Preparing for Cyber Essentials

Low angle view on a blue padlock made to resemble a circuit board and placed on binary computer code.

Reading Time: 4 minutes This guide is intended to set out the process of preparation and gaining the Cyber Essentials and/or Essentials Plus certification.

SSLVPN from CNC

VPN secure connection concept. Person using Virtual Private Network technology on laptop computer to create encrypted tunnel to remote server on internet to protect data privacy or bypass censorship

Reading Time: 4 minutes In this guide we’ll look at setting up a remote working connection using a SSLVPN from CNC.

Lend Me Your Ear

Cropped shot of a handsome young man working in a call center with a female colleague in the background

Reading Time: 4 minutes The vast array of headset models can make choosing a suitable one somewhat daunting.  In this short article I aim to help you identify a headset suitable for your needs.

Reviewing 365 Phishing Reports

PHISHING Button on Computer Keyboard

Reading Time: 4 minutes In this guide, it will cover how to view the 365 Phishing reports as well how to check who has completed training if they have been caught out by a Phishing simulation.

SonicWall NetExtender SSL VPN

SSL VPN. Virtual private network. Encrypted connection.

Reading Time: 5 minutes A VPN allows you to access resources on your office network from wherever you are. SonicWall NetExtender is a piece of software that can be installed on your laptop or desktop that initiates the VPN connection.

Mailbox Housekeeping

Cropped shot of letters in a letter box

Reading Time: 5 minutes In an age where so much communication is electronic it’s easy to forget that your mailbox does have a finite size.  Like a filing cabinet there is only so much you can store in it before it becomes full and you have to fillet out old documents to make way for newer ones.

Microsoft 365 Email Encryption

Cyber Security, Phishing, E-Mail, Network Security, Computer Hacker, Cloud Computing

Reading Time: 3 minutes Although many people don’t realise it, an email is not a secure communication medium by default. Think of it like writing on a postcard and then posting it.  Along it’s journey to the recipient anyone can read the contents.

How to setup a Microsoft 365 App Password

Reading Time: 4 minutes Some applications do not support Multi-factor authentication which can become a problem when Security defaults or Conditional Access have been enabled on a Microsoft 365 tenant. To overcome this we can create App Passwords that can be used to connect to Microsoft 365 Services for a specific application.

Mobile Device Enrolment – iPhone

Reading Time: 6 minutes This useful guide will take you through the steps of enrolling your iPhone with Microsoft’s Mobile Device Management so you really can keep your personal and work data separate.

Mobile Device Enrolment – Android

Reading Time: 6 minutes It’s quite normal to want to have access to email & your calendar on the move but what security considerations need to be taken into account to keep your personal data and company data separate?

Microsoft 365 MFA Setup Guide

cyber security in two-step verification, multi-factor authentication, information security and encryption, secure access to user's personal information, secure Internet access, and cybersecurity.

Reading Time: 5 minutes Multi Factor Authentication (MFA) provides an additional level of security to your systems and helps combat cyber attacks. When you login to a service such as Remote Desktop Server or Microsoft 365 not only do you enter your username and password but also via the MFA app prompt you confirm it’s you

Mailbox Management

Reading Time: 5 minutes Email has given us a powerful medium to communicate across continents, or just to the other side of the room.  With it comes a high volume of messages, many of which are “cakes in the kitchen” style and others that contain large attachments.

Microsoft 365 – Multi Factor Authentication (MFA) Setup Guide

secure online payments. two factor authorization. man hands holding mobile phone and entering password message on laptop.

Reading Time: 5 minutes What is Multi Factor Authentication (MFA)? Multi Factor Authentication (MFA) provides an additional level of security to your systems and helps combat cyber attacks. When you login to a service such as RDS or Microsoft 365 not only do you enter your username and password but also via the MFA app prompt you confirm it’s… Continue reading Microsoft 365 – Multi Factor Authentication (MFA) Setup Guide

Is your office telephone system holding you back?

Old telephone receivers tied up together on a desk, jammed phone lines concept

Reading Time: 2 minutes So much has changed in the modern office over the last 50 years.  Typewriters and fax have given way to the computer and email.  Social media and the internet have opened up channels of communications and commerce that could never be imagined in the mid-20th century.  Yet, despite all these technological advances the office telephone… Continue reading Is your office telephone system holding you back?

Published
Categorized as Tech News