Cyber security is now a pressing issue for many organisations. If you’re unaccustomed to the technology sector, it can be hard to decode the extensive volume of technical language. As part of the research project I am currently involved, cyber security concerns within UK businesses is a key area. Read more as I attempt to break down the complicated language surrounding the topic in a Glossary of terms.
The National Cyber Security Centre recommend organisations use backups as a way to help mitigate against a wide range of potentially catastrophic problems, such as fire, theft, flooding, and – naturally – ransomware.
If you’re using Multi-Factor Authentication for your organisation, and want to use Apps that connect to your Office 365 account, you will need to create an Office 365 App Password. Thankfully, it’s really easy to do, if a little hard to find.
Security is paramount for any business, especially given the rise in cyber attacks, data thefts and major network breaches. I won’t list the major names, as that’s been done, but you can read the Cyber Security Breaches Survey 2016. Much of that research was aimed at larger organisations, even though it’s far easier for enterprise-level companies to secure their resources. But what about the rest of us, Startups, Micro-Businesses and Small to Medium sized organisations?
Part One | Part Two In Part One we learnt: Install and update Windows Server with Active Directory Federation Services version 2.0 (AD FS 2.0) with update Rollup 2, KB2681584. Set-up AD FS for Office 365 for Single Sign-On. To continue . . . Add five claim rules to the Active Directory Claims Provider trust. Use the following procedure to […]
Restrict Access to Office 365 Exchange Online: Limiting by Network, IP, Client, Group or Policy | HowTo | 1 of 2
Active Directory Federation Services (AD FS) 2.0 provides a way to configure access restriction policies. Office 365 & Exchange Online customers using Single Sign-On (SSO) who require these policies can now use Client Access Policy rules to restrict access based on the location of the computer or device that is making the request and prevent access […]
Microsoft Azure has taken a major step ahead of its rival cloud platforms with its continued commitment to security in the form of ISO 27017 cloud security certification. Achieving compliance with the ISO27017 cloud security certificate dictated that Microsoft had to adhere to 44 different cloud risk and threat model controls. With these additional security […]
Passwords should be complex and changed regularly. Encryption should be implemented for any business critical information and especially for any information which is mobile or transported in any fashion. Why then do we still get asked the question “why do we need to change our passwords so often” and “do we have to have such […]
Cyber security and cyber fraud. Look, there is no easy answer to this, albeit many pundits, commentators and politicians would have you believe there is. First of all, I’m a technologist, I love it. However, technology does not hold the key to the solution to this issue. The simplistic application of some ethereal technical solution […]
Serviceteam IT Limited, 49 Frederick Road, Edgbaston, Birmingham, B15 1HN.
Copyright © 2011 Serviceteam IT Limited. Registered in England 07578043.