Are You Still Using 123456 as Your Password?

Password 123456

Using 123456 as Your Password?

Is your company’s cybersecurity repeatedly swept under the rug? While reinforcing passwords and setting up firewalls can seem daunting, you may not realize the severe risk of neglecting these and other routine security practices. Unfortunately, as the Internet evolves to meet our needs and desires, the same can be said of malicious hackers and programs. Ill-intentioned parties are constantly becoming more adept at accessing private information and what is meant to remain secure data.

Despite this growing threat, many of today’s Internet users and company employees have not reacted accordingly to increasingly well-equipped hackers. In fact, a 2019 Forbes article cites that ‘123456’ remains the most commonly used Internet password in the US and the UK. By maintaining such basic passwords, cyber-intruders are granted easy access to personal or professional information, and quickly cash in your data for billions per year. It’s officially time to protect your business’ sensitive information and data. This article will detail the importance of ramping up your company’s cybersecurity measures as well as a few simple ways to get started. Discover the following achievable strategies to significantly decrease your company’s risk of hacking and intrusion.

Password 123456

Eliminate the “Not Much to Steal” Mentality

An extremely common line of reasoning within mid-size companies is that cyber hackers probably won’t bother taking advantage of them because “there’s not much to steal.” This statement could not be further from the truth and it tends to lure employees and leadership alike into a false sense of security. The fact remains that 43% of all cyberattacks are aimed at small businesses. Hackers can just as easily sell a smaller company’s information as they can a larger corporation’s. However, the major difference is that larger businesses tend to allocate funds to cybersecurity, whereas smaller or mid-size companies might not prioritize this cost. Many professionals hesitate over the cost of cybersecurity but may not consider the potentially catastrophic costs of not having it.

To remain vigilant, employees should keep an eye out for attachments from unknown accounts. These documents could be in the form of a Microsoft Office attachment that initially appears legitimate. As a rule of thumb, do not open emails or messages from accounts you’re not familiar with. Because it takes a company 6 months on average to discover a security breach, it is well worth your time to evaluate your company’s current cybersecurity situation and consider where there might be room for improvement.

Prioritize Employee Education

One of the easiest ways to head off potential security threats in your mid-size company is to thoroughly educate team members on cybersecurity practices and procedures. If there currently aren’t any, create and enforce protocols that can be communicated through online training, checklists, and seminars. Make sure to discuss the specificities of your company as it applies to Internet safety and data protection. Without this crucial step of employee education, your company will waste time and resources trying to rectify security issues that could have been resolved through open communication.

Keep in mind that cybersecurity is frequently evolving. Therefore, employees should be updated regularly on the best ways to protect company information. An easy measure to increase employee cooperation is to ask them to sign a document attesting that they have understood and will abide by your business’ security practices. The document can also mention that should the cybersecurity measures be disregarded, there could be repercussions for the employee involved. All in all, if leadership takes the time to discuss cybersecurity, making it relevant and applicable for all employees, your company is much better equipped against a potential security threat.

Invest in Cybersecurity Measures

If your mid-size company has yet to invest in cybersecurity measures, there’s no better time than the present to start protecting your valuable information and data. It’s not difficult to get started — begin by setting up a firewall that serves as a barrier between your sensitive information and potential hackers or intruders. In a time when remote workers are becoming more common, your company’s “work from home” staff should also implement a firewall within their personal networks. After all, they regularly access the same important information and data as your in-office employees. Consider providing remote workers with a complementary firewall to eliminate any potential hacking risks.

It’s worth noting that many businesses now allow employees to BYOD (“bring your own device”) to work. In this regard, BYOD calls for the same security measures as a remote worker, since your employees likely transport their laptop, tablet, or other electronics to and from the office each day. On top of that, those who bring their own computer to work are probably using it for personal tasks after hours, which increases the chances of a possible breach. Most importantly, employees should respect the cardinal rule of cybersecurity: do not use the same password for multiple sites, especially as a universal password between personal and professional sites. Urge company leadership to enforce automatic security updates on employees’ devices and inform all staff about your password policy.

Consider Using a Password Manager

An effective solution to your company’s password creation and storage problems is a password manager. A password manager helps your business manage your team’s passwords within a centralized digital “vault.” The primary advantage of a password manager is that your business’ IT team can create intricate, long and random passwords for various sites or accounts that employees gain access to just by logging into the password manager. By streamlining password storage, you can make massive amounts of information secure and basically eliminate the need for staff to create their own passwords. This quickly limits the possibility of a cyber attack and keeps company leadership in control of who can access what information.

