A method of exchanging messages between people using electronic devices.

Posts

Two Critical Vulnerabilities Found In Inmarsat’s SATCOM Systems

Global satellite telecommunications company Inmarsat is warning customers of two critical vulnerabilities that…

, , , , , , , , , , , , , ,

Office 365 App Password with MFA | HowTo | 1 of 2

If you’re using Multi-Factor Authentication for your organisation, and want to use Apps that connect to your Office 365 account, you will need to create an Office 365 App Password. Thankfully, it’s really easy to do, if a little hard to find.

, , , , ,

Office 365 Email Signature Management with Mail Flow Rules [Part 2: Apply the Rule]

We covered the reasons why you should include an email signature, and what information you should include in the previous post. However, Office 365 Email signature management is made possible with the application of mail flow rules. This enables the functionality to append email signatures at the server side, meaning that you get consistently applied signatures no matter what device you’re sending from. This enables company-wide standardisation and brand consistency.

, , , ,

Office 365 Signature Management with Mail Flow Rules [Part 1: Creation]

Office 365 email signature management for company-wide consistency is made possible with mail flow rules. There are a number of reasons why you might want to append an email signature to your emails. The foremost reason is making it easier for customers to contact you. An Office 365 signature looks professional and consistent, distinguishes your organisation, […]