SlideShare a Scribd company logo
1 of 5
Download to read offline
Hackers Prey on
Windows XP
Vulnerabilities
rpeters@rftclouds.com
REACH FOR THE CLOUDS, INC.
12/8/2014
1 | P a g e
Hackers Prey on Windows XP
Vulnerabilities
Even though Microsoft discontinued their support for Windows XP around six months back,
an estimated 1 million users are still using this outdated OS. 44% of all businesses are still
using Windows XP in some capacity. The discontinued patch support for Windows XP is a
direct avenue for hackers to find and exploit vulnerabilities. Several attacks have been
launched by hackers exploiting the critical vulnerabilities in legacy versions of Internet
Explorer. Microsoft has admitted that there are security issues with IE 6 through 11. These
are “drive-by” attacks that the hackers use to hack browsers by tricking people into visiting
malicious websites. These attacks are so serious that the Department of Homeland Security
actually issued a warning (after the attacks) and advised people to not use those versions of
Internet Explorer until the bugs are fixed.
Even though Microsoft lived up to its reputation of being a consumer friendly company and
fixed the bugs in IE by offering patch support to computers running on Windows Vista and
Windows 7, it clearly mentioned that IE browsers on Windows XP would not receive any
patch support.
The “drive-by” vulnerability was the biggest bug affecting Windows XP post patch support
retirement and it's only a matter of time before the hackers are able to uncover more flaws
in IE and launch further attacks on Windows XP. The company claims that Microsoft XP is
66% more vulnerable compared to other platforms now that patch support is no longer
available.
This is serious news for business owners still using XP. An upgrade is no longer an option –
it is an absolute necessity. However, with any OS upgrade comes a unique set of challenges.
First and foremost what happens to your company’s existing data, files and documents?
Modernizing your environment can place the compatibility of your files at risk. Often
documents that play a daily role in your company’s operations can lose functionality due to
incompatibilities with the latest versions of Microsoft Office. Any organization migrating
from legacy Microsoft Office products run the risk of documents not converting with the
same functionality it previously possessed, causing unwanted business interruption,
possibly bad data as well a strain on the IT department to restore the previous functionality
of the document.
2 | P a g e
Your IT Department Needs The Right Tools:
The moment you upgrade from the legacy versions of Microsoft Office to the latest release,
you run the risk of losing the designed functionality of a document.
Let's face the facts - migration could be an arduous job, especially when working with large
amounts of files. If you want your IT department to be able to accurately identify and screen
the vulnerable files, you have to give them the tools necessary for the job. There is always
room for “human” error and that could mean some problematic files getting overlooked and
left behind during an investigation, especially when there are a lot of files to sift through. This
could mean unwanted business interruptions, a strain on your IT department and could
impact your bottom line.
Wouldn't it be great to be able modernize your systems without the associated risks to file
functionality, loss of productivity and additional strain on your IT department?
Here is the cost-effective solution:
The cloud-based application design company, Reach for the Clouds, Inc., has good news for
you. The company specializes in designing applications to simplify and secure the legacy
Microsoft upgrade process. Below are the three components to the RFTC Toolset your
company needs to utilize in order to mitigate the risks of losing file functionality after
converting to the latest version of Microsoft Office from legacy Microsoft Office software:
1. RFTC O365 Detective: RFTC O365 Detective is a light piece of software that will scan
your desktops, servers or file shares looking for known problematic files. The RFTC O365
