Digital Workplaces and Workflows: Overcoming Resistance to Change

Cost savings, productivity and efficiency improvements are top priority for any business. Embracing digitalisation of operational processes can offer plenty of opportunities for process optimisation and bring about positive change across your organisation.

Recent statistics show that by digitising processes and workplaces, an organisation can gain cumulative cost savings of up to 4.2 percent a year, varying depending on industry.

Benefits of Digitalisation across Different IndustriesSource: Statista

Resistance to change, however, is an intrinsic property of any organisation, whether in a startup or an established business. The only differences are in the specific processes such resistance to change is affecting across your operations.

Let us take a look at some important contributors to resistance and how you can pave the way to harness business technology for your organisation.

Age Is Key Factor in Digitisation Adoption

Widespread adoption of digital tools is inevitable as the workforce grows in fragmentation and an increasing number of roles can actually be carried out on the go or entirely remote. Digital workplaces now include teams on the field and remote workers that are located all over the globe. Even small and medium enterprises are digitising their business operations and workplaces to retain their competitiveness.

Introduction of digital technologies at the workplace is facing resistance, however. Contrary to popular beliefs, the oldest employees are not those who are the most resistant to digital change. A recent survey by Gartner shows that employees between 18 and 24 years of age are most willing to accept change. Older workers, at the age of 55 and over, rank second in openness to new technologies that eliminate routine tasks. The employees aged between 35 and 44 are those you should expect to resist tech adoption most.

So, how you deal with the opposition toward digitisation by your staff in their most productive age?

How to Overcome Resistance to Change

We need to turn to management theory for a moment to understand where the roots of resistance to change lie, and employ working methods for overcoming that very resistance. In 1969, Paul R. Lawrence, Professor of Organisational Behaviour at the Harvard Business School, published an article in Harvard Business Review titled “How to Deal With Resistance to Change”. It addresses the very phenomenon without delving into specific technical details, and offers ideas that are still very relevant in today’s corporations.

A summary of Lawrence’s findings:

  • You need not gamify digitisation by encouraging “participation”, as it may lead to trouble instead of solving digital transformation issues.
  • You must understand the true nature of resistance, since most employees do not resist the technical side of the changes but rather the social change, namely the changing aspects of human relationships.
  • You must assess the resistance as a function of the employees’ fixation with certain technical aspects of those new concepts you want to introduce.

Only after you have good understanding of why and how workers will or are reacting the change, can you move to overcoming opposition against digitalisation. At this point it is encouraged for you to hold plenty of meetings and discussions, to provide a forum where your teams feel heard, and for your leadership teams to promote the positiveness of such changes to the organisation and how they benefit everyone involved.

A working method is to introduce digital workflows and procedures within a larger transformative change that may include adoption of new machinery, network upgrade and expansion, or another business innovation. You should also make every effort to demonstrate the change is an opportunity and not a threat.

It helps if you have a CIO or a long term IT Services Provider on board, but it is not mandatory when you as a business leader understand the goals the organisation wants to achieve by introducing digital methods of work. Your CIO, IT Services Provider, or your leadership teams should be driving the transformation by:

  • Beginning digital transformation from the top.
  • Redefining business processes by placing technology as top priority.
  • Collaborating with all stakeholders and business counterparts to drive the change.
  • Being ambitious with these efforts.
  • Offering help for effortless transition.

It may sound simple, but it is far from it. Moving a complex system to the cloud, for instance, may involve certain technical challenges, however a complete shift to digital workplaces and procedures will involve organisational transformation. Challenging current models and looking beyond current practices is not an easy task for any founder, business owner, or C-level executive.

Your organisation must also overcome obstacles where business units or individuals across your organisation are implementing Shadow IT, when employees are addressing certain problems by implementing their own solutions rather than going through official IT, which then introduces security risks to the business. Being well aware of the entire workflow will enable you to improve on it and adopt applications and data solutions that will work for all of your business units and employees. A half-finished digital solution will face natural resistance from within, and may eventually be phased out altogether.

How to Plan for Digital Workplaces

In light of the above, careful planning is required for the adoption of digital workplaces. For a lasting transformation, first priority should be placed on business strategy to achieve long term goals rather than focusing on sporadic technology. A successful implementation of digital workplaces within an organisation involves a number of critical components.

