508-909-5961 [email protected]

Office 365 hacking: What you need to knowThere really is an app for almost everything — including one that cybercriminals use to hack into businesses’ systems. Cyberattacks have become so advanced that they are now aided by an app, like this one that poses serious threats to Office 365 users. If you’re using Office 365, here’s what you need to know. A […]

The post Office 365 hacking: What you need to know appeared first on Complete Technology Resources, Inc..

Office 365 hacking: What you need to know

There really is an app for almost everything — including one that cybercriminals use to hack into businesses’ systems. Cyberattacks have become so advanced that they are now aided by an app, like this one that poses serious threats to Office 365 users. If you’re using Office 365, here’s what you need to know.

A phishing scam that harvests users’ credentials

The latest cyberattack on Microsoft Office 365 involves harvesting users’ credentials. Scammers use this previously unseen tactic by launching a phishing message to users, asking them to click on an embedded link. What makes this scam more insidious than traditional phishing scams is that the URL within the message links to a real Microsoft login page.

How does it work?

The phishing message resembles a legitimate SharePoint and OneDrive file-share that prompts users to click on it. Once they do, they are taken to an Office 365 login page where they will be asked to log in if they haven’t already.

After they’ve logged in, they’ll be prompted to grant permission to an app called “0365 Access.” Users who grant permission effectively give the app — and the hackers behind it — complete access to their Office 365 files, contacts, and inbox.

This technique can easily trick lots of users since the app that requests access is integrated with the Office 365 Add-ins feature. That means that Microsoft essentially generates the request for permission. No, Microsoft is not aiding hackers to breach systems. Rather, the scam is made possible by a feature that allows users to install apps that are not from the official Office Store.

Ways to protect your Office 365 account — and your business

Given their fairly advanced approach, these scammers could effortlessly prey on careless employees. There are ways to make sure that doesn’t happen.

  • Always check the email’s sender account before clicking on any link or granting apps access.
  • Implement a policy that prevents staff from downloading and installing apps that are not from the Office Store.
  • Regularly conduct security awareness training that covers essential cybersecurity topics. Educate employees on how to spot phishing scam red flags (e.g., unknown senders, grammatical and typographical errors, suspicious requests, and the like). Increase their knowledge about more sophisticated attacks and keep everyone informed about current and future cybersecurity risks.

Successful attacks could result in an unimaginable catastrophe to your company. For tips on how to spot this and other nefarious scams and how to plan thorough security practices, contact our experts today.

Published with permission from TechAdvisory.org. Source.

The post Office 365 hacking: What you need to know appeared first on Complete Technology Resources, Inc..

Read More

How phishers harvest Office 365 credentialsWith over 150 million active subscribers, Office 365 is, unsurprisingly, on top of hackers’ minds. And now, hackers are using a technique that doesn’t even require users to give up their credentials. Learn how they do it and get protected. A phishing scam that harvests users’ credentials The latest cyberattack on Microsoft Office 365 involves […]

The post How phishers harvest Office 365 credentials appeared first on Complete Technology Resources, Inc..

How phishers harvest Office 365 credentials

With over 150 million active subscribers, Office 365 is, unsurprisingly, on top of hackers’ minds. And now, hackers are using a technique that doesn’t even require users to give up their credentials. Learn how they do it and get protected.

A phishing scam that harvests users’ credentials

The latest cyberattack on Microsoft Office 365 involves harvesting users’ credentials. Scammers use this previously unseen tactic by launching a phishing message to users, asking them to click on an embedded link. What makes this scam more insidious than traditional phishing scams is that the URL within the message links to a real Microsoft login page.

How does it work?

The phishing message resembles a legitimate SharePoint and OneDrive file-share that prompts users to click on it. Once they do, they are taken to an Office 365 login page where they will be asked to log in if they haven’t already.

After they’ve logged in, they’ll be prompted to grant permission to an app called “0365 Access.” Users who grant permission effectively give the app — and the hackers behind it — complete access to their Office 365 files, contacts, and inbox.

This technique can easily trick lots of users since the app that requests access is integrated with the Office 365 Add-ins feature. That means that Microsoft essentially generates the request for permission. No, Microsoft is not aiding hackers to breach systems. Rather, the scam is made possible by a feature that allows users to install apps that are not from the official Office Store.

Ways to protect your Office 365 account — and your business

Given their fairly advanced approach, these scammers could effortlessly prey on careless employees. There are ways to make sure that doesn’t happen.

  • Always check the email’s sender account before clicking on any link or granting apps access.
  • Implement a policy that prevents staff from downloading and installing apps that are not from the Office Store.
  • Regularly conduct security awareness training that covers essential cybersecurity topics. Educate employees on how to spot phishing scam red flags (e.g., unknown senders, grammatical and typographical errors, suspicious requests, and the like). Increase their knowledge about more sophisticated attacks and keep everyone informed about current and future cybersecurity risks.

Successful attacks could result in an unimaginable catastrophe to your company. For tips on how to spot this and other nefarious scams and how to plan thorough security practices, contact our experts today.

Published with permission from TechAdvisory.org. Source.

The post How phishers harvest Office 365 credentials appeared first on Complete Technology Resources, Inc..

Read More

What you need to know about Android accessoriesDid you know that you can connect a mouse to your Android tablet and use it as you normally would on a desktop computer? A mouse is just one of the many accessories supported by many types of Android devices. Depending on which accessory you use, you can make your device easier or much more […]

The post What you need to know about Android accessories appeared first on Complete Technology Resources, Inc..