Detective is truly a “detective” within the toolset as it identifies not only where the files are,
but how many files could be problematic. RFTC O365 Detective was designed specifically to
identify files that are known to have issues when converting from the Microsoft Office legacy
suites to Office 2007, 2010 and 2013. The RFTC O365 Detective can determine the files
containing VB code, charts, passwords, links and Active X components. These are usually the
ingredients that spell trouble during migration. RFTC O365 Detective will identify all files
that have these elements thus defining the scope of the project you have before you.
With RFTC O365 Detective installed you can better define the scope and landscape of your
upgrade project. Arming your team with this data prior to attempting the upgrade will
reduce the loss of productivity due to broken files and the stress caused to an already
inundated IT staff.
3 | P a g e
The user interface on RFTC O365 Detective is super intuitive, easy to use and reflects the
commitment of RFTC to achieve ultimate customer satisfaction. If you want, RFTC O365
Detective will export the results to Excel too!
2. RFTC FileReporter: The RFTC FileReporter is a full scale reporting component of the
RFTC Toolset. The RFTC O365 Detective outputs its finding into XML files and the RFTC
FileReporter takes those XML files and allows the end user to report on the data collected.
These reports provide managers with precise information to make informed decisions for
Microsoft Office upgrade planning and execution. The reporting component of the toolset
proves to be very helpful as it answers a lot of tough questions for project managers. How
many Microsoft Office files and other files exist on the network? Where are the files stored?
Should all files be converted or be shown as a subset?
RFTC FileReporter helps the project manager make vital decisions about their upgrade/
migration project.
3. RFTC OfficeMigrator: The RFTC OfficeMigrator is a key component of the RFTC
Toolset. Now that you have taken the time to identify the scope of the project, you can make
an informed decision on how to utilize the RFTC OfficeMigrator. The RFTC OfficeMigrator
is the part of the toolset that can attempt to automatically convert files that are known to
have issues when using the typical method of converting Microsoft files. As mentioned
previously, the files containing VB code, charts, passwords, links and Active X components
are the typical files that have issues when migrating off of the legacy Office products. The
RFTC OfficeMigrator can perform bulk conversions of these files, saving countless man hours
and taking the guess work out of the Office migration. Often a company will take the
break/fix approach during the migration process. This can often derail even the smallest of
projects. Fixing files often falls upon an already inundated IT staff or the end user, causing
a drop in productivity and wasted man hours. The RFTC OfficeMigrator will report all the
files that were successfully converted, as well as the files that will require further attention.
Time to get down from the fence and embrace RFTC Solutions:
If you are still using XP and utilizing legacy Microsoft Office software, an upgrade is
inevitable. Performing an upgrade should not cost you the functionality of your existing files.
Understanding the landscape of your environment and scope of your project are first and
foremost when attempting an Office migration. Protecting the past efforts that was put into
creating files is a tough job during a migration because you have to first know which files are
going to end up being problematic.
4 | P a g e
The RFTC Toolset can assist with defining the landscape, as well as perform bulk conversions
with full reporting features. Reach for the Clouds, Inc. has the solution for any organization
that has been reluctant to upgrade from the legacy versions of Microsoft Office. The RFTC
Toolset takes the guess work out of the Office migration thus saving countless man hours,
preventing loss of productivity with your workforce and freeing up IT staff to focus on more
pressing issues.