Essentials of Implementing Digital WorkplacesSource: Gartner

As can been seen from the chart above, one cannot build a successful digitisation solution without a strategy. Digitalisation should be part of a broader business strategy, which takes into account essential factors such as employee skills, business goals, opportunities for consumerisation, as well as your core business specifics.

Planning for digital change will also require rethinking core roles and processes within your organisation. This could result in hostile reactions by internal stakeholders who oppose digital disruptions which may otherwise seem good to an unbiased external observer. You should also plan for initial loss of efficiency if your digital transformation involves a deeper learning curve, which is a common scenario across many industries.

Making informed decisions is a crucial part of the process of digitisation, and it applies to both managers and workers who need to comprehend why the change is necessary and how the entire process will look like. Do not fall victim to the prejudice that all your workers will resist the change for the sake of opposing the adoption of new methods and means of work. Once they understand the need for change and how digital transformation of core processes will benefit all parties involved, natural adaption should follow.

Finally, resistance must be dissected in detail. It oftentimes is result of small technical details not working as planned or omissions in your digitisation plan that in turn produce ineffective workflows. Any change is a dynamic process and transition to digital workplaces will require some time to produce best results. Correcting details on the fly is welcome once you have a broader digitalisation strategy in place.

Is your organisation due for a digital transformation? Speak to our experienced Solutions Architects at Interlinked and we can guide your business through all of the processes discussed above.

Improving Automated Business Processes with Office 365

After the initial implementation of Office 365, organisations will typically spend some time looking at their existing business processes to identify ways that Office 365 can improve them. It’s nearly impossible to move all processes at once, but identifying and improving the most highly utilised ones will certainly assist with organisation-wide adoption of Office 365.

Office 365 comes with a lot of tools and it can be challenging to narrow them down to get a full picture of the pros and cons that may affect a development process. So let’s take a look at some of the questions that frequently arise when reviewing requirements for a business process and how the Office 365 suite of tools might answer them.

Selecting the Right Office 365 Tool

When looking to improve a business process in Office 365 with a no or low-code tool, there are typically three options to consider: Microsoft Forms, SharePoint Lists/Libraries and PowerApps. The first thing to review is the current state of the business process and its complexity. If the process begins with something like simple data entry into an Excel spreadsheet with minimal logic, then Microsoft Forms might be a good fit. Microsoft Forms works well for those who are not very technical and need something simple and straightforward to manage the form. The biggest con of Microsoft Forms is it offers minimal field types and options for logic.

If the field types are more complicated than what Microsoft Forms offers, the next step is a SharePoint list (or library). SharePoint lists offer numerous field types and have some built-in features like views and validation. They are also a great jumping off point to utilize other tools like PowerApps. Libraries should be considered if a document upload is what initiates the business process.

PowerApps come into play when the logic of the form goes above and beyond what SharePoint lists can do out of the box. Think things like cascading dropdowns, repeating tables and connecting to data outside of the current list. Also, with PowerApps there is the bonus of adding mobile apps.

One other consideration is the audience for the business process. If that audience contains unlicensed external users, you may need to stick with Microsoft Forms or SharePoint Lists or Libraries, as PowerApps isn’t currently available for external users.

Finding Your Business Process’s “Flow”

Once the business process has a home, the next step is to establish how the process needs to flow. Use Microsoft Visio, or a similar tool, to map out the exact process. Are there approval stages? How many? Does that data need to be moved elsewhere when the process is complete? These are all great questions to ask when mapping out the workflow.

The main tool for workflows used to be SharePoint Designer. While that is still an option, a lot of people using Office 365 have turned to Flow to replace SharePoint Designer workflows. Like PowerApps, Flow comes with a learning curve. If you are new to workflows, Flow is a much more user-friendly version of Designer.

Flow does have some pre-built templates that come in handy. One example is a template that automatically sends data submitted to Microsoft Forms to a SharePoint list. This is perfect for those who like the user experience of Microsoft Forms but need the data in a SharePoint list for either reporting or to continue a more complex business process.

Visualising the Process

Once automation is up and running, the next thing to consider is how the user will interact with all of it. This can be most easily achieved by using modern pages in SharePoint to give each type of user their own experience in a dashboard view. These pages can contain links to a form, views of lists or libraries, and embedded PowerApps. There is also an option to embed visualisations of data from Power BI. This does require some licensing considerations, but can be extremely helpful for those who need quick answers about the business process and how it is functioning. Microsoft also recently added connector web parts, which allow you to connect and display data outside of Office 365. Creating these robust experiences for users will help with overall adoption and ease the training burden.

