Facebook
How to Protect Your Data in the Cloud

How to Protect Your Data in the Cloud

Before the pandemic, many businesses took measured steps to transition to cloud technology. The global pandemic forced many companies to make rapid changes to allow their employees to work from home. Although there were security implications associated with such drastic measures, it has resulted in massive gains in cybersecurity.

The cloud has revolutionised the way businesses store and manage data. Thanks to major vendors investing in top-tier security measures, businesses of all sizes can rely on a high level of protection for their confidential information, along with regular updates as more features are added daily.

Despite the advances in cybersecurity technology, businesses still experience security breaches. Often, these breaches can be avoided when the right policies and configurations are in place.

To ensure your business is adequately protected without breaking the bank, let’s look at a few simple yet effective measures that are included with Microsoft 365.

Microsoft 365

Use Microsoft 365 Business Premium

All Microsoft 365 plans include security features, but Premium provides far more features specifically designed for business environments.

Use Multi-Factor Authentication (MFA)

When every user is authenticated correctly, the risk of security breaches drastically decreases. Furthermore, this powerful security feature can be executed speedily, taking a few minutes per account.

The two most secure MFA methods include the Security key method (which involves using a separate security key that you can insert into a PC or mobile device to authenticate the login) and the use of an authentication app. If you use voice and SMS-based MFA please do so with caution. SMS and Voice MFA do not use encryption, making it easy for hackers to intercept them.

Data Security in the cloud

Admin Account Protection

No user should have admin rights on their primary account because even admins can make mistakes when checking email or casually browsing. Users should only have the access they need for the time they need it. Implement a limited access policy to cut the chances of any violations.

Disable Anonymous Sharing

Anonymous sharing is enabled by default, allowing you to share documents with anyone. Meaning, a document could accidentally get sent to the wrong person. By disabling this feature, you will have more control over where your business data is shared.

SharePoint

Monitor SharePoint for Changes and Access Events

SharePoint is a practical way to keep your team informed. You can receive alerts for suspicious activity and notifications when someone deletes more than five files or copies a large amount of data. This can help prevent data loss accidents as well as malicious acts.

Implement Device Policies and Management

Your workforce may use various devices to carry out tasks. Each device is a potential path into your protected environment, so it is essential to have strong policies in place. You can create policies that require complex passwords and insist that Windows updates are performed promptly. Endpoints are now the most prominent threat, so use the free device protection in your Microsoft Business Premium subscription to boost security.

Block Client Forwarding Rules

Enabling email forwarding might breach your workplace policies and also put your business at risk. Suppose a hacker managed to gain access to an account, they could forward emails to an address of their choice, allowing them access to leak sensitive business information and wreak havoc.

The importance of online data security

Data Loss Prevention (DLP) Policies

In Microsoft 365 Business Premium, you can designate rules around your data, such as restricting certain document types from being emailed. You can use these rules to prevent sensitive information, such as credit cards, Medicare, and licence numbers, from being emailed, cutting a critical risk. If your business must share sensitive data, we recommend uploading documents to a secure file storage platform such as OneDrive or Google Drive and then generating a secure link to share with relevant individuals/teams.

Improve Your Microsoft Secure Score

Microsoft 365 includes a handy tool that evaluates your security posture and provides a score based on system configurations, user behaviour, and other measurements. In addition, the tool offers you a prioritised list of recommendations to support you in raising your security level.

Backup Your Cloud Data

A common misconception is that someone, somewhere, is backing everything up for you in the cloud, but that isn’t entirely true. Understand what your data loss acceptance level looks like and find a data backup solution you are satisfied with.

The best online data security protection is prevention through training

Training

Regarding cybersecurity, it is no surprise that human error is the most common cause of security breaches. Regardless of all the possible precautions you take to minimise the risk of cybercrime, all it can take is a link click, download, missed update or misconfiguration to lead to a big problem.

The best way to avoid human error is to enforce cyber security guidelines and provide online and in-person training and testing.

Testing should include a targeted phishing campaign to see who clicks – this can help you to identify who requires training.

As part of any cyber security audit, we look at physical security; you’d be surprised how many people still put their password on a post-it note by their monitor and how many visitors are left unsupervised around sensitive information!

Most of the actions in this post require little or no help to set up and will immediately reduce your risk of a breach. While it is worth investing in a cyber security review and the assistance of a data security specialist, there is plenty that you can do yourself to become less of a target to hackers.

Please don’t hesitate to reach out if you have any questions about data protection.

Contact Us

  • This field is for validation purposes and should be left unchanged.

