Office 2016 is the latest version of Microsoft Office, a suite of servers, services and applications. The productivity suite is available for Windows and Mac both. Office 2016 Windows version has the following features:
Ability to create, open, edit and save files in the cloud directly from the desktop
A new search tool named Tell Me for commands in Word, Outlook and Excel
Co-authoring in real-time with users connected to Office Online
A designer sidebar and animations in PowerPoint
New chart types and templates in Excel
Feature for inserting your online video in OneNote and more
However, Office 2016 latest version for Mac includes features like updated user interface, complete support for Retina Display, amazing sharing options for Office documents, Chart feature in Excel, Pivot Table Slicers and more.
To meet different needs of the users, Office 2016 is available in the following versions:
Home & Student
Home & Business
Home & Student
Home & Business
Before you install Office 2016, make sure your system fulfils all the specifications required for it. This step is necessary to avoid any kind of errors due to incompatibility of the operating system or others. Office 2016 goes perfect with Windows 10 operating system. But, with this also it may find some issues. One of the most common issue that may happen is frequently crashing of the Office suite when try to open a new document.
If you are also experiencing the same issue and looking out for a solution that can fix it out, then this article is just for you. Have a look over the below mentioned troubleshooting steps:
Right-click the Windows Start button
Choose Control Panel from the program list
Set the view as “Category View”
Under Programs category, choose Uninstall a Program
Now, right-click the MS Office product you want to repair and choose Change
In the next step, you will be asked “How would you like to repair your Office program?”
Choose Online Repair to fix the issue
Now, select Repair
You can also go for Quick Repair, which runs faster but fixes corrupted files
On the other hand, Online Repair initiates an uninstallation process, which further takes longer time
Once everything is done, restart your device
If the problem still persists, contact Office.com/setup. The team of certified technicians will be glad to assist you with the best possible solution. The best part of the Office customer care service is that they operate 24*7; so you can contact them as per your convenience.
Ellie Williams is a passionate writer who loves to write about the most latest technological changes and errors associated with them. She has also written hundreds of blogs on web browsers, Office errors, antivirus, mobile phones, gadgets and other related stuff.
When you enter your legitimate Product Key, the Activation Wizard consequently runs. The Activation Wizard gives both of you decisions on the best way to continue:
Actuate by utilizing the Internet The Activation Wizard naturally contacts the Microsoft permitting servers through your Internet association.
On the off chance that you are utilizing a legitimate Product Key that has not as of now been utilized for the permitted number of establishments, your item is initiated quickly.
When you actuate through the Internet, your item ID (got from the establishment Product Key) is sent to Microsoft through a scrambled exchange.
A reaction (the affirmation ID) is sent back to your PC to initiate your item. On the off chance that you initiate your item through the Internet and you are not effectively associated, the wizard cautions you that there is no association.
Initiate by utilizing the phone You can phone an Activation Center and enact your item with the assistance of a client benefit delegate.
Phone actuation may take longer than initiation through the Internet. You ought to be at your PC when you call, and you ought to have your Product Key accessible.
With the last arrival of Microsoft Office 365 (Home Premium), Microsoft has found a way to change its amusement. The most recent office suite is drastically not quite the same as past variants of Microsoft Office, from how it’s conveyed to what’s incorporated to how it’s estimated.
The uplifting news is the vast majority of the progressions are greatly positive, a huge reason Microsoft Office 365 Home Premium release remains an Editors’ Choice here at PCMag. Despite the fact that change is great for this situation, there’s still a considerable measure you have to know before choosing to purchase or introduce the suite. Here are ten of the most imperative certainties about the new Microsoft Office 365.
1. In the cloud. Microsoft Office 365 is “in the cloud” from two points of view. In the first place, purchasing the suite essentially requires downloading it, which is to state, you can’t get it on a plate (the special case being in creating nations, where Microsoft will keep on selling circles). Second, the workplace suite itself is set up to spare your records to the cloud, SkyDrive for this situation, on the off chance that you so pick. You do at present have the choice to spare documents locally, however the applications coordinate firmly with SkyDrive.
2. Cost and membership show. Microsoft Office 365 Home Premium is presently being sold in the membership model, and it costs $99 every year for a whole family unit to introduce (more points of interest beneath). A portion of alternate adaptations of the suite are sold as a “ceaseless” permit, which means one duplicate of the product is authorized to just a single machine, yet that permit is useful forever.