Ultimately, password managers dramatically improve cybersecurity in businesses. Research shows that employees often keep their sensitive passwords written down on a Post-It note that could easily be accessed by any passing visitor or coworker alike. Reduce the risks of cyber threats both from internal and external sources by implementing a system that keeps track of who logs into company sites and when. Without this kind of accountability, it can be much more difficult to pinpoint the source of a security breach. Gone are the days of the ‘123456’ passwords — reach out to a local IT managed services provider to implement any of the previously mentioned tactics to strengthen your company’s cybersecurity.

What Is Social Engineering? (Insights/Information)

Social Engineering

Social Engineering: A Threat to Your Cybersecurity

Social engineering is the use of psychological manipulation to gather confidential information. Criminals are always looking to exploit you for valuable data: personal logins, bank accounts, and even remote access to your computer. Whenever you log on, they could be trying to steal your information through malware-filled links or fraudulent websites.

Social Engineering

Why a Great IT Department Is Not Enough

You interact with certain, trusted companies on a daily basis. You may glance at an email from your office supplier, click their link, and log in to confirm this week’s order for manila folders, only to find that it was a fraudulent website stealing your password.

The growing sophistication of cybersecurity has made it very difficult to breach your software from the outside. With a dependable firewall and anti-malware suite, your computer is rock-solid. But that is only the first half of the equation. You are the second half.

Criminals know that manipulating your trust is easier than hacking their way past your IT department, so you play an important role in maintaining your business’s safety.

What Can I Do?

The best solution is to always double-check anything asking for your confidential information. If you’re clicking a hyperlink, make sure you know exactly where it’s directing you before you click it; if you’re logging into a website, make sure it’s secure and verified. All it takes is for one user to log in to a fraudulent website for a criminal to have the key that lets them walk right past all of your IT department’s efforts.

However, sometimes it’s hard to follow-up with this due diligence when we’re busy. That is why it’s important to recognize the telltale signs of social engineering at-a-glance, especially in the one communication you take part in every day.

Double-Check Your Emails

Fraudulent (or “phishing”) emails are responsible for the majority of cybersecurity breaches, some of which have targeted truly massive companies—from international banks to social media conglomerates.

Always be on the lookout for the key components of a phishing email:

“From:” Address

  • The sender is an unrecognized person that is not affiliated with your business.
  • Names of trusted senders are included in an otherwise unusual address (ex. “staplescustomersupport134789@gmail.com”).

“To:” Address

  • The email is addressed to an unusual group of recipients (ex. People in unrelated departments or even every employee).
  • The email is addressed to recipients uninvolved with the supposed subject of the message.

Date

  • The email is sent outside of business hours or at an irregular time.

Subject

  • The subject line consists of random characters or completely unrelated information.
  • The subject line references you despite you not recognizing the sender.

Links and Attachments

  • The email includes unusual hyperlinks or attachments, especially when placed in odd locations throughout the email.
  • The email includes hyperlinks that have titles unrelated to their locations (ex. A “Login to your Staples account” link directing you to an unknown website).

Message

  • The email’s message wants you to urgently take an unusual action, such as clicking a link before your account is deleted.
  • The email’s message contains grammar or spelling errors where it normally would not.

Be Patient

All of these examples pressure you into making a bad decision you wouldn’t normally make. That pressure keeps you from acting on your suspicions by keeping you on a fake time crunch.

So take your time to analyze anything unusual. If something seems suspicious, it probably is. Let your IT managed services company know so they can verify whether it’s a real threat or just a false alarm.

Watch out for social engineering and keep your business safe and secure.

What Is The Modern Workplace?

Modern Workplace

The Secret Workplace Every Single Employee Dreams About Whenever They Clock In

Employee retention is always a challenge. Because it takes so long to find, recruit, and train your best employees, it’s very important to focus on how you can keep them.

And the best way to improve employee retention is to understand what employees want. As it turns out, you can use Microsoft Modern Workplace to provide the work environment that your employees dream of

What does that Microsoft Modern Workplace actually look like, though? Here’s a breakdown of what your employees really want.

Easier Technology

There is a stereotype that older employees are more resistant to change. And these changes may include anything from new procedures to new technology.

The truth is that all workers, young and old, can get overwhelmed by too much technology. Simply put, they don’t like to master dozens of different programs from dozens of different companies just to make it through each day.

With the Microsoft Modern Workplace, you get an “all-in-one” solution for communication and collaboration. And it’s nice and intuitive. If your employees can work with Office 365, they can easily work with the entire Microsoft Modern Workplace suite of software.

More Free Time

What do employees want but they’re too afraid to ask for? A little more downtime, of course!

Many of your best employees are bogged down each day with boring, routine tasks. If they didn’t have to focus so much on those mundane activities, they’d have time to focus more on genuinely innovative new ideas.

One of the best things about the Microsoft Modern Workplace is that it allows users to automate several different tasks. And when most of those mundane tasks have been automated, your employees will be free to focus on the “big picture” ideas your company needs to stand out!

