Blog

Blog

Things to do in Office 365 BEFORE you get breached

Cloud-based services, including Office 365, Google Drive, DropBox, and many more, are a big target for cyber criminals. Since the services are not behind your firewall, anyone with access to the internet can try to target your account and access sensitive information. 

Fortunately,  there are some easy—and free!—things you can do make your Office 365 environment more secure. Unfortunately, almost no one wants to do these things until after their account gets compromised.

 

Read More »

This Type of Phishing Attempt is Especially Damaging

There is one particular group of Office 365 users who are a gold mine to hackers. They are the people in your organization with admin credentials.

Read More »

From the Trenches: Reused email causes SharePoint Issue

Using an email address with only the first name or just first name and last initial works well for most small businesses. But it can occasionally cause confusion when you have multiple employees with the same name.

Normally, that’s when both employees still work there. We recently ran into a customer case where having a new employee with the same name as an old employee caused an onboarding issue in Office 365, specifically when adding the user to SharePoint Online sites.

Read More »

Two Reasons You Should Be Tracking Usage in Office 365

Microsoft recently announced an Office 365 adoption content pack for Power Bi. This content pack can be used to create a Power BI dashboard to help Office 365 administrators understand how their users interact with Office 365, by tracking usage and collaboration across apps.

Tracking app usage in Office 365 isn’t new but putting the information into a Power BI dashboard makes it much easier to see and interact with the data so you can use it to make decisions. Two of the best uses for this data are to guide your user training and to determine if your users are in the right licenses.

Read More »
   
New Call-to-action

Posts by Topic

see all