3. Permit useful for five gadgets. Paying a membership charge for Microsoft Office 365 Home Premium has one enormous preferred standpoint: You can introduce Office on up to five gadgets, and these can incorporate the two Windows machines and Macs. Microsoft says you’ll have the capacity to introduce the suite on extra, select cell phones “when accessible,” which is an obscure method for not promising applications for the enormous two versatile OSes, while as yet dangling the carrot.
4. Working frameworks. You can introduce Microsoft Office 365 on machines running Windows 7 or 8 (however not Vista or XP). When you introduce the product on a Mac running OS X (10.5.8 and higher), you’ll really get Office 2011 (full form), as opposed to Office 365.
5. Applications included. The Home Premium variant of Office incorporates Word, Excel, PowerPoint, Outlook, Publisher, OneNote, and Access. OneNote is excluded in the Mac rendition, nonetheless.
6. Must introduce all applications. You can’t alter your establishment of Office 365 Home Premium by picking not to introduce a portion of the applications. The entire suite gets introduced in spite of whether you intend to utilize, say, Microsoft Access or Publisher.
7. Deals with touch-screen gadgets. The new Office is intended to deal with touch-screen gadgets, similar to tablets and touch-screen PCs running Windows 8. (See my initial hands-on early introductions of the suite on the touch-screen gadget.)
8. Incorporates 27GB distributed storage. As said, Office 365 was intended to coordinate firmly with SkyDrive, Microsoft’s response to Google Drive. Each SkyDrive client gets 7GB space allowed to begin, and Home Premium supporters of Microsoft Office 365 get an extra 20GB of space, giving them an aggregate of 27GB.
9. Free Skype minutes. One perfect liven that is barely noticeable is that Home Premium endorsers get 60 free Skype minutes for each month to call landlines in bolstered nations. Skype-to-Skype calls are constantly free, yet for times when you have to dial a universal landline number, you can utilize your free Office minutes.
10. Extra forms and rebates. Home Premium is only one of a few cuts of Microsoft Office that is accessible. The Office 365 business versions are expected to be discharged on February 27. College understudies and personnel can likewise get a major rebate for an Office bundle that is a little pared down, however considerably less costly at $79 for a long time, usable on two gadgets.
A Security Researcher from Israel Amit Dori, who works with Votiro, has first talked about this problem. He says that the Cybercrooks can host a beautiful video on the servers and then they may add Cryptojacking Script to Monero or to other Cryptocurrency. But when the user clicks on the video’s playback button, the browser gets launched. CoinHive or another such popular miner gets started earning crypto to the far away scammer.
This sort of problems can be averted if MS-Word started to whitelist such domains and allows only YouTube or Vimeo Videos to get played. Some Security- Researchers are against of such solution. The hidden web browser mining has, on the other hand, has explained that this can be possible if the user doesn’t close the video, for a long time.
As per Dori, for their smooth transformation from one video to another, the hacker may upload longer video or short videos. Nowadays, the people desire to watch and download videos on YouTube more than in any other Channel. But the question is who are going to watch or download movies in MS-Word?
The Hackers have to persuade a thousand of users on the regular basis to open up Word booby-trapped documents, to make a profit out of that. They have understood the point that the people mostly, open the video-streaming services and stay there for a long time.So they are now trying to hack the services and place crypto miners over there because people while watching any movies usually never recognize high CPU and Processor loading. The hackers are earning high profit through the websites like a torrent, porn sites, game portals and other resources with pirated content.
The other products of MS-Office are secure because it provides access to certain domains. The online video facility is available in MS-Office other products like OneNote and PowerPoint.
Amit Dori’s detention for the Cryptojacking can be used for the other purposes also, other than the same. For example, the hackers may push scripts into the Word player.The Internet Explorer window makes it easy to get the certain information from the inspected person. For example, the hackers may place regulation on the viewers, who couldn’t able to access the authentication procedure and personal data.
Word macros are very famous among the malware users. The MS-Office Word was used by the hackers to evolve malignant scripts.Recently, Researchers has detented the OLE function of MS products and have asked to be careful while working with MS-Word which has attached videos. One should always download the fresh updates which include the Internet Explorer window. When Amit Dori informed Microsoft about the security issues but they have neglected it. Thus, the user must be very careful while watching any videos on MS-Word, should use VPN to their traffic and not type anything on their personal data, especially from an unknown server.