Easier Collaboration

Managers and executives understand how important group projects are. Such projects help your employees bring different skills and perspectives to the table. And once you put everyone together, you get a group that is much greater than the sum of its parts.

However, employees usually aren’t thrilled by group projects. Even if they get along with the entire team, it can be difficult to communicate with everyone and send files back and forth. The final result is an overflowing inbox and a lot of frustration.

The good news is that the Microsoft Modern Workplace was designed from the ground up to help employees collaborate. Microsoft Teams and Sharepoint makes it easy and intuitive to work together without blowing up each other’s inboxes.

When collaboration is this easy, your employees may learn to love group projects as much as you do!

Faster Problem-Solving

One reason that Microsoft Modern Workplace is so popular among small businesses is that it is an all-in-one solution. With this software in place, your business doesn’t have to rely on a dedicated IT team to manage so much of your technological needs.

One side effect of this for employees is that any problems they discover will be solved that much more quickly. Previously, their only course of action may have been to submit a ticket to IT, hope someone notices it, and hope it gets fixed before the week is out.

The automation of the Microsoft Modern Workplace helps to avoid many potential technological problems. And the intuitive software and collaborative tools will help your team solve any other issues, all without spending countless unproductive hours waiting on IT!

Remote Work Opportunities

Even before the COVID-19 pandemic, remote work opportunities were what many employees wanted most. And working during quarantine has helped even more employees develop a taste for working from home.

And it’s easier than ever for you to provide such opportunities. With the Microsoft Modern Workplace, you can use software such as Microsoft Teams to coordinate and collaborate with your remote workers.

Surprisingly, remote employees are just as productive as office employees. In some cases, they may be more productive. And while you can’t necessarily let everyone work from home, offering select remote work opportunities can serve as a powerful incentive to keep some of your best employees around. Furthermore, having a Microsoft-powered remote work infrastructure in place will prepare you for future crises.

With the Microsoft Modern Workplace, your office can be ready for anything.

Modern Workplace

Is Your Organization Prepared for Top 2020 Cybersecurity Threats?

Cybersecurity Threats

Top 2020 Cybersecurity Threats

Managed IT cybersecurity professionals have been challenged to the hilt through the first half of 2020. Phishing attacks increased by upwards of 600 percent during the height of the pandemic as industry leaders made haste to move to the Cloud or increase their remote workforce infrastructure. Industry leaders have been so busy dealing with the very next issue they haven’t had a moment to prepare for emerging cybersecurity threats.

Cybersecurity Threats

As Gartner analyst Peter Firstbrook explains, the resulting changes implemented to deal with the pandemic “accelerated digitalization of business processes.” Putting operational success on a wireless fast track may have left organizations increasingly vulnerable to wide-ranging threats. According to antivirus software giant Norton, these are top cybersecurity threats organizations may not be prepared to handle.

  • Deepfakes: This trick uses artificial intelligence to combine words and create phony images and messaging.
  • Synthetic Identities: This new method to perpetrate fraud blends real and fabricated personal identity information to build a representation of a real person.
  • AI-Powered Digital Attacks: Cybercriminals can now create programs that even replicate human behaviors to fool people into providing sensitive financial information.
  • 5G Challenges: The rollout of 5G is expected to increase cybersecurity risks on the Internet of Things (IoT) logistics networks.
  • Auto Hacks: Increased reliance on technology in cars, SUVs, and other vehicles, has cracked the door for a new type of automobile hack.
  • Cloud Jacking: This type of cyber-attack leverages weaknesses in programs and systems to penetrate Cloud-based networks and use them to mine cryptocurrency.
  • Ransomware Attacks: According to Security Magazine, more than 151 million ransomware attacks were carried out during the first three-quarters of 2019 alone. They show no sign of slowing down.

Decision-makers who are finally getting their feet under them would like nothing better than to focus exclusively on profit-driving endeavors. But sustaining a debilitating data breach or costly ransomware attack would only bring your efforts to a screeching halt. The question industry leaders may want to be asking, right now, is if you are prepared to deal with critical threats. These are strategies cybersecurity consultants believe are determined solutions going forward.

Extended Detection & Response Proves Meaningful

Extended detection and response (XDR) strategies employ automation to collects and assess data and run this information through a variety of cybersecurity innovations. The process improves early threat detection, deterrence, and response times.

Cybersecurity Automation Comes of Age

Hackers continue to utilize as many technological tools as they can get their keyboards on, and AI has been a boon for digital thieves. But for every move an online criminal makes, cybersecurity experts have a counter. Automating cybersecurity tools through AI and machine learning drive computer-centric systems in the direction of real-time defense. The strategy also streamlines systems by eliminating redundancies that can slow response solutions.

