Security Webinar Series – Device & App Security

Introduction With the increasing volume and diversity of both ‘bring your own device’ (BYOD) and corporate-owned devices being used in organizations today, a growing challenge for IT departments is keeping corporate information secure. Microsoft mobile application management (MAM) and mobile device management (MDM) solutions help minimize this complexity by offering management capabilities both on-premises and in the cloud, all from a single console. In this Webinar you will learn more on how to MANAGE DEVICES AND APPS FROM THE CLOUD.

Read more

Manage Office 365 App Password

Manage Office 365 App Password

Introduction to Office 365 App Password An app password is a code that gives an app or device permission to access Office 365. When you are using a non-browser application that does not support modern authentication such as apple native email app or Office 2010 that do not support multi-factor authentication. If you are enabled for Multi-Factor Authentication (MFA) in Office 365 then you will need an App Password for these non-browser applications. For such applications, users won’t be able to

Read more

Office 365 Advanced eDiscovery

The amount of electronic information is exploding, and the information is more complex as it’s coming from number of different sources like email, instant messages, documents, videos etc. Managing ever growing data effectively to meet internal and external compliance requirements is more difficult than ever due to increased volume of data and source. To continue to meet legal, business, and regulatory compliance challenges, businesses must be able to keep and protect important information and quickly find what’s relevant. Preparing for

Read more

Setting up forced TLS in Exchange online

Introduction to TLS TLS is a protocol to ensure privacy between communicating applications and their users on the Internet. When a server and client communicate, TLS ensures that no third party can tamper with message. Setting up forced TLS in Exchange Online requires setting up mail flow connectors. By default, all emails in Office 365 are sent using Opportunistic TLS. When sending using Opportunistic TLS, if a TLS connection cannot be established, it will fall back to a basic connection and

Read more

Setting up Office 365 anti-phishing Policies

Introduction Attacks through email are one of the most common methods used by hackers to gain entry into a network. Phishing is a technique used by hackers to retrieve sensitive information such as a user’s account credentials, financial information or marketing campaign etc. In a phishing attack, hacker contact the user posing as a legitimate sender to target the user into providing sensitive data such as personally identifiable information, banking or credit card details, and passwords. Phishing emails usually contain branding

Read more
1 2 3 23