More Related Content

Viewers also liked

Televisi sebagai Media Pembelajaran dalam PAI
Televisi sebagai Media Pembelajaran dalam PAITelevisi sebagai Media Pembelajaran dalam PAI
Televisi sebagai Media Pembelajaran dalam PAIDzihan Farkhiyah
 
Media gambar sholat jum'at
Media gambar sholat jum'atMedia gambar sholat jum'at
Media gambar sholat jum'atDzihan Farkhiyah
 
New Product Development Process: Stages, Activities & Outputs
New Product Development Process: Stages, Activities & OutputsNew Product Development Process: Stages, Activities & Outputs
New Product Development Process: Stages, Activities & OutputsDesign 1st
 

Viewers also liked (7)

Doc3
Doc3Doc3
Doc3
 
Quinntern Project
Quinntern ProjectQuinntern Project
Quinntern Project
 
Televisi sebagai Media Pembelajaran dalam PAI
Televisi sebagai Media Pembelajaran dalam PAITelevisi sebagai Media Pembelajaran dalam PAI
Televisi sebagai Media Pembelajaran dalam PAI
 
Media gambar sholat jum'at
Media gambar sholat jum'atMedia gambar sholat jum'at
Media gambar sholat jum'at
 
Presentation5
Presentation5Presentation5
Presentation5
 
New Product Development Process: Stages, Activities & Outputs
New Product Development Process: Stages, Activities & OutputsNew Product Development Process: Stages, Activities & Outputs
New Product Development Process: Stages, Activities & Outputs
 
Tomato diseases
Tomato diseasesTomato diseases
Tomato diseases
 

Similar to Hackers Prey on Windows XP

Alphabet soup deployment
Alphabet soup deploymentAlphabet soup deployment
Alphabet soup deploymentStephen Rose
 
Ketan Julka CV
Ketan Julka CVKetan Julka CV
Ketan Julka CVKetanJulka
 
computer software
computer softwarecomputer software
computer softwareclouie
 
XP to Windows 7 with MDT
XP to Windows 7 with MDTXP to Windows 7 with MDT
XP to Windows 7 with MDTStephen Rose
 
October 2017 Ivanti Patch Tuesday Analysis
October 2017 Ivanti Patch Tuesday AnalysisOctober 2017 Ivanti Patch Tuesday Analysis
October 2017 Ivanti Patch Tuesday AnalysisIvanti
 
Comparisons And Contrasts Of Windows Ce, Windows Xp, And...
Comparisons And Contrasts Of Windows Ce, Windows Xp, And...Comparisons And Contrasts Of Windows Ce, Windows Xp, And...
Comparisons And Contrasts Of Windows Ce, Windows Xp, And...Cecilia Lucero
 
Deploying An Optimized Desktop - XP to 7 With P2V
Deploying An Optimized Desktop - XP to 7 With P2VDeploying An Optimized Desktop - XP to 7 With P2V
Deploying An Optimized Desktop - XP to 7 With P2VStephen Rose
 
officeautomationtoolsforpowerpointpresentation
officeautomationtoolsforpowerpointpresentationofficeautomationtoolsforpowerpointpresentation
officeautomationtoolsforpowerpointpresentationLeeladhar Kushwaha
 
LincDoc Enterprise Edition brochure
LincDoc Enterprise Edition brochureLincDoc Enterprise Edition brochure
LincDoc Enterprise Edition brochureDan O'Leary
 
Office 2007 uof-u4-07
Office 2007 uof-u4-07Office 2007 uof-u4-07
Office 2007 uof-u4-07Vishal Mehta
 

Similar to Hackers Prey on Windows XP (20)

Sharanabasappa_Resume
Sharanabasappa_Resume Sharanabasappa_Resume
Sharanabasappa_Resume
 
Alphabet soup deployment
Alphabet soup deploymentAlphabet soup deployment
Alphabet soup deployment
 
Ketan Julka CV
Ketan Julka CVKetan Julka CV
Ketan Julka CV
 
Mke15
Mke15Mke15
Mke15
 
computer software
computer softwarecomputer software
computer software
 
XP to Windows 7 with MDT
XP to Windows 7 with MDTXP to Windows 7 with MDT
XP to Windows 7 with MDT
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Software nate(4)
Software nate(4)Software nate(4)
Software nate(4)
 
October 2017 Ivanti Patch Tuesday Analysis
October 2017 Ivanti Patch Tuesday AnalysisOctober 2017 Ivanti Patch Tuesday Analysis
October 2017 Ivanti Patch Tuesday Analysis
 
Comparisons And Contrasts Of Windows Ce, Windows Xp, And...
Comparisons And Contrasts Of Windows Ce, Windows Xp, And...Comparisons And Contrasts Of Windows Ce, Windows Xp, And...
Comparisons And Contrasts Of Windows Ce, Windows Xp, And...
 
