We are currently traveling in uncharted territory. Many of you have worked remotely for years, where others are still trying to figure out the logistics of how to physically work remotely. And even if the location of your work hasn’t changed, the feeling or the environment is different. Many of you will be working today with your spouse and kids surrounding you. We have new terms like social distancing and every situation is fluid and evolving. These are new times, so we need new tools to help us find as much efficiency in the way we are working.
In the past few weeks, we have explored all things Microsoft 365. We have broken down the terminology, product differences, pricing, and common questions and answers. Based on all that we have reviewed, it is time to give you the details of how to decide if it is the correct product for your office. Today we will break down the three major deciding factors of how to determine if Microsoft 365 is the right option for your office.
Consistency is the name of the game, and when it comes to naming, Microsoft is King. Unfortunately, with such similar names as Office 365 and Microsoft 365, there is a great deal of confusion on the differences between the offerings. This month, we will compare and contrast Office 365 vs. Microsoft 365. We will break down the high-level differences between the two Microsoft offerings, the difference in pricing, which product will benefit your business, a glossary of terms involved with both offerings, and an essential Q and A regarding both Microsoft 365 and Office 365. Today, we will stay high-level and look and the key differences between the two Microsoft offerings.
It seems only appropriate that October is National Cybersecurity Awareness Month (NCSAM). The month where we have traditionally tried to scare the pants off each other, we now place a focus on real-life terror! Cyberattacks are real and are happening everywhere. There are all types of attacks, and individuals and businesses are all at risk! Education is the frontline to keep yourself and your business safe. This month there is a unique collaboration between the Government and Industry to ensure all Americans have the resources to learn how to be safer and more secure online.
We have spent the past few weeks focusing on security awareness training. We touched on what it is and why it is crucial. Now comes the step for action. For you and your employees to be the strongest first line of defense, you must make time for security awareness training. For as we have reiterated over and over, 95% of breaches are the cause of employee error. So the training is obviously necessary, so now time is the only barrier.
Real-life examples of BECs
If you have been following the news, you should know that we are all at risk of Business Email Compromises (BEC). You may be growing tired of hearing this fact although it is a fact that we need to keep in the front of our minds at all time! Timing is a factor that these cybercriminals are continually accessing and know how to attack when your guard is down. Below are real-life examples of BECs that illustrate how easily these attackers researched, planned and struck at the right time and were able to victimize educated, experienced business people.
Business Email Compromise and Education
This month at Pendello we have been focusing on Business Email Compromise as the risk is definitely on the rise. If you remember, Business Email Compromise (BEC) is when an organized crime group gains access to your email through deception with the use of spear-phishing, identity theft, email spoofing, malware, and social engineering. In the past two weeks’ blogs, we introduced BECs and the different types of attack attempts. This week we are delving into how to recognize attack attempts. As 93% of all investigated data breaches can be traced back to a specific employee, we at Pendello Solutions know that end-user education is your best defense. So this month Pendello is bringing you some guidelines to look for when dealing with your day to day communications.