Multi Factor Authenticator Fatigue

Danger – Multi Factor Authenticator Fatigue!

Being educated on cyber security basics is essential.

The recent hack of Uber shows how crucial being aware of social engineering techniques is for all of us.

The hacker who claimed to be 18 years old claimed that he was able to access Uber’s systems through an employee. Although he had the employee’s password, he was blocked by Multi Factor Authentication (MFA). He then phoned the employee claiming to be from Uber IT department. The employee was told that he should accept the MFA challenge on his phone (the constant messages asking him to verify the login). The employee complied and the criminal gained access.

Multi Factor Authenticator Fatigue

Image credit from Avatier

Multi Factor Authenticator (MFA) Fatigue attacks are when a cyber-criminal has access to login details but is blocked from access to the account by multi-factor authentication. The criminal tries multiple logins, each of which generates a text asking for verification until the victims become tired of seeing the messages and finally accepts the notification.

This social engineering tactic has become very popular in recent attacks against well-known companies, including Twitter, MailChimp, Robinhood, and Okta.

Would you like to know more about how to protect yourself and your business?

Contact us to schedule a chat or give us a call 1300 795 105 or 0416 038 856.

Graeme Pascoe

I help businesses streamline their technology to support business success. Consolidating your technology offers several benefits to companies of all sizes. A managed service provider can help identify and implement the best ways to maximise technology in your business.

Whenever you’re ready, here are three ways I can help you further:

1. No obligation analysis of your network
We’ll check your IT structure and advise you on ways to improve efficiency and security.

2. Free email threat scan
Find hidden malicious emails lurking in your inbox (Office 365 or other cloud-based services). Phishing attacks via legitimate-looking emails are the greatest threat to businesses today. Since the COVID-19 pandemic attacks have multiplied to an alarming level. Want to know if you are targeted?

3. Microsoft 365 demonstration
We’ll show you what Office 365 is all about (it’s not just Word, Excel, and email) and show ways in which it may improve your business processes. You may find better ways of working

Handy Productivity Apps in Microsoft 365

Handy Productivity Apps in Microsoft 365

Here’s a couple of handy productivity apps in Microsoft 365 that you may not know about…

Microsoft ToDo

Do you like to work off a list of tasks for the day? I use Microsoft ToDo to as a daily tasks list. It gets all of those jobs onto a list so that I can clear them out of my head and tick them off as they are completed. Look for the blue tick in Outlook or download the ToDo app. Here’s a short video that talks about ways to use ToDo.

Microsoft Planner
If you’ve used Trello, Planner is very similar. Create a plan, then add ‘buckets’. These are categories of tasks within the plan. Add your tasks under these buckets and you can assign them to people, add a date for completion, tag the task with various categories that you can create and note if a task is started, in progress or completed.
If working in Microsoft Teams is a big part of your day, then adding Planner to Teams keeps it handy. Watch this short video to see how it works.

handy productivity apps

Would you like to know more about what Microsoft 365 can do for your business?

Contact us to schedule a chat or give us a call 1300 795 105 or 0416 038 856.

Graeme Pascoe

I help businesses streamline their technology to support business success. Consolidating your technology offers several benefits to companies of all sizes. A managed service provider can help identify and implement the best ways to maximise technology in your business.

Check out our previous blog posts related to handy productivity apps in Microsoft 365:

Microsoft Lens – Use it, you’ll love it

What Is OneDrive? – Work Smarter with OneDrive

OneDrive Storage – Work Smarter with OneDrive

Sharing From OneDrive – Work Smarter with OneDrive

OneDrive Known Folder Move – Work Smarter with OneDrive

Whenever you’re ready, here are three ways I can help you further:

1. No obligation analysis of your network
We’ll check your IT structure and advise you on ways to improve efficiency and security.

2. Free email threat scan
Find hidden malicious emails lurking in your inbox (Office 365 or other cloud-based services). Phishing attacks via legitimate-looking emails are the greatest threat to businesses today. Since the COVID-19 pandemic attacks have multiplied to an alarming level. Want to know if you are targeted?

3. Microsoft 365 demonstration
We’ll show you what Office 365 is all about (it’s not just Word, Excel, and email) and show ways in which it may improve your business processes. You may find better ways of working

Optus Cyber Attack – Customers Beware

Optus Cyber Attack – Customers Beware

Optus Cyber Attack – Customers Beware

Recently, Optus suffered a significant cyber breach with personally identifiable information of millions of customers stolen.

This information includes passport numbers, license details, DOB, phone numbers, home addresses, and email addresses which could be used for fraud and identity theft.

Although Optus has not confirmed or denied, it appears that a database of 1.1 million Optus customers’ names, email addresses, and mobile numbers have been offered for sale since September 17th.

