SharePoint Phishing Attack on Office 365 Users

What is Phishing? Phishing is the fraudulent attempt to obtain sensitive information such as usernames, password and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. The cyber attack dubbed “PhishPoint” demonstrates the craftiness and extent cyber criminals will go to in order to harvest Office 365 credentials. Context can be

Read more


Backups are a part of Office 365, aren’t they? No

Office 365 backups You probably assume that Microsoft takes care of backups in regards to Office 365, Exchange Online, Onedrive and Sharepoint. While Microsoft does look after the underlying infrastructure and application up-time, it is the responsibility of the customer to protect and manage their valuable business data. When it comes to working in cloud-based applications, the option of granular

Read more


Spot the Scam – March 2018 Edition

One of the latest phishing scams doing the rounds is using Apple branding to try and dupe victims. The scam functions by first sending victims an email detailing that their Apple ID has been locked. This email contains a link that supposedly takes the victim to the Apple website where they can unlock the account. The website is of course

Read more


Phishing – Think Before You Click!

Phishing is a method used by hackers to try to obtain your personal data. The ideal result of phishing is to get hold of an unwilling user’s details such as login credentials and/ or bank details. Another possible consequence of this attack is where a user accidently downloads malware. The malware then infects the user’s PC. Phishing attacks solely rely

Read more


Spot the Scam – November 2017 Edition

In the last few months we have noticed an increase in the amount of scam/ phishing emails. These kinds of emails are constructed by a scammer to try and trick a user into providing personal information such as bank details and passwords. The emails appear to be sent from a legitimate sender. The quantity of such emails is of course

Read more


Password Protection: Time to take it S3r1ou5ly!

We are all aware of the role a password plays in data access security. They function in the same way a physical padlock does. They prevent unauthorized access. We are also fully aware that passwords should be complex and near-on impossible to crack. However, the percentage of people that actually take this advice on board is startling. In a recent

Read more


Protecting your Business – Part III

So far, we have analyzed the importance of protecting business/ personal data and security, as well as the role back-ups play in helping achieve this. To finalize this series, let’s discuss further solutions which can save us all the headache of data loss. You will probably be aware already, that there are many factors that can contribute to the overall

Read more


Protecting your Business – Part I

In this three-part series, we are going to dive into the world of security. We will discover how a lack of security can significantly impact your business. Firstly, we will discuss the implications of a breach of security and use a real-world scenario. Next week we will be focusing on what we can do to prevent this. When communicating with

Read more