Technologies that will shape our world in 2023 and beyond

Technologies that will shape our world in 2023 and beyond

We are already using smart algorithms every time we search the internet, shop online, navigate as we travel, choose how we entertain ourselves, and conduct countless tasks. But what will the next few years bring? According to many experts, we are on the cusp of a new era in computing, one that will be defined by immersive digital worlds and blockchain technology. Here is what you need to know about the hyper-connected, intelligent world of 2023 and beyond…

What is the Metaverse?

Some futurists believe that by the end of 2023, we will all be spending a significant amount of time in digital worlds that are so realistic, they are indistinguishable from reality. These “metaverses” will be built on blockchain technology and will allow us to digitally recreate anything in the physical world. For example, you could attend a virtual concert featuring your favourite band, explore an exotic vacation destination, or play a virtual reality game with friends from around the world. And because metaverses will be built on blockchain technology, they will be incredibly secure and resistant to hacks and cybercrime.

The Hyper-Connected World

As metaverses become more popular, our physical world will become increasingly connected to the digital world. This “hyper-connectivity” will enable new types of interactions and experiences that are not possible in the physical world. For example, you may be able to purchase products and services with a simple voice command or receive real-time updates about the status of your delivery without having to track it yourself. And thanks to advances in artificial intelligence (AI), many of these interactions will be carried out by digital assistants who will always be available to help us with our needs.
The future of technology

A Sustainable Future

As we become more reliant on technology, it is essential that this reliance is sustainable. Fortunately, many of the technologies that will shape our future are environmentally friendly. A good example of environmentally friendly technology is 5G networks. 5G networks deliver high-speed internet to our mobile devices and use less energy than current 4G networks. Additionally, solar energy is becoming more cost-effective as technology improves its efficiency and storage capacity. As a result, it is likely that we will see an increase in solar-powered homes and businesses in the coming years.
The future is looking pretty bright—and pretty tech-savvy! It is important to stay ahead of the curve when it comes to emerging technologies so that you can make the most of their benefits. Whether it is getting ready for the metaverse or ensuring that your business is using sustainable technology, keeping up with the latest trends will help you stay ahead of the competition. Subscribe to KeyTech’s monthly mailing list to stay informed of the latest technology trends.

Like this post?

If you liked this post, sign up to our newsletter to keep informed on other news.
How to Create an Outlook Email Signature

How to Create an Outlook Email Signature

If you are using Microsoft 365, you might like to use a signature management application that appends to emails after you send them from any device. The email signature management application creates brand consistency and is a great marketing tool.

This article, however, will show you the process of creating an email signature using the Microsoft 365 Outlook application. Let’s get started!

Step 1.

Choose “New Email”, as if you were composing a new email.

Step 1 Click New email

Steps 2 and 3.

Click “Signature” then click Signatures…”

Step 2 and 3 Click Signature then click Signatures...

Steps 4

The Signatures and Stationery window will appear. Click the button that says New” to create a new signature. 

Step 4 Dialogue box pops up, click New button

Step 5

Type a name for your signature when prompted, then click “OK”.

Step 5 Name your signature

Step 6.

In the larger “Edit signature” field, design your signature. It is here that you can format your signature’s text and add links and images.

To add an image click the insert image icon Insert and image by clicking this icon

To add a link (or Teams chat link) to your signature, select the image or text you want to apply the link to. Next click the link icon: Link Icon

Step 6 Insert Image and link

Steps 7 and 8.

Paste your link in the “Address:” field and press “OK” to continue.

Step 8 paste your link in the address field and press "ok"

Step 9.

The link has been applied, to save your signature, click “OK”.

Step 9 Link is created, confirm and save by clicking "OK"

Step 10.

Now you can use your signature by clicking on “Signature” again. This time you will see your signature in the dropdown box. Click on the new signature to use it.

Compose your email and send it as you usually would.

Step 10 click "Signature" and find your new signature in the drop down box. Click it to choose it

Step 11.

Once you have clicked on the signature that you created, it will appear at the bottom of your email. Test that your link goes to the correct page/application.

Compose or make any edits to your email and send it as you normally would.

Step 11. Completed signature. Test link works

Need additional instructions?

Please let us know if you have any difficulties. We are happy to assist you. We welcome your feedback so we can further improve our processes. Our aim is to make your life easier so you can get your time back.

Like this post?

If you liked this post, sign up to our newsletter to keep informed on other news.