Microsoft or MS word itself is an abbreviation of Micro Computer and Software and has its headquarters in Washington. The American multinational company is known for manufacturing, developing, licensing, supporting, and selling computers, computer software, hardware and many other products. Among all its Office productivity suite has won hearts of almost all the computer users globally. Just like the previous versions, the latest version of the Office suite, i.e. Office 365 is also available for both consumers and businesses. Since launch, the Office setup 365businessversion has helped both small and large businesses to expand their business.
Even in the recent Tech Summit in Cape Town, Microsoft has talked about its initiative of Office 365, which is further a combination of three products. The complete Office 365 package incorporates Office 365, Windows 10 and Enterprise mobility and Security. Combination of the three collections, put together gives a complete toolset for the MS office. It aimed at forming the business in the organization in a more productive way. This helps the business in the digital marketplaces with more productivity and improving coordination. Microsoft stated that the companies will come up with around 50% of workforce by 2020 and the global workforce around 42% will be dealing in mobile.
The main issues faced by the company today are Cyber threats. Microsoft has recently said in an interview that around 74% of the companies think that they will be hacked by the next year. With the recent changes, MS office offers services of One Drive, to save the work -documents, presentation in the drive. It is helping the employees from -any forms of losses of data and information, working on different hardware with ease and helping to present all the notes on the meeting, without the use of paper.
Microsoft 365 is helping IT department with saving its employees credentials without causing further turmoil. They are also reaching towards business partners to use Office 365, by teaching them to use it. Other than that MS 365 is reaching to all the three fields by and large – Business, Enterprise and Education and these three has different usages.
For Business purposes, Microsoft office 365 is offering an easy and available packages along with the three combinations- Office 365, Windows 10 and Enterprise mobility and Security. For Enterprise purposes, Microsoft office 365 is offering extensive features of these three combinations, along with the huge control level. And for the Education, keeping in mind the students Microsoft Office 365 is offering easy features, that includes the student license with free of cost.
These services are provided keeping in the mind the core principles which includes efficiency, enhancing the creativity, improving the user experiences in a better way and safeguarding the security, said Microsoft in a report.
Office 365, Office 2013 and Office 2016 are the latest versions of the Office Productivity Suites developed by the Microsoft for its users of different platforms (like Windows, Android, Mac or iOS). All these Office suites are made available to its users in different editions. So to enjoy the applications, services and servers involved in these latest Office Productivity Suite, the users need to download, install and activate the setup to the device.Sometimes the users may face common errors or issues while installing the latest versions of the Office productivity suite i.e. Office 365, Office 2013 or the Office 2016 setup to the device.And one such common installation errors of the Office 365, Office 2013 or the Office 2016 is the Office Error Code 30066. In the below information, I am detailing the troubleshooting steps of the Office Error Code 30066.
The Office Error 30066 is mostly caused due to the following reasons mentioned below:
The office installation has been blocked due to the installed antivirus software or the firewall.
Incorrect Proxy settings or the poor internet connection
Some previous version of the Office suite has already been installed to the device of the users.
The setup files of the previous version of the Office suite have not been removed completely from the device.
Corrupted registry files of the system
Incorrect install files of the Office setup
Insufficient Disk Space
As the Office Error Code 30066 occurs on the device, a message box is displayed on the screen that shows the message as shown below:
“Something went wrong.
Sorry, we weren’t able to download the Office introduction. If you’d like you can take a look online or skip it for now.
Office Error Code 30066”
The users may resolve the Office Error Code 30066 on the device, by following the troubleshooting procedures mentioned below:
Method 1: Disable the Windows Firewall, Temporarily:
Firstly, launch the “Start Menu” either by clicking the “Start” button on the taskbar or hit the “Windows” key on the keyboard.
Now, click the “Control Panel” option.
The “Control Panel” window will appear on the screen.
From this window, select the “System and Security” option and then, click the “Windows Firewall” option.
Now, select the “Turn off Windows Firewall” radio button in the “Private Network Settings” and “Public Network Settings” sections.
And then, select the “OK” button for saving the changes made by the users.
Now try to install the Office 365, 2013 or 2016 suite setup to the device.