New Breed of CSOs Emerges

Given the emergence of non-traditional threats that evolved during 2019, organizations are looking for enterprise-level chief security officers (CSOs) to deliver on the promise of increased investment. Managed IT professionals rallied around the banner of “enterprise-level cybersecurity” for years. But perhaps the missing piece of the puzzle was decision-makers who understand the underlying infrastructure and salient details.

As ransomware attacks, GPS spoofing, and the next scheme rears its ugly head, having a security professional who can assess, secure, defend, and pivot with agility could make a significant difference. Either CSOs will need to catch up to the wave of next-generation threats or make way for a new breed of enterprise-level executives.

Are Privacy Professionals Needed?

Complying with government data privacy and protection regulations appears to be growing into a discipline of its own. New York, California, and even the EU have pushed through regulations that have national and global implications. And although these laws are stringent, they don’t even scratch the surface of industry-specific data protection and privacy oversight.

Industry leaders find themselves at a crossroads in 2020, deciding whether to create a full-time management position to provide regulatory oversight or outsource. Many are opting to work with a high-level cybersecurity firm to harden their defenses and ensure best practices that always meet or exceed compliance regulations.

Growth in Zero-Trust Networks

In some cybersecurity circles, consultants advocate for an increase in zero-trust networks that shield applications and data from the view of prying eyes. Although virtual private networks (VPN) were considered high-level protection for remote workers, zero-trust appears to be proving even more beneficial. The underlying premise is that a VPN might be difficult to uncover, but a hacker can wreak havoc once breached. Zero-trust networks, by contrast, limit access by the user. Even if a digital scammer swipes someone’s login information, they gain only limited and managed access.

The advanced schemes trolled out by digital thieves gives industry leaders and cybersecurity specialists a headache every year. Although hackers in 2020 leverage cutting-edge technologies, these bad actors can still be contained.

If your organization, like many others, could be vulnerable to these or other next-generation cybersecurity threats, it’s time to harden your defenses. A third-party cybersecurity firm can conduct a full review of your network, evaluate best practices, compliance, and provide a report. With this objective information in hand, your organization can be prepared, come what may.

Reset Your Computer System Today Using Windows 10

Do you need to reset your computer system?

Resetting is different from simply refreshing or restoring a computer system. Resetting means reinstalling Windows but during the process, you delete your personal settings, apps (unless the apps originated with the computer), and files (unless you choose to keep them). Refreshing and restoring your computer doesn’t require deleting these things, the latter of which is a scary idea. You, however, will likely need or want to reset your computer system using Windows 10 if, for example, any of the below are present:

  • Your computer system often freezes, runs slow, or otherwise acts funny and trouble-shooting the cause will take hours or more.
  • You haven’t installed an app, driver, or an update recently, and the computer doesn’t work well.
  • You simply want to restart using a clean slate and don’t want to conduct a cumbersome old-fashioned install typical of Windows 8 and previous versions.
  • You want to resell, trade, or dispose of your computer or computer system.

Resetting your computer system using Windows 10 is a relatively short process that has been considerably refined since Windows 8. Resetting doesn’t require a product key or any other installation tools and amounts to a few basic steps.

Step-By-Step Process to Reset Windows 10

Before resetting your computer system using Windows 10, you want to make sure you have backed up your system. As a reminder, you will lose most––if not all––of your personal settings, files, apps, and drivers when you reset your computer. Once you decide that resetting is what you want to do, you have to decide which of the three basic methods is appropriate for you:

  1. Reset using Settings. Use this option if you can access Settings from the menu.
  2. Reset from the Sign-On Screen. Use this option if you cannot access Settings. It’s also the way to reset using what’s commonly referred to as the Safe Mode.
  3. Reset from a Blank Screen. Use this option if the first two are not options.

Reset Using Settings

  1. Select the Start buttonin the menu.
  2. Select Settings> Update & Security> Recovery .
  3. Click on Open Recovery settings.
  4. From the Recover page and under Reset this PC, select Get started.

  1. You then have three options from which to choose:
    1. Keep my files > Change settings > Preinstalled apps On. This option reinstalls Windows 10 and allows you to keep personal files while removing settings, apps, and drivers you installed and restoring apps installed by the manufacturer. If you choose this option, you will be prompted on the Next screen on what personal files to keep.
    2. Keep my files > Change settings > Preinstalled apps Off. This option reinstalls Windows 10 and allows you to keep your personal files while removing settings, drivers, or apps that either you or the manufacturer installed. If you choose this option, you will be prompted in the Next screen on what personal files to keep.
    3. Remove everything. Under this option, you can either (1) leave Data erasure On, which is best if you will dispose of or sell your computer; or (w) leave Data erasure Off, which is less secure but also takes less time.

  1. Before you actually start the resetting process, you will be provided with an outline of what happens when you reset your system. If you agree, then click the Restore button. The process can take up to an hour. You know it’s finished once a license agreement appears and you are asked to agree to it.

