Introducing the Microsoft Teams Schedule Send Feature

Microsoft Teams Send Feature

Introducing the Microsoft Teams Schedule Send Feature

Key Points

  • Microsoft Teams will introduce a new feature in the coming weeks that will enable users to schedule messages to be sent later.
  • Schedule Send will allow users to choose a specific time and date for their message, giving them greater control over when it is delivered.
  • This new feature will be valuable for organizations looking to improve productivity and communication.

In today’s business world, we are increasingly relying on chat apps like Microsoft Teams to communicate with our coworkers. While this is a great way to stay in touch, maintaining a sensible workflow can also be difficult if you and your team constantly send messages back and forth. Fortunately, Microsoft is introducing a new feature to Teams that will help address this issue.

According to Microsoft’s product roadmap, Microsoft Teams users will soon benefit from a delayed send feature. This will allow users to schedule when their messages will be sent, giving them more control over their communication.

Microsoft Teams Send Feature

What Is Schedule Send?

Schedule Send is a new feature in Microsoft Teams that will allow users to delay the delivery of messages. This can be useful if you need to coordinate with team members in different time zones or if you want to make sure that your messages are received during normal business hours.

How to Use Schedule Send

To use the Schedule Send feature, simply compose your message as usual and then long press the send button to schedule the message. A window will appear where you can select the date and time you want your message delivered. Once you have selected a date and time, click on the “Send at scheduled time” button, and your message will be sent at the specified time.

Schedule Send is a great way to stay organized and smoothly flow your chat conversations. By taking advantage of this feature, you can ensure that your messages are always received by your team members at a convenient time.

The Benefits of Delaying a Message in Microsoft Teams

Sometimes it is beneficial to not have a message sent immediately. This could be for several reasons, such as:

  • You are in a different time zone, and the person you are messaging is likely to be asleep
  • It is out of normal work hours for the person you are messaging
  • You don’t want to interrupt the person you are messaging if they are busy
  • You want to make sure the person you are messaging sees the message as soon as they wake up/start work

How Will This New Feature Impact Your Organization?

Every user within your organization will have the ability to schedule messages to be sent at a later time. Users can schedule messages as long as the scheduled date is no longer than 7 days in the future. Scheduled messages can also not be flagged as important or urgent, and any attached files and inline images will only be accessible once the message has been marked as delivered.

While Microsoft may state that this feature was designed for organizations that employ people in different time zones, this feature can have several applications within your organization.

Here are 5 ways that your organization can make use of the Schedule Send feature in Microsoft Teams:

Time Zone Coordination

If you have team members in different time zones, scheduling messages can help ensure everyone is on the same page. You can avoid any confusion or miscommunication by sending messages at a convenient time for all team members.

Keeping the Conversation Flowing

If you and your team are constantly sending messages back and forth, the Schedule Send feature can help keep the conversation flowing smoothly. By scheduling messages in advance, you can avoid any disruptions or delays in the conversation.

Planning Ahead

The Schedule Send feature can also be used to plan ahead. If you know you will be unavailable at a certain time, you can schedule messages to be sent while you are away. This way, you can still participate in the conversation even when you cannot be online.

Avoiding Distractions

If you are working on a project and do not want to be interrupted, you can use the schedule send feature to delay the delivery of messages until you are finished. This way, you can focus on your work without being distracted by incoming messages.

Following Up

The Schedule Send feature can also be used as a follow-up tool. If you need to follow up with a team member about a task or project, you can schedule a message to be sent after the task is completed.

What Impact Does the Digital Age Have on the Schedule Send Feature?

In the digital age, we are always connected. With the click of a button, we can send a message to anyone, anywhere in the world. With instant messaging apps like WhatsApp, Facebook Messenger, and iMessage, we can converse with someone on the other side of the globe in real-time.

While this instant gratification can be great, it can also be overwhelming. We are constantly bombarded with messages and notifications from friends, family, and co-workers. As a result, we often feel like we should always be available and on-call. The Schedule Send feature can help alleviate some of this pressure.

By allowing you to schedule messages in advance, you can control when and how you want to communicate with your team. This can be a great way to establish boundaries. The Schedule Send feature can be a great tool for managing your time and communication in the digital age. In a world where everyone is connected 24/7, the Schedule Send feature can help you take a step back and think about the best time to send a message.

Cardiologist Turns Hacker

Moises Luis Zagala Gonzalez

Cardiologist Turns Hacker – Moises Luis Zagala Gonzalez

Moises Luis Zagala Gonzalez, a cardiologist in Venezuela, is the alleged creator behind the Jigsaw v.2 and Thanos ransomware strains. If true, this would make him one of the most prolific cyber criminals in recent history. These ransomware strains have caused immense damage, with Jigsaw v.2 encrypting over 500,000 files and Thanos targeting healthcare facilities worldwide.

If Gonzalez is extradited to the U.S. to face charges, it will be a significant victory for law enforcement in their fight against cybercrime. This case highlights the importance of international cooperation in combating cybercrime and the need for more robust security measures to protect against ransomware attacks.

