
Email Security Feature for O365
While you can take many security precautions to protect your organisation, a cyber attack is always possible because of human error. Microsoft, however, is trying to change this. In the coming weeks, the technology giant plans to launch a new email security feature for Outlook, but only if you’re an Office 365 user. Here’s how it can help your business.
Aptly called “Safety Tips”, Microsoft Office 365’s new security feature is designed to help make your employees (and yourself) more aware of which emails may contain harmful content. By analysing the data patterns of millions of emails, the feature uses a colour-coded bar at the top of an email to help you determine what emails are safe, suspicious, or fraudulent.
How this email security feature works:
Safety Tips uses a simple system to help you identify the safety level of an email quickly. The system consists of four colors that categorizes an email as suspicious, trusted, safe or unknown. The details of each of these categories are outlined below.
Suspicious email
Color label: Red
Description: This has either failed sender authentication or is a known phishing email. These messages should be deleted.
Unknown email
Color label: Yellow
Description: Exchange Online Protection marks this type of email as spam. However, you can move this item to your inbox by clicking it’s not spam in the yellow bar.
Trusted email
Color label: Green
Description: If this email comes from a domain Microsoft deems safe, then it falls into this category.
Safe email
Color label: Gray
Description: This type of email has either been marked safe by the user’s organization, has been moved from the junk folder into their inbox by the user, or the email is from a contact on the user’s safe sender list.
Color coding will look different between the Outlook app and Outlook for the Web. In the Outlook application, only suspicious emails will be flagged, whereas in Outlook for the Web all four types of emails will be color-coded. However, it should be noted that most emails won’t have any color code as they’re only added when Microsoft thinks they’re relevant.
With hackers getting smarter by the day, and human error a roadblock to a secure business, this new feature will hopefully add an extra layer of security to your organisation. If you’d like to learn more about Office 365 or other security services we offer, get in touch today. A more secure business awaits.
Multi IT & Telephony Solutions is a premier CSP (Cloud Solutions Provider). We will be able to provide you with the right O365 products at competitive pricing.
VIEW MORE
Laptop vs Desktop for small businesses
Running a small business takes an intelligent, resourceful person. From day one you must make important decisions in all areas of business, from the marketing strategy chosen for a product to the brand of printer you will use to print out flyers. One of the biggest decisions you will make in the early stages of a business involves your SMB’s computer hardware, particularly whether to invest in a Laptop vs Desktop computer. Read on to find out how to make this decision for your company.
Portability
Modern desktop computers aren't nearly as immobile as they used to be. In many cases the screen is thin and light, and all-in-one desktops are easy to unplug, move and plug in on the road. But there are still places the desktop cannot go. Laptops allow you to go anywhere, even places without electricity. But this ability to take your work anywhere can be counterproductive by creating more stress on employees who think they must work all the time.
Memory/Speed
Desktop computers often have more memory than laptops, and they’re faster speeds due to better processors. This is now changing as a result of advancing technology, but until the cost of high-powered laptops becomes affordable to the general public, the desktop computer is going to provide businesses with more speed. If your employees’ work is limited to word processing and emailing, laptops should be enough. However, anything more will probably require a desktop machine.
Security
An SMB’s computer hardware needs to be secure to ensure that private company information doesn't end up in the wrong hands. On a desktop computer, the hardware is easier to defend against malware and adware. It’s also more physically secure because the desktop is often kept in one location and not easy to snatch. If you do choose the laptop route, make sure to have strict policies on how to protect machines that leave the office.
Price
Traditionally, the laptop has been cheaper and available to more people. This is true particularly for smaller notebook-style laptops. But desktop computers are becoming more affordable as more people have access to them through local channels. With a capable IT service provider such as Multi IT, cost probably won’t be a deciding factor between the two options.
Quality
Although laptop computers provide the convenience of portability, over time they’re prone to problems with the battery and charging cord. They are also easily damaged. By contrast, desktops are generally more sturdy. But when they do experience a problem, it often leads to expensive repairs.
Final Recommendation
The laptop vs desktop debate is an old one, with supporters on both sides touting the advantages of their choice to all who will listen. A growing company really needs a combination of both types of computers. However, a desktop computer will be generally more reliable for the fledgling company owner to start with. Laptops should be added as budget permits to provide that extra portability and convenience.
If you have questions regarding the best choice for your company, give Multi IT a call on 011 435 0450, alternatively contact us and we will be happy to provide you the assistance you need to improve your business.
VIEW MORE
Apple Watch - Taking your productivity to the next level
The Apple Watch is the very first in line of smart "wearables", while still not perfected as yet the Apple Watch can still dramatically increase your productivity in everyday situations.
Remember the ’90s when people had their hands full with Filofaxes and PalmPilots, desperately trying to be organised and productive? Nobody could imagine back then that anything smaller could get the job done. But now there’s a smart watch that does everything those ancient devices used to do, and so much more – like take calls and even summon an Uber.