Taking the considerations above will get your organisation started with automating your business solutions. If you have questions on how to further apply these to your business, feel free to speak to us! Send us a message or give us a ring on 1300 302 207.

How to set up a rule to send phishing attack alerts in Microsoft Exchange

Empower your employees to easily notify IT security personnel of a phishing attack with a simple Exchange rule. Learn how to set one up below.

When it comes to enterprise phishing emails, the most effective defence is a well-trained and educated workforce. While technologies like artificial intelligence and machine learning may stop many phishing emails from getting through to user inboxes, those tech solutions cannot overcome the careless click of a malicious link when the technology fails.

2018 report from Comodo Security shows that about 50% of an enterprise’s computer using employees will click on a link sent via email from an unknown user without first thinking of the potential consequences. To overcome this lack of urgency, IT professionals should task the entire workforce with the responsibility of immediately reporting phishing emails when they are uncovered.

The Office 365 add-in, Report Message, allows Outlook users to report a phishing or other suspicious email with the click of a single icon on the standard Office Ribbon interface. However, by adding a new rule to Microsoft Exchange, your organisation’s IT security team can also receive a copy of the report and be notified – with no additional effort on the employee’s part.

Set up the Rule

Creating or modifying rules using the following technique requires Exchange Online Administrator authentication status. This tutorial also assumes you have installed and enabled the Report Message add-in for Outlook.

Open the online portal to Office 365 and logon with administrator credentials. Navigate to the Admin Center and then open the Exchange Admin Center submenu. Click the Mail Flow link in the left navigation bar. You should see a screen similar to the screenshot below. (Please note this example has no rules yet)

Click on the Plus button to create a new rule. Name your new rule (Phishing Submission) and then open the Apply this rule if dropdown box. Choose the entry: The recipient address includes. Add these two email addresses to the list as shown in the below screenshot.


In the Do the following box, choose the Bcc the message to entry and add the appropriate security administrator or team as designated by your intrusion detection policy. Set the Audit this rule with severity level to medium, as shown in the below screenshot, and click Save.

Once this rule is established, whenever an employee reports an email using the Report Message add-in, the appropriate security personnel will receive a copy of the message automatically. This will allow your security teams to act swiftly and decisively to mitigate and counteract phishing attacks in accordance with your organisation’s policies.

7 IT Security Tools from Microsoft

When it comes to IT Security, 2017 was not a good year for many people. With data breaches, ransomware attacks, and security vulnerabilities making headlines around the globe, it appears as if both organisations and individuals were under attack.

So, how can you protect your organisation and its data?

Below is a list of 7 IT security tools that are recommended for organisations to increase their security posture. Although this isn’t an exhaustive list, these are relatively easy-to-use and fairly intuitive tools.

1. Windows 10

Windows 10 is Microsoft’s most secure operating system yet. With built-in features like Windows Hello, Microsoft Edge, and SmartScreen, Windows 10 protects your users’ identities, information, and devices from threats with several threat protection and security management tools.

2. Enterprise Mobility + Security

As a comprehensive Cloud solution, Microsoft Enterprise Mobility + Security (EMS) helps your organisation to address the constantly-changing cyber security landscape. By safeguarding your organisation’s resources, EMS helps you track suspicious login activity within your organisation, allowing you to gain a deeper understanding of user, device, or data activities, and also gives you the power to change permissions when necessary.

By including such things as single sign-in access to your corporate resources from any device, EMS is the answer for improved security across cloud, on-premises and mobile devices.

3. Azure Active Directory Identity Protection

Hackers and cyber criminals are becoming increasingly effective in using sophisticated phishing attacks to steal a user’s identity and gain access to your environment. Once that hacker gains access – no matter who it is within your organisation – it’s relatively easy for them to gain access to more important content.

Azure Active Directory Identity Protection helps protect your organisation by allowing you to configure risk-based policies that will automatically respond to detected issues if the risk level you specified has been reached. Azure Active Directory Identity Protection can use adaptive machine learning algorithms and heuristics that will detect suspicious incidents or anomalies to generate both reports and alerts for you to review. These will let you evaluate what issues have been detected, then allow you to take the necessary steps to either mitigate or remove the threat.