Moises Luis Zagala Gonzalez

In a groundbreaking move, the United States has charged a Venezuelan cardiologist with “computer intrusions” for allegedly moonlighting as a ransomware developer. Dr. Jose Zamora-Quezada is accused of developing and selling ransomware that he used to target at least four hospitals in the U.S. and Canada. If convicted, he faces up to 10 years in prison.

This is the first time that the U.S. has charged someone with developing and selling ransomware, and it sends a strong message that this type of crime will not be tolerated. Cybersecurity experts have praised the indictment, saying that it could help to deter future attacks.

Zagala, also known as “Jay Tee,” pleaded guilty to conspiracy to commit wire fraud in August 2019. According to the FBI, he began developing ransomware in 2016. In June 2017, he and his conspirators launched the Jigsaw ransomware, which encrypts a victim’s files and demands a ransom be paid in bitcoin to decrypt the files.

The FBI claims that Zagala then created a 2.0 version of the Jigsaw ransomware that was designed to update the older ransomware program, which was created by others. He also developed a ransomware-creation tool dubbed Thanos, after the Marvel supervillain. Zagala’s guilty plea is significant because it shows that the U.S. government is willing to prosecute those who develop and distribute ransomware.

This is likely to deter others from engaging in this type of activity.

6 Timely Tips To Help Businesses Avoid Phishing Emails

Avoid Phishing Emails

6 Timely Tips To Help Businesses Avoid Phishing Emails

Phishing emails are a common way for cybercriminals to steal important data from businesses and individuals. This article will discuss what phishing is, how to identify a phishing email, and how to protect your business data from being stolen. We will also provide tips for avoiding phishing scams, the consequences of falling for a phishing scam, and how to report a phishing email.

This article covers:

  1. What is phishing, and how does it work
  2. How to identify a phishing email
  3. How to protect your business data from being stolen
  4. Tips for avoiding phishing scams
  5. The consequences of falling for a phishing scam
  6. How to report a phishing email

Businesses of all sizes are at risk of a data breach, and the consequences can be devastating. Hackers can steal sensitive information such as passwords or credit card numbers, and they may even be able to access confidential company documents. In addition, a data breach can damage a company’s reputation and cause customers to lose trust in its online communications.

Avoid Phishing Emails

1. What is phishing, and how does it work

Phishing is a type of online fraud involving emails or websites that mimic legitimate businesses to trick individuals into providing sensitive information, such as passwords or credit card numbers. Cybercriminals will often create emails or websites that look very similar to those of a legitimate company, and they may even use the company’s logo or branding. When an individual clicks on a link in a phishing email or visits a phishing website, they may be taken to a fake login page where they are prompted to enter their username and password. Once the cybercriminal has this information, they can use it to access the individual’s accounts or steal their money.

2. How to identify a phishing email

You can look for several things to determine if an email is a phishing scam. First, check the sender’s address to see if it matches the company’s address that it claims to be from. If the sender’s address is different or if there are typos in the address, it is likely a phishing email. Second, look for generic greetings such as “Dear valued customer” instead of your name. Third, be suspicious of any email that asks you to click on a link or download an attachment, as these could contain malware that will infect your computer. Finally, trust your gut – if something about the email feels “off,” it is probably a phishing email.

3. How to protect your business data from being stolen

You can take several steps to protect your business data from being stolen in a phishing attack. First, educate your employees about phishing scams and make sure they know how to identify a phishing email. Second, use a spam filter to block emails from known or suspected phishing websites. Third, do not click on email links unless you are absolutely sure they are legitimate. Fourth, do not download attachments from unknown senders. Finally, keep your anti-virus software up to date and run regular scans on your computer to ensure it is free of malware.

4. Tips for avoiding phishing scams

You can do several things to avoid falling for a phishing scam. First, be suspicious of any email or website that asks you for personal information. Second, do not click on email links unless you are absolutely sure they are legitimate. Third, do not download attachments from unknown senders. Fourth, keep your anti-virus software up to date and run regular scans on your computer to ensure it is free of malware. Finally, if you are ever unsure about an email or website, you can contact the company directly to confirm its legitimacy.

5. The consequences of falling for a phishing scam

If you fall for a phishing scam, the consequences can be severe. Your personal information may be stolen and used to commit identity theft, and your computer may be infected with malware. You may also lose money if you provide your financial information to a phishing website. In addition, falling for a phishing scam can damage your reputation and cause you to lose trust in online communications.

6. How to report a phishing email

If you receive a phishing email, do not reply to it or click on any links. Instead, report it to the company from which it claims to be and to the Federal Trade Commission (FTC). You can also forward the email to the Anti-Phishing Working Group at reportphishing@apwg.org.

157-Year-Old Lincoln College Succumbed To A Ransomware Attack

157-Year-Old Lincoln College Succumbed To A Ransomware Attack

157-Year-Old Lincoln College Succumbed To A Ransomware Attack

On May 13th, 2022, a college that has remained open through two world wars, the 1918 Spanish flu epidemic, and the Great Depression will close its doors. The college has been struggling to stay afloat in recent years, and the coronavirus pandemic and a recent ransomware attack have dealt a fatal blow.