Method 2: Disable the Antivirus Software Installed to the Device:
Launch the user interface or the user console of the antivirus software installed on the device of the users.
Now, select the “Settings” icon or the gear icon displayed at the top-rightmost corner of the antivirus interface.
From the drop-down menu, click the “Real-Time Protection” option.
Now, toggle the button just in front of the “Firewall” option for making it “Disable”.
And then, click the “Ok” or the “Yes” option on the confirmation message window displayed on the screen.
Now, try to install the Office setup to the device, if the error still appears on the screen then, jump to the resolving procedure detailed in the Method 3.
Method 3: Execute the SFC Scan on the Device:
SFC Scan or the System File Checker is the advanced tool or mechanism that checks as well as verifies the missing/ corrupted files of the Operating System installed on the device. Apart from this, this tool also allows the users to restore the missing files too.
Firstly, launch the cmd or the command prompt on the device (Run as Administrator).
Now, on the cmd window, type the command as shown below and then, hit the ‘Enter’ key:
Wait till the scanning process gets successfully completed.
On completion of the scanning process, restart the device and try to install the Office 365, 2013 or 2016 setup to the device.
After performing the aforementioned step wise procedures for resolving the Office Error Code 30066, if the error still persists on the device then, the users may call the Office Customer Support on the Office toll-free number, to get an instant support.
Last September, we announced new capabilities in Office 365 Message Encryption that enable users to seamlessly collaborate on protected emails with anyone. This release included Do Not Forward an out-of-the-box policy that encrypts emails and Office attachments, and restricts the content and email from being forwarded, printed or copied.
Today, we are happy to share that we are releasing another out-of-the-box policy called encrypt only. With the encrypt-only policy, users can send encrypted email to any recipient, whether they are inside or outside the organization, and the protection follows the lifecycle of the email. That means recipients can copy, print and forward the email, and encryption will not be removed. This new policy provides more flexibility in the type of protection that can be applied to your sensitive emails.
This is valuable for organizations that want persistent encryption, but do not want to add additional restrictions. For example, a doctor looking to protect an email containing sensitive personal information, can apply the encrypt-only policy, and the patient receiving the email can easily consume the protected message regardless of their email provider, and forward that email to another trusted party.
With this new, flexible policy, users and admins can apply different levels of protection to best fit their data protection needs.
Read more to understand what the encrypt-only policy looks like and how to apply the policy.
How the encrypt-only policy works
The encrypt-only policy is an out-of-the box policy that can be used without additional configuration, and as the name suggests, only applies encryption to the email. You can apply the policy through end-user controls in Outlook or through automatic admin managed controls in the Exchange admin center. Users can apply this policy to individual emails through end-user controls in Outlook, and Admins can apply this policy automatically to any email that matches the set criteria through admin-managed controls in the Exchange admin center.
Customers that have enabled the new Office 365 Message Encryption capabilities will see the encrypt-only policy first through Outlook on the web and in the Exchange admin center under mail flow rules. Updates to Outlook for Windows and Outlook for Mac are planned for the coming months.
How to send an email with the encrypt-only policy in Outlook on the web
Users can apply protection with the encrypt-only policy by clicking on the protect button and changing the permissions to just encrypt. While the other options encrypt the message, the encrypt option will apply the encrypt-only policy to the message, therefore enabling recipients to forward, copy and print the message.
Applying this option will offer added flexibility for recipients to share the email with other trusted parties while encryption continues to persist and throughout the lifecycle of the email.
In Outlook on the web, users can click on the protect button to change the permissions of the email. Once a user clicks on protect, the users can click on encrypt, to only encrypt the email.Once the encrypt-only policy is applied, the user will see a notification that encryption has been applied.
How to apply the encrypt-only policy through Exchange mail flow rules
As an administrator, you can apply the encrypt-only policy automatically to emails that meet certain conditions by creating a mail flow rule. When you do this, email affected by the encrypt-only policy is encrypted in transport by Office 365.
For instructions on creating a mail flow rule that employs the encrypt-only policy, see define mail flow rules to encrypt email messages in Office 365.
You as an administrator can create new mail flow rule to automatically apply the encrypt-only policy to emails.
How to read encrypt-only email using Outlook on the web and Outlook mobile
Office 365 recipients can easily read and reply to emails that have been applied with the encrypt-only policy using Outlook on the web and Outlook mobile directly from the client.
