This is part of an ongoing series of Office 365 Best Practices which should in place for every organization – big or small, business or non-profit. “Spoofing” is a spam technique in which malicious actors pose as legitimate senders for their own nefarious purposes – monetary gain, account access, etc. A common spoof attempt seen … Continue reading
This is part of an ongoing series of Office 365 Best Practices which should in place for every organization – big or small, business or charity. The Audit Log is a tool that tracks all user and admin account activity for 90 days – with the right licensing, it can keep even track activity up … Continue reading
This is part of an ongoing series of Office 365 Best Practices which should in place for every organization – big or small, business or charity. E-mail hackers are very sneaky, and the good ones have no problem with biding their time. When an account is cracked by a malicious actor, it’s common for them … Continue reading