The college’s closure will be a significant loss for the community, as it has been a source of education and employment for many generations. The college’s decision to close is a sign of the times, as more and more colleges face financial difficulties due to the pandemic.

It is an unfortunate reality that the long-standing institution will soon be no more.

Lincoln College — a historically Black college in rural central Illinois that broke ground on President Abraham Lincoln’s birthday in 1865 — tried but failed to raise enough money to recover from the combined impact of COVID-19 and a December cyber attack, David Gerlach, the college’s president, said in a statement.

The college had hoped to use the funds to cover expenses related to the pandemic and the cyberattack, which shut down the school’s computer systems and caused “significant financial losses.” According to Gerlach, the college has made some progress in restoring its systems, but it is still facing “major challenges.”

He did not say how much money the school was seeking or where the funds would come from. The news comes as many Historically Black Colleges and Universities (HBCUs) are struggling to stay afloat amid the pandemic. Earlier this month, Maryland’s Bowie State University announced laying off more than 100 employees.

And last year, Florida A&M University laid off nearly 200 employees and imposed a hiring freeze to cut costs. With their already tight budgets, HBCUs have been hit hard by the pandemic, which has led to a decline in enrollment and revenue.

157-Year-Old Lincoln College Succumbed To A Ransomware Attack

Ransomware Blocks Access To Critical Information

Lincoln College, which has roughly 600 students, saw its enrollment fall after the coronavirus hit, disrupting its operations and finances. As the school struggled to stay afloat, a ransomware attack blocked the college from accessing data used in its student recruitment and retention and fundraising efforts.

The attack, which occurred over the summer, was particularly damaging because it came when the college was already facing significant financial challenges. Lincoln is just one of many colleges that have been hit by ransomware attacks in recent years.

These attacks have cost colleges millions of dollars in damages and have led to disruptions in campus operations. They have even forced schools to close their doors permanently in some cases. Given the financial challenges that many colleges are currently facing, it is likely that we will see even more ransomware attacks in the coming years.

According to the school’s statement, by the time Lincoln regained access to its vital computer systems in March, estimates had shown “significant enrollment shortfalls” requiring a “transformational donation or partnership to sustain Lincoln College beyond the current semester,” the school’s statement outlined. The shortfall was caused by a malware attack that shut down the college’s online and on-campus operations for nearly two weeks.

The attack also disrupted the school’s ability to process new applications, causing a drop in incoming students.

Zero Trust Networks: What Are They?

Zero Trust Networks

Zero Trust Networks: What Are They?

The internet has brought a world of opportunity for businesses. It is easy for companies to reach out to consumers and offer them products or services without a physical storefront. However, this also opens businesses up to the risk of data breaches and cyber attacks. Cyber attacks can be costly, and data breaches can damage your business’s reputation.

To protect your business, you need to be aware of the risks and take steps to mitigate them. Cyber insurance can help cover the costs of a data breach or cyber-attack, and a cyber security plan can help you protect your business from these threats.

By taking these steps, you can help ensure that your business is protected from the risks of operating online.

There is no one-size-fits-all solution for determining whether you should implement zero-trust network access in your organization. Instead, the best way to decide whether this security model is suitable for you depends on the level of risk your business faces and the type of data you store on your network.

For businesses dealing with highly sensitive or proprietary information, implementing zero trust is a must. Without strict controls, there is a significant risk that your information could fall into the wrong hands and be used for malicious purposes. Furthermore, the increased regulatory requirements and cyber threats facing businesses today mean that protecting sensitive data must be a top priority if you want to avoid costly fines and reputation damage.

On the other hand, if your business doesn’t handle any sensitive or proprietary data, zero-trust may not be as critical to securing your network. However, implementing zero trust can still help protect against common threats like phishing scams and malware attacks, even in these cases. Furthermore, limiting access to less important or lower-risk assets on your network can help ensure that your most valuable data remains secure even if there is a breach elsewhere on the network. Ultimately, whether or not to implement zero-trust network access should be based on the unique needs and risks of your organization.

If you are considering implementing zero trust in your organization, there are a few things to keep in mind.

  • First, zero trust is not a silver bullet that will magically make your network impenetrable. It is important to remember that no security measure is 100% effective and that zero trust should be just one part of a comprehensive security strategy.
  • Second, zero trust requires a significant investment of time and resources to implement correctly. To be effective, zero trust must be integrated into every aspect of your network, from your infrastructure and applications to your end-users and devices.
  • Finally, it is essential to remember that a zero-trust network is a constantly evolving entity. Your security measures will need to be updated as new threats emerge and your network changes over time.

If you are looking for a way to improve the security of your network, zero trust may be the right solution for you. By taking steps to limit access and protect your data, you can help ensure that your business is protected from cyber-attacks.
Zero Trust Networks

What Is Zero Trust Network Access?

At its core, a zero-trust network access policy is all about limiting access to sensitive data based on the security of a given endpoint. This means that if an endpoint cannot be verified, it won’t have access to any critical or confidential information on the network. By limiting access in this way, zero-trust policies help to protect against threats and keep data secure. They also ensure that only authorized and authenticated users can use and connect to services on their devices or computers. Overall, a zero-trust network access policy is essential for businesses looking to protect their most sensitive information and maintain their digital integrity.