Fg b
Fg bFg b
Fg b
 
EGENindepth_v3_recto
EGENindepth_v3_rectoEGENindepth_v3_recto
EGENindepth_v3_recto
 
Winbatch
WinbatchWinbatch
Winbatch
 
Deploying An Optimized Desktop - XP to 7 With P2V
Deploying An Optimized Desktop - XP to 7 With P2VDeploying An Optimized Desktop - XP to 7 With P2V
Deploying An Optimized Desktop - XP to 7 With P2V
 
ResumeCurrent
ResumeCurrentResumeCurrent
ResumeCurrent
 
officeautomationtoolsforpowerpointpresentation
officeautomationtoolsforpowerpointpresentationofficeautomationtoolsforpowerpointpresentation
officeautomationtoolsforpowerpointpresentation
 
Essay On Microsoft Office
Essay On Microsoft OfficeEssay On Microsoft Office
Essay On Microsoft Office
 
LincDoc Enterprise Edition brochure
LincDoc Enterprise Edition brochureLincDoc Enterprise Edition brochure
LincDoc Enterprise Edition brochure
 
Software
SoftwareSoftware
Software
 
Office 2007 uof-u4-07
Office 2007 uof-u4-07Office 2007 uof-u4-07
Office 2007 uof-u4-07
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Hackers Prey on Windows XP