Protecting Your Website from Cyberattacks

Protecting Your Website from Cyberattacks

It is more important than ever before to protect your website from cyberattacks. In today’s digital age, website security is a pressing concern for all businesses, large and small. A cyberattack against a public-facing website can have major repercussions, including loss of data, website downtime, denial of service (DoS), and damage to the company’s reputation. Fortunately, there are steps you can take to protect your website from these threats and avoid serious consequences.

While these threats affect all aspects of information security—confidentiality, integrity, and availability—they can also gravely damage the reputation of a website and its owner. For example, organisations and personal websites that fall victim to defacement, DoS, or data breaches may experience financial loss due to the loss of trust from stakeholders of the business and a decrease in website traffic.

Types of Website Security Threats

There are many different types of website security threats, but some of the most common include:

SQL injection:

SQL injection is where malicious code is injected into a website’s database. A SQL attack can steal sensitive data or take control of the affected website.

Cross-site scripting (XSS):

XSS attacks occur when an attacker injects malicious code into a webpage which is then executed by the browser when the page is loaded. An XSS attack can steal sensitive data or hijack user sessions.

Denial-of-service (DoS):

DoS attacks are designed to make a website unavailable to users by flooding it with traffic from multiple sources. This type of attack can be used to take down a website or disrupt business operations.

Phishing:

Phishing attacks are a type of social engineering attack where an attacker attempts to trick a user into divulging sensitive information such as login credentials or financial information. Phishing attacks can be conducted via email, text messages, or fake websites that mimic legitimate ones.

How to Protect Your Website from Cyberattacks

There are many steps you can take to protect your website from cyberattacks, including:

Implementing strong authentication methods:

Using strong authentication methods such as two-factor authentication can help protect against password theft and phishing attacks. Two-factor authentication requires users to provide two pieces of evidence when logging in, such as a password and a one-time code that is sent to their mobile phone.

Keeping software up-to-date:

Attackers often exploit software vulnerabilities to gain access to websites and databases. You can reduce the chance of an attacker finding vulnerabilities by keeping a website’s components up-to-date.

Restricting access to sensitive data:

Store sensitive data in an encrypted format and restrict access to authorised users only. Restricting access to sensitive data will help you reduce the risk of data breaches.

Website security is important to consider for anyone with a website. There are many safeguards that can be taken to protect a website from cyberattack, but it’s important to remember that no system is 100% secure. With cyber criminals learning how to get around the new security patches, and developing new methods to attack, it is critical that we all monitor and update our websites regularly.
Chat with KeyTech today so we can answer your website security enquiries and include website security improvements with their website maintenance services.

Like this post?

If you liked this post, sign up to our newsletter to keep informed on other news.

Request a Call Back

  • Stay up-to-date with our latest news, promotions, and tech advice from KeyTech through our monthly email.
  • This field is for validation purposes and should be left unchanged.

Microsoft 365 app to replace Office.com

Microsoft 365 app to replace Office.com

A recent post on the Microsoft 365 Admin Center indicates that the new Microsoft 365 web app has started rolling out last week, and that the Windows and mobile apps will follow in January 2023.

Watch the short video below for a sneak peek of the Microsoft 365 app desktop interface.

The Microsoft 365 app is thoughtfully designed to help users be more productive by managing all their documents, notes and media in one place. In addition, the app allows them to create content like a pro and work seamlessly across devices.
The Microsoft 365 app will be free to install from the Microsoft website and the Apple and Google Play stores but requires an active Microsoft 365 subscription. Once the app installation is complete, users are prompted to sign in with their Microsoft 365 account.
After signing in on the desktop app, users will see their email, calendar, files, and contacts in one place. The app also promises features such as task management and the ability to share documents with other users.
The Microsoft 365 app is an excellent way for users to stay organised and productive. Email, calendar, files, and contacts will be in one place, allowing easy access to the information needed without switching between different apps or screens. The task management and document-sharing features are also beneficial for those who need to collaborate with others on projects or tasks.

The Microsoft 365 app will automatically replace the existing Microsoft Office web experience and will bring some new features to its users. The rebranding of Office.com is only the first change users will notice.
Some of the most notable new features include tagging support, a feed tab and a new apps module.

  • Tagging support will help users classify documents with custom tags.
  • The feed tab feature will surface meetings, shared files and trending content within your organisation.
  • A new apps module will provide a unified interface to access productivity apps from Microsoft and third-party providers.
The Microsoft 365 app will become a great tool for increasing productivity. Users can use the app on the web or install the app on desktop and mobile devices. The app aims to provide a unified experience across Microsoft 365 apps, including Outlook, OneDrive and Teams. Overall, the Microsoft 365 app will become a valuable asset for individuals and businesses, helping them to increase their productivity and organise their work-life more efficiently.