Reset Using the Sign-On Screen

  1. Simultaneously press the Start button  and the L key to render the sign-in screen.
  2. Simultaneously press the Shift key and Power button.
  3. While still holding down on the Shift key, click Restart, which appears in the lower-righthand corner. The computer will restart in Windows Recovery Environment (WinRE), which is also referred to as Safe Mode
  4. A blue screen will appear giving you three options: (1) Continue; (2) Troubleshoot; and (3) Turn off your PC. Choose Troubleshoot.

  1. From the Troubleshoot page, click on Reset this PC. The same Recovery page as mentioned above will appear. Choose Reset this PC.
  2. The Reset this PC page will appear. Choose one of the three same above-listed options on the Reset this PC page and then follow the same process.

Reset from a Blank Screen

  1. Confirm the computer is turned off.
  2. Turn on the computer by pressing the power button.
  3. As soon as it restarts, press the power button again to turn it off.
  4. Repeat steps 1-3.
  5. Restart the computer––it should start-up in the WinRE environment (Safe Mode).
  6. You can now follow the same steps under Reset from the Sign-on Screen.

A Windows 10 Alternative to Resetting

Windows 10 also allows you to refresh your computer system by using the Give your PC a fresh start option. This option is useful when you want a fresh start but do not want all the factory software installed. This process takes a lot less time, like 20 minutes or so, and is preferable when you want to “reset” using Windows 10 because the computer isn’t working well and you recently installed a new app.

Whatever your reason is for wanting to reset your computer system, it’s good to know you have options when using Windows 10.

Reasons for Choosing Microsoft Teams as an Alternative to Zoom

Microsoft Teams v. Zoom

Microsoft Teams as an Alternative to Zoom

COVID- 19 induced lockdowns and social distancing measures helped spur Zoom’s growth. The video conferencing app managed to attract 300 million users by April 2020 compared to 10 million in December. Its rise to prominence left rivals like Facebook, Microsoft, Cisco, and Google scrambling for innovative ways to gain a competitive advantage.

However, privacy and security hiccups compromised Zoom’s popularity. Hackers infiltrated many meetings around the world in actions known as Zoom bombing. In South Africa, hackers beamed shocking images to parliamentarians during a virtual meeting.

The security and privacy concerns led to the banning of video conferencing platform by the NYC Department of Education. As a result, remote learning classes in New York switched to platforms like Microsoft Teams. Recent reports revealed that the Zoom app failed to encrypt messages end-to-end, which exposed user’s email addresses.

Microsoft Teams v. Zoom

Microsoft Teams: The biggest threat to Zoom

Microsoft recently confirmed reports about a powerful new feature that is undoubtedly a game-changer in the videoconferencing sector. The platform can now handle up to 300 participants during a virtual video meeting. The technology giant introduces this feature when it has been launching a string of features in its push for the top spot.

The increased number of participants in a meeting is a boon for businesses and other organizations, which host large virtual meetings. With the Zoom app, virtual meetings can only accommodate a maximum of 100 participants. To increase the number of attendees, you need to use an add-on.

The gallery view in Teams enables users to view up to 49 participants during a virtual video call. Microsoft boosted the gallery view feature by adding 40 more people up from nine. The addition is a welcome move for multiple groups like exercise classes, business meetings, and schools.

Benefits of switching to Microsoft Teams

Many users are searching for a viable alternative to Zoom. Microsoft’s introduction of robust new features has enabled the Teams platform to stand out as a strong challenger for Zoom.

Many companies can find it easier to opt for Microsoft Teams because they are already using the tech giant’s other products. As the Teams app’s evolution gains momentum, some analysts from Credit Suisse predict that the platform is more likely to emerge as the greatest threat for Zoom in the long-term.

Experts also highlight Microsoft’s size and profile in the technology sector as its principal advantages. The Teams app also provides easy integration with the tech giant’s productivity suite. Microsoft can launch massive marketing campaigns, thus enabling it to reach potential customers at scale.

Privacy and security features in Teams

Microsoft Teams comes with a wide array of security and privacy controls designed to prevent vulnerabilities to hacking similar to Zoom bombing. These features allow you to monitor and control access to your company’s virtual meetings and sensitive information.

During the meetings, you can add, remove, and appoint both participants and presenters. Privacy controls empower you to regulate access to confidential material used in the presentation. Guest participants from outside your business gain limited access to sensitive details.

Moderation tools allow you to control how attendees post and share information. Microsoft Teams employs artificial intelligence to track conversations to prevent the transmission of inappropriate content or conduct. The app ensures data protection using advanced encryption methods. It complies with more than 90 regulatory guidelines, including FedRAMP, HIPAA, and GDPR.

