Improved email security for Office 365

While you can take many security precautions to protect your organization, a cyber attack is always possible because of human error. Microsoft, however, is trying to change this. In the coming weeks, the technology giant plans to launch a new security feature for Outlook, but only if you’re an Office 365 user. Here’s how it can help your business.

Aptly called “Safety Tips”, Microsoft Office 365’s new security feature is designed to help make your employees (and yourself) more aware of which emails may contain harmful content. By analyzing the data patterns of millions of emails, the feature uses a color-coded bar at the top of an email to help you determine what emails are safe, suspicious, or fraudulent.

How it works

Safety Tips uses a simple system to help you identify the safety level of an email quickly. The system consists of four colors that categorizes an email as suspicious, trusted, safe or unknown. The details of each of these categories are outlined below.

Suspicious email
Color label: Red
Description: This has either failed sender authentication or is a known phishing email. These messages should be deleted.

Unknown email
Color label: Yellow
Description: Exchange Online Protection marks this type of email as spam. However, you can move this item to your inbox by clicking it’s not spam in the yellow bar.

Trusted email
Color label: Green
Description: If this email comes from a domain Microsoft deems safe, then it falls into this category.

Safe email
Color label: Gray
Description: This type of email has either been marked safe by the user’s organization, has been moved from the junk folder into their inbox by the user, or the email is from a contact on the user’s safe sender list.

Color coding will look different between the Outlook app and Outlook for the Web. In the Outlook application, only suspicious emails will be flagged, whereas in Outlook for the Web all four types of emails will be color-coded. However, it should be noted that most emails won’t have any color code as they’re only added when Microsoft thinks they’re relevant.

With hackers getting smarter by the day, and human error a roadblock to a secure business, this new feature will hopefully add an extra layer of security to your organization. If you’d like to learn more about Office 365 or other security services we offer, get in touch today. A more secure business awaits.

Published with permission from TechAdvisory.org. Source.

Office 365 Groups: your apps under one roof

At work, we depend on several apps to be more productive around the office. However, with so many of them open in our web browsers, it can be a drag to constantly click in and out of tabs just to get the information we need. Fortunately, Office 365 Connectors for Groups allows you to stay on top of all the third party services your company is using. So how, exactly, do these connectors make your life easier? Here are a few things you need to know about the new Office 365 feature.

What can it do?

Office 365 Connectors enable users to access third party apps and services within their Outlook groups, rather than having to scour through dozens of windows to access a specific application. This new feature allows you to keep your company’s discussion in one place, and enables your employees to stay up-to-date regardless of the service used to broadcast an event. For example, your team members can be informed about a particular hashtag that your company is following on Twitter without having to explicitly open the page. Groups aren’t limited to one particular service either. With connectors you can use Twitter, Trello, Mailchimp, Bing, UserVoice and over 50 other services.

Small organizations can also take advantage of connectors. Office 365 lets you develop your own connectors by embedding the Connect to Office 365 button on your site. This allows users to connect to your service and get updates on your company, as they would with other third party services. Basically, with connectors, your Office 365 client becomes a hub for third party that keeps your company in sync to get more work done.

Connector card

Connector cards offer a user friendly way to interact with external applications. If a particular connector is added to a group, connector cards are generated within the group’s activity feed. While most cards will display events in plain text, some applications like Twitter and Trello provide formatted actions to interact with the card. Trello, for example, allows you to Assign or Comment on an event card.

Who can create a connector?

Office 365 group members can configure and use an array of connectors. Once you configure a connector for a specific group, that app will be also be available for other members. However, the person who added a connector to the group is the only one capable of modifying that app.

How do you access Office 365 Connectors?

With its public release, any Office 365 Mail user can use Office 365 Connectors for Groups. Simply navigate to a Group from your Outlook page and click on the Connectors tab at the top of the page. From here, you can connect the available third party services on offer to any of your Outlook groups. You can even configure the settings of your apps without ever having to leave Office 365. However you should probably only consider pulling in the applications that you think your group will be using the most.