Any effective security policy must consider the fact that employees are the weak link in the security chain. No matter how strong your technical defenses are, they can be easily circumvented if an employee accidentally discloses sensitive data. That’s why it’s crucial to have a policy that limits user access based on the trust level. By only allowing users to access the data they need to do their jobs, you can reduce the chances of accidental disclosure. And by requiring users to log into the system with a unique username and password, you can ensure that only authorized users are accessing the data. You can help protect your company’s sensitive data from accidental disclosure by taking these steps.

Why Zero Trust Networks Are Crucial For Today’s Business

A zero-trust network is a critical component of any business. By creating this secure and reliable system, companies can ensure that their employees have the tools and information they need to do their jobs efficiently, without the risk of malicious acts or cyber attacks. This promotes a healthy work environment, but it also reduces the overall risk for the company as a whole.

With a zero-trust network in place, companies can grant much more flexibility and access to individuals within their organizations. These employees can then use applications and other resources designed specifically for their particular roles, increasing productivity and efficiency. Moreover, by giving certain employees far more flexibility than others within the same organization, companies can achieve new levels of collaboration while still protecting sensitive data from prying eyes.

Overall, a zero-trust network is essential for any business that wants to create an effective and safe working environment for its employees. By empowering these individuals with access to valuable resources while at the same time limiting their ability to make mistakes or act maliciously, businesses can reduce their risk and thrive in today’s fast-paced digital economy.

Zero Trust Policies

Zero-trust policies are vital for organizations that want to stay protected against cybersecurity threats. These policies take a proactive approach, actively monitoring and restricting access to data regardless of where the user is coming from or what device they are using. And the benefits of these policies speak for themselves: businesses that have implemented zero-trust policies have been able to significantly reduce the risk of cyber-attacks while maintaining high levels of data transfer speeds and productivity throughout their organization.

But what does the future hold for zero-trust policies? According to recent research carried out by Microsoft, nearly all security decision-makers believe that zero-trust is critical to business success in today’s digital world. This suggests that zero-trust will continue to be on the rise in the years ahead, offering organizations unparalleled protection against cyber threats without compromising speed or efficiency. In a landscape where data breaches seem more common than ever, embracing zero trust may be one of the most effective ways to keep companies safe and secure in our increasingly digitized world.

Any business that handles sensitive customer data needs to have a zero-trust network access policy. This policy ensures that only authorized users can access the network and that all data passing through the network is encrypted. The benefits of a zero-trust network are manifold. It reduces the risk of data breaches, improves productivity and engagement, and cuts costs for businesses. For employees, it increases job satisfaction and peace of mind. In today’s increasingly interconnected world, a zero-trust network access policy is essential for any business that wants to protect its data and reputation.

The Overall Benefits Of Zero Trust Networks

Protection For Your Remote Workforce

A zero-trust network is an excellent way to secure your remote workforce. Many companies don’t take the time to think about their remote staff’s level of access. This can lead to a dangerous situation where employees have full access to an asset they shouldn’t.

A zero-trust network addresses this issue in a few different ways. First, you can create different user access levels depending on an individual’s level of access. This can help give teams clear guidelines for what each remote worker can do. For example, if an employee only needs to access files on a specific server, they should only be given access to that server and no others. By contrast, if an employee needs to be able to access multiple servers, they should be given appropriate levels of access to those servers. This system of user access levels helps ensure that each remote worker only has the level of access they need and no more.

In addition, a zero-trust network can help improve communication between remote workers and the rest of the company. Often, communication breakdowns happen because employees feel like they are being left out of the loop or are not being given enough information. With a zero-trust network, this is less likely to happen. Instead of relying on outdated emails or documents, remote workers can be given access to a secure intranet where they can find the most up-to-date information. This helps ensure that everyone is on the same page, and it can improve communication throughout the company.

Data Breach Risk Lowered

A data breach is one of the biggest threats to businesses today. When someone gains unauthorized access to your network and obtains sensitive information from your server, they can use this information for malicious purposes, like identity theft or fraud.

However, a key benefit of having a zero-trust network is that it makes data breaches much harder. This is because strong security and access policies help you control who has access to what. You can also update these policies quickly if they become outdated or new threats emerge, which means that your network will always be protected against emerging vulnerabilities.

Therefore, by adopting a zero-trust policy and ensuring that your network is secure and protected, you can significantly reduce the risk of data breaches and protect your business against costly cyberattacks.

Keep Confidential Business Information Secure

Another key benefit of having a zero-trust network is that it can help protect your private business information. Many companies don’t take the time to think about their remote staff’s level of access. This can lead to a dangerous situation where employees have full access to an asset they shouldn’t.

A zero-trust network addresses this issue in a few different ways. First, you can create different user access levels depending on an individual’s level of access. This can help give teams clear guidelines for what each remote worker can do. Second, all data passing through the network is encrypted, so even if an unauthorized person were to gain access, they wouldn’t be able to read it. Finally, zero-trust networks are designed with security in mind from the ground up, so you can be confident that your data is safe.

