As you know, Microsoft regularly release new options and new security features as part of their Office 365 platform.
As part of their focus on security, they highly recommend that all users implement 2FA or MFA on all their O365 accounts.
2FA (two-factor authentication) or MFA (multi-factor authentication) is an additional security layer for your business (moving forward we will just refer to this as 2FA). It helps to address the vulnerabilities of a standard password-only approach.
With 2FA a user will first enter their username and password. Then, instead of immediately gaining access, they will be required to provide another piece of information. This second piece of information could be an number of things including:
a code that was sent to a nominated mobile phone.
an answer to one or more “secret” questions.
a token or code linked to a hardware device.
a fingerprint or other biometric pattern.
With this additional security measure, a potential compromise of your password won’t provide access to your account. As O365 accounts are being hacked on a daily basis we highly recommend implementing 2FA to help stop unauthorised access to your account ASAP.
There are a few options available to you:
1) Setup this feature yourself (bear in mind if you break something you may lose access to your account).
2) Lock us in to do the work for you – we’ve put together a fixed fee price of $550 (user limits apply) to set this up for you. Just contact us and we will get you scheduled in.
As with all jobs we will be working through all these projects on a first come, first served basis so get in ASAP.
“Your computer has a virus.” Such a dreaded phrase!! With a “human” virus we can feel awful and miss work but when a virus hits our computers, we can lose valuable information and be vulnerable to attack. Continue reading →
When we accidentally delete something, it feels like the end of the world. If a client file or your latest proposal is deleted, you may have to start again. Yet deleting files may not as permanent as many think. When it comes to destroying data properly, you will need to take a more thorough approach. Continue reading →
You might think that your business is going to be fine if a single device goes down. After all, there are other devices your staff can use and your entire systems are not going to fall like dominoes. Or will it? Get rid of single points of failure to make sure that one vulnerability does not take down your entire network. Continue reading →
Your business will rely on a number of service providers. You are likely using third parties for services such as Internet access, domain names, website hosting, software licenses, just to name just a few. So, when a renewal notice arrives, you might just pay it and then file it away for future reference. Here is what you should be doing instead. Continue reading →
A number of our clients have received an email claiming that they have been hacked and that the hackers have video taped them watching porn. To stop the hacker distributing the so called video to all their friends, they demand a ransom payment. Continue reading →
Cybercrime has hundreds of millions of victims if not more! Two-thirds of people online have experienced personal information theft or compromise. A 2018 McAfee Security study suggested that represents more than 2 billion individuals! Continue reading →
Most Apple Mac owners believe their computers are immune to viruses and malware. Even Apple has run advertising campaigns promising that its computers “don’t get viruses”. Those who have owned a Mac for years, decades even, are particularly prone to believing that it indeed the case – after all, nothing has happened to them yet! Regrettably, Macs do get viruses and the threat is getting even larger. Continue reading →