Monthly Archives: August 2018

How to prevent phishing attacks

In 2018, phishing attacks are still thriving and relevant. Phishing is a fraudulent action of sending a deceptive email in order to get end users to reveal personal information. No matter how big or small your company is – attackers masquerade as a respectable entity that will trick employees into trusting the sources. So what are some ways to prevent phishing attacks within your organization?

Stay in the know

New phishing techniques are being adopted continually, it’s important to keep employees in the know of the latest scams. Staying up to date on email scams will reduce the chance of employees falling victim to phishing. Furthermore, employers and employees should take the time to meet with cyber security professionals to learn of the latest ways to keep their inbox secure and best practices when opening emails.

Think before you click

When an employee receives an email from a trusted site or trusted source, its much less likely to be a malicious email. It’s common to receive emails from a reputable companies on the daily basis, this is why phishing is so common. Scammers disguise emails as reputable companies to increase their chances of getting the end user to click.

End users should hover their cursor over a link prior to clicking, the actual link address will show up at the bottom of the page. It’s important to make this a habit among employees, reading the link will allow for the site identification. When in doubt, go directly to the source rather than clicking an unverified link.

Education is key

The biggest step an employer could take to prevent employees from exposing themselves to a phishing attack: education. As a general rule, no personal or financial information should be shared over the internet. Users should never input sensitive information into links they clicked on over email. No email sent or received should have sensitive information. All websites visited should https:// and link checking should become habit.

As malicious email behavior continues, it is crucial for businesses of all sizes to educate themselves on the latest in cybersecurity. To learn more about CompuOne’s cybersecurity training, contact us today.

Office 365: Security Best Practices

Microsoft Office 365 has become a common necessity for business and enterprises alike. As data loss and security breaches continue to grow, it is essential to use best practice to assure Office 365 security.

Multi-Factor Authentication

Multi-factor authentication (MFA) is a security system that has become increasingly essential in Office 365 security. MFA requires more than one method of authentication to verify employee identity and credentials.

Managed from the Office 365 admin center, enabling multi-factor authentication prior to deploying Office 365 to the end user is the most successful way of setting it up. Microsoft permits MFA in three separate ways depending on business preference:

  • Mobile app as a second authentication factor.
  • Text message as a second authentication factor.
  • Phone call as a second authentication factor.

Mobile Device Management

Companies may have a “bring your own device” policy, and some may have regulations against employees bring their own devices. Regardless, employees are capable of accessing Office 365 data with phones and tablets.

Education is key to make certain of mobile device management (MDM) security, i.e., employees not accessing files with sensitive information. Nevertheless, there are always circumstances that cannot be accounted for.

Fortunately, Office 365 has built in mobile device management that is available for both Office 365 for Business and Office 365 Enterprise.  If employees use company-owned devices, admins are able to manage and revoke access to important data when needed. Mobile device management for Office 365 is a proper way of enhancing business security.

Data Encryption

Another best practice for file protection in Office 365 is to safeguard with data encryption. To assure the security of information, admins must implement security protocols regarding data that is stored with Office 365. This is exceptionally important for companies who acquire and store sensitive information such as social security, banking information, and health records.

Office 365 offers multiple encryption capabilities to prevent from business content being read by unauthorized users. By default, encryption at the computer level on Windows OS is by Bitlocker. Files being shared on OneDrive for Business and Sharepoint online are encrypted by TLS connections.

Office 365 is a vital tool for business and enterprises alike, there is an enormous importance to secure information. As a Microsoft Gold Partner, CompuOne is well-versed in securing Office 365 subscriptions. To learn more about security best practice for Office 365, please contact us.

Three types of virtualization

In business technology, virtualization is becoming far more integrated and advanced than ever before. In the digital world, there is no doubt that some form of virtualization will be introduced to a majority of companies in the upcoming future. So what is it?  Virtualization is creating a virtual resource of something.

There are multiple types of virtualizations that can serve various industries, business sizes, and functions. Companies are quick to adopt virtualizations as a productive tool, with increased efficiency, and refined security.

Desktop Virtualization

Desktop virtualization, sometimes referred to VDI, is a common form for virtualization across various industries. Desktop virtualization is hosted on a centralized server, and can be accessed from virtually anywhere. It is common among education institutions and the manufacturing industry. IT experts are able to perform maintenance and upgrades easily, since desktops are all hosted on the same server.

Server Virtualization

To put server virtualization simply, it is segmentation of a physical server into numerous virtual servers. Server virtualization allows multiple servers to be hosted on a single machine. This will allow companies to divide the workloads, especially in IT departments. Server virtualization reduces costs due to minimized hardware use and increases productivity with the division of workloads.

Storage Virtualization

Storage virtualization is an effortless and low cost way of storing data that many businesses could potential benefit from. There are multiple ways storage virtualization can work: it can be implemented within the storage itself, through dedicated appliances, or through software built to create storage virtualization.  It is a great tool for disaster recovery planning, since data that is stored virtually can be replicated and transferred securely.

Incorporating virtualization could be extremely beneficial in many different areas of a business. A managed IT services provider will help integrate virtualization based on company goals and needs. Please contact CompuOne today to learn more.