4. Windows Information Protection

As a part of the Windows 10 Anniversary Update, Windows Information Protection (WIP) was introduced to integrate with other Microsoft products like Office 365 and Azure Rights Management in order to increase your security posture. Designed to prohibit corporate data from leaking into personal or public domains, Windows Information Protection helps maintain control of your data. With Windows Information Protection, you can identify personal and business data, determine the apps that can access it, and provide basic controls to help determine what your users can do with business data (for example, you can limit your employees’ ability to copy and paste data to an unsecured location).

5. Office 365 Advanced Threat Protection (ATP)

Office 365 ATP is a multipurpose add-on to many of the Exchange and Office 365 subscription plans. With features like Safe Attachments (protecting you from unknown malware and viruses), Safe Links (proactively protecting your users from malicious hyperlinks in email messages), Spoof Intelligence (detecting senders who are spoofing your domain by pretending to be someone else in your organisation), Quarantine, and advanced anti-phishing capabilities, Office 365 ATP helps protect your organisation’s email, files, and Office 365 applications from any unknown malware or viruses.

Helping you gain critical knowledge of who in your organisation is being targeted, Office 365 ATP can give you insight into which users are clicking on malicious links, and investigate which messages have been blocked because of unknown viruses or malware.

6. Office 365 Data Loss Prevention

No organisation wants to find out that their users are passing along sensitive information. So, with Office 365 Data Loss Prevention, you can empower your user to be more conscious about your company policies surrounding the sharing of sensitive information.

Through the Exchange Administration Centre in the Office 365 admin portal, your email administrators can set up policies that will tell your Office 365 Data Loss Prevention tool to scan through your user emails (in the background). If the tool determines that a policy is about to be breached, a Policy Tip will pop up in the email window that alerts your users that they are about to pass on sensitive information.

7. Office 365 Advanced Security Management

Included in the Office 365 E5 (and available to the other Office 365 enterprise plans for a small fee), Advanced Security Management for Office 365 gives you greater control and visibility over your Office 365 environment in these three areas: threat detection, enhanced control, and discovery and insights.

Enhanced control lets you set up policies that track specific activities, like flagging when someone downloads more than they usually do, when someone has multiple failed sign-in attempts, or when someone signs in from an unknown or risky IP address. With threat detection, you can set up anomaly detection policies that will alert you of potential breaches in your network. And with the app discovery dashboard, your IT professionals can see your organisation’s Office 365 and other Cloud services usage, which in turn allows you to maximise your investments in IT-approved solutions. Plus, Advanced Security Management for Office 365 will help you determine if there’s any activities from shadow IT occurring within your organisation.

Unsure which product is best for your business?

To find out more about which solutions are the most suitable for your organisation, contact us today.


Microsoft Teams for Mobility and More

Today, 61% of employees say they work outside of the office at least part-time, and that number is gradually increasing. As staff continue to adapt and evolve in today’s digitally-transforming landscape, it’s important to ensure that your business is equipped with the right tools to facilitate collaboration.

Solutions like Microsoft Teams are designed to ensure that experts can continue to communicate with their colleagues, contribute to workflow, and produce exceptional results regardless of where they are.

With the dedicated Microsoft Teams mobile app, users can view shared content, connect through chat with meeting participants, and catch up with various tasks, all within a convenient, easy-to-use application. So, what makes Teams so beneficial for remote workers?

Easy-to-Adopt with a Simple UI

The mobile user interface for Teams is simple, with a minimalist navigation menu that makes it easy for users to find the chats and activity feeds that are relevant to them. Users can check recent conversations, mentions, and team actions within a matter of minutes, and everything is organised chronologically for the best results.

Effective Mobile Device Management

Another thing that gives Microsoft Teams the edge for mobile workers is the fact that CIOs and admins can maintain all the control they need over mobile devices, using Intune for Office 365, which allows your organisation to:

  • Manage which mobile devices the workforce can use to access business data
  • Manage the mobile apps that the workforce uses
  • Protect and control the way your team can access and share information
  • Ensure that apps and devices remain compliant with security requirements

A Simple but Valuable Feature Set

The features available on the Microsoft Teams mobile app are designed to be easy to use and access. The most prominent tools available include chat and calling. Chat comes with things like photo uploading, rich text editing features and more.

