Posts

The Microsoft Teams Bug - That allows malware delivery to external accounts

Image
The Microsoft Teams Bug - That allows malware delivery to external accounts! Collaboration tools like Microsoft Teams have become an integral part of our work lives. But you still need to be cautious with how you and your employees use it. That’s because security researchers have discovered a bug in Teams that could potentially allow malware to be delivered from external accounts. This vulnerability allows cybercriminals to send a specially crafted message via Teams from an external account. If it’s clicked, the link in the message would deliver malware directly onto the victim's computer or device. Don't worry though, Microsoft is working on a fix for this bug and will roll it out soon. And the risk is actually pretty low. Plus, to prevent external messages from being sent to your business, you can disable external communication in the admin centre. In the meantime, you should always take appropriate steps to reduce your risk of falling victim to such attacks. Firstly, make su...

Browse with confidence: Microsoft Edge’s security boost

Image
Browse with confidence: Microsoft Edge’s security boost Browsing the web can be risky. It only takes one click on one bad link to put your business’s data at risk. With cyber criminals constantly targeting businesses using automated tools, it's important to stay one step ahead with your online security. That's why we're excited that Microsoft is working on a major security update for its Edge browser, which will bring enhanced security to everyone using it. It’s adding new security features and beefing up existing ones. Maybe you’ve already seen features such as Password Monitor. This alerts you if any of your saved passwords have been compromised in a data breach, prompting you to change them immediately. There’s also SmartScreen technology, which will help safeguard you from phishing scams and malware. This checks websites against a list of known malicious sites, as well as analysing URLs for any suspicious patterns or characteristics. If it detects something that’s not r...

Now AI can make your Teams meetings more productive

Image
  Now AI can make your Teams meetings more productive Are you tired of wasting precious time in meetings, only to leave feeling confused and disorganised? Do you struggle to keep track of all the action items and follow-up tasks that come out of these meetings? Microsoft Teams has launched a new feature which could solve your problems and boost productivity.  Meeting Recap is an AI-based intelligent meeting recap feature, available exclusively to Teams Premium subscribers. This innovative feature harnesses the latest in artificial intelligence technology to generate comprehensive summaries of your meetings. That means no more tedious recaps… but hello to accurate and efficient summaries that capture all the key points from your meetings. The Meeting Recap feature doesn't stop there. It automatically identifies action items and follow-up tasks, assigns them to team members, and even sets deadlines for completion. This means that everyone involved in the meeting knows exactly wh...

DDOS ATTACKS - What you need to know.

Image
WHAT YOU NEED TO KNOW ABOUT DDOS ATTACKS! Have you heard of a DDoS attack? If not, listen up. Recently, Microsoft's Outlook was taken down by one, causing chaos for millions of people. What exactly is a DDoS attack? It stands for Distributed Denial of Service, and it's a type of cyber attack that floods a server with traffic until it can no longer function properly. Think of it like a digital traffic jam - the more cars on the road, the slower things move. DDoS attacks can happen to anyone, regardless of size or industry. And if your business relies on online services like email or cloud storage (which, let's be real, most businesses do these days), an attack like this can be incredibly disruptive. So how can you protect your business from a DDoS attack? Here's my advice: Invest in DDoS protection Keep your software up-to-date - many DDoS attacks rely on exploiting vulnerabilities in outdated software Use a content delivery network (CDN). It can help distribute incoming...

Business Email Compromise (BEC) attacks: what you need to know.

Image
  Business Email Compromise (BEC) attacks: what you need to know. We need to talk about something serious - the rise of Business Email Compromise (BEC) attacks. They're becoming more sophisticated and frequent and can have devastating consequences for your company's finances, reputation, and security. What exactly is a BEC attack? It's when a cybercriminal gains access to a legitimate company email account and uses it to send fraudulent messages to other employees, customers, or partners. These messages can be very convincing, often using social engineering tactics to trick people into giving away sensitive information or transferring money. The scary thing about BEC attacks is that they can be hard to spot. The fake emails might look like they're coming from someone you trust, or they might contain details that make them seem legitimate. That's why it's important to be vigilant and know the warning signs. Here are some red flags to watch out for: Urgent request...

STOP AND THINK! BEFORE YOU CLICK ON THE EMAIL LINK!

Image
STOP AND THINK! BEFORE YOU CLICK ON THE EMAIL LINK.   How many times a day do you respond to an email without really thinking about its contents?       Maybe it's a request for some information. Perhaps it’s asking you to pay an invoice. All mundane stuff. But no sooner than you’ve hit send, you've fallen victim to a Business Email Compromise (BEC) attack. A BEC attack occurs when a cybercriminal gains access to your business email account and uses it to trick your employees, customers, or partners into sending them money or sensitive information. They do this by impersonating someone senior, and abusing their position of trust.    It might sound like something that only happens to big corporations, but that's not the case.  According to the FBI, small and medium-sized businesses are just as vulnerable to BEC attacks as larger ones. In fact, these attacks have cost businesses more than £20 billion over the past few years. And Microsoft brings more bad ...

BACK UP YOUR DATA NOW! - IS YOUR BUSINESS DATA AT RISK?

Image
  Is your business data at risk? Don’t take chances with old tech. When you replace old computers or external drives, do you delete data and then just… get rid of them? You could be putting your sensitive data at risk. A new study by a data recovery specialist shows that millions of deleted files can be recovered from improperly wiped hard drives that are sold online. It’s not just buyers who can access your old files. Cybercriminals often buy used hard drives and attempt to recover data from them. This could include anything from confidential business information to client details. It’s easy to forget old data when excited about shiny new technology. However, it’s important to consider what’s on that old drive before selling it or disposing of it. Even if the drive is encrypted, it’s still possible for data to be recovered. And if the drive is damaged, there’s a chance that some of the data is still salvageable. It’s better to be safe than sorry when it comes to sensitive informat...