Office 365 Multi-Factor Authentication HowTo: In Part One we covered step-by-step of how to enable Multi-Factor Authentication in the Admin Panel. In Part Two I will cover the additional steps the user is required to take in order to enrol in Multi-Factor Authentication. The user will create two forms of verification and update their account recovery details.
Exchange Online Multi-Factor Authentication HowTo: We’ve covered the notion of two-factor authentication (2FA) and multi-factor authentication (MFA), especially how you MUST enable it for sensitive accounts. I include all IT users, plus any senior management user within the organisation, such as the MD/CEO as their email is sensitive enough to justify Exchange Online Multi-Factor Authentication.
Office 365 anti-spoof email protection: Insider spoofing or faking the email address of the CEO or the Managing Director to trick the CFO or the Finance Director into transferring tens of thousands of Pounds to criminal bank accounts is really big business. Microsoft, with Office 365 anti-spoof email protection, is quashing the threat.
We covered the reasons why you should include an email signature, and what information you should include in the previous post. However, Office 365 Email signature management is made possible with the application of mail flow rules. This enables the functionality to append email signatures at the server side, meaning that you get consistently applied signatures no matter what device you’re sending from. This enables company-wide standardisation and brand consistency.
Office 365 email signature management for company-wide consistency is made possible with mail flow rules. There are a number of reasons why you might want to append an email signature to your emails. The foremost reason is making it easier for customers to contact you. An Office 365 signature looks professional and consistent, distinguishes your organisation, […]
Security is paramount for any business, especially given the rise in cyber attacks, data thefts and major network breaches. I won’t list the major names, as that’s been done, but you can read the Cyber Security Breaches Survey 2016. Much of that research was aimed at larger organisations, even though it’s far easier for enterprise-level companies to secure their resources. But what about the rest of us, Startups, Micro-Businesses and Small to Medium sized organisations?
Email continuity is critical. Learn how to protect email with simple, and old hat, methods in tandem with Exchange Online for email continuity & email disaster recovery. Email continuity & Email Disaster Recovery: I’m not sure if it’s just me, but there does seem to be an incessant whine regarding the demise of email. Usually from […]
While email remains the primary method of communication between users, many users and companies are experimenting or committing to alternative means such as Slack or Google Hangouts. While these methods have additional benefits and limitations, Skype for Business is favoured by larger firms due to the focus on security, manageability and reliability. “When it comes […]
Office 365 pricing is competitive and the first choice for organisations that need a cloud-based suite of productivity and collaboration applications. Office 365 Pricing: Of course I’m someone who uses this suite in the office, and almost everywhere in fact. I’m not at all surprised to see so many other organisations choosing Office 365, even if […]
Office 365 Plans: We’ve already written extensively on why we recommend Office 365 over Google Apps. We’ve also written extensively on using OData, PowerShell or ActiveDirectory, to get the most out of Office 365 for you and your users. However, as there are so many different packages available, it can quite a puzzle to work out which Office […]
Serviceteam IT Limited, 49 Frederick Road, Edgbaston, Birmingham, B15 1HN.
Copyright © 2011 Serviceteam IT Limited. Registered in England 07578043.