508-909-5961 [email protected]

Most of us like to think we’d never click on a suspicious link in an email. But the fact of the matter is this is one of the most common ways a business is hacked. We’re all human of course, and we make mistakes. Yet now Microsoft is trying to prevent this. Here’s an inside […]

2016Apr21_Office365_BMost of us like to think we’d never click on a suspicious link in an email. But the fact of the matter is this is one of the most common ways a business is hacked. We’re all human of course, and we make mistakes. Yet now Microsoft is trying to prevent this. Here’s an inside look at a new Outlook security feature that aims to protect the email of Office 365 users.

Aptly called “Safety Tips”, Microsoft Office 365’s new security feature is designed to help make your employees (and yourself) more aware of which emails may contain harmful content. By analyzing the data patterns of millions of emails, the feature uses a color-coded bar at the top of an email to help you determine what emails are safe, suspicious, or fraudulent.

How it works

Safety Tips uses a simple system to help you identify the safety level of an email quickly. The system consists of four colors that categorizes an email as suspicious, trusted, safe or unknown. The details of each of these categories are outlined below.

Suspicious email Color label: Red Description: This has either failed sender authentication or is a known phishing email. These messages should be deleted.

Unknown email Color label: Yellow Description: Exchange Online Protection marks this type of email as spam. However, you can move this item to your inbox by clicking it’s not spam in the yellow bar.

Trusted email Color label: Green Description: If this email comes from a domain Microsoft deems safe, then it falls into this category.

Safe email Color label: Gray Description: This type of email has either been marked safe by the user’s organization, has been moved from the junk folder into their inbox by the user, or the email is from a contact on the user’s safe sender list.

Color coding will look different between the Outlook app and Outlook for the Web. In the Outlook application, only suspicious emails will be flagged, whereas in Outlook for the Web all four types of emails will be color-coded. However, it should be noted that most emails won’t have any color code as they’re only added when Microsoft thinks they’re relevant.

With hackers getting smarter by the day, and human error a roadblock to a secure business, this new feature will hopefully add an extra layer of security to your organization. If you’d like to learn more about Office 365 or other security services we offer, get in touch today. A more secure business awaits.

Published with permission from TechAdvisory.org. Source.

Read More

Recently, Microsoft announced a new feature in Office 365 Groups called Connectors. As part of their new openness mantra, Office 365 Connectors allows you to connect with popular third party services without ever having to leave your Outlook client. This means relevant content and updates that you want are sent immediately to your group feed, […]

2016Apr7_MicrosoftWindowsNewsAndTips_BRecently, Microsoft announced a new feature in Office 365 Groups called Connectors. As part of their new openness mantra, Office 365 Connectors allows you to connect with popular third party services without ever having to leave your Outlook client. This means relevant content and updates that you want are sent immediately to your group feed, making workflow more seamless. Here is a bit more detail on what Office 365 Connectors has in store for you.

What can it do?

Office 365 Connectors enable users to access third party apps and services within their Outlook groups, rather than having to scour through dozens of windows to access a specific application. This new feature allows you to keep your company’s discussion in one place, and enables your employees to stay up-to-date regardless of the service used to broadcast an event. For example, your team members can be informed about a particular hashtag that your company is following on Twitter without having to explicitly open the page. Groups aren’t limited to one particular service either. With connectors you can use Twitter, Trello, Mailchimp, Bing, UserVoice and over 50 other services.

Small organizations can also take advantage of connectors. Office 365 lets you develop your own connectors by embedding the Connect to Office 365 button on your site. This allows users to connect to your service and get updates on your company, as they would with other third party services. Basically, with connectors, your Office 365 client becomes a hub for third party that keeps your company in sync to get more work done.

Connector card

Connector cards offer a user friendly way to interact with external applications. If a particular connector is added to a group, connector cards are generated within the group’s activity feed. While most cards will display events in plain text, some applications like Twitter and Trello provide formatted actions to interact with the card. Trello, for example, allows you to Assign or Comment on an event card.

Who can create a connector?

Office 365 group members can configure and use an array of connectors. Once you configure a connector for a specific group, that app will be also be available for other members. However, the person who added a connector to the group is the only one capable of modifying that app.

How do you access Office 365 Connectors?