Notable features in Teams

The platform comes with a sophisticated noise suppression feature to eliminate ambient noise from meetings automatically. Microsoft is planning to add a more advanced real-time noise-canceling feature that uses artificial intelligence. Additionally, Teams will introduce a raise hand feature to enhance convenience during virtual meetings.

Convert a User Mailbox to a Shared Mailbox in Microsoft 365

How to Convert a User Mailbox to a Shared Mailbox in Microsoft 365

How to Convert a User Mailbox to a Shared Mailbox in Microsoft 365

After converting your regular mailbox to a shared mailbox in Microsoft 365, you retain all your existing calendars and email. The only difference is that it will be visible to several people. You can convert your shared mailbox back to private in the future. It promotes teamwork and convenience.

How to Convert a User Mailbox to a Shared Mailbox in Microsoft 365

Some of the most important things to know when converting from user mailbox to shared mailbox include:

  • The user mailbox you wish to convert must have a license -assigned to it before you can convert it to a shared mailbox. If it does not, you may not find the option to convert it. If you removed the license, add it back first. You can remove it back later.
  • Do not delete your old user’s account as you will need it to anchor your shared mailbox
  • With a shared mailbox, you can enjoy up to 500GB of data without a license. If you want more data, you must have a license assigned.

You can convert regular mailbox to shared mailbox by following these steps:

  1. Find the Admin option after logging in to your Microsoft 365 account
  2. Find the option ‘Active Users’ under the Admin option
  3. Choose the user you wish to convert and click on the option ‘Mail Settings’
  4. Click ‘Convert to shared mailbox.’
  5. Click ‘Convert’ to finish the process

Using the Exchange Admin Center

  1. Find the option ‘Exchange Admin Center
  2. Click on the option ‘Recipients’ and then ‘Mailboxes.’
  3. Find the user mailbox and select ‘Convert’ under ‘Convert to shared mailbox.’
  4. If the mailbox is less than 50GB, remove the license from the user. Stop paying for it, but do not delete your user’s account. If you are converting it for a previous employee, check to ensure that they have no other way of logging in.

Converting the Mailbox of Deleted User

If you wish to convert the mailbox of a deleted user, follow these steps to complete the process:

  1. Restore the deleted account
  2. Ensure that it has an assigned Microsoft 365 license
  3. Reset the password and wait for the mailbox to be created again
  4. Convert it to a shared mailbox and remove the license from the user mailbox
  5. Start adding members

Converting a Shared Mailbox to a Regular Mailbox

You can convert your shared mailbox back to a regular mailbox by following these steps:

  1. Login to your account as admin and find the Microsoft 365 Admin Center
  2. Click ‘Exchange’
  3. Find the options ‘Recipients’ and then ‘Shared’
  4. Click on the shared mailbox
  5. Click ‘Convert’
  6. Click ‘Convert to regular mailbox.’
  7. You will receive a warning message asking for confirmation.
  8. Click ‘Yes’

You must assign a license for the mailbox after conversion. You must also reset the password. The conversion can take a lot of time. When it is done, you will receive a completion message. Click ‘Close.’

After signing into Microsoft 365 again, you will find all the data from your shared mailbox.

In conclusion, Microsoft 365 is great for both regular and shared mailboxes. They all have unique features and benefits. A shared mailbox is an inbox type that allows you and other members of your team to send and receive emails from a similar address. It is a great option for companies that wish to promote teamwork. Since all members can respond to emails in the address, sharing work is easy.

If you wish to switch from user to shared mailbox, you can complete the process in a few simple steps. During the migration process, your data remains secure and integrated.

What Does $150K Ransomware Payment Say About Your Cybersecurity?

Ransomware Payment

$150K Ransomware Payment

A recent news piece published by Tech Republic highlights the discouraging reasons why too many businesses fall prey to hackers and pay ransoms for their digital property. Perhaps nothing adds insult to injury quite like someone burglarizing your organization and then making you pay for their crime.

A recent $150,000 ransom paid in Bitcoin to regain control of one small business’s digital assets reveals why so many cybercrimes go unreported. As staggering as the data breach statistics are, they may just be the tip of the spear. Security journalist Karen Roby conducted a Q&A with an unidentified CFO who made the decision to set aside pride and succumb to a hacker’s demands.

“His company chose not to get authorities involved given the value that was at stake, and the company’s immediate need to gain back control of its network,” Roby reportedly stated. “We’re hoping his first-hand account will help you better understand what these types of ransomware attacks look like and give you an idea of how to better protect your own organization.”

Ransomware Payment

How Do Ransomware Attacks Happen?

Ransomware attacks rank among the more prevalent methods used by digital thieves. The underlying strategy mirrors that of taking someone hostage and demanding payment from loved ones for their safe return.