Looking Ahead For Zero-Trust Networks

In today’s world, data security is more important than ever. With the rise of digital transformation, more and more businesses are moving their data online. This makes it easier for cybercriminals to target companies and steal sensitive information. A zero-trust network can help protect businesses against these threats by ensuring that only authorized users have access to sensitive data.

We can expect to see more businesses embrace zero-trust networks in the years ahead. As the world becomes more digitized, the need for these types of networks will only grow. Companies that want to protect their data and reputation need to take action now – before it’s too late. By embracing zero trust, businesses can stay one step ahead of cybercriminals and keep their data safe.

Secure Your Business Network

In today’s fast-paced business world, nearly every employee needs access to the company network. This makes it easy for employees to collaborate and stay on top of their work, posing some significant risks. With so many people accessing the network worldwide, there is a greater danger of data breaches and hacking attempts. To address these risks, many companies are beginning to implement zero-trust network access policies – a set of guidelines designed to limit the network access of remote employees and limit their potential for data breaches.

These policies typically involve a multi-step verification process that includes strict authentication protocols like two-factor authentication or biometric scanning. By requiring comprehensive verification each time someone logs in remotely, the zero-trust approach ensures that only authorized users have access to sensitive information within the company network. Not only does this help minimize the risk of data breaches, but it can also help businesses maintain higher security standards overall as they adapt and prepare for future threats. So if you’re looking for ways to improve your business’s cyber security practices, consider taking a page from this book and implementing zero-trust network access policies in your organization today.

Can Ransomware Spread Through Business WiFi Networks?

Securing Your Wireless Network from Ransomware

Can Ransomware Spread Through WiFi?

Ransomware has been a menace to businesses large and small for years, and the problem is only getting worse. One of the most insidious aspects of ransomware is its ability to spread through wifi networks, infecting multiple computers and devices.

This can cause severe disruptions to business operations, as employees are unable to access their files or applications. In some cases, ransomware can even render entire networks unusable. While there are steps that businesses can take to protect themselves from these attacks, such as implementing robust security measures and backing up data, the best defense is often proactive detection and response.

By ensuring that their networks are constantly monitored for suspicious activity, businesses can reduce the chances of being hit by a ransomware attack.

Securing Your Wireless Network from Ransomware

How Does Ransomware Spread Through A Network?

The increase in ransomware attacks is a serious concern for businesses of all sizes. Ransomware is a type of malware that encrypts a victim’s files and demands a ransom be paid in order to decrypt them. Attackers are constantly finding new ways to spread ransomware, and the amount of ransom demanded has been increasing.

This has led to businesses losing access to critical data and facing significant financial losses. The best way to protect yourself from ransomware is to have a good backup strategy in place. This will ensure that you can recover your data if you do become a victim of an attack. You should also make sure that your security software is up to date, and that you only download apps and software from trusted sources.

By taking these precautions, you can help to protect your business from the growing threat of ransomware attacks.

Who Does Ransomware Typically Target?

Despite ransomware becoming more prevalent in society, many people are still unaware of what it is and how it works. Ransomware is a type of malware that encrypts a victim’s files and holds them for ransom.

The attackers usually demand a ransom in cryptocurrency, which is difficult to trace. In some cases, the attackers will release the victim’s files after the ransom is paid; however, there is no guarantee that the files will be released or that they will be decrypted correctly.

Many times, the victims of ransomware attacks are left with no choice but to pay the ransom or lose their data forever.

Recently, ransomware has been used to target critical infrastructure, such as the Colonial Pipeline attack in 2021. This attack disrupted the flow of oil across the eastern United States. Cybercriminals have also started to target supply chains, such as when remote management software vendor Kaseya fell victim to the REvil ransomware.

These attacks have highlighted the need for organizations to be prepared for a ransomware attack and have a plan in place to respond quickly.

Securing Your Wireless Network From Spreading Ransomware

Business wireless networks are becoming increasingly popular as more and more people connect their devices to the internet. However, as the number of devices connected to the internet grows, so does the risk of cyberattacks.

One way to protect your business network from intrusion is to keep your wifi access password protected. Many routers come with a default password that is easy to guess, so it’s important to change it to something that is unique and difficult to crack.

In addition, it’s also a good idea to enable encryption on your router. This will make it more difficult for hackers to access your data. Finally, be sure to keep your router and firmware up-to-date with the latest security patches.

By following these simple steps, you can help protect your business’s wireless network from cyber threats and the spread of ransomware.

Network Equipment Shortages

Supply Issues Information Sign

Network Equipment Shortages

The current state of microchips for network equipment is difficult at best, depending on a supply chain that can cross over 70 international borders and 31,000 miles before reaching its end destination, with processes in Texas, Michigan, Malaysia, Germany, and China before landing at the port in California for distribution. The many limitations in travel and supply chain staffing brought about by the COVID-19 pandemic have made what was already a just-in-time supply chain into a mess, one that’s expected to continue for the foreseeable future. With chip supply shortages contributing to lead times as far out as 400 days for your networking equipment, price increases due to inflation, and missed shipping dates, how will your company keep up?