If you are a current or former customer of Optus please be vigilant.
Watch out for scams. Make sure that you take all of the recommended security precautions.

Here is the media release from Optus.

Optus Cyber Attack – Customers Beware

Have you got your critical accounts protected with MFA (multi function authentication)?

Do not trust phone calls where the person claims to be from Optus or any other organisation if they are asking for information from you.

Here’s a great checklist from CyberCX:
Security advice for individuals following Optus data breach

Would you like to know more about how to protect yourself and your business?

Contact us to schedule a chat or give us a call 1300 795 105 or 0416 038 856.

Graeme Pascoe

I help businesses streamline their technology to support business success. Consolidating your technology offers several benefits to companies of all sizes. A managed service provider can help identify and implement the best ways to maximise technology in your business.

Whenever you’re ready here’s three ways I can help you further:

1. No obligation analysis of your network

We’ll check your IT structure and advise you on ways to improve efficiency and security.

2. Free email threat scan

Find hidden malicious emails lurking in your inbox (Office 365 or other cloudbased services). Phishing attacks via legitimate-looking emails are the greatest threat to businesses today. Since the COVID-19 pandemic attacks have multiplied to an alarming level. Want to know if you are targeted?

3. Microsoft 365 demonstration

We’ll show you what Office 365 is all about (it’s not just Word, Excel, and email) and show ways in which it may improve your business processes. You may find better ways of working

 

Microsoft Edge – Superior Protection

Microsoft Edge – Superior Protection

Microsoft Edge is Your Superior Protection while Browsing the Internet

You already know that Google Chrome has been the default browser for many people. Chrome has been great, but new features and a host of different extensions have lost their place as the fastest browser out there. It’s also had some vulnerabilities in recent times. If you are at all concerned about security (and you should be), it may be time to consider a safer alternative.

Microsoft Edge, bundled with Windows 10 and 11

It is built on the same Chrome engine as Google Chrome. Accordingly, it has all the same features and is 11% faster. Whatever you were able to do in Google Chrome, you can do it in Microsoft Edge. In addition, Edge has several handy functions.

Microsoft Edge Image

Image via Microsoft Edge

You can customise the start page – deciding whether you want to see news articles, just the headlines, or no news items. Your most visited websites appear across the start page for easy access. You can choose the background to be an image that you choose or the excellent images in ‘image of the day’. The app launcher in the top right of the start page will take you straight into your Microsoft 365 apps. Beside it, you can have weather or stock reports displayed.

You probably know that most cyber threats are delivered by email. However, the second most common attack comes from compromised websites. Even seemingly safe websites can be hacked and used to deliver a malicious payload to your computer.

Microsoft Edge has security built in to protect you against phishing attacks and other threats.

For the protection alone that it provides, my choice these days is Microsoft Edge.

Microsoft Edge – Handy Feature

There are a number of handy features that are worth knowing about.

You will notice a few icons on the right of the address bar…

Collections

This is a great alternative to ‘favourites’.  You can create a collection to categorise the sites that you want to save. Web sites are saved in the collection along with a thumbnail which may remind you about the site content. You can open all sites in a collection at once, and send them to a Word or Excel document or to OneNote.

Web Capture

Just like the snipping tool that’s built into Windows, Web Capture makes it super fast to get a screenshot of a web page or just a selected area.

The second most common cyber attack comes from compromised websites. Click on the 3 dots at the extreme right of the address bar and select the settings cog. Under ‘privacy, search and services’ you can control some of the security settings to stay protected.

Would you like to know more about how to protect yourself and your business?
Contact us to schedule a chat or give us a call 1300 795 105 or 0416 038 856.

Graeme Pascoe

I help businesses streamline their technology to support business success. Consolidating your technology offers several benefits to companies of all sizes. A managed service provider can help identify and implement the best ways to maximise technology in your business.
Backups Made Simple with OneDrive

Backups Made Simple with OneDrive

Backups Made Simple with OneDrive … and so much more!

We get so used to expecting to turn on our computer and be able to get to work.
That is, until one day it doesn’t .
That’s the time many start to think about backup…too late.

In the past, backing up a computer workstation hasn’t been a straightforward exercise.

Nowadays, with Microsoft’s OneDrive, an automatic backup can be quite easily set up.

I have blogged about OneDrive for Business previously. But OneDrive is included in all versions of Microsoft 365 / Office 365. It is even included with Windows. The free version in Windows has a limit of only 5GB, but you can increase that for only $3 per month.

So, how can you get OneDrive to backup your important data? Microsoft calls it ‘known folder move’. Once set up OneDrive will backup your documents folder, your desktop, and your photos. You can add other folders if you need to.

If you have previously set up OneDrive, you will have a cloud symbol on the right-hand side of your taskbar. Click on that and select the settings cog. Select settings again and then click on the backup tab.