With its public release, any Office 365 Mail user can use Office 365 Connectors for Groups. Simply navigate to a Group from your Outlook page and click on the Connectors tab at the top of the page. From here, you can connect the available third party services on offer to any of your Outlook groups. You can even configure the settings of your apps without ever having to leave Office 365. However you should probably only consider pulling in the applications that you think your group will be using the most.

As your business grows, you’re going to need more services to be more productive in the workplace. By aggregating them all in one place, you save time shifting around dozens of apps to find the information that you need. So the next time you create an Office 365 Group, help your team members work more efficiently by setting up some connectors.

If you’re interested in learning about the latest Office 365 updates, contact us today.

Published with permission from TechAdvisory.org. Source.

Read More

More and more small and medium-sized businesses are making the switch from on-premises SharePoint systems to cloud-hosted Office 365. If you’re one of them, it’s vital to ensure that you put in place adequate protection to counter the security challenges that come with the migration. While many businesses contemplating switching find themselves concerned about the […]

2016Mar11_Office365_BMore and more small and medium-sized businesses are making the switch from on-premises SharePoint systems to cloud-hosted Office 365. If you’re one of them, it’s vital to ensure that you put in place adequate protection to counter the security challenges that come with the migration. While many businesses contemplating switching find themselves concerned about the potential for undesirable elements to breach the cloud-based security of Office 365 itself, the robust safeguards Microsoft has in place mean localized issues are far more likely to prove to be your network’s weak point. These essential steps will help ensure your transition from SharePoint to Office 365 is a smooth and secure one.

Identify your company’s sensitive data…

It’s so easy to create sites within SharePoint that businesses often have far more than they realize, covering just about every aspect of their operations. And it’s natural, of course, for at least some of the files housed within those sites to contain sensitive commercial or personal data. The key is ensuring that sensitive information is adequately identified and protected. Do this by conducting a security audit before you undertake your migration.

Your audit should identify the types of data stored in the various parts of your SharePoint network, including which specific information needs extra safeguarding. Be sure to consider everything from trade secrets and contract details to the personal information of your clients.

…and then restrict access to it

Once you’ve worked out where your most precious data lies, you can check who currently has access to it and whether their access is appropriate. After all, it’s not necessary for everyone to be able to get at all the data your company owns; it’s far better to operate on a need-to-know basis, with a reasonable level of flexibility.

Ensure that each of your employees has access only to the data that’s necessary for them to perform their duties. When you make the switch to Office 365, you’ll find that it allows you to conveniently set these different levels of permissions, including for external partners with whom you collaborate.

Trust nobody and suspect everybody

We say that lightheartedly, of course – it would be counterproductive to become so security-paranoid as to suspect everyone is attempting foul play with your company’s data. Nonetheless, it’s wise to consider everyone in your organization when it comes to auditing data access permissions – and that includes system administrators who might be assumed to have master access to every element of your network infrastructure.

A rogue administrator is the stuff of nightmares, since their elevated position gives them much greater leeway to siphon off valuable data without being noticed – or even to allow others to conduct questionable business and bypass the usual built-in security precautions. Overcoming the danger of an all-too-powerful administrator admittedly becomes easier if you have more than one on staff, but even in smaller businesses you can mediate some of the risk by regularly checking on your administrator’s usage and ensuring that their top-level system permissions remain justifiable.

Use machine learning to foresee security breaches

Every action performed by your staff within Office 365 is automatically logged, and with relative ease you can pull reports that allow you to analyze these. But the sheer number of events taking place within Office 365 in the course of your business’s normal operations means that even attempting to identify questionable behavior will be akin to the proverbial needle and haystack. That’s not to say it’s unwise to be on the lookout for anomalies in normal usage – the export of unexplainably large volumes of data, for instance, could suggest that a member of your team is leaking intelligence to a competitor, or that they’re about to jump ship and take your trade secrets with them.

Thankfully, it’s possible to leverage the developing power of machine learning to identify potential breaches before they happen – without the need to wade through unmanageable swathes of perfectly normal data. Graph API is incorporated into Office 365, and allows for the integration of machine learning tools into your security environment to achieve just that. The same tools can also help you avoid being caught out by hackers, by identifying system login attempts from locations that are out of the ordinary; you should bolster this protection by religiously removing inactive accounts and those of departing employees.