While Microsoft Teams might not have the widest selection of features available on the market, there are numerous add-ons available so that you can basically build the team collaboration software of your dreams. With the Teams Mobile app, remote workers can tap into the rich desktop experience of Teams collaboration and plug into an array of third-party services without ever having to switch to another tool or provider. All that, and the app is extremely easy to use, which ensures that you don’t have to bring remote workers in for training.

One point worth noting is that the Microsoft Teams application does work more effectively for file editing through mobile if you have other Microsoft Office 365 applications installed too. This may be something to consider when building a suite of tools for your mobile workers.

A Host of New Microsoft Teams Features

Microsoft recently announced a new suite of features intended to appear within Teams throughout 2018, including the delivery of new inline messaging translations between a range of languages in chat and conversation channels. There’ll also be a background blurring option for video calls, proximity detection to add Skype systems to meetings, and mobile sharing facilities too. Mobile sharing will mean that attendees can share video live streams and photos from their mobile devices.

Alongside the huge selection of planned features, Microsoft has announced new calling features for the enterprise-grade system, including call delegation and consultative transfer. There’s also Direct Routing available, which allows customers to integrate their existing telephony with Teams.

Additionally, Teams will also be available across a range of meeting room devices, including the Microsoft Surface Hub, and a selection of partner-created devices like those from HP, as well as Plantronics and Polycom.

Bringing Voice Computing to the Workplace

Microsoft has announced new features that will help users to transcribe, record, and save meetings in the cloud. The anticipated inline message translation function will also integrate with Microsoft’s very own voice assistant, Cortana.

According to Microsoft, their decision to integrate Teams with Cortana should help users to make calls more easily, join meetings, and add people to conferences using nothing but natural language.

During this year, Teams will see the arrival of cloud recording – another solution that will take advantage of recent developments in cloud technology. Teams will have the opportunity to record meetings with nothing but a click and create automatic transcriptions of whatever was said. Attendees in meetings will be able to play back key parts of their recordings with the help of transcription guidance.

Microsoft has suggested that the transcription service will be upgraded in the future with facial recognition to make sure remarks are properly attributed to the right people.

Teams is Gaining Traction

Alongside all the recent updates, Microsoft also gave an insight into the popularity of Microsoft Teams, with 200,000 customers currently in the Teams environment, over 181 markets, using 39 different languages.

Are You Ready for Teams?

To learn more about enabling your teams with Teams, contact us today.

Is your business on ISDN? Upgrade before you’re disconnected.

In 2016, Telstra announced its decision to cease sale on its ISDN products and other special services as of June 2018. This is due to the nationwide rollout of the National Broadband Network and the incompatibility these products face with the new technology.

Telstra’s anticipated final disconnection will occur in 2022 – but businesses could begin losing services as early as 2019 depending on their location.

Affected services include:

  • ISDN2
  • ISDN2 Enhanced
  • ISDN10/20/30
  • DDS Fastway
  • Megalink
  • Frame Relay

Important dates:

  • 31 January 2018 – New ISDN service unavailable for customers who do not already have ISDN in place
  • 30 June 2018 – Full cease sale on new or additional ISDN services for all customers
  • June 2019 – Disconnection will commence for existing ISDN connections
  • By 2022 – All ISDN connections will be disconnected and full network will be decommissioned

Companies that currently utilise an ISDN service should start considering an upgrade.

If your business hasn’t transitioned to a compatible product within eighteen months of the NBN becoming available at your address, your services will be disconnected. This could mean permanent loss of your phone numbers and disruptions to your business.

You don’t have to wait until the final disconnection date. Interlinked can help your business migrate to an IP system today that is fully customisable and compatible with ADSL and NBN. On top of functionality and compatibility, it can also cut down on costs by reducing the cost of all your calls.

To assist with your migration, Interlinked can help your business evaluate the below:

  • Upgrading your existing phone system vs buying a new one
  • Selecting a hosted VoIP system vs an on-premise VoIP-enabled PBX
  • Network capacity and speed – your internet connection may need to change to accommodate for voice quality

Next Steps:

  1. Speak to us for a free consultation
  2. Interlinked will tailor a new solution based on your business’ needs
  3. We will take care of all paperwork and migration processes

To find out if your address is NBN-ready, click here.