OneDrive Manage folder back up

You can find more information on Backups Made Simple with OneDrive in our blog here.

Would you like to know more about how to protect yourself and your business? Contact us to schedule a chat or give us a call 1300 795105 or  0416 038 856.

Graeme Pascoe

I help businesses streamline their technology to support business success. Consolidating your technology offers several benefits to companies of all sizes. A managed service provider can help identify and implement the best ways to maximise technology in your business.

Ransomware – A Dangerous Threat to Your Business

Ransomware – A Dangerous Threat to Your Business

Ransomware is a Dangerous Threat to Your Business. It is a current favourite attack of cyber criminals. It’s usually installed when you click on a link in an email that looks legitimate. The payload that is quietly downloaded in the background encrypts your files, and a message is sent to you demanding payment to recover them.

Ransomware

Image by Pete Linforth from Pixabay

The Australian Cyber Security Centre (ACSC) has helpful information and tools to combat the increasing danger of Ransomware.

As the ACSC points out, ‘Never pay a ransom’. There is no guarantee that you will regain access to your information, nor prevent it from being sold or leaked online. You may also be targeted by another attack.
Some states in America have made the payment of these ransoms illegal.

You can read more information from the ACSC that can be found on their website here.
They also have a tool here to help if you have been a victim of a ransomware attack.

Ransomware is a Dangerous Threat to Your Business.

With security settings in Microsoft 365 properly configured, your risk of a ransomware attack is significantly reduced.

Would you like to know more about how to protect yourself and your business?

Please contact us 1300 795 105 / 0416 038 856 if you have any questions.

Graeme Pascoe

I help businesses streamline their technology to support business success. Consolidating your technology offers several benefits to companies of all sizes. A managed service provider can help identify and implement the best ways to maximise technology in your business.

Whenever you’re ready here are 3
ways I can help you further:

1. No obligation analysis of your network
We’ll check your IT structure and advise you on ways to improve efficiency and security.

2. Free email threat scan
Find hidden malicious emails lurking in your inbox (Office 365 or other cloudbased services). Phishing attacks via legitimate-looking emails are the greatest threat to businesses today. Since the COVID-19 pandemic attacks have multiplied to an alarming level. Want to know if you are targeted?

3. Microsoft 365 demonstration
We’ll show you what Office 365 is all about (it’s not just Word, Excel, and email) and show ways in which it may improve your business processes. You may find better ways of working

Keep Lost or Stolen Devices Safe

How Do You Keep Lost or Stolen Devices Safe?

It’s only a matter of time before an employee’s smartphone, laptop, or tablet goes missing. It might even be YOUR work device that’s lost or stolen.

There are approximately 70 million lost smartphones every year.

How many get recovered? Only 7% of them.

Just 2% of stolen laptops are recovered. Each laptop has a 1 in 10 chance of being stolen.

Keep Lost or Stolen Devices Safe

Image by Jan Vašek from Pixabay

You can lose much more than just an expensive piece of hardware if a work mobile phone goes missing. Mobile devices are just as connected to business information as desktop computers. Can your company break that connection if a device is lost or stolen?

Do you even know all the employee phones, laptops, and tablets logging into your stuff? Without foresight, your sensitive data can be floating out there for anyone to steal. Each lost device gives the thief the “keys to the kingdom” (which in this case is your business network).

Stop thinking that security will just magically take care of itself or is too hard and complicated. This is how companies go under from the costs of a cyber attack. Take precautions proactively, like using a mobile device manager or cloud access security broker.

“Wait…Cloud access… what?”

Not sure what that is? We can help. And it won’t cost you a fortune to keep lost or stolen devices safe.

Contact us and let’s discuss ways to reduce your risk from unsecured mobile devices.

Graeme Pascoe

I help businesses streamline their technology to support business success. Consolidating your technology offers several benefits to companies of all sizes. A managed service provider can help identify and implement the best ways to maximise technology in your business.
.AU Domains Available – Get Yours Now

.AU Domains Available – Get Yours Now

Earlier this year the .au domain name was announced. So now, as well as Australian domain names ending in .com.au or .net.au, etc. the shorter .au name will be available.

.AU Domains Available – Get Yours Now

.AU Domains Available

In early October the .au domain suffix will become publicly available on a first come first served basis.

However, until 20 September there is a ‘priority allocation’ period, prior to the public launch.

That means that in this period the existing registrant only, of a domain name such as mycompany.com.au will be able to apply for the equivalent mycompany.au domain name.

Should you consider applying for a .au domain before it’s publicly available?

It’s easier to remember and faster to type. Australian domain names show up higher in local search engine results.

But also grabbing a .au domain name in this priority allocation period ensures that no one else can register that name. It affords brand protection.

Please contact us 1300 795 105 / 0416 038 856 if you have any questions.