As your business grows, you’re going to need more services to be more productive in the workplace. By aggregating them all in one place, you save time shifting around dozens of apps to find the information that you need. So the next time you create an Office 365 Group, help your team members work more efficiently by setting up some connectors.

If you’re interested in learning about the latest Office 365 updates, contact us today.

Published with permission from TechAdvisory.org. Source.

Get Office 365 switch security right

It’s easy to see why Office 365 is an attractive solution for small and medium-sized businesses already familiar with the Office interface. More and more companies are making the move to the cloud, but many have yet to complete their transition and still rely at least in part on on-site SharePoint systems. When you’re ready to migrate, the move from SharePoint to Office 365 presents numerous security challenges to prepare for – not least because breaches are far more likely to be caused by localized issues than insufficient protection on Microsoft’s part. Here’s what you need to do to ensure you’ve got security covered when you make the leap to migrating from SharePoint to Office 365.

Identify your company’s sensitive data…

It’s so easy to create sites within SharePoint that businesses often have far more than they realize, covering just about every aspect of their operations. And it’s natural, of course, for at least some of the files housed within those sites to contain sensitive commercial or personal data. The key is ensuring that sensitive information is adequately identified and protected. Do this by conducting a security audit before you undertake your migration.

Your audit should identify the types of data stored in the various parts of your SharePoint network, including which specific information needs extra safeguarding. Be sure to consider everything from trade secrets and contract details to the personal information of your clients.

…and then restrict access to it

Once you’ve worked out where your most precious data lies, you can check who currently has access to it and whether their access is appropriate. After all, it’s not necessary for everyone to be able to get at all the data your company owns; it’s far better to operate on a need-to-know basis, with a reasonable level of flexibility.

Ensure that each of your employees has access only to the data that’s necessary for them to perform their duties. When you make the switch to Office 365, you’ll find that it allows you to conveniently set these different levels of permissions, including for external partners with whom you collaborate.

Trust nobody and suspect everybody

We say that lightheartedly, of course – it would be counterproductive to become so security-paranoid as to suspect everyone is attempting foul play with your company’s data. Nonetheless, it’s wise to consider everyone in your organization when it comes to auditing data access permissions – and that includes system administrators who might be assumed to have master access to every element of your network infrastructure.

A rogue administrator is the stuff of nightmares, since their elevated position gives them much greater leeway to siphon off valuable data without being noticed – or even to allow others to conduct questionable business and bypass the usual built-in security precautions. Overcoming the danger of an all-too-powerful administrator admittedly becomes easier if you have more than one on staff, but even in smaller businesses you can mediate some of the risk by regularly checking on your administrator’s usage and ensuring that their top-level system permissions remain justifiable.

Use machine learning to foresee security breaches

Every action performed by your staff within Office 365 is automatically logged, and with relative ease you can pull reports that allow you to analyze these. But the sheer number of events taking place within Office 365 in the course of your business’s normal operations means that even attempting to identify questionable behavior will be akin to the proverbial needle and haystack. That’s not to say it’s unwise to be on the lookout for anomalies in normal usage – the export of unexplainably large volumes of data, for instance, could suggest that a member of your team is leaking intelligence to a competitor, or that they’re about to jump ship and take your trade secrets with them.

Thankfully, it’s possible to leverage the developing power of machine learning to identify potential breaches before they happen – without the need to wade through unmanageable swathes of perfectly normal data. Graph API is incorporated into Office 365, and allows for the integration of machine learning tools into your security environment to achieve just that. The same tools can also help you avoid being caught out by hackers, by identifying system login attempts from locations that are out of the ordinary; you should bolster this protection by religiously removing inactive accounts and those of departing employees.