Apple Watch is more than just a pretty face. It’s quite a serious workhorse. It’s a diary, personal assistant, reminder and communication device whether you’re on the go or in a meeting. It also comes with multiple social and travel functions, and you can wear it in so many ways.
You’ll love it because with Apple Watch you can:
Receive calls and messages, and send quick messages;
Send quick voice messages to other Apple Watch users;
use some of your favourite apps designed especially for your timepiece, like Uber, Maps, Shazam, Weather and banking options;
Get notifications from all calendar entries, access Instagram and photo galleries;
Access notes and lists you composed with the Notes app on your iPhone or Mac via iCloud;
Use your favourite travel apps and be guided by Maps to places (or meetings) in cities you’re unfamiliar with;
Have Siri with you wherever you go – using the watch’s mic, you can dictate a text or ask questions, set a reminder to call a colleague, make a lunch reservation or submit a report;
Choose from a range of watches: Sport, Watch or Edition. Choose the case (colour of the face): stainless steel, rose gold, space grey, gold, black or silver. Choose straps with which to dress your watch up or down: sport, aluminium, nylon or Hermès-style.
Apps you’ll love:
Declutter and get organised with Clear (R99,99)
Capture ideas, thoughts and memos on the go and sync across all your devices with Just Press Record (R59,99)
Sync your tasks with Google and across your Apple devices with TasksPro (R119,99)
Start a draft through Siri dictation and send it to your inbox with Drafts 4 (R199,99)
(These apps are specially designed for Watch to enhance the experience and usability. Search for them and download them via your Apple Watch app.)
Where to get your Apple Watch
Multi IT & Telephony Solutions are certified Apple suppliers and can advise you on the best Apple product for your needs. Contact us today for pricing.
*Originally published on You online.
VIEW MORE
Recognising a Social Engineering Attack
Cyber criminals no longer necessarily hack your accounts or infect your systems to steal your information. These days, they often trick you into making a mistake. This kind of attack is called social engineering, and your common sense is your most powerful defence against it. With this article you will be better equiped for recognising a social engineering attack.
Let’s say you receive a call from your computer support company. They tell you your computer is at risk or has a problem and they can help you solve it. They then proceed to baffle you with technical terms and talk you through how to find some files. You confirm the files are there and they confirm the problem is real.
Their next step is to convince you to buy some software remotely or give them remote access so they can fix your problem. The moment you agree to giving them control is the moment they steal your data.
You receive an email from your boss or co-worker. The email asks you to urgently send them some information. You know it is information they could possibly need. So when they ask you to bypass normal security procedures and send it to their personal Gmail account, you just do it. The problem is, the person you’re emailing isn’t your boss or co-worker.
So how do you stop such attacks?
You can’t. However, you can use common sense to identify whether it is likely to be one. Recognising a Social Engineering Attack before it is too late can save you a lot of pain and money. Here's 4 ways to identify a likely social engineering attack.
1. Does it sound too good to be true?
If you receive an email that says you’ve won a car, and you haven’t entered a competition to win a car, then you’re more likely to be the target of a social engineering attack than a new car winner.
2. What's the rush?
If someone wants something urgently from you or is pushing you to take urgent action, they are attempting to fool you into making a mistake. Don’t fall for it.
3. Why would my friend or work colleague say that?
If you receive an email from someone and it doesn’t sound like them, it probably isn’t. It’s more likely to be someone impersonating them and attempting to trick you.
4. Why would they be asking me for that?
If you receive a request for your password or other information, such as account numbers, or information the person sending the email should already have access to, it probably isn’t a legitimate request.
Ensure all of your staff are trained and prepared and there are appropriate processes and procedures in place. A social engineering attack could be aimed at anyone in your organisation, from the CEO down. Communicate with your staff and let them know, if they suspect something is wrong to stop communication immediately and to report it to the management team.
Also have a look at WHALE PHISHING AND HOW TO PROTECT YOURSELF FROM IT and CYBER SECURITY – 10 WAYS YOU CAN EDUCATE YOUR EMPLOYEES.
Get a IT Partner you can count on.
Multi IT & Telephony Solutions has been handling IT for more than 30 years now. Recognising a Social Engineering Attack is only the first step, with our highly qualified technical team we will be able to assess your security shortfalls as well as implement effective security strategies to keep you and your organisation safe. Contact us today for your free IT audit.
VIEW MORE
The basics of App Virtualisation
App virtualisation is a term that gets thrown around by professionals quite often. Vendors say it’s a necessity for small business owners. But for a service that claims to make your life easier, it’s ironic that small business owners are left even more confused with what app virtualisation actually is. So what exactly is it? How does it help your company? And what should you be aware of, if you do decide to get it? Here are some things that you need to know about app virtualisation services.
Non-virtualised apps
To understand app virtualisation, we need to know how desktop applications are traditionally installed first. When you install an application like Skype or Slack onto a computer, the installer program puts most of the files required for the app to run in the Program Files folder on your hard drive. This process is usually fine for personal use, but things can become problematic if you install similar apps on your device.