Let me know if you would like help registering your .au domain name.

Graeme Pascoe

I help businesses streamline their technology to support business success. Consolidating your technology offers several benefits to companies of all sizes. A managed service provider can help identify and implement the best ways to maximise technology in your business.

See our latest case study published on the D-Link Australia website.
Historical Village Deploys Latest Wireless Technology, Delivering Reliable Wi-Fi for Staff and Guests Alike.

Whenever you’re ready here are 3
ways I can help you further:

1. No obligation analysis of your network
We’ll check your IT structure and advise you on ways to improve efficiency and security.

2. Free email threat scan
Find hidden malicious emails lurking in your inbox (Office 365 or other cloudbased services). Phishing attacks via legitimate-looking emails are the greatest threat to businesses today. Since the COVID-19 pandemic attacks have multiplied to an alarming level. Want to know if you are targeted?

3. Microsoft 365 demonstration
We’ll show you what Office 365 is all about (it’s not just Word, Excel, and email) and show ways in which it may improve your business processes. You may find better ways of working

Stay Safe – Run Updates Now

Stay Safe – Run Updates Now

Stay Safe and Run Your Software Updates now!

Stay Safe – Run Updates Now! Cybercriminals are constantly looking for vulnerabilities in software. Once found these ‘cracks’ in the security of a software product such as Windows are exploited. This causes untold damage and financial loss to companies and individuals.

Microsoft continually monitors for cyber threats. Every second Tuesday of the month (US time), Microsoft releases software updates that repair these vulnerabilities. We recommend that you run Microsoft updates to avoid great damage to your security system.

That’s why it is critical that Microsoft and other security updates are installed promptly.
Right now there is a vulnerability that is already being exploited by a gang known as the 8220 Gang. This will affect users of some software packages that run on Windows 10 and 11 platforms.

Whether this affects you or not it’s a timely reminder to make sure that you don’t try to put off running those software updates.
We make every effort to ensure that our managed services clients are kept up to date. If you are not being proactively looked after by your IT provider make sure that you manually check that your software patching is up to date.

Microsoft Update

Keep your personal and business data safe and secure.

If you are interested to talk with IT experts, please contact us and we can discuss options for your business needs.

We are an IT managed services company with a passion for helping businesses to work efficiently, and safely with their computer systems.

Keep your business running smoothly and your data safe and secure. We take care of all your technology needs so you can achieve your company’s dreams and objectives.

Improve your defences against cyber security threats. Be sure to Download this FREE e-Book ‘The Essential Business Security Guide’ now!

FREE E-BOOK DOWNLOAD

Check out our previous blog posts:

Don’t Use The Same Password – A cautionary tale

Why Use a Password Manager?

Check out our case study published on the D-Link Australia website.

Read it here: Historical Village Deploys Latest Wireless Technology, Delivering Reliable Wi-Fi for Staff and Guests Alike.

The Essential Business Security Guide Your Company Needs

The Essential Business Security Guide Your Company Needs

Improve your defences against cyber security threats. Be sure to Download this FREE e-Book ‘The Essential Business Security Guide’ now!

FREE E-BOOK DOWNLOAD

Business Cyber Security Guide

The Essential Business Security Guide Your Company Needs to strengthen your cyber security defence. So many companies don’t take security seriously until they are affected by a breach. We know that you want to improve your defences against cyber security threats.

We hope that you will get value from our eBook and that you are able to improve your defences.

Please check out the blog on our website for deeper insights and advice around your business IT.

One particular article is about an app that may be of interest to you too.

It’s a Microsoft app that I use daily to digitise paper receipts and make them immediately available to my bookkeeper. It’s useful for many other purposes, grabbing a quick picture of written material with better control than taking a photo.

Check out our blog post on Office Lens. You might find it useful too.

We hope that you have managed to strengthen your cyber defences. You can never fully defend against attacks, but every defense measure helps.

It’s been in the news, so you probably know that war in Ukraine has led to an even greater volume of threats.

Being alert and educating your staff to be vigilant is very important as criminals use social engineering techniques to gain access to a business or individual so that they can steal or make ransom demands.

If you need help or have any questions, please feel free to contact us.

So you don’t have a robust internal IT team?

We are an IT managed services company dedicated to assisting businesses to take advantage of the new ‘Modern Workplace’ made possible through cloud technology.

Please feel free to request further information or ask any questions on securing your IT systems.

Graeme Pascoe

I help businesses streamline their technology to support business success. Consolidating your technology offers several benefits to companies of all sizes. A managed service provider can help identify and implement the best ways to maximise technology in your business.

See our latest case study published on the D-Link Australia website.
Historical Village Deploys Latest Wireless Technology, Delivering Reliable Wi-Fi for Staff and Guests Alike.