In a recent report titled “What Are My Options for Dealing With Long Lead Times on Network Equipment?” Gartner mentioned, “We expect lead times to remain high through early 2023, at which point we expect slow incremental improvement over the course of months.” This leaves many companies scrambling to get their network hardware in place, with the report citing five ways to increase capability, but only one of which puts more hardware into your servers, while one is a touch on the sneaky side.

Supply Issues Information Sign

1) Optimize your existing hardware

Many company switches are operated at less than 75% port capacity, according to the report by Gartner, with campus and enterprise switches often underutilized so that rapid growth or cable simplification can be achieved. “We estimate at least 25% of campus and data center ports are unused, and likely more. Thus, reducing excess capacity via consolidating connectivity can readily free up 10% to 15% of switches for most enterprises, while leaving room for growth.” By using existing hardware effectively, you won’t have the option for growth in the future, but it may get you past the worst of the shortages and delays. It will require changes and recalling of the network, along with downtime and labor.

2) Move to the cloud

When you switch your network to the cloud, your hosting or cloud provider will have to come up with the network hardware, but because the hardware is often shared among many companies, there’s a lower overall demand for chips. This allows you to avoid having to purchase new data-center switches and similar equipment. In the report,

The solution to everything: Move to the cloud. Enterprises can avoid buying data-center switches and other hardware if they move workloads to hosting providers or public cloud providers. The report also recommended putting x86 servers in place instead of network appliances that have low interface counts, including routers, firewalls, and load balancers.

3) Move to the front

Vendors often prioritize customers that give them larger opportunities for revenue or loss of revenue, so consider competition at the vendor level. Threaten to take your business somewhere else and see if they’ll come around. As a new customer, make sure your vendors know that you represent significant future income. As the report states, “Vendors are prioritizing customers that represent larger revenue opportunities and/or create the risk of revenue loss.” This allows you to avoid having to wait in line for a first-in, first-out order approach and may get you what you need.

4) Consider certified refurbished equipment

What happens to relatively new equipment that isn’t used for very long? It’s refurbished and resold. Though it’s not brand new, the recertification process still provides you with some protection in terms of a warranty or similar benefits. This can include equipment from top brands including Cisco and HPE Aruba. Though the equipment maybe a little older, the lead time is often only days to weeks versus months to over a year.

5) Wear it out

Many companies will change out hardware well before the end of its useful life by months to years. Just because you have a switch that is approaching the end of its warranty doesn’t mean it will immediately break down. Instead of automatically retiring it, try negotiating with your vendor to get an extended service contract to get more use out of existing assets.

These five solutions provide you with a range of options you may not have considered.

Slack vs. Microsoft Teams

Slack vs. Microsoft Teams

Slack vs. Microsoft Teams

Chat-based collaboration has been around for several years, but with the sudden impact at the beginning of the COVID-19 pandemic, Slack and Microsoft Teams both quickly rose to the forefront. But which one is better for your business? Whichever option you choose, you’re still the winner, because two great collaboration platforms provide you with the features you want. Here’s a six-category comparison to help you through the process.

Slack vs. Microsoft Teams

Business Tech Blog: Slack vs. Teams

Interface and Usability

  • Appearance: For customization, go with Slack for a ton of options.
  • Navigation/Dashboard: Slack focuses on work channels to separate projects, teams or topics. Teams focuses on the people being brought into the collaboration.
  • In-App Help: Teams features Help icons at the bottom of the sidebar, including training, topics, and what’s new links, allowing you to browse or search. Slack’s in-app chatbot is super easy to use for fast answers.
  • Chat: Teams will provide an experience closer to a word processor, with additional colors, fonts, and similar options.
  • Video and Voice Conference: Slack integrates well with Zoom, Webex and others. Teams build in videoconferencing but can use other options.
  • Notification Control: Teams provides many notification options, while Slack provides superior Do Not Disturb controls.

Integrations

  • Microsoft 365/Office 365: Not surprisingly, being a Microsoft product, Teams is better at integrating the business productivity suite, along with integration to SharePoint and OneDrive. Slack also integrates, but not as far as Teams does.
  • Google Workspace: If you use Google-based options, such as Google Calendar, Gmail, and Google Drive, you’ll want to stick with Slack, because Teams doesn’t even try it.
  • Salesforce: Salesforce bought Slack in July 2021, allowing easy integration. View Slack messages tied to specific Salesforce records and Salesforce alerts on Slack channels. Teams integrates with it, but not as deeply.
  • Overall: Slack offers significantly more third-party app integrations, currently tying into over 2,400 apps versus Teams’ 700, with both apps providing the option to build customized apps and integrations, with Slack having about 935,000 customized apps.

Additional Noteworthy Features

  • Shared Channels: Slack Channels makes it easy to connect your workspace to a partner’s workspace, improving collaboration. Teams provides guest access for outside parties.
  • Scaling: Slack supports unlimited users and channels, with over 100,000 users per channel. Teams allow unlimited users, up to 25,000 participants per team, 200 channels per team, and 5,000 users per channel.
  • Translation: Teams offers onboard message translation in 36 different languages. Again, Slack uses app integrations such as the Rosetta Translator bot.

