With every Microsoft product you purchase there is a known EOL, or End of Life. Simply put, it’s an expiration date for your software or licensing. The most common reason is due to advancements and/or changes in technology that lead to your current purchases becoming obsolete. That is not to say that the software or devices that you recently purchased aren’t advanced for their current life cycle, but at one time we also believed that Windows 95 was so advanced we couldn’t imagine we would ever need a new operating system again. Fast forward to 2019 and we are 8 OS versions past Windows 95 with Windows 10.
So you might have heard the buzzwords “2FA” or “Multi-factor Authentication” thrown around a lot lately. The use of 2FA has become increasingly popular over the last few years. Apple has started prompting their users to activate this more advanced form of security. Your child’s Xbox Live account is now also prompting them to activate and use 2FA. Software you use at work, particularly credit card processing software, may also require card access or a 6 digit code. So that begs the question: what is multi-factor authentication?
Although Microsoft Office 365 has plenty of helpful features, sometimes you come across a need for which some 3rd party provides a plugin. Seeing that not all add-ons developers are created equally, we’ve tested and compared some to help you make an informed decision. Whether you need email backups, archival or encryption we’ve got you covered! All of the add-ons we review below have proven to be reliable, easy to use and capable to provide some level of security compliance feature as required by HIPAA, PCI, SOX and/or CJIS.
As the year draws to a close, we want to remind you of how important it is to stay diligent with your cybersecurity awareness training and security updates. This year, like years past, cybersecurity breaches have topped headline news and may have affected you personally. Let’s review some of the larger breaches and malware risks this year. These are security breaches that allowed someone or some group to access personal information, and they could even access some examples of how that information was used.
For each area of concern with sensitive data, there are published guidelines to follow in order to achieve compliance. Reading and digesting the guidelines in whole can be a difficult task. There are decision making tools, technical requirement write-ups, security policies, and security procedures to pour through. So, without getting into the nitty gritty, we want to answer some of the frequently asked questions that come our way.
What is compliance? Some of you might be acutely aware of this term, and others might have little to no idea. In broad terms, business compliance means following the rules required to secure your business and the people that interact with it. More specifically, compliance is aimed at information security. Business Compliance means you are complying with requirements by a credible organization or government department that promotes the security and protection of sensitive information.
*Special Alert* – Extortion Email Scam
A worrying new type of phishing email is going around using stolen data from high-profile websites. These emails include a password that has been used with the user’s email address in the past in an attempt to scare that person into sending the scammer money (typically Bitcoin). Since the emails include personalized information, they appear credible in ways typical phishing emails do not. Typically, the scammer is claiming that they have recorded “compromising activity” and blackmailing the user for their silence.
Within the last year, Facebook, MyHeritage, Ticketfly, Under Armour, and several other high-profile services have been compromised.
Ah Budgeting… The least favorite thing we can do in both our personal and business lives. Although it isn’t fun, it tends to make our lives much easier in the long run. Let’s break down the basics to getting you and your organization onto a budget plan that will work for your business goals.
Once you’ve decided to work remotely, you may find it difficult to stay in sync with the rest of your team back in the office. Digital workforce infrastructure has been engineered for decades to provide a stable foundation for your office, but now that you’re outside of your firewall you may find yourself as frustrated as a hacker would be when trying to access your company’s documents. While you may still be able to email back and forth with your coworkers, you can’t easily update your shared files, see who’s available to receive an incoming call, or update a customer’s order status.