By covering these essential security considerations when it comes to your migration, you’ll be one step closer to ensuring you strike the right balance between the powerful collaborative features of Office 365 and the robust safeguards your business’s integrity demands. To find out more about how we can help your Office 365 migration run smoothly, or what other business benefits you can derive from cloud-powered technologies, just give us a call.

Published with permission from TechAdvisory.org. Source.

4 things you should know about the cloud

From hosting websites, email, applications and online file storage, the cloud has become a popular alternative to traditional IT services among businesses. In fact, it is almost impossible to find a company’s data center that does not employ cloud-based services of some kind. However, reported incidents of cloud hacks and server failures can lead some small business owners to be wary of a service that still has much confusion surrounding it. So what are these common misconceptions about implementing cloud computing into a business? Here are a few myths people believe about the cloud.

Cloud infrastructures are unsecure

Security is a necessity for online users. And the most prevalent misconception about the cloud is the idea that cloud services lack appropriate security measures to keep data safe from intruders. Most users also think that the data stored in the cloud can be easily accessed by anyone, anywhere and at anytime.

But the truth is it’s actually a good idea for small businesses to use cloud services. Small companies usually can’t afford to hire an IT department let alone train them to deal with online security threats. Cloud providers, on the other hand, offer services such as layered security and antivirus protection that not only specialize in keeping infrastructures safe from hackers but are available at a price that is much lower than you would pay for in-house IT staff.

Additionally, large cloud-based services such as Google Apps for Work and Office 365 are supported by an infrastructure that constantly installs, updates and patches, which helps manage security breaches. This significantly frees you from the burden of having to install the updates yourself and managing the overall security of your system.

Users should understand that no company is completely safe from security threats regardless of their IT infrastructure. But data is likely to be more secure in the hands of cloud providers as they are the most prepared and qualified to protect your digital property.

Encryption

There is a misunderstanding about the role of encryption or rather how it is implemented to keep your data safe. Encryption is usually used for data in transition, where data is protected from anyone seeing it as it travels from one location to another on the Internet. But encryption can also be applied to data at rest, where data is encrypted on a storage drive.

While cloud service providers already keep their physical storage drive well protected, some keep the decryption key held in software, potentially leaving the key vulnerable to intruders. If hackers were to successfully obtain the decryption key, they can simply access your encrypted data. That’s why some cloud storage services are much better than others in terms of keeping your data protected.

With this in mind, you should understand that while every cloud service highlights their data security by demonstrating their encryption abilities, it does not necessarily mean that a cloud-based service that markets itself as such is right for you. When it comes to choosing the right cloud service, it is best to inform yourself about the security measures that a cloud infrastructure implements and look at how it can protect your company’s digital property.

With the cloud you are no longer responsible for data security

While cloud security is important, the responsibility for protecting data ultimately rests on the user. Misplacing mobile devices can leave your data vulnerable and make the cloud infrastructure insecure. It is also recommended to have verification mechanisms in place for devices that are used to access the cloud.

Losing USBs or external hard drives obviously leads to direct data loss and can be easily remedied by backing up your files. This applies to files stored in the cloud as well. So be smart, and backup your files because it’s better to be safe than sorry.

The cloud is never faulty

Like many online services, cloud-based services are not immune to technical difficulties. For example, some cloud businesses have suffered outages and server failures which corrupted files and may have lost data in the process.

Hacking is another reason why some cloud services fail. Using a less than optimal cloud service that is vulnerable to attacks can lead to stolen or deleted data, which would be near impossible to recover if you did not have any offline backups.

Regardless of these flaws, however, it is vital to note that using the cloud as your only source of data storage and processing can lead to problems in the future. Keeping backups of your files is always a good idea.

Security is truly one of the biggest barriers to the adoption of cloud computing in a small business. But as cloud services expand and encryption technologies advance, cloud adoption is increasingly becoming the most cost-effective solution to meet the small business owner’s IT demands. Contact us today to learn how your business can take advantage of all the cloud has to offer.

Published with permission from TechAdvisory.org. Source.