Mobile and Web Apps

In this category, Slack and Teams were very even, with similar functionality, features and usability.

Security, Compliance and Enterprise Management

  • Security: Both have similar layers and degrees of protection overall. However, integrations in Slack could open new vulnerabilities.
  • Encryption: Both apps encrypt data while in transit as well as in storage. A wide range of capabilities and apps keep your data secure.
  • Enterprise Key Management: Teams offers this to a certain extent, but Slack’s Enterprise Key Management lets you create encryption keys for messages and files.

Plans and Pricing

  • Free Options: Both apps provide free plans, but Teams is more generous, with unlimited meetings, messages, and search, up to 500 users, 2GB storage per user, 10GB shared storage, one-on-one chat, screen sharing, unlimited integrations, and encryption, while Slack has up to 10,000 messages, 10 integrations, one-on-one video calls, and two-factor authentication.
  • Slack Plans: Pro plan starts at $6.67/user/month and steps up to $12.50/user/month for Business+, with both billed annually. Enterprise Grid plan pricing requires contacting Slack sales. Paid plans provide unlimited access, messages, and much more.
  • Teams Plans: There are many plans for Teams, ranging from $5/user/month to $57/user/month, while adding more capability, such as scheduled meetings, recording, security, admin, and compliance features.

In Conclusion

Overall, Slack and Teams offer many of the same features. Consider what features you need and which option delivers those features best. If you do a great deal of Microsoft 365 work, consider giving Teams a long trial before switching. If, on the other hand, you tend to avoid vendor lock-in issues, are avidly using Salesforce, or use Google Workspace, give Slack a shot and see how well it will work for your enterprise.

Do Microsoft Teams Attacks Prove Need for Innovative Cybersecurity Awareness Training?

cybersecurity experts

Do Microsoft Teams Attacks Prove Need for Innovative Cybersecurity Awareness Training?

Although hackers select email as their preferred delivery method upwards of 92 percent of the time, a recent Microsoft Teams exploitation emerged as a significant threat. Do these stunning Trojan attacks on businesses require a rethinking of cybersecurity awareness training?

With more than 270 million monthly users collaborating on the platform, Microsoft Teams ranks among the high-value targets. This holds true for relatively unskilled hackers and advanced persistent threat (APT) actors who possess the knowledge, tools, and funding to abuse the even heightened cybersecurity defenses. In January, a report by researchers at Avanan surfaced that indicates thousands of malicious files circulated Microsoft Team chat spaces.

“By attaching the file to a Teams attack, hackers have found a new way to target millions of users easily. They can steal Microsoft 365 credentials from a previous phishing campaign, giving them carte blanche access to Teams and the rest of the Office suite,” Avanan reportedly stated. “Given that hackers are quite adept at compromising Microsoft 365 accounts using traditional email phishing methods, they’ve learned that the same credentials work for Teams.”

Cybersecurity experts have issued alerts to check laptops, desktops, and other devices synced with business networks to run enterprise-level antivirus scams immediately. It’s also crucial to search devices for Trojans named User Centric, UserCentric, or UserCentric.exe. These were among the initial monikers APTs gave the Trojan files. However, cybersecurity experts believe hackers have renamed the malware.

cybersecurity experts

Microsoft Teams Malware Poses Substantial Risk

What makes the Teams malware attack particularly dangerous stems from workplace comfort. Business leaders who invest in cybersecurity awareness training help employees identify email phishing scams. Even more sophisticated spear-phishing schemes are usually spotted because workforces possess the knowledge to identify telltale signs. But workforces grow increasingly relaxed on platforms such as Teams and Slack, among others.

“Most employees have been trained to second-guess identities in email, but few know how to make sure that the name and photo they see in a Teams conversation are real,” Avanan officials reportedly stated. “This attack demonstrates that hackers are beginning to understand and better utilize Teams as a potential attack vector.”

Relatively unskilled hackers will continue to send out tens of thousands of bulk emails, hoping an uneducated user will make a mistake. Fortunately, many industry leaders have already invested in cybersecurity awareness training that turned their workers into a hardened frontline of defense. But for cybercriminal adept a problem-solving, Teams was worth their time and energy to infiltrate. This highlights the international chess match played between digital thieves and cybersecurity professionals.

How are Hackers Manipulating Teams?

Everyday people generally believe that platforms such as Teams are safe. With this comfort in mind, it’s inconceivable that seemingly valid massages have been laced with malware. Unfortunately, that’s precisely the vulnerability that now exists on these once trustworthy platforms. These rank among the latest methods cybercriminals leveraged on teams.

  • Compromise one organization and monitor inter-organizational communication.
  • Compromise an email address that can access Teams.
  • Use phishing schemes to steal Microsoft 365 credentials.

When someone clicks on the malicious file transmitted on the platform, it automatically downloads. The Trojan installs into the system and allows digital thieves to administer and control the network or device. Unlike ransomware attacks, APTs could hide in a system and pilfer off valued digital assets until detected and expelled.