For instance, if two similar applications are installed on the same file destination, there is a chance that these programs might conflict with each other and inevitably crash. Similarly, if you choose to uninstall a program without knowing that it shares important files with another application, you run the risk of breaking the other application. Additionally, installing applications the traditional way means you’ll have to manually install the same programs for all your users. Not only is this expensive but installing new applications for every desktop in your company is going to take an absurdly long time.
App virtualisation
The solution to this is app virtualisation. This refers to the type of virtualisation where you run a program on a thin client, which runs in an environment separate from the physical server allowing you to run programs that are normally not compatible with a certain operating system (OS). In other words, virtualized apps trick your computer into working as if the application is running on a local machine, but in fact you’re actually accessing the app from somewhere else. This is better than traditionally installed programs because virtual apps run and feel just like any regularly installed app would.
Advantages of app virtualisation:
Apart from the basics however, app virtualization offers more advantages for small businesses including:
Quick installation times and less money spent on local installation for each user.
Allowing incompatible applications to run on any local machine. For instance, if your laptop is dated and can’t run the latest apps on its own, you can lighten the load on your CPU by accessing virtualized apps instead.
Mac users can simply run any Windows apps if your company’s local server runs Windows OS.
Applications will not conflict with each other on your computer, since virtual apps are installed in a different location.
Upgrading is easy since your IT department won’t have to upgrade applications in individual desktops, they just have to upgrade the virtual application within the company’s local server.
Applications can be accessed from any machine, allowing your employees to work from home or on the go if they choose to.
Things to consider:
Before you start deploying app virtualisation solutions at the workplace, you need to have a stable network connection first so that you can smoothly stream apps to your users. This is definitely more important for graphic intensive applications. You should also note that some applications like antivirus programs are difficult to virtualise since they need to be closely integrated with your local OS.
Get app virtualisation help
App virtualisation is popular for many SMBs and it definitely pays off to know why it’s good for your company before taking the plunge. Victualling a workplace is no easy task and that’s where Multi IT & Telephony Solutions come in. So if you’re convinced that your company can benefit from app virtualisation, get in touch with our IT experts today.
VIEW MORE
Information Security Threats for 2017
Information security threats in 2017 will be more persistent and damaging than ever before. You need to be prepared for the unknown.
This year could see an exponential rise in information security breaches that endanger the integrity and reputation of trusted organisations. The Information Security Forum, a global, independent information security body that focuses on cyber security and information risk management, forecasts these four key global security threats…
Unmanaged Risk from Devices
Everywhere you go, there are more and more connected and smart devices. Collectively known as the Internet of Things (IoT), they range from heart monitoring devices to fully interfaced smart homes. The trouble is, these devices are relatively simple to hack. By embedding sensors everywhere, we’re greatly expanding the threat landscape.
Many businesses are unaware of the scale and penetration of internet-enabled devices and are deploying IoT solutions with little regard to risk management and security. Rather than doing away with them, it’s critical to think about where connected devices are used and what data they have access to, then build security measures around that.
You need to be eyes open and realistic about managing the application of IoT devices.
Crime-as-a-service
Criminal syndicates used to operate like start-up companies. Now, they’re starting to mimic large private sector organisations. They’re becoming extremely mature and sophisticated businesses. Many even operate as a service offering. While some have their roots in existing criminal structures, others focus purely on cybercrime. They specialise in particular areas ranging from writing malware to hosting services, testing, money mule services, and more.
You need to have advanced measures in place to protect your business against this growing sector.
New Regulations Bring Compliance Risk
Governments around the world are introducing, or being pressured to introduce, tighter data protection legislation. This in turn introduces new and unforeseen costs.
Your business needs to keep abreast of the changes in regulations across all jurisdictions you operate in. You then need to ensure you’re compliant with them. This means completely rethinking the way you collect and secure information.
Depending on the nature of the information being compromised, failure to comply could mean big fines – bigger than anything we’re used to.
Bull's Eye on Brand Reputation and Trust
In 2017, sensitive corporate information and critical infrastructure has a bull's eye painted on it.
Attackers are more organised, attacks are more sophisticated, and threats are more dangerous than ever before. Brand reputation and the trust dynamic that exists amongst customers, partners and suppliers have become targets for cybercriminals and hacktivists. We're no longer merely talking about personal information and identity theft.
Your business needs to be aware of the more important trends that emerged in 2016, as well as those forecast in the year to come.
Bullet proof your organisation against information security threats
Now is the time to make your employees the strongest link in identifying and reacting to security threats. Successfully doing so requires an understanding of the various risks faced by employees in different roles, then tailoring their work processes to embed relevant security processes. Your ability to implement this will determine how this trend affects your organisation.
Multi IT & Telephony Solutions have over 30 years experience in the IT industry. Contact us to find out how we can be of assistance in your organisations fight against information security threats.
VIEW MORE