6 Best Practices for Protecting Yourself from Coronavirus (and Other) Phishing Scams Phishing is a danger all the time, but especially so during time of uncertainty and stress. It’s often when people’s minds are elsewhere that they get caught with their defences down and fall for a phishing scam.
Supporting Your Remote Workforce with Microsoft Teams During the COVID-19 Outbreak The world is facing a challenge with COVID-19 that hasn’t been seen in modern times. This is causing sudden changes in the way we live and work with the goal of reducing the risk of community spread.
Introduction to Information Barriers in Microsoft Teams for Compliance Ensuring compliance with both data privacy and conflict of interest rules can be challenging. These guidelines often include restrictions on the sharing of information both inside and outside your organisation.
Why You Need to Be Using Multi-Factor Authentication Company wide Weak or stolen passwords are responsible for approximately 63% of all data breaches. This is why the purpose of many phishing campaigns is to steal user login credentials. Office 365 users have seen an increase in scams specifically designed to
What is Microsoft Intune and How Can it Protect Your Office 365 Data and Endpoints? Prior to the computer age, company files were in paper format and were stored in filing cabinets, which wasn’t great for sharing, editing, or finding easily, but did have the advantage of restricting access.
IT Policies That Every Small Business Should Have When small businesses are first starting out, many haven’t yet come up with policies on things like handling email or online internet use during work hours.
What is Microsoft To Do Between personal tasks, such as when to put out the trash and recycling, and work tasks dealing with project deadlines and appointments, there are multiple things the average person needs to keep track of on a regular basis.
How to Get Started with a Business Continuity Plan There are a number of threats that can cause operational issues to a business. Some are large enough to completely close a business down (like destruction of the physical building), while others are less severe but can still be costly, like
Top 5 Threats to Mobile Device Security Smartphones have completed their evolution from wireless telephones to tiny “pocket computers” and statistics in a number of areas show that mobile use is outpacing desktop computer use. It seems that people prefer their portable devices to connect online over computers that are
How to Handle Your Technology During an Office Move to Ensure it Stays Intact Any type of major move involves multiple moving parts and when you’re relocating your office, and several logistics to plan for. One of the biggest considerations is how to move your technology infrastructure.