Like this post?

If you liked this post, sign up to our newsletter to keep informed on other news.
Microsoft 365
We can help answer your Microsoft 365 questions. Feel free to reach out to our team over the phone or complete the form below.

Request a Call Back

  • Stay up-to-date with our latest news, promotions, and tech advice from KeyTech through our monthly email.
  • This field is for validation purposes and should be left unchanged.

The Incredible Power of Microsoft Teams Admin Center

The Incredible Power of Microsoft Teams Admin Center

Management Tools within Microsoft Teams Admin Center

If you are a Global or Teams administrator, you will find the Teams Admin Center to be a valuable tool for managing your business. With the full administration capabilities, you can manage and monitor users, apps and devices in one place!Microsoft Teams Admin Center gives you the tools to enforce team-wide and organisation-wide security, compliance and privacy through policies such as two-factor authentication, single sign-on through Active Directory and data encryption.

Team Member & User Management

  • Create, edit, search and archive teams (groups) within your business
  • Set teams as public or private
  • Add or remove team, members and owners
  • Add or remove channels to the group
  • Change team and group settings (including conversation settings, channels settings and classifications)

Manage Policies

Policies carry out a range of duties within an organisation. Teams Admin Center allows administrators to permit and restrict user settings on various areas such as messaging, meetings and applications. For example, administrators can allow users to schedule meetings in a teams channel, enabling users to edit sent messages, and control whether users pin apps to the Teams app bar.

Administrators can assign policies to individual users, users with certain roles, and groups within the company using Microsoft Teams Admin Center or via Powershell.

App policies can be configured witrh custom apps installed and pinned to the Teams app bar for your team.

Transcriptions, cloud recordings and IP audio/video configurations can be setup for meeting policies in Teams.

Administrators can view policy assignments in an Activity log and manage them within the Policy Packages section of Teams Admin Center.

Users within your company can send any feedback regarding Microsoft Teams from any Microsoft Teams app, whether it is the web, desktop or mobile app.

Microsoft Teams Admin Center Meetings

Manage Devices

When you purchase devices that support remote provisioning, you can configure, update, restart and monitor the device diagnostics within the Microsoft Teams Admin Center. Similar to configuring user and group policies, profiles can be created and assigned to an individual device or a group of devices.

Security, Compliance and Privacy

When you purchase devices that support remote provisioning, you can configure, update, restart and monitor the device diagnostics within the Microsoft Teams Admin Center. Similar to configuring user and group policies, profiles can be created and assigned to an individual device or a group of devices.

Microsoft delivers advanced security and compliance capabilities to their applications. Security features such as two-factor authentication, single sign-on through Active Directory and data encryption in transit and at rest.

Customers of Microsoft 365 own and have complete control of their data. Microsoft doesn’t have access to uploaded content and customer data stays within the tenant. Microsoft won’t use their client data for anything other than providing you with the service you subscribed to. Visit the Microsoft Trust Center for more information.

Industries & Government

Microsoft has built a set of resources to guide and assist administrators to get the most out of Teams. There are resources for the following organisation types:

  • Education
  • Frontline Workers
  • Government
  • Healthcare
  • Nonprofit
  • Retail

Ask us for a demo

Ask us for a demo of the Microsoft Teams Admin app so you can see this helpful tool in action. Take advantage of its powerful features to streamline your operations and keep track of all Microsoft 365 apps and settings in one place.

Start exploring the app to discover the convenience of managing Microsoft 365 from the new Microsoft 365 Admin app.

So why not download the app today and see how it can benefit your business?

Download the Microsoft 365 Admin App | Microsoft 365

Ask us for a demo of the Microsoft Teams Admin app so you can see this helpful tool in action. Take advantage of its powerful features to streamline your operations and keep track of all Microsoft 365 apps and settings in one place.

Downloading the Admin app in Teams

How to Download the Admin app in Microsoft Teams

You will need administrative rights to use it, although the Admin app is available for all users in the App Store.

To experience the new Admin app, visit the Microsoft Teams app store. Type “Admin” in the search field to find and download the app in Microsoft Teams.

Microsoft continues to refine their newest app to make its Teams collaboration platform ideal for hybrid work. The company recently added chat bubbles support on iOS & Android as well as live captions and transcriptions in the web version of their platform and enabled users to embed Teams chat within Dynamics 365.

We are happy to help! Phone 1300 755 615