//
archives

Cybersecurity

This tag is associated with 12 posts

Office 365 Best Practice: Deploy Anti-Spoofing Rule.

This is part of an ongoing series of Office 365 Best Practices which should in place for every organization – big or small, business or non-profit. “Spoofing” is a spam technique in which malicious actors pose as legitimate senders for their own nefarious purposes – monetary gain, account access, etc. A common spoof attempt seen … Continue reading

Office 365 Best Practice: Enable Audit Logging.

This is part of an ongoing series of Office 365 Best Practices which should in place for every organization – big or small, business or charity. The Audit Log is a tool that tracks all user and admin account activity for 90 days – with the right licensing, it can keep even track activity up … Continue reading

Office 365 Best Practice: Block External Auto-Forward.

This is part of an ongoing series of Office 365 Best Practices which should in place for every organization – big or small, business or charity. E-mail hackers are very sneaky, and the good ones have no problem with biding their time. When an account is cracked by a malicious actor, it’s common for them … Continue reading

Follow IT PRO Source on WordPress.com

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 57 other followers

Archives

About the Editor

Austin Thomé

Austin Thomé

Writer, enthusiastic IT Professional, expert coffee drinker, and website proprietor.

View Full Profile →