We talked last month generally about real-time collaboration and why it’s so efficient and effective—see “Stop Mailing Files Around and Use Collaborative Apps.” Now we’re going to explain how to start collaborating in Apple’s iWork suite of apps: Pages, Numbers, and Keynote. Happily, the basics are similar in all three apps.
We’ll focus on the Mac versions here (make sure you have the latest updates!), but note that the iOS versions can participate as full-fledged collaboration citizens (Apple has more details). It’s even possible to use the iCloud versions of these apps for collaboration, but with some limitations (notably that Pages documents with tracked changes can only be viewed, not edited, in iCloud).
Once you have a document you want to share, the first step is to invite your collaborators. Choose Share > Collaborate with Others, or click the Collaborate button in the toolbar.
The document must be stored in iCloud Drive (or the Box
file sharing service), and the iWork apps will automatically move the file there if need be. To find the file later, choose Go > iCloud Drive in the Finder and look in the folder associated with the app you’re using.
Next, the app displays the Add People dialog, where you can choose with whom you’re going to share the document, how to send the invitation, and what permissions to set.
The Share Options are important. First, you can limit access to “Only people you invite” or “Anyone with the link.” With the former, the invitees must have iCloud accounts and be signed in. With the latter, you can share with anyone, even if they don’t use Apple devices.
Second, with the Permission menu, you can let collaborators make changes, or if you want them just to see the document, you can restrict them to View Only.
When you’re done, click Share to send the iCloud link via the specified channel (or copy it to the clipboard for sending in whatever way you prefer).
Accept an Invitation
When the recipient clicks the link or clicks Accept in a sharing notification, they get a dialog asking to open the document and telling them where it’s stored, in case they don’t want to work on it right away.
When they open the document, it will look and feel exactly like a normal document in Pages, Numbers, or Keynote.
For someone who isn’t an Apple user, clicking the iCloud URL will open the document in the Web version of the appropriate app on iCloud.com. They’ll need to enter a name to identify them in the document, after which they can work in the Web app.
Add and Change Data
For the most part, you can do anything in a shared document that you can do with a normal document. There a few general limitations, such as managing styles and working with media files over 50 MB, plus some app-specific restrictions, such as working with tables of contents in Pages, transposing tables in Numbers, and changing themes in Keynote. Apple has a full list
While you’re working, you can see who else is in the document at the same time by clicking the Collaborate button and looking for a colored dot next to a person’s name.
You’ll see color-coded cursors, text, and object selections as other people work, but if that’s distracting, choose View > Hide Collaboration Activity.
It can be hard to be work in a document while seeing someone else making changes, so don’t be shy about hiding collaboration activity. Or, if you are actively working with someone on a particular part of the document, consider doing so while you can talk in person or on the phone.
Commenting is the big win for collaboration with remote colleagues—it can save a vast amount of time to discuss a particular aspect of a document in context. To add a comment, select some text or an object, and then choose Insert > Comment or click the Comment button on the toolbar. (The controls look a bit different in iOS; Apple explains the differences
Comments appear as color-coded selections, boxes, or in the case of Numbers, corner triangles in cells. If they’re in the way, you can hide them by choosing View > Comments > Hide Comments. Other commands in View > Comments let you easily navigate to next and previous comments so you don’t have to find them visually.
Other collaborators can click Reply to continue the conversation right within that comment. You can edit one of your comments at any time by clicking to the right of the timestamp and choosing Edit Comment (or Edit Reply). Once the discussion has been resolved, either the person who started the comment thread or the document owner can delete the comment thread by clicking Delete.
Tracking who made what changes to a document is available only in Pages, and it’s hugely helpful when you need editing. Only the document owner can enable the feature by choosing Edit > Track Changes, but once that’s done, the change tracking toolbar appears above the document with controls for navigating between comments and changes, buttons for accepting or rejecting changes, and a button for pausing change tracking. A pop-up menu at the right side lets you configure whether you want to see all changes, changes other than deletions (which is generally the best setting), or what the document will look like in the end. A left-hand sidebar lists all comments and changes—show it by choosing View > Show Comments & Changes Pane.
Anyone with edit access can accept or reject any particular change by clicking Accept or Reject in the Comments & Changes pane; you can also use the buttons in the change tracking toolbar to navigate from change to change, accepting and rejecting as you go. If there’s no need to deal with each change individually, use the pop-up menu’s commands to accept or reject all changes.
Needless to say, you can work on shared documents only when you’re online when you’re using the Mac or iOS version of an iWork app (if you try to edit while offline, the app will only let you edit a copy that is no longer shared). With any iCloud.com documents that you already have open, however, you can work offline, but your changes won’t appear to others until you reconnect.
When you’re done collaborating on a document, click the Collaborate button in the toolbar and then Stop Sharing (below left). Doing so immediately prevents others from making more changes and deletes the document from iCloud Drive on their devices (below right).
