Blog

Blog

Microsoft Advanced Threat Analytics vs. Advanced Threat Protection: What’s the difference?

Microsoft has cybersecurity products for every area of your network from on-premise servers to desktops to cloud email and storage. However, when you read through a list of names for some of the available security solutions from Microsoft, there might be confusion as to the intended use for each—mostly because the names are all so similar.

Case in point: The Microsoft “Advanced Threat…” line of products: Microsoft Advanced Threat Analytics, Azure Advanced Threat Protection, Windows Defender Advanced Threat Protection, Office 365 Advanced Threat Protection. Within this list, there are technologies intended for either enterprise, small business or both and for on-premise, cloud or hybrid deployment.

Most importantly, they all serve different purposes and protect different areas of an organization’s infrastructure:

Read More »

How You Make It Easy to Guess Your Password

Having a compromised account is bad news. At best, it means some headaches. More likely, it’s going to cost you money and resources, not to mention lost customer trust (and some headaches).

Often, the only thing standing between you and a compromised account is your password. And most people are pretty terrible at making up passwords. Most of fall into the same habits when creating passwords, making them really easy to guess.

Read More »

3 Ways to Prevent a Cybersecurity Breach from Ruining Your Vacation

Not much will ruin a vacation faster than getting a call from your office that someone fell for a wire fraud phishing 

But a little bit of planning before you leave the office can greatly reduce the chances of your team falling victim to an attack. Here’s what to do:attack, and your company has lost $100,000. Executive team vacations are a popular time for cybercriminals to strike, especially with CEO impersonation attacks.

Read More »

Nine Office 365 Apps You May Not Know About (But Should)

 

Most businesses who switch to Office 365 don’t use all of the tools available to them in their licenses. Sometimes, it’s because they genuinely don’t have a use for them—but more often, it’s because they just aren’t familiar with everything they have access to.

But there are some hidden gems in that “Explore all your apps” link in your Office 365 portal. We’re covering nine of these lesser known apps that come with most Office 365 business and enterprise plans.

Read More »

Could your vendors’ cybersecurity put you in danger?

You probably remember the massive Target breach a few years ago. Millions of credit card numbers were stolen from Target’s customers and their reputation took a huge hit around the busiest shopping season of the year.

What you probably don’t remember is the name of the company that was actually hacked—it was an HVAC company who sometimes did work for Target stores. The air conditioning company was hacked, and the cybercriminals used their access to Target’s system to cause massive amounts of damage.

When implementing a cybersecurity plan, most business owners only consider their own company. But you also need to consider the cybersecurity policy of your vendors—especially if they have access to your network or your sensitive data.

Read More »

5 Ways to Improve Your To-Do List

For a long time, I was a pen and paper to-do list person. But recently, I’ve been using the Microsoft To-Do app more and more. While a pen and paper to do list is great for a brain dump, using To-Do makes it easier to organize and automate my task list.

Here is how I have used Microsoft To-Do to keep track of my tasks and make it easier to figure out what to do next.

Read More »

6 Things Every Financial Services Firm Needs to Know About Cybersecurity

Financial service firms stand to lose big if they fall victim to an attack. It’s not just your data that’s on the line—it’s your money and your reputation, too. When it comes to putting together a cybersecurity plan to keep your business safe, there are a few things every financial services firm needs to know:

Read More »

How Cybercriminals Use Current Events to Target You

No doubt over the past few weeks you’ve been inundated with emails about privacy policies and email subscription updates as companies worked to meet new EU regulations (GDPR) that went into effect on May 25. Cybercriminals used this flood of emails to their advantage, sending out similar emails to try to trick you out of your password and credit card details or trick you into downloading ransomware.

This is part of a much larger trend of cybercriminals using current events to try to trick you. When you’re expecting to see an email about a particular event or subject, you probably won’t notice something suspicious.

Read More »

What You Need to Do to Secure Your Company's Office 365 Environment

Office 365 operates under a shared security responsibility model—meaning you are responsible for some of the security of your company’s Office 365 environment.

Most notably, you are responsible for access. You are responsible for who you let into your environment, whether intentionally or unintentionally.

 

Read More »

Microsoft 365 Announcements You May Have Missed

In recent weeks, including at last week’s Build conference, Microsoft announced some pretty significant new features for Microsoft 365, making the platform more secure and giving users a more seamless experience across all devices.

Read More »
   
Ultimate Guide to Small Business Cyber Security