In these cases, a company’s digital assets are taken hostage by inserting malicious software that effectively gives hackers total control of a network. Email remains the most-used delivery system. When someone in an organization gets tricked into clicking on a link or downloading a file, the ransomware application enters the network and hackers take control of the system and devices.

In order to regain control, cyber-thieves demand payment — typically in Bitcoin — in exchange for a decryption code. Like real-life hostage-taking, paying ransoms does not necessarily ensure the criminals will hold up their end of the bargain. Sometimes ransom-payers never receive the code. Other times, hackers delete systems to wipe away any digital fingerprints.

Why Some Decision-Makers Pay Ransoms

A ZDNet article called “Ransomware attacks: Why and when it makes sense to pay the ransom,” highlights why more businesses pony up rather than contacting the authorities. Written by Larry Dignan, the piece points out that the decision often comes down to cold financial calculations.

“Now paying ransomware is likely to go against conventional wisdom. The practice may also make you throw up in your mouth,” Dignan reportedly states. “However, there are real costs to having your company or city dead in the water for days. Paying ransomware should be viewed as any other business decision.”

In the case of the Tech Republic Q&A, the small business promptly contacted a third-party IT professional to assess the potential fallout of not paying the hacker’s demand. A quick review of the outfit’s digital assets revealed that the cybercriminal did not necessarily have control of what many consider to be the most valuable data. These typically include the following.

  • Banking information
  • Healthcare records
  • Personal identity information such as Social Security numbers
  • Intellectual property files

“The third party that we spoke to that were acting as our agent between us and the hackers. They said, ‘This is strange. You don’t really have anything they can hold over your head other than just stopping your business.’ But we engaged them quickly,” the ransomware victim reportedly said. “Ironically, they worked straight through on a Sunday to help us and by Monday morning we were in full agreement, and they began the conversation with the hacker group to see what we could get done.”

The third-party negotiated the ransom of $400,000 down to $150,000 in what took on the appearance of a corporate contract negotiation. The process revealed that some hackers conduct themselves like ordinary businesspeople. An encryption code was delivered, luckily, and this criminal outfit even offered tech support to the victimized company if they ran into problems getting computers back online.

“Yeah. I mean, if anything has made me laugh about this whole situation is that it’s just the selective morality of, ‘Hey, we know we’ve robbed you of money and your files and held you at our whim, but by the way, we’re here to help 1-800 …’ It’s unbelievable,” the victim reportedly said.

The Tech Republic’s microcosm looks at why organizations pay ransomware demands points out that some are overly reliant on their network. Failure to have a go-to backup system or secure digital assets that can be leveraged leaves industry leaders with a hard choice. Either pay up or sustain even greater financial losses. Bitcoin payouts are the hidden cost of subpar cybersecurity.

What’s the Best Way to Switch IT Managed Service Providers?

Switch IT Service Companies

The Best Way to Switch IT Managed Service Providers

The COVID-19 lockdowns have naturally changed how many organizations and companies operate. Educational institutions are embracing virtual classes, events that were previously held in person are now fully virtual, and a whopping 98% of employees worked from home to avoid spreading the novel coronavirus. Sadly, not all IT managed service providers were able to keep up with their customers’ needs during this challenging time, leading disaffected business owners to search for new IT managed services that can handle a company’s current and future IT challenges.

While finding a competent IT service is imperative, it’s also vital to know how to change companies without disrupting your current IT operations. The following are some expert tips that can help a company transition to a new IT service safely and smoothly.

Switch First

Don’t tear up your contract with your current IT managed service provider until you find another provider that can take their place. Furthermore, you’ll need your new provider to get to work on your IT set-up right away. Once your new IT service has everything under control, you can pull the plug on your former IT service.

What does this operation entail? Here are some steps you’ll need to take to make sure your business is ready to switch IT managed services:

  • Make sure you have all your login information and administrative access to all your accounts. Any decent IT managed service will provide you with this information even before you ask for it. Sadly, some subpar services try to hold onto your information to force you to continue to work with them.
  • Have your new company do a thorough cybersecurity assessment of your business to ensure there are no back doors that former IT technicians can use to gain access to your valuable company information.
  • Let your staff members know that you will be changing IT managed services by a specific date. Inform them of new protocols that will be put in place once you make the switch.
  • Schedule IT training sessions with your new managed IT service as soon as possible so your staff members can learn how to master new programs and cybersecurity rules quickly and easily.

What Does a Good Managed IT Service Look Like?

Selecting the right IT managed service provider to replace your current IT service is no easy task. Here are some tips that can help you make smart decisions.

  • Make sure the IT managed service is familiar with your industry.
  • Look up reviews online and ask prospective IT managed services to provide references from clients they have worked with in the past.
  • Ask about the pay structure. It should be a fixed monthly price, with allowance to scale services as the need arises.
  • Make sure the IT service can meet not only your current but also future needs.
  • Choose an IT service provider that puts a premium on cybersecurity services. Data breaches are becoming more commonplace than ever, with more than eight billion records exposed in the first quarter of 2020 alone.

