- Excel Explorer
- Posts
- Quickly build interactive dashboards using slicers in Excel.
Quickly build interactive dashboards using slicers in Excel.
Add Table Slicers with Keyboard Navigation in Excel
Today, we’re focusing on how to add a Slicer using the Table Design ribbon via keyboard navigation, starting with Alt + T
. Slicers are one of the best ways to filter table data visually without dropdowns or complex filters. If you’re already building interactive dashboards with slicers, feel free to skip today’s edition.
Without further ado, let’s dive in and learn how to insert a slicer using the keyboard, starting with Alt + T.
Join the AI ROI Conference on September 25 - Free Virtual Conference
On September 25, get the expert formula for turning AI spend into ROI at your organization at Section's virtual AI ROI conference.
No gatekeeping, no pitching, no BS. Hear from top AI leaders like Scott Galloway, Mo Gawdat, and May Habib and leave with a clear path to AI ROI for your company. Free to attend. Registration required.
The process is as follows
1. Open Google Sheet and “Alt T”

2. Press “OK“

3. Select all and “add slicer”

4. Select Location and Press “OK”

We are done.

And that’s how you add a Slicer in Excel by using keyboard navigation starting with Alt + T
. Whether you’re slicing by department, status, or city—this method is perfect for clean, dynamic reporting.
We Value Your Feedback
Was this featured story helpful? Rate it, and let us know how we can improve.
How would you evaluate our today's newsletter?We read your emails, comments, and poll replies regularly. Your feedbacks help us to improve and deliver the best possible newsletter. |
Stay tuned for more Excel tips and tricks in our future issues. If you have any questions or need further assistance, feel free to reply to this email. Happy Extracting!!!
Ignore This Text
Cyber Threat Awareness and Mitigation Guide
Cyber Threat Alert and Mitigation Guide: AI-Powered Threats, Deepfakes, and Synthetic Attacks
Issued by: [Your Organization Name]
Classification: Internal Use Only / Confidential
Effective Date: [Insert Date]
Urgency Level: High – Immediate Attention Required
1. AI-Driven Social Engineering and Deepfake Threats
The cyber threat landscape has escalated with the emergence of AI-powered social engineering attacks, including synthetic voice and video impersonations (deepfakes), automated spear-phishing campaigns, and chatbot-based deception.
Threat actors are leveraging advanced generative AI models to convincingly impersonate executives, HR staff, IT support, legal teams, and even trusted vendors. These deepfake attacks use manipulated audio and video to simulate real-time meetings, phone calls, or pre-recorded messages that appear indistinguishably real.
Impersonated requests may include urgent wire transfers, confidential document access, or password resets. The psychological pressure in these scenarios is amplified due to visual or auditory cues mimicking the intended sender.
Key Indicators of AI-Powered Deception:
Video calls where voice or facial expressions appear slightly unnatural or delayed.
Unexpected, urgent requests for credentials or financial actions delivered via voice or video.
Inconsistencies in grammar, tone, or phrasing not typical of the impersonated individual.
Requests that bypass typical approval workflows, especially from high-ranking “executives.”
Mandatory Preventive Measures:
Implement video verification protocols for financial or high-risk requests delivered via audio/video calls.
Enforce strict out-of-band authentication: Confirm all unusual or urgent requests through a separate communication channel.
Train all staff on identifying deepfake and synthetic media threats.
Disable automatic meeting acceptance in calendars to prevent unauthorized invitations.
Require internal keywords or authentication phrases during critical communications for identity validation.
Report all suspected impersonation attempts immediately to the cybersecurity team. Preserve all media and logs for forensic analysis.
2. Autonomous Malware, Smart Ransomware & AI-Enhanced Threats
A new class of malware is emerging: AI-enhanced autonomous malware, capable of adapting in real time, evading detection, and self-replicating across complex networks. Smart ransomware can now identify the most valuable data, escalate privileges, and negotiate payment with built-in chatbots.
Attackers are no longer operating manually – they are automating attacks at scale, using AI to identify vulnerabilities faster than defenders can patch them.
High-Risk Characteristics:
Malware that learns and adapts its behavior after scanning host environments.
Encrypted, modular code that changes signature upon each execution to bypass traditional antivirus tools.
Coordinated, multi-vector attacks combining phishing, credential stuffing, and system exploits.
Compromised backups, including ransomware that silently encrypts backup files before triggering an alert.
Required Mitigations:
Deploy AI-powered endpoint detection and response (EDR) capable of behavioral analysis and automated containment.