Users can read the encrypted message natively directly in Outlook on the web and Outlook mobile.
The inline reading experience for Outlook desktop (Windows and Mac) will be available in the coming months. In the meantime, Office 365 users using Outlook desktop will see the encrypted mail as an html mail with an rpmsg_v2 attachment.
How to read encrypt-only emails for non-Office 365 users (on-prem, Gmail, and Outlook.com users)
Non-Office 365 users, receive an html mail with an rpmsg_v4 attachment. Once they click Read Message they are redirected to the Office 365 Message Encryption portal where they can reply, forward, print, or take other allowed actions. More information can be found in this article.
The new encrypt-only policy rolls out starting today as part of Office 365 Message Encryption.
Office 365 Message Encryption is offered in Office 365 E3 and E5, or as an add-on -you can find the full list of where Office 365 Message Encryption is offered here.
Have you been working with Planner in Microsoft Teams? Starting today, you can access all your plans from Teams within the Planner web app. On the Planner hub, you’ll see plans from Teams included within the Recent plans and All plans sections, as well as their associated team and channel information. You can favorite a plan for easy access and then work on it in Planner or open it up in Teams. Planner apps mobile will see this as an update in the next week or so.
Recent plans list showing a plan from Microsoft Teams
For more information about using Planner in Teams, check out this article.
In an effort to shape the next updates on Auto Attendant and Call Queues in Skype for Business Online Phone System, we would like to invite you to take part in customer feedback surveys we have prepared for you.
These surveys are open to all members of Tech Community, and designed to take just a few minutes of your time. Please click on the links below to start a survey in a new window:
Auto Attendants – Customer Satisfaction Survey
Call Queues – Customer Satisfaction Survey
Your time and feedback is much appreciated, and we look forward to hearing from you on your experiences with Auto Attendants and Call Queues in Skype for Business Online!
The General Data protetion Regulation (GDPR), which began as a regulatory requirement, is increasingly seen as a long-term opportunity to establish greater trust with customers and further unlock employee collaboration and productivity in many businesses. The intelligent compliance solutions in Microsoft 365 help you assess and manage your compliance risks and leverage the cloud to identify, classify, protect, and monitor sensitive data residing in hybrid and heterogeneous environments to support GDPR compliance.
Updates in Microsoft 365—currently rolling out—help protect sensitive data and include:
Compliance Manager general availability for Azure, Dynamics 365, and Office 365 Business and Enterprise customers in public clouds.
Azure Information Protection scanner general availability.
In addition to the updates announced today, capabilities in Microsoft 365 help to:
Protect sensitive data in apps and across cloud services.
Support data protection across platforms.
Provide a consistent labeling schema experience (in preview).
We’re also going to expand sensitive data types to include a GDPR template to consolidate sensitive data types into a single template.
These Microsoft 365 updates and capabilities are designed to provide you with an information protection strategy to help with GDPR compliance.
“GDPR is coming. But with Microsoft’s information protection solutions, we will have a more efficient way to handle compliance.”
—Erlend Skuterud, chief information security officer for Yara
Assess and manage compliance risk with Compliance Manager
Because achieving organizational compliance can be very challenging, we suggest organizations periodically perform risk assessments to understand their compliance posture. Compliance Manager is a cross–Microsoft Cloud services solution designed to help organizations meet complex compliance obligations like the GDPR. The Compliance Manager is now generally available for Azure, Dynamics 365, and Office 365 Business and Enterprise customers in public clouds.
“Compliance Manager really adds great additional value for Microsoft Cloud services by providing insights on the relationships between regulation, processes, and technology,” stated IT manager Nick Postma from Abrona, a Dutch healthcare organization that helps clients on their journey to becoming strong and confident members of society through social partnerships.
Perform risk assessments with Compliance Score
Compliance Score—a Compliance Manager feature—enables you to perform ongoing risk assessments on Microsoft Cloud services with a risk-based score reference, giving you visibility into your compliance performance. Each control is assigned a risk weight based on the level of risk involved due to control failure, and as you implement and assess controls, you’ll see your score change. Compliance Score is currently available for Office 365 and will be rolling out to other Microsoft Cloud services soon.
Learn more about the key capabilities and updates for Compliance Manager and Compliance Score at our Tech Community blog.
