Security

First Email Scam Directed at Office 365

First Email Scam Directed at Office 365

News about the first email social engineering attack against Office 365 came alongside Microsoft’s announcement that the anti-spam SmartScreen technology is being deprecated. Stay safe people!


Dell Data Protection White Paper Series

Dell Data Protection White Paper Series

Dell is a leader in data protection software.  Listed below is a series of white papers and technical briefs outlining a series of solutions and to system backup options, data protection, cloud...


Faster backups without overhauling your backup software? You bet.

Faster backups without overhauling your backup software? You bet.

Reduce storage requirements, lower power and cooling loads, and shrink RPOs and RTOs –without overhauling existing backup software. See how it’s possible in our white paper, “Choosing the Right Deduplication Solution for Your Organization.”


Get your apps back in business – in minutes.

Get your apps back in business – in minutes.

Your apps and data must always be available — with near-zero downtime. Our tech brief shows you how to achieve cloud-era protection that safeguards apps and data, whether it’s physical, virtual or in the cloud.


Fast data protection ROI? This e-book shows you how.

Fast data protection ROI? This e-book shows you how.

It’s possible to protect critical digital assets, improve productivity, reduce costs— and get an unbelievable return on investment (ROI). How do we know? Because these five companies did it! See how in this e-book.


Data Protection: Focus On Recovery

Data Protection: Focus On Recovery

Staying competitive means your organization needs to recover from an outage like it never happened. That means restoring operations immediately for the user — even while a full system restore is going on in the background.


Choosing the Right Public Cloud for Better Data Protection

Choosing the Right Public Cloud for Better Data Protection

Don’t be afraid of public cloud. It can be a great choice if you’re clear on the capabilities, including: Must-have features The right balance of recovery time, cost and risk Hidden gotchas to know about


Tony's Office 365 Snippets – August 25

Tony's Office 365 Snippets – August 25

Some quick impressions of the new Office 365 Secure Score Preview. Microsoft Ignite begins soon. OWA has a nice new People view, Groups are borrowing from Delve, Planner has shown up on menus and seems to be getting some new features too, including an interesting third-party Outlook add-in.


No Good Answers for Office 365 Backups

No Good Answers for Office 365 Backups

Vendors of backup software often focus on the data belonging to a single application. It’s an approach that does not work for Office 365 where new applications use components drawn from multiple workloads. Traditional backup and restore approach is inadequate Office 365 Groups and Office 365. But the real question is whether cloud backups make sense.


The Anatomy of an Office API Vulnerability

The Anatomy of an Office API Vulnerability

Office 365 is not immune to security vulnerabilities in the code that make up its services. In this case, an ISV discovered a gaping hole in a new API introduced in March 2016 to enable access to reporting data for Office 365 tenants. Fortunately, the gap has been fixed and we can relax. That is, until the next vulnerability is discovered.


Using Azure Information Protection

Using Azure Information Protection

Learn how Azure Information Protection, now in public preview, allows existing Azure Rights Management (RMS) templates to be applied to protect content generated by Word, Excel, PowerPoint, and Outlook (2010 to 2016) automatically based on a simple classification scheme defined in an Azure protection policy.


Office 365, EMS, and cmdlets

Office 365, EMS, and cmdlets

I’m technically on vacation and supposed to be sunning myself in the South of France. However, the ecosystem surrounding Office 365 never stops evolving and changing and I keep a wary eye on what’s happening, even by the pool. Here’s what I have been looking at in the last week.


Understanding SOME of the Pratfalls and Pitfalls of Sharing in a Collaborative World

Understanding SOME of the Pratfalls and Pitfalls of Sharing in a Collaborative World

Using some good graphics, Marc explains the levels of hierarchy in SharePoint in a way that will make sense to most users who struggle with where a document goes and where one might want to establish security for sharing documents with others.


Microsoft Ends SHA-1 Certificate Support: Where's the Lock Button?

Microsoft Ends SHA-1 Certificate Support: Where's the Lock Button?

Today Windows 10 users will notice Microsoft Edge and Internet Explorer will no longer consider websites protected with a SHA-1 certificate as secure and will remove the lock icon from the address bar for these sites. For now, these sites will continue to work but will not be considered secure...


Chasing Email Forwarding: Who’s Forwarding Email Outside Office 365?

Chasing Email Forwarding: Who’s Forwarding Email Outside Office 365?

If users forward email from their Office 365 mailbox, it might lead to some compliance issues or information leakage. Users might not be aware of the lurking issues and simply see forwarding as a way to have their work mail show up in their personal email account. Clear policies governing the use of email forwarding, good communication, and some tweaks to Office 365 can help solve the problem.