Lessons Learned from a True Story of How a Phishing Email and Look-Alike Domain Netted $160,000 for a Hacker
What if you got a call from your vendor asking you why you haven’t paid them yet – but you HAD already paid them, or you thought you had. That’s what happened recently to a company that became the victim of a cyber attack that siphoned off $160,000 to the hacker’s bank. Here’s how it happened…
4 Ways to Mitigate the Dangers of Your Home Network
How “smart” is your home? Could you list everything under your roof that’s connected to the internet? Let’s start that list – computers, tablets, smartphones, TV, thermostat, speakers, game consoles, hearing aids… you get the idea. These are all endpoints that can create potential vulnerabilities…
National Cybersecurity Awareness Month: Do Your Part – Be Cyber Smart
October is National Cybersecurity Awareness Month (NCSAM), and the theme for 2020 is – “Do Your Part. #BeCyberSmart.” NCSAM is in its 17th year and in the years since it was launched by the National Cyber Security Alliance, its mission has been to promote safe behaviors so that Americans can act…
5 Signs That It’s Time to Move to SharePoint
SharePoint is Microsoft’s file storage and sharing platform, but it can do a lot more for your business than just save your files. If you’re looking for a way to use technology to improve your business, then moving to SharePoint is the direction you should go to streamline processes, beef up security…
M365 Use Case: Streamline Onboarding Processes with Power Automate
What Can You Do with Microsoft 365? USE CASE: Microsoft Power Automate SITUATION: A company had a series of tasks that needed to be completed whenever a new hire was onboarded. These tasks included activities in different departments. For example, HR gathered employee information; Accounting…
Microsoft 365 Use Case: Message with Teams Instead of Text Messaging
What Can You Do with Microsoft 365? USE CASE: Microsoft Teams SITUATION: A company needed to record incoming shipments of supplies at various job locations. The onsite employees were using their personal cell phones to take photos of the shipments and were sending those via text messaging to…