าสมควรจะเชื่อการตัดสินใจดังกล่าวหรือไม่ 5. ช่วยเสริมความปลอดภัยการใช้งานบนระบบคลาวด์ 6. ช่วยหลอกล่อ และวางกับดักรับมือการโจมตีไซเบอร์ 7. เป็นฟันเฟืองสำคัญในการทำ Zero Trust ความปลอดภัยทางไซเบอร์ เป็นจริงได้แค่เราเริ่มลงมือทำ อย่าปล่อยให้สายเกินไป จนเรารับมือไม่ทัน
How I Prompt: 10 Leaders Share Their Favorite AI Time-Savers From ‘What are our top challenges?’ to ‘Summarize this email thread,' Microsoft executives share their favorite AI promptsDrop a few simple conversational prompts into AI, and the results are pretty astonishing. But these tools also have a deeper potential to transform how work gets done for those who learn how to fully leverage it.Think of generative AI as a digital assistant that augments your own knowledge and capabilities. If you take a few seconds to give it context and explain your goals, you can create things faster, complete tasks with ease, and lessen your cognitive load.As you experiment, you’ll develop your own approach to collaboration. To help you get started, we asked 10 leaders here at Microsoft how they use prompts to boost creativity, save time, and stay focused on the most meaningful and rewarding parts of their jobs.Sumit Chauhan, Corporate Vice President, Office Product GroupWhen I get in to work in the morning, I’m already behind. There are unread emails and chat messages to catch up on while I’m simultaneously jumping into my first meeting. With Copilot in Outlook, I can type summarize, and boom—I have a pretty accurate rundown of the highlights of a long thread. Or let’s say I have to generate a deck based on documents, emails, previous presentations, what have you. I can go into PowerPoint and say, generate me a deck based on these things, and I get an outline or a draft of a deck. Just that one thing saves me an enormous amount of time.Jared Spataro, CVP, Modern Work & Business ApplicationsWhat makes Copilot feel almost magical is the fact that it has a deep understanding of me, my job, my priorities, and my organization. It knows my entire universe of data at work. I can write:Quickly summarize the meeting I had at 11 a.m. yesterday.Who attended?What decisions were made?Give me a sense of what you think the next steps should be.Put that summary into an email to Jun, and propose a time when we’re both free next week to discuss.Write it in Japanese.Colette Stallbaumer, General Manager, Microsoft 365 and Future of WorkTime is our most precious resource, and Copilot helps me reclaim some of that time at work. During a busy day, my most frequently used prompts start with “Find me”:Find me the Q2 news deck that Marta shared in a meeting this week.Find me the most recent Work Trend Index research document from Grace.Find me the hybrid work playbook we created in 2021.No more hunting for specific documents, decks, or emails. Copilot combs through all my folders and files to quickly find what I need—even if it’s a file I haven’t accessed in years. I find it saves me time and helps me stay focused on the strategic and creative work that matters most. Amy Coleman, CVP, Human Resources & Corporate FunctionsOnce a week, to keep myself informed and prepare for meetings with global HR partners, I ask Copilot:What are the top challenges facing global HR organizations this week in September 2023?What about in Australia, 2023?Are HR trends in the US for September 2023 different than the HR trends in Germany for September 2023?Show me HR research across all of our global offices from the past three months, 2023.Who are the top voices talking about these challenges?It opens the door to possibilities rather than simply coming to a conclusion.Jaime Teevan, Chief Scientist & Technical FellowWhen I’m reading an article, I get better summaries when I say, summarize this article for a Microsoft executive with a particular interest in research than when I just ask for a summary. Or if I’m trying to think critically about the article, I might follow up by telling it what I want the reply to look like: What questions should that exec ask of the article? Please include answers to the questions, quoting the article when possible. Basically, I get better replies by including details and direction.Deb Cupp, President, AmericasI meet with a lot of customers. There are often a lot of ideas generated and action items assigned during these meetings. When I need to send follow-up emails, I rely on Sales Copilot to kick-start the drafting process. I just tell it to generate a response, and it looks at my previous email exchanges with that customer, recent notes from the Teams call, as well as any relevant data from the CRM, and suggests an appropriate response email. I can take that and make some edits of my own before hitting send. These prompts are like my personal shortcuts to staying organized and nailing communication, even on the busiest workdays.Jon Friedman, CVP, Design & ResearchI don’t write code. But I wanted to write JavaScript for an app that ran on mobile devices, so I prompted the AI with all the things I wanted the app to do, and it spit the code back at me. Then I asked, where do I put this code to look at it more carefully? It told me where and helped me troubleshoot errors. I didn’t just ask it to do something for me; I asked it to teach me too. It was like collaborating with a patient programmer.Kathleen Mitford, CVP, Global Industry MarketingPrompts like, write a list of… or compare… or give me examples of… give me interesting options and possibilities, and help me to explore creative ideas and build new work habits. Communication and iteration is key at work, and that includes communication with AI. I observe how Copilot responds to my prompts, then I ask it to evaluate its own response, then I ask it to iterate again. It’s like an ongoing dialogue, arrived at by testing and learning continually.Merrie Williamson, CVP of Azure Infrastructure, Digital & Application InnovationI am always looking for ways to go deeper in learning about our specific customers. One useful time saver is telling Copilot, highlight key trends and insights in this company’s quarterly earnings report. It’s a quick way to add the additional context I need to drive a great conversation for customer meetings.Tara Roth, CVP, Microsoft 365 Customer Success EngineeringI love the ability to say, surface key action items for Teams meetings. It’s not always perfect, but it gets you close enough that you can then just quickly edit and add or take away whatever you want. I feel like I can be more attentive in the meeting because I’m not worried about taking notes. I can fully engage with the confidence that Copilot will have captured the key items accurately enough that I can then go modify and send out the summary.