“Compounding this problem is the fact that default Teams protections are lacking, as scanning for malicious links and files is limited. Further, many email security solutions do not offer robust protection for Teams,” Avanan reportedly stated. “Hackers, who can access Teams accounts via East-West attacks, or by leveraging the credentials they harvest in other phishing attacks, have carte blanche to launch attacks against millions of unsuspecting users.”

How Can Business Leaders Defend Against Teams Trojan Attacks?

Devices and networks often demonstrate signs they’ve been infected by a Trojan. Sluggishness, frequent crashes, excessive pop-ups, or random programs running could be the result of a Trojan.

It’s essential to contact a third-party cybersecurity professional if you believe your business network has been compromised. Finding and removing a Trojan requires in-depth knowledge and experience. People who try a DIY approach risk triggering unidentified files and potentially damaging the network. In some cases, organizations believe they have eliminated the threat, only to later discover it was embedded in other devices, documents, or electronic messages.

Industry leaders would be well-served to consider having a full review of their systems conducted. Even if this Trojan hasn’t infiltrated your network yet, enhanced cybersecurity awareness training regarding Teams and other platforms empowers your staff to repel malware attacks.

Microsoft Office 365 Updates

Microsoft 365

Updates To Microsoft 365 and Microsoft Office 365

Are you a Microsoft 365 or Office 365 subscriber? Then, you’ll have access to the latest security patches, bug fixes, and software features. However, it might be challenging to monitor the changes in every update and know when to expect them. Here is information about the most recent updates to Office 365/Microsoft 365 for Windows.

Microsoft 365

Version 2201 (Build 14827.20192)

Released on February 8, 2022, this build fixes multiple bugs while offering security updates for Excel, Visio, and the Office suite. With this build, people can now save files in Project. IT teams should look out for this security update. Be sure to apply the update when reports about problematic issues indicate that everything is well.

Version 2201 (Build 14827.20158)

Microsoft released this update on January 26, 2022. The build comprises multiple features, including new Cortana features for Teams, simplified scrolling through large Excel spreadsheets, and enhanced address book searches for MS Outlook. The fixes resolved the Access bug that prevented the Insights add-in from working intermittently.

The update also resolved an Outlook bug that resulted in unresponsive applications after loading contact cards. This build also ensures that “Repeat style” in Word will repeat the style rather than apply “Normal.”

Version 2212 (Build 14729.20248)

Released on January 11, 2022, this build ensures that Excel shapes and form controls can now call VBA macros. The build also comes with security updates covering Microsoft Office Remote Code Execution Vulnerabilities. Like other security updates, IT teams need to apply the update once they ascertain that there are no problematic issues with the build.

Version 2112 (Build 14729.20194)

This January 4, 2022 update offers multiple new features, including a team update that lets you “raise your hand” without interrupting the conversation. The build also includes a new feature that allows you to only track your Word charges when collaborating. You will also get access to an enhanced way of searching for Outlook’s calendar.

The MS update also fixes multiple bugs. First, the update resolved a bug in Outlook that created garbled text when users exported contacts to a CSV. Also, users no longer have to deal with applications closing unexpectedly in Access when making a connection to a Jet or Access database with multiple threads.

Version 2111 (Build 14701.20262)

Microsoft released this build on December 16, 2021, to fix two bugs. One bug fix applied to the whole Office suite as it involved refreshing elements that have text. The other bug was an Access bug that hindered multiple users from accessing a database on a network file share.

Version 2111 (Build 14701.20248)

On December 14, 2021, MS released a build to fix multiple bugs, including one in Outlook, where the teaching tips about Office’s new look were absent. This build also fixed a bug in Excel, where opening an XLSM file in the SpreadsheetCompare tool resulted in sluggish responses.

Users also got access to multiple security updates for Excel and the MS Office suite.

Version 2111 (Build 14701.20226)

Microsoft dedicated this build to resolving common bugs. Released on December 3, 2021, the update fixed different bugs, including an Excel bug where newly created PivotTables lost custom settings whenever users changed the data source range. Users can now click on all pop-UI elements in PowerPoint and Word with the update. This update also resolves a bug in the Project where specific projects closed unexpectedly when users loaded customized reports.

Version 2210 (Build 14527.20312)

Released on December 1, 2021, version 2110 offers viable solutions for multiple bugs. The update resolved a bug that prevented users from inserting signatures into forwards, replies, and new email conversations. Besides, this upgrade ensures that all R64 users can select a theme picker under Word’s Options menu.

Version 2110 (Build 14527.20226)

Microsoft Teams users are the greatest beneficiaries of this update that MS released on October 25, 2021. With this update, users can now leverage the Q&A application available on Teams. Also, the update lets users create Live Transcripts for web users on the platform. Besides, people can use Team’s desktop app to join other cloud meetings anonymously.

The upgrade’s capability also extended to MS Office. This build addressed an issue on Outlook where sync failures occurred whenever someone generated a preview.

All these upgrades have one thing in common – Microsoft designed them to ease operations on Office 365 and Microsoft 365. Upgrade your tools regularly to leverage all these upgrade benefits.