Switching IT managed services can be challenging. It shouldn’t be done in a hurry; at the same time, you shouldn’t hesitate to find a new service provider if your current one is unable to meet your present and future needs. Do careful research to ensure your new provider is the best fit for your business and then start the transition process before notifying your current IT company that you will no longer use its services. Doing so will protect your business from disruptions while improving your IT efficiency and security.

Switch IT Service Companies

Microsoft Edge Browser FAQ

Microsoft Edge Browser

Have You Tried The Microsoft Edge Browser?

Microsoft’s Internet Explorer has been around from the early beginnings of the World-Wide Web. Over the years, it was sometimes immersed in controversy since it was “built into” some previous Windows versions. Well, not quite, since knowledgeable users knew how to install other browsers. But when Windows 10 came along, along with it came a new browser, Microsoft Edge. Below are some interesting, frequently asked questions.

Microsoft Edge Browser

What Great Things Can Microsoft Edge Do?

The following wonderful features exist on the newest Chromium-based version of Microsoft Edge, released January 15, 2020.

  • It has a new Collections feature that helps organize favorite webpages.
  • Web Note allows you to annotate web pages you find with a pen, highlighter, or typed notes. You can even do artful doodling on those pages, then save them in Edge or into MS OneNote.
  • It natively supports 4K video viewing, Dolby Audio, and Dolby Vision.
  • It runs on and syncs passwords, favorite websites, and settings on macOS, iOS, and Android. A Linux version is also rumored to be in the works for release later in 2020.
  • We are all familiar with horizontal web page tabs, but Edge also has an option to make them vertical, which is great for having lots of tabs open at the same time.
  • When you use passwords, Password Monitor will check autofill passwords against a database to see if they are in use elsewhere.
  • As with all great browsers, Edge also has a Privacy Mode.

Does Microsoft Edge Have Good Internet Protection?

The World-Wide Web, the wild-wild-West of the Internet, danger lurks all around. Cyber-thieves could use adware, malvertising, pharming, formjacking attacks, and man-in-the-middle browser attacks. Webpages may have malicious or poorly programmed scripts able to harm your computer and compromise your security. MS Edge is one of the major browsers in use, so all the reputable security software companies work together with Microsoft to create safe, seamless browsing experiences. Microsoft is continually being attacked from all sides, so its products are always being updated whenever issues are discovered.

Even if you were to accidentally lose or turn off your computer protection software suite of products, MS Edge works with other Windows applications to protect against the most common Internet hazards.

How Often Is Edge Updated?

Windows 10 users know that Microsoft has monthly updates for their systems. MS Edge will sometimes be updated at the same time. The user can also manually do updates or turn on automatic updating.

Is Microsoft Edge Based on Chromium?

The first version of Microsoft Edge came with the launch of Windows 10 using a proprietary Microsoft technology. Starting on January 15, 2020, Microsoft launched a new Google-Chromium-based Edge browser. In some ways, Microsoft’s version is more advanced than Google’s Chrome. For example, it already has anti-tracking defenses built-in. Edge has its own add-on market, however, add-ons can also be obtained from the Chrome Web Store.

Do I Have To Use Microsoft Edge?

If you use Internet Explorer 11 or an earlier version, you are probably using an operating system that will eventually no longer be supported. When that operating system reaches the end of its lifecycle, Microsoft will also phase out all support for that version of Internet Explorer.

However, you can use Google Chrome, Mozilla Firefox, and many other browsers. Each browser has its strengths and weaknesses. Hard-core users of Chrome often find that MS Edge will often work where Chrome fails.

Should I Use Microsoft Edge?

Does your company require you to log in from home to get access to special web-based database applications? If so, you want to first check with your corporate IT office to see if their software is running software using legacy DLLs: ActiveX Controls, Silverlight, or Java. It is very expensive to make reliable, stable custom controls for specific company needs, so your IT department may want you to wait before trying to access their website for home-based work purposes. However, they may also give you special instructions on how to configure Microsoft Edge to run in IE mode or enterprise mode. Remember, for home-based work with established companies, ask them what upgrades work best before trying something new.

What About Edge with Adobe Flash, ActiveX, Silverlight, or Javascript?

Adobe is ending Adobe Flash after 2020, but Edge supports web pages with and without it. Edge does not support BHOs like Silverlight or Java, nor ActiveX controls. For operating systems that still support Internet Explorer 11, Edge can be set to open web pages with those technologies in IE 11 automatically.

Should I Try the New Microsoft Edge?

Yes! But make sure you first learn it on a personal computer or device. Anybody who does research on the Internet will like the new features within the Edge Browser.