What you need to know about Android accessories

Did you know that you can connect a mouse to your Android tablet and use it as you normally would on a desktop computer? A mouse is just one of the many accessories supported by many types of Android devices. Depending on which accessory you use, you can make your device easier or much more fun to use.

USB keyboards, mice, and gamepads

Android phones and tablets don’t usually have standard, full-size USB ports, so you can’t plug a USB accessory directly into it. To connect such an accessory to the device, you’ll need a USB on-the-go (OTG) cable. This is a micro-USB adapter that you can purchase from any computer store for a couple of dollars.

From there, your accessories should work without needing any further configuration. In fact, USB OTG allows you to use other USB devices, such as a flash drive, with your Android device.

Keep in mind that not every Android device has the port that’s required to support USB OTG. This is the case with some smartphones. To avoid wasting money, be familiar with your device’s specs and ports before you purchase a USB OTG cable.

Bluetooth keyboards, mice, and gamepads

USB OTG cables sure are handy, but they can make your supposedly portable device not so portable anymore. Bluetooth technology effectively remedies the problem. Most Android devices allow you to connect wireless mice, keyboards, and gamepads directly by pairing them through the Bluetooth settings.

Using each accessory

All accessories should work in a plug-and-play manner. Here’s what you can do with some of them:

  • Keyboard – Once connected, you should be able to use this accessory to type on your Android tablet as you would on the onscreen keyboard. Many of the keyboard shortcuts work as they do on computers, too. These include Alt+Tab for switching between apps, and Ctrl+X, C, or V for Cut, Copy, and Paste respectively.
  • Mouse – Connecting a mouse will allow you to navigate and click on things using a mouse cursor instead of tapping on the device itself. You can still use the touchscreen while the mouse is connected.
  • Gamepad – While gamepads can be used to navigate through your Android’s home screen interface and launch applications, they’re better used with games that support controllers.

There are so many ways to have fun and extend the functionality of your Android device. If you have any questions about Android or are looking to integrate it into your business, give us a call and we’ll be happy to advise you.

Published with permission from TechAdvisory.org. Source.

The post What you need to know about Android accessories appeared first on Complete Technology Resources, Inc..

Read More

Helpful Mac keyboard shortcuts you should be usingPointing and clicking with a mouse is great. There are times, however, where using the mouse to perform simple tasks interrupts productivity and slows you down. Try these helpful Mac keyboard shortcuts to help you work more efficiently. Minimizing (or “Docking”) the front app window: Command + M Use this combination when you have several […]

The post Helpful Mac keyboard shortcuts you should be using appeared first on Complete Technology Resources, Inc..

Helpful Mac keyboard shortcuts you should be using

Pointing and clicking with a mouse is great. There are times, however, where using the mouse to perform simple tasks interrupts productivity and slows you down. Try these helpful Mac keyboard shortcuts to help you work more efficiently.

Minimizing (or “Docking”) the front app window: Command + M

Use this combination when you have several apps, browsers, or Finder windows open and want to minimize the active one. To minimize all open windows at once, press Option + Command + M.

Closing an active window: Command + W

This shortcut lets you close active apps or programs like browsers, Finder, Thesaurus, or any app that allows multiple tabs to be open simultaneously. To close all tabs without quitting the program entirely, press Option + Command + W.

Quitting a program: Command + Q

Clicking the red X button in most Mac apps and programs, like Mail, only puts them in the dock. This shortcut lets you fully quit an application.

Force quitting a program: Option + Command + Escape

If an app becomes unresponsive, you can shut it down by using the force quit shortcut, which displays all your open applications. Select the one you want to quit and hit Force Quit. In some instances, you might need to press Command + Tab to switch to another app, then press Command + Shift + Option + Escape to quit an active app.

Hiding apps: Command + H

With this trick, you can hide an active window, which is particularly useful when you want to quickly conceal what’s on your screen. It’s also great for decluttering your screen by keeping only one app active. Simply press Option + Command + H.

Opening folders in Finder: Command + Shift + A/U/D/H/I

These combinations offer faster ways to view your Applications (A), Utilities (U), Desktop (D), Home (H), and iCloud (I) folders without having to click several apps.

Shutting down a Mac: Control > Option > Command > Power button or Control > Option > Command > Media Eject

In a hurry and need to power off quickly? This shortcut shuts down everything — apps, operating system, and power.

Taking a screenshot:

  • Command + Shift + 3 – Take a snapshot of your entire screen.
  • Command + Shift + 4 – Turn your cursor into a set of crosshairs that will let you select a specific area of your screen.
  • Command + Shift + 4 + Spacebar – Hit these keys to screenshot only your current window (e.g., browser window, Notes app, etc.) without altering its dimensions.

Other little-known shortcuts:

  • Command + Spacebar – Spotlight Search bar will appear in the upper center of your screen, which you can use to search for files or programs.
  • Command + Option + D – Hide the Dock.
  • Command + Shift + [ or ] – Cycle through tabs in Safari by pressing [ when moving right or ] when moving left.
  • Command + Shift – See all your open tabs in an active browser.
  • Command + , (comma) – Open the active app’s settings.
  • Command + Shift + T – Opens the last closed tab in the active browser.

Everyone uses hotkeys to work faster and more efficiently. If you need more usability and productivity tips and tricks on MacBook, iMac, MacBook Pro, or any of your business devices, call our experts today!

Published with permission from TechAdvisory.org. Source.

The post Helpful Mac keyboard shortcuts you should be using appeared first on Complete Technology Resources, Inc..

Read More