  • 1. Hackers Prey on Windows XP Vulnerabilities rpeters@rftclouds.com REACH FOR THE CLOUDS, INC. 12/8/2014
  • 2. 1 | P a g e Hackers Prey on Windows XP Vulnerabilities Even though Microsoft discontinued their support for Windows XP around six months back, an estimated 1 million users are still using this outdated OS. 44% of all businesses are still using Windows XP in some capacity. The discontinued patch support for Windows XP is a direct avenue for hackers to find and exploit vulnerabilities. Several attacks have been launched by hackers exploiting the critical vulnerabilities in legacy versions of Internet Explorer. Microsoft has admitted that there are security issues with IE 6 through 11. These are “drive-by” attacks that the hackers use to hack browsers by tricking people into visiting malicious websites. These attacks are so serious that the Department of Homeland Security actually issued a warning (after the attacks) and advised people to not use those versions of Internet Explorer until the bugs are fixed. Even though Microsoft lived up to its reputation of being a consumer friendly company and fixed the bugs in IE by offering patch support to computers running on Windows Vista and Windows 7, it clearly mentioned that IE browsers on Windows XP would not receive any patch support. The “drive-by” vulnerability was the biggest bug affecting Windows XP post patch support retirement and it's only a matter of time before the hackers are able to uncover more flaws in IE and launch further attacks on Windows XP. The company claims that Microsoft XP is 66% more vulnerable compared to other platforms now that patch support is no longer available. This is serious news for business owners still using XP. An upgrade is no longer an option – it is an absolute necessity. However, with any OS upgrade comes a unique set of challenges. First and foremost what happens to your company’s existing data, files and documents? Modernizing your environment can place the compatibility of your files at risk. Often documents that play a daily role in your company’s operations can lose functionality due to incompatibilities with the latest versions of Microsoft Office. Any organization migrating from legacy Microsoft Office products run the risk of documents not converting with the same functionality it previously possessed, causing unwanted business interruption, possibly bad data as well a strain on the IT department to restore the previous functionality of the document.
  • 3. 2 | P a g e Your IT Department Needs The Right Tools: The moment you upgrade from the legacy versions of Microsoft Office to the latest release, you run the risk of losing the designed functionality of a document. Let's face the facts - migration could be an arduous job, especially when working with large amounts of files. If you want your IT department to be able to accurately identify and screen the vulnerable files, you have to give them the tools necessary for the job. There is always room for “human” error and that could mean some problematic files getting overlooked and left behind during an investigation, especially when there are a lot of files to sift through. This could mean unwanted business interruptions, a strain on your IT department and could impact your bottom line. Wouldn't it be great to be able modernize your systems without the associated risks to file functionality, loss of productivity and additional strain on your IT department? Here is the cost-effective solution: The cloud-based application design company, Reach for the Clouds, Inc., has good news for you. The company specializes in designing applications to simplify and secure the legacy Microsoft upgrade process. Below are the three components to the RFTC Toolset your company needs to utilize in order to mitigate the risks of losing file functionality after converting to the latest version of Microsoft Office from legacy Microsoft Office software: 1. RFTC O365 Detective: RFTC O365 Detective is a light piece of software that will scan your desktops, servers or file shares looking for known problematic files. The RFTC O365 Detective is truly a “detective” within the toolset as it identifies not only where the files are, but how many files could be problematic. RFTC O365 Detective was designed specifically to identify files that are known to have issues when converting from the Microsoft Office legacy suites to Office 2007, 2010 and 2013. The RFTC O365 Detective can determine the files containing VB code, charts, passwords, links and Active X components. These are usually the ingredients that spell trouble during migration. RFTC O365 Detective will identify all files that have these elements thus defining the scope of the project you have before you. With RFTC O365 Detective installed you can better define the scope and landscape of your upgrade project. Arming your team with this data prior to attempting the upgrade will reduce the loss of productivity due to broken files and the stress caused to an already inundated IT staff.
  • 4. 3 | P a g e The user interface on RFTC O365 Detective is super intuitive, easy to use and reflects the commitment of RFTC to achieve ultimate customer satisfaction. If you want, RFTC O365 Detective will export the results to Excel too! 2. RFTC FileReporter: The RFTC FileReporter is a full scale reporting component of the RFTC Toolset. The RFTC O365 Detective outputs its finding into XML files and the RFTC FileReporter takes those XML files and allows the end user to report on the data collected. These reports provide managers with precise information to make informed decisions for Microsoft Office upgrade planning and execution. The reporting component of the toolset proves to be very helpful as it answers a lot of tough questions for project managers. How many Microsoft Office files and other files exist on the network? Where are the files stored? Should all files be converted or be shown as a subset? RFTC FileReporter helps the project manager make vital decisions about their upgrade/ migration project. 3. RFTC OfficeMigrator: The RFTC OfficeMigrator is a key component of the RFTC Toolset. Now that you have taken the time to identify the scope of the project, you can make an informed decision on how to utilize the RFTC OfficeMigrator. The RFTC OfficeMigrator is the part of the toolset that can attempt to automatically convert files that are known to have issues when using the typical method of converting Microsoft files. As mentioned previously, the files containing VB code, charts, passwords, links and Active X components are the typical files that have issues when migrating off of the legacy Office products. The RFTC OfficeMigrator can perform bulk conversions of these files, saving countless man hours and taking the guess work out of the Office migration. Often a company will take the break/fix approach during the migration process. This can often derail even the smallest of projects. Fixing files often falls upon an already inundated IT staff or the end user, causing a drop in productivity and wasted man hours. The RFTC OfficeMigrator will report all the files that were successfully converted, as well as the files that will require further attention. Time to get down from the fence and embrace RFTC Solutions: If you are still using XP and utilizing legacy Microsoft Office software, an upgrade is inevitable. Performing an upgrade should not cost you the functionality of your existing files. Understanding the landscape of your environment and scope of your project are first and foremost when attempting an Office migration. Protecting the past efforts that was put into creating files is a tough job during a migration because you have to first know which files are going to end up being problematic.
  • 5. 4 | P a g e The RFTC Toolset can assist with defining the landscape, as well as perform bulk conversions with full reporting features. Reach for the Clouds, Inc. has the solution for any organization that has been reluctant to upgrade from the legacy versions of Microsoft Office. The RFTC Toolset takes the guess work out of the Office migration thus saving countless man hours, preventing loss of productivity with your workforce and freeing up IT staff to focus on more pressing issues.