Blog

Blog

The Pros and Cons of Microsoft 365

Microsoft recently introduced Microsoft 365 – a suite of tools including Windows 10, Office 365 and Enterprise Mobility + Security (EMS) under one license. It’s an excellent solution for businesses looking to simplify their technology management while keeping their business secure.

But like everything else, it has its pros and cons and won’t be the right solution for every business.

 

Read More »

Four Types of Phishing Emails Targeting Businesses

Phishing emails can be a big problem for businesses of every size. They can be difficult to detect and prevent and can cost you big time.

One of the reasons they’re so difficult to detect is because they can take on so many forms. A phishing email can look like anything. But there are patterns and some common types to be aware of:

 

Read More »

What is Shadow IT?

 

There’s probably a massive hole in your cybersecurity. It’s probably been there for years. You probably already know about it – you may even be the main culprit behind it. And you probably don’t even realize it’s a security risk: Shadow IT.

Shadow IT refers to the use of any hardware or software in a company that is not approved by the IT department. Examples include: employees using different software to edit photos, storing company files on their personal flash drives, or simply using a different internet browser to check their email.

Read More »

FAQ: Is Office 365 Secure?

One common question among businesses considering Office 365 is “Is it secure?” This is a great question to ask of any software, app, or company with access to your data (and should probably be asked more than it already is). The short answer is yes*, but a lot of the security is your responsibility.

Read More »

Ignite 2017: What you need to know

A few members of our service team spent last week at Microsoft Ignite, the annual conference for IT admins, engineers, computer scientists and other technical folks. Most every Microsoft conference includes major product announcements, and Ignite 2017 was no exception.

Most focused on the tech side (hello, quantum computing), but there were also some product announcements that will likely affect the day to day of every employee – not just IT admins.

Here’s what you need to know:

Read More »

Watch Out for this Fake Office 365 Spam Message

Microsoft recently released Volume 22 of their Security Intelligence Report where they reported a pretty scary number: They’ve seen a 300% increase in user accounts attacked over the past year. After poor password management, one of the main causes of this is targeted phishing attempts.

Cyber criminals target potential victims based on industry, job role, and more recently, the apps and software they use. Office 365 is no exception. Recently, we were forwarded a phishing attempt targeting Office 365 made to look like a generic spam quarantine message. To the phisher’s credit, they made this attempt look very, very convincing.

Read More »

Five Fast Facts about Microsoft 365

Microsoft recently introduced a new product called Microsoft 365, centered around making business more productive and more secure. While it’s not going to be for every business, it’s a natural fit for many businesses – especially if you’re already using (or looking to move to) Office 365 or Windows 10.

Here’s what you need to know:

Read More »

Why You Should Be Testing Your Employees' Data Security Knowledge

You’re only as strong as your weakest link, and when it comes to data security in business, your weakest link is typically your employees. Not because of malicious motives – but because it only takes one click on a bad link or opening the wrong attachment to put your whole business in jeopardy.

To reduce the chances of your company falling victim to ransomware or another cyber-attack, your employees should know the red flags of a cyber-attack – and you should be regularly testing them on their knowledge.

Read More »

From the Trenches: Out of Office Phishing Scam

Phishing scams are not uncommon. Years ago, the "Nigerian Prince" versions of phishing attacks targeting as many people as possible, hoping to get a few people to fall for it. These days, cyber criminals put in a bit more effort and do their research on their potential victims first. 

We’ve seen a phishing scam going around recently targeting companies will high-level employees who are out of office (we’ve even experienced it first hand). The scammers are using this as an opportunity to try to get lower level employees to wire large sums of money to this.

Read More »

What Happens When Ransomware isn’t Really Ransomware

Ransomware has been making big headlines recently. The WannaCry ransomware attack knocked out systems all over the world in May. In late June, another massive ransomware attack (called Petya, ExPetr, or NotPetya) hit companies in Europe, taking down major companies like Reckitt Benckiser.

Except this latest ransomware attack wasn’t actually ransomware – it was worse. According to Kaspersky Labs, it was wiperware disguised to look like ransomware.

Read More »
   

Subscribe to Our Newsletter

Ultimate Guide to Small Business Cyber Security