The National Cyber Security Centre recommend organisations use backups as a way to help mitigate against a wide range of potentially catastrophic problems, such as fire, theft, flooding, and – naturally – ransomware.
Cloud Connect uses the latest in fibre hardware technology to create a physical link between your network, and the cloud. While most data will travel across the public Internet, Cloud Connect is a dedicated connection between your network and your cloud services. Learn what it is, how it works, why you need it.
If you’re using Multi-Factor Authentication for your organisation, and want to use Apps that connect to your Office 365 account, you will need to create an Office 365 App Password. Thankfully, it’s really easy to do, if a little hard to find.
Azure Multi-Factor Authentication HowTo: In Part One and Part Two we covered step-by-step of how to enable Multi-Factor Authentication in the Admin Panel and enrol users. In Part Three I will cover the additional steps the user is required to take in order to install and verify Multi-Factor Authentication with the Azure Multi-Factor Authenticator App.
Office 365 Multi-Factor Authentication HowTo: In Part One we covered step-by-step of how to enable Multi-Factor Authentication in the Admin Panel. In Part Two I will cover the additional steps the user is required to take in order to enrol in Multi-Factor Authentication. The user will create two forms of verification and update their account recovery details.
Exchange Online Multi-Factor Authentication HowTo: We’ve covered the notion of two-factor authentication (2FA) and multi-factor authentication (MFA), especially how you MUST enable it for sensitive accounts. I include all IT users, plus any senior management user within the organisation, such as the MD/CEO as their email is sensitive enough to justify Exchange Online Multi-Factor Authentication.
Even though we work with all of the Tier 1 network and leased line providers, we don’t often talk about it. This is due in part to our customers’ network and ethernet fibre leased line services being both commercially sensitive and a security risk should we divulge their details. It is also a relatively complex area of IT infrastructure, where one size rarely fits all. So here goes . . .
Fibre Broadband: In a statement yesterday, the Advertising Standards Authority (ASA) said it was acting because of “evolving concerns” about the way fibre internet services were being advertised. ISPs are advertising services as being “fibre internet” or “fibre broadband“, when in actual fact they rely upon copper wires for the last-mile link. The probe has been prompted by […]
Office 365 anti-spoof email protection: Insider spoofing or faking the email address of the CEO or the Managing Director to trick the CFO or the Finance Director into transferring tens of thousands of Pounds to criminal bank accounts is really big business. Microsoft, with Office 365 anti-spoof email protection, is quashing the threat.
If your organisation needs connectivity to support business critical data and applications, it’s important to find a solution that works for you, and a leased line connection is often part of that. Leased lines provide connections between networks that require data to ease communication. This could mean they connect offices to the Internet, or to other geographically distant offices and sites, or they might even carry telephony data such as a call centre.