Simultaneous collaboration is wonderful when you’re working intensely with other people to develop a presentation, brainstorm budget estimates, or wordsmith a mission statement. In such situations, you’ll want to be able to talk at the same time. But for other sorts of projects, it’s also useful to allow people to collaborate when it’s convenient for them—the important thing is that everyone is working in the same document and can see each other’s changes and comments. If you rely on Apple’s iWork app for word processing, spreadsheets, or presentations, give their collaboration features a try!
With luck, you should never need to check your iPhone’s or iPad’s warranty status. But bad things do happen to good devices. In iOS 12.2, Apple has just made it easier to figure out if your device is still under warranty or covered by AppleCare+. Go to Settings > General > About, where you’ll find a new entry that’s either called Limited Warranty (the basic Apple warranty) or AppleCare+ (the extended warranty you can buy). The entry shows the expiration date, and tapping it provides more details on the Coverage screen. If your iPhone or iPad doesn’t have AppleCare+ but is eligible for it, you can even buy it from this screen. You won’t see anything if your device is out of warranty and no longer eligible for AppleCare+.
A significant danger to businesses today is phishing—the act of forging email to fool someone into revealing login credentials, credit card numbers, or other sensitive information. Of course, phishing is a problem for individuals too, but attackers more frequently target businesses for the same reason as bank robber Willie Sutton’s apocryphal quote about why he robbed banks: “Because that’s where the money is.”
The other reason that businesses are hit more often is that they have multiple points of entry—an attacker doesn’t need to go after a technically savvy CEO when they can get in by fooling a low-level employee in accounting. So company-wide training in identifying phishing attempts is absolutely essential.
Here are some tips you can share about how to identify fraudulent email messages. If you’d like us to put together a comprehensive training plan for your company’s employees, get in touch.
Beware of email asking you to reveal information, click a link, or sign a document
The number one thing to watch out for is any email that asks you to do something that could reveal personal information, expose your login credentials, get you to sign a document online, or open an attachment that could install malware. Anytime you receive such a message out of the blue, get suspicious.
If you think the message might be legitimate, confirm the request “out of band,” which means using another form of communication. For instance, if an email message asks you to log in to your bank account “for verification,” call the bank using a phone number you get from its Web site, not one that’s in the email message, and ask to speak to an account manager or someone in security.
Beware of email from a sender you’ve never heard of before
This is the email equivalent of “stranger danger.” If you don’t know the sender of an email that’s asking you do something out of the ordinary, treat it with suspicion (and don’t do whatever it’s asking!). Of course, that doesn’t mean you should be entirely paranoid—business involves contact with unknown people who might become customers or partners, after all—but people who are new to you shouldn’t be asking for anything unusual.
Beware of email from large companies for whom you’re an anonymous customer
Attackers often forge email so it appears to come from a big company like Apple, Google, or PayPal. These companies are fully aware of the problem, and they never send email asking you to log in to your account, update your credit card information, or the like. (If a company did need you to do something along these lines, it would provide manual instructions so you could be sure you weren’t working on a forged Web site designed to steal your password.)
Since sample email from large companies is easy to come by, these phishing attacks can look a lot like legitimate email. Aside from the unusual call to action, though, they often aren’t quite right. If something seems off in an email from a big company, it probably is.
Beware of email from a trusted source that asks for sensitive information
The most dangerous form of this sort of attack is spear phishing,
where an attacker targets you personally. A spear phishing attack involves email forged to look like it’s from a trusted source—your boss, a co-worker, your bank, or a big customer. (The attacker might even have taken over the sender’s account.) The email then requests that you do something that reveals sensitive information or worse. In one famous spear-phishing incident, employees of networking firm Ubiquiti Networks were fooled into wiring $46.7 million
to accounts controlled by the attackers.
Beware of email that has numerous spelling and grammar mistakes
Many phishing attacks come from overseas, and attackers from other countries seldom write English correctly. So no matter who a message purports to come from, or what it’s asking you to do, if its spelling, grammar, and capitalization are atrocious, it’s probably fraudulent. (This is yet another reason why it’s important to write carefully when sending important email—if you’re sloppy, the recipient might think the message is fake.)
One of the best ways to train employees about the dangers of phishing is with security awareness testing, which involves sending your own phishing messages to employees and seeing who, if anyone, falls for it. Again, if you need help doing this, let us know.
We don’t want to belabor the point, but multinational tech companies like Apple, Facebook, and Google will never call or text you personally out of the blue. So if you get a call or text purporting to be from such a company, it’s 99.9% likely to be a scam, and you should ignore it regardless of whether the caller ID seems legitimate. If you’re still worried, look up the company’s tech support phone number separately—never respond directly to such a call or tap a link in a text—and discuss the situation with the support reps. Or contact us, and we’ll talk it through with you.