By covering these essential security considerations when it comes to your migration, you’ll be one step closer to ensuring you strike the right balance between the powerful collaborative features of Office 365 and the robust safeguards your business’s integrity demands. To find out more about how we can help your Office 365 migration run smoothly, or what other business benefits you can derive from cloud-powered technologies, just give us a call.

Published with permission from TechAdvisory.org. Source.

Read More

Setting up an IT infrastructure for a small business can be an intimidating and costly venture. Fortunately, cloud computing has given companies affordable and flexible solutions to deal with rapidly advancing technological demands. However, for the small business owner, there are still many common misunderstandings about using cloud services. Here are a few ways some […]

2016Mar8_Web&Cloud_BSetting up an IT infrastructure for a small business can be an intimidating and costly venture. Fortunately, cloud computing has given companies affordable and flexible solutions to deal with rapidly advancing technological demands. However, for the small business owner, there are still many common misunderstandings about using cloud services. Here are a few ways some businesses may misconceive the nature of the cloud.

Cloud infrastructures are unsecure

Security is a necessity for online users. And the most prevalent misconception about the cloud is the idea that cloud services lack appropriate security measures to keep data safe from intruders. Most users also think that the data stored in the cloud can be easily accessed by anyone, anywhere and at anytime.

But the truth is it’s actually a good idea for small businesses to use cloud services. Small companies usually can’t afford to hire an IT department let alone train them to deal with online security threats. Cloud providers, on the other hand, offer services such as layered security and antivirus protection that not only specialize in keeping infrastructures safe from hackers but are available at a price that is much lower than you would pay for in-house IT staff.

Additionally, large cloud-based services such as Google Apps for Work and Office 365 are supported by an infrastructure that constantly installs, updates and patches, which helps manage security breaches. This significantly frees you from the burden of having to install the updates yourself and managing the overall security of your system.

Users should understand that no company is completely safe from security threats regardless of their IT infrastructure. But data is likely to be more secure in the hands of cloud providers as they are the most prepared and qualified to protect your digital property.

Encryption

There is a misunderstanding about the role of encryption or rather how it is implemented to keep your data safe. Encryption is usually used for data in transition, where data is protected from anyone seeing it as it travels from one location to another on the Internet. But encryption can also be applied to data at rest, where data is encrypted on a storage drive.

While cloud service providers already keep their physical storage drive well protected, some keep the decryption key held in software, potentially leaving the key vulnerable to intruders. If hackers were to successfully obtain the decryption key, they can simply access your encrypted data. That’s why some cloud storage services are much better than others in terms of keeping your data protected.

With this in mind, you should understand that while every cloud service highlights their data security by demonstrating their encryption abilities, it does not necessarily mean that a cloud-based service that markets itself as such is right for you. When it comes to choosing the right cloud service, it is best to inform yourself about the security measures that a cloud infrastructure implements and look at how it can protect your company’s digital property.

With the cloud you are no longer responsible for data security

While cloud security is important, the responsibility for protecting data ultimately rests on the user. Misplacing mobile devices can leave your data vulnerable and make the cloud infrastructure insecure. It is also recommended to have verification mechanisms in place for devices that are used to access the cloud.

Losing USBs or external hard drives obviously leads to direct data loss and can be easily remedied by backing up your files. This applies to files stored in the cloud as well. So be smart, and backup your files because it’s better to be safe than sorry.

The cloud is never faulty

Like many online services, cloud-based services are not immune to technical difficulties. For example, some cloud businesses have suffered outages and server failures which corrupted files and may have lost data in the process.

Hacking is another reason why some cloud services fail. Using a less than optimal cloud service that is vulnerable to attacks can lead to stolen or deleted data, which would be near impossible to recover if you did not have any offline backups.

Regardless of these flaws, however, it is vital to note that using the cloud as your only source of data storage and processing can lead to problems in the future. Keeping backups of your files is always a good idea.

Security is truly one of the biggest barriers to the adoption of cloud computing in a small business. But as cloud services expand and encryption technologies advance, cloud adoption is increasingly becoming the most cost-effective solution to meet the small business owner’s IT demands. Contact us today to learn how your business can take advantage of all the cloud has to offer.

Published with permission from TechAdvisory.org. Source.

Read More