Protect sensitive data on-premises
Azure Information Protection scanner addresses hybrid and on-premises scenarios by allowing you to configure policies to automatically discover, classify, label, and protect documents in your on-premises repositories such as File servers and on-premises SharePoint servers. The scanner can be configured to periodically scan on-premises repositories based on company policies. Azure Information Protection scanner is now generally available.
Read “Azure Information Protection scanner” to learn more. To deploy the scanner in your own environment, follow instructions in this technical guide.
Protect sensitive data in apps and across cloud services
Since data travels through many locations—across devices, apps, cloud services, and on-premises—it is important to build the protection into the file so this protection persistently stays with the data itself. Azure Information Protection provides persistent data protection by classifying, labeling, and protecting sensitive files and emails.
Microsoft Cloud App Security (MCAS) can read files labeled by Azure Information Protection and set policies based on the file labels. For example, a file labeled as Confidential, with an associated policy of “do not forward or copy,” cannot leave your network via file sharing apps like Box.net or Dropbox. In addition, the service scans and classifies sensitive files in cloud apps and automatically applies AIP labels for protection—including encryption. To learn more about this feature, read “Automatically apply labels to sensitive files in cloud apps” and the related technical documentation.
Support for data protection across platforms
As part of our information protection vision, our goal is to cover all major device platforms. Building on our efforts to support non-Windows platforms, we are now previewing the ability to label and protect sensitive data natively, with no plugins required, in Office applications running on Mac devices. This enables Mac users to easily classify, label, and protect Word, PowerPoint, and Excel documents in a similar manner that you are used to with the Azure Information Protection client on Windows. Considering that a significant amount of sensitive information is in PDF format, as part of our ongoing partnership, we are in the process of working with Adobe to have the same consistent labeling and protection of PDFs available in Adobe Reader.
To learn more about these new information protection capabilities, visit the Enterprise Mobility + Security blog.
Consistent labeling schema experience now in preview
We are previewing a consistent labeling schema that will be used across information protection solutions in Microsoft 365. To start, this means that the same default labels will be used across both Office 365 and Azure Information Protection—eliminating the need to create labels in two different places.
The consistent labeling model also helps ensure that sensitive labels—regardless of where they were created—are recognized and understood across Microsoft 365, including Azure Information Protection, Office 365 Advanced Data Governance, Office 365 Data Loss Prevention, and Microsoft Cloud App Security. Learn more about the preview of the consistent labeling experience.
“Microsoft’s information protection capabilities help you protect and manage your sensitive data throughout its lifecycle—inside and outside the organization,” stated an analyst from KuppingerCole, an international and independent analyst organization headquartered in Europe.
Detect and classify personal data relevant to GDPR
The ability to automatically classify personal data is a critical part of helping you achieve your GDPR goals. Today, we have over 80 out-of-the-box sensitive information types that can be used to detect and classify your data. Soon we will provide a GDPR sensitive information type template to help detect and classify personal data relevant to GDPR.
The upcoming GDPR sensitive information type template will help consolidate our sensitive data types into a single template—as well as add several new personal data types to detect (such as addresses, telephone numbers, and medical information).
To learn more about the current sensitive information types, read “What the sensitive information types look for.” To learn more about how to create and customize your own sensitive information types, read “Create a custom sensitive information type.”
For sensitive emails, Microsoft 365 enables users to collaborate on protected messages with anyone inside or outside the organization via Office 365 Message Encryption.
To provide more flexibility over controlling and protecting personal information shared in sensitive emails, we are rolling out the new encrypt-only policy in Office 365 Message Encryption starting today. Read further about this and other updates in our Tech Community blog.
Get started on your GDPR journey with Microsoft 365
The Microsoft Cloud is uniquely positioned to help you meet your GDPR compliance obligations. Our cloud solution is built for power, scale, and flexibility.
Microsoft 365 brings together Office 365, Windows 10, and Enterprise Mobility + Security—offering a rich set of integrated solutions that help you assess and manage your compliance risk by leveraging Artificial Intelligence (AI) to protect your most important data and streamline your processes with a sophisticated and holistic solution set.
No matter where you are in your GDPR efforts, the Microsoft Cloud and our intelligent compliance solutions in Microsoft 365 can help you on your journey to GDPR compliance. Learn more about how Microsoft can help you prepare for the GDPR and take our free online GDPR assessment.