Maintain isolated, immutable, and encrypted backups, disconnected from primary networks.
Apply software patches within 24–48 hours of release, prioritizing critical vulnerabilities.
Implement Zero Trust Architecture (ZTA)—assume breach, verify all users and devices continuously.
Limit admin privileges and enforce least privilege access controls.
Conduct red-team simulations that include AI-simulated threats.
3. Secure AI Use, Shadow AI Risk, and Data Exposure
Employees increasingly use AI tools such as chatbots, assistants, and generative models for productivity. However, inputting sensitive company data into third-party AI platforms without security oversight introduces major risk—this is referred to as Shadow AI.
Once data is entered into public LLMs (Large Language Models), there is no way to fully retrieve or guarantee its deletion. Sensitive documents, internal policies, customer information, source code, and legal strategies have already been leaked by careless use of AI tools in global incidents.
Organizational Directives:
All staff must cease using unsanctioned AI platforms for any business-related task.
Only pre-approved AI systems vetted for privacy, compliance, and model training boundaries may be used.
Never input client, employee, or financial data into any AI tool unless explicitly authorized.
The IT Security Team will regularly audit network traffic for unapproved access to AI tools.
Legal and data governance teams must be consulted before engaging third-party AI vendors.
4. Secure Communications Amid Generative Attacks
AI has blurred the lines between human and machine communication. Chatbots and AI-generated emails are now capable of creating entire email threads that appear authentic. These may include spoofed addresses, reconstructed logos, and prior message history to gain trust.
Enhanced Protocols for Communication:
Digitally sign all internal emails involving sensitive or financial transactions.
Use encrypted channels (TLS, S/MIME, or PGP) for all confidential discussions.
Internal memos should include watermarking or unique reference codes.
Log and monitor message forwarding, especially to external addresses or personal inboxes.
If in doubt, verify the sender verbally or via direct call—assume deception if urgency is paired with secrecy.
5. Supply Chain and Third-Party AI Risks
Vendors and contractors using AI tools introduce risks that extend beyond your organizational boundaries. Many suppliers may lack cybersecurity maturity or visibility into how their AI tools manage your data.
Vendor Risk Controls:
Require all vendors to disclose any AI systems used in their services.
Include AI data usage clauses and liability terms in all supplier agreements.
Conduct penetration testing of third-party interfaces (APIs, portals, etc.).
Limit third-party access to only what is necessary and monitor API interactions in real time.
Suspend or terminate partnerships with vendors who refuse to adhere to data protection protocols.
6. Immediate Threat Reporting & Escalation Protocols
In the context of AI-enhanced threats, delayed reporting can result in exponential damage due to speed of malware propagation or social engineering success.
If You Suspect a Threat:
Do not interact further with the content or platform.
Immediately disconnect affected devices from the network.
Report the incident using the Cybersecurity Incident Hotline at [Insert Hotline Number].
Email the Security Operations Center (SOC) at [security@[yourorg].com] with full details, including any attachments or screenshots.
Retain all logs, messages, and communications for investigation.
7. Updated Compliance: Global AI & Data Governance Regulations
[Your Organization Name] is committed to adhering to the evolving landscape of cybersecurity and AI-related regulations, including:
EU AI Act (2025)
NIST AI Risk Management Framework (U.S.)
UK AI White Paper and Code of Practice
GDPR / CCPA / HIPAA / PDPA / Privacy Act (AU)
ISO/IEC 42001:2023 (AI Management Systems)
We have appointed an AI Ethics & Governance Officer, updated our Data Protection Impact Assessments (DPIAs), and established an internal AI Governance Committee to monitor AI usage across the enterprise.
8. Digital Sustainability and Responsible Technology Use
AI systems consume significant energy resources. As part of our digital sustainability initiatives:
Use AI judiciously and optimize prompts for efficient computing cycles.
Avoid running redundant AI models or workflows.
Choose cloud platforms that offer carbon neutrality and transparent sustainability policies.
Review internal AI workloads quarterly to reduce computational waste.
Final Note: Be Proactive, Not Reactive
Cybersecurity is no longer limited to technical teams—it is a shared, continuous responsibility across the organization. As threat actors gain speed, intelligence, and scalability through AI, our defense posture must be anticipatory, agile, and deeply informed.
Trust nothing by default. Verify everything. Challenge urgency. Question authenticity.
For urgent assistance or to report anomalies, contact the IT Security Response Team at [Insert Hotline or Email].