
AM-Win Newsletter.
July 2014
In this edition
- Archived copies of our newsletter
- AM-Win latest version information - No Upgrade this month. Version 9.056 is the latest version on the web.
- AM-Win Support Solutions
- Changing the superannuation percentage in AM-Win.
- Bank Reconciliation
- Wage entry and reversals
- Credit notes
- Allocating unallocated funds
- Cash banked in error
- Handling internal work
- Computer Security
- Implement formal security policies
- Microsoft Office tips
- Use the High-Capacity Clipboard in Office
- Make your own quick steps in Outlook
- Whoops
Printing our newsletter articles in PDF format.
Click on the PDF image below each article to view and print article in PDF format. Please note that we will always open a PDF file in a new window.
Archived copies of our newsletters
Did you know that we archive copies of our newsletters for 12 months - if you've missed one or want to chase up an article that you've read click on Newsletter in the top menu on our site and select Newsletter Archives.
Latest Version Information
No new update - Version 9.056 is the latest version on the web.
Click here to download. For program enhancements view "About" in the AM-Win menu after updating. This Version 9 download will upgrade any existing Version 9 of AM-WIN without an Install code or license files.
Don't forget to backup your data before upgrading.
If you have any AM-Win version prior to version 9.0 please click here before updating.
AM-Win Support Solutions
Changing the superannuation percentage in AM-Win.
It will be necessary for you to change the superannuation percentage in your AM-Win from 9.25% to 9.5% as of the first of July. Here's how.
Click the PDF logo below to view/print and save this tutorial.
Going Live with AM-Win
We have many new users going live for the first time and the following documents are designed to assist these clients. For the old hands please bear with us as we republish these documents.
Click link below to view/print and save these tutorials.
Computer Security
Implement formal security policies
You need a security policy for the same reason you need a policy about annual leave, it provides a transparent process by which staff know what is required of them and allows management to monitor and audit security practices against the policy.
Unless it's written down and effectively communicated to your staff they won't know what is required of them.
A security policy is a document that covers the rules and practices that you want your staff to follow when working with e-mail, browsing the Web, and accessing confidential data stored in your system. A security policy can help your organisation reduce security breaches and data loss by helping employees follow through with safe and secure computing practices.
In some cases you may find your customers and/or suppliers demand that you have a security policy in place that they can review - especially if you may be formally linking into their IT systems.
Top Tips
- When creating your security policy, identify and work on securing the IT assets that impact your business the most.
- Implement a process of reporting breaches. If staff are able to report breaches confidentially they may be more willing to report at all.
- Set clear policies on what websites employees can and can not access. Staff need to know what is expected of them when using email and the internet at work.
- Keep your security policy up to date. Review the security policy yearly to ensure it is still relevant.
- Stay up to date on online safety and security issues. Subscribe to the web site of your security provider of choice [e.g. MacAfee,] to keep up to date on the latest security and network vulnerabilities.
In this article:
- Develop clear policies
- Implement a process of reporting breaches
- Develop a code of conduct
- Develop action plans
- Keep your security policy up to date
Develop clear policies
There are a number of issues a security policy should address including why there is a need for one to start with.
The key reasons to have a security policy is that many people using computers are not aware of the security risks and when the organisation has multiple computers and multiple staff members it becomes harder to make sure all the computers are secure and all staff know what to do if there is no security policy.
A security policy may cover:
- Acceptable use - How staff use email and the internet. Should certain websites be blocked to staff? Should there be a restriction on the size of email attachments? There is clear evidence that staff do access pornographic web sites while at work. What is also clear is that the majority of threats to your systems and your business are to be found and downloaded when visiting these types of sites.
- Handling sensitive data - who and how should sensitive data be handled and stored.
- Securing and handling equipment - is there a system in place to track who is using equipment in the organisation?
- Using internet safely - what system is in place to ensure anti-virus, anti-spyware, operating systems, Web browsers and other software are kept up to date?
- Remote access - what is the system to ensure security is maintained while accessing the work from the road or at home?
Implement a process of reporting breaches
Provide a confidential way for staff to report security breaches. It is often difficult for employees to speak out. If you provide a mechanism through which they can safely raise concerns they are more likely to bring problems to your attention earlier rather than when it is too late.
Develop a code of conduct
Develop a code of conduct with your employees about appropriate behavior in the workplace.
You may want to include what is appropriate to discuss in a public forum outside of work. There have been a number of instances publicised in the media where employees have discussed their views on work and colleagues on social networking websites.
Develop action plans
Establish a set of action plans that staff can follow if something does go wrong covering such things as:
- what to do if business equipment is lost or stolen
- what to do if you think a computer is infected with a virus
- what to do if there has been a loss of data
Keep your security policy up to date
Once the security policy is implemented, it needs to become an integral part of day-to-day business activities and general business culture.
You and your staff need to keep abreast of information on current security issues so that the security policy you develop stays up-to-date.
Maintaining the security policy is a day-to-day business activity for everyone, for example, checking email for viruses and logging off the computer from the Internet at the end of the day.
Monitor and test the security policy you have in place to identify potential and actual security problems before they become issues that may cost your business time and money.
Subscribe to the Alert Service of your security software provider of choice [e.g. MacAfee] to keep up to date on the latest computer and internet vulnerabilities and threats.
Click on the PDF logo below if you wish to view or print this advisory in full in PDF format.

Use the High-Capacity Clipboard in Office
Here's a tip that applies to all the major Office apps.
The standard Windows clipboard holds only one item at a time. But in any office app you can use the Office Clipboard, which holds up to 24 items at a time.
Click on the PDF logo below to read or print this tutorial.
Make your own quick steps in Outlook
Outlook's new Quick Steps feature [Office 2010] lets you create one-click (or one-keystroke) e-mail actions. For example, moving a message to a folder you use for archiving messages.
Click on the PDF logo below to read or print this tutorial.
Note:
Please note that we do not provide support for our Office tips as they are provided by a third party. If you need further information why not try using Google - Cut and paste the heading of our tip into Google's search box. You'll be amazed at the information available.
Whoops
We now embed videos from sites such as UTube into our newsletter. You will now be able to download videos and view them in full screen, providing the functionality is available on the host site. Firefox users may need to download the latest flash player.
![]() |
![]()
Office, Excel and Windows logos are the property of Microsoft and are used for reference points only.

