Chapter 4

Being Productive, Staying Secure

IN THIS CHAPTER

check Appreciating the intelligent experiences in Office 365

check Using bots to get more done, faster

check Securing email communications with encryption

check Troubleshooting Outlook issues

We live in a world where the line between our personal and professional lives is becoming more blurred every day. Our personal mobile devices also function as our work phone. We check work email at home from our smartphones. During breaks (and sometimes not) at work, we use our work laptops to tweet. People in the marketing department may use the same device to post corporate news on the company’s Facebook page as well as post selfies on their personal Facebook accounts.

The Bring Your Own Device (BYOD) strategy is increasingly being adopted by organizations. As an employee, it’s great to be able to use the latest iPhone you stood in line for to get work done instead of fighting with a locked-down company-issued device. For the company, a BYOD policy means more productivity and reduced cost.

While there certainly are upsides to the merging of personal and ...

Get Office 365 For Dummies, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.