For details of Telstra’s announcement, click here.

Track, secure and control corporate devices under one single system

The Interlinked Mobile Device Management (MDM) service allows you to manage and secure the increasing volume and diversity of both ‘bring your own device’ (BYOD) and corporate-owned devices.

Here’s a quick overview of our MDM solutions powered by Microsoft’s Enterprise Mobility + Security products, and how Interlinked can help your business stay in control:

To learn more about protecting and controlling your business devices, contact us today.

Notifiable Data Breaches Scheme – Quick Facts & Answers

Australia’s Notifiable Data Breaches (NDB) Scheme went into effect recently in February 2018.

Cyber security is now more important to Australian businesses than ever, and IT leaders can expect questions and concerns from key stakeholders about what the new laws mean for their organisation.

Here are some easy-to-understand answers to the most common questions, or simply download our NDB Fact Sheet.

Who does the new Notifiable Data Breaches Scheme affect?

Australia’s Data Notification Law came into effect on February 22, 2018. It applies to businesses governed under the Privacy Act 1988 – including any with annual turnovers of $3 million, or businesses that collect and store sensitive user information like payment or personal data. If a data breach will likely result in “serious harm” to individuals, whether reputation, finances, or safety, you are required to notify the relevant parties. Failure to do so can incur fines of up to $1.8 million.

How big is the impact?

According to the 2017 Cost of Data Breach Global Study by Ponemon Institute, 1 in 4 organisations with top cyber security defences still experience data breaches. 90% of a cyber attack’s bottom-line impact is felt up to two years after an attack. It is important to recognise that data breaches are not an “if” scenario, but “when”. The new data breach laws add hefty fines and heightened public scrutiny on top of many other consequences of a breach, including: loss of sales and contracts, compromised IP, and legal action. Customers and shareholders will hold business leaders responsible for non-compliance with these laws.

What do we do when a breach is detected?

Verified breaches must be reported to the Australian Information Commissioner and all affected individuals, along with descriptions of
the breach, the nature of any compromised information, and recommendations to individuals on what they should do next. The law gives organisations only 30 days to investigate any suspected breach, or plug any possible data loss, before notification is required.

How can you protect your business against breaches?

Monitor your networks. According to the Cost of Data Breach Global Study, it takes an average of six months to discover a data breach. It’s critical to have a robust monitoring system not only to help you and your team identify and stop threats more consistently, but also to make compliance with data breach notification laws much simpler. The more visibility you have into your data and networks, the easier it is to give details to regulators and the public if a breach occurs.

Download our NDB Fact Sheet for quick sharing with your business leaders and colleagues.

Have concerns or want to learn more about the NDB Scheme? Contact Interlinked today.

Is your data backup solution up to date?

Data backup technology has drastically evolved throughout the past decade to meet the rapidly increasing amount of business data.

Here’s a look at the latest in our backup solutions and how Interlinked can help your business get back up & running in a matter of seconds:

At Interlinked, we specialise in no hassle automated backup plans that offer cost effective data protection to ensure business continuity.

To learn more about protecting your business data, contact us today.

Office 365 updates for January 2018

2018 kicked off with some new updates to Office 365 apps across all devices. Microsoft Office’s CVP Kirk Koenigsbauer detailed some of the new Office 365 updates in a blog post.

Here’s a quick summary:

  • Get more out of Microsoft Teams: The biggest Microsoft Teams update so far brings a new app store for add-ons, support for slash commands, improved search, and more.
  • Office apps on Mac and iOS: Microsoft is bringing AutoSave support for Word, Excel, and PowerPoint to Office 365 subscribers on Mac devices, which means you will no longer have to manually save files that are stored on OneDrive. Co-authoring for Office apps on Mac and iOS also opened up general availability this month.
  • OneDrive for iOS: OneDrive is getting a huge update on iOS — including a refined look, support for drag-and-drop, support for iOS 11’s Files app, and more.
  • Education push: Last week, Microsoft announced some major education-focused update for the entire Office suite. The company is expanding Office’s Immersive Reader and other Learning Tools to more devices, including Mac devices. In related news, OneNote’s Class Notebook is getting support for two of the most popular school information systems.
  • New ways to Yammer: You can now share GIFs, post announcements to groups, and more using Yammer on mobile and desktop.

For more details, check out the full blog post from Microsoft.