Making IT simpler with a modern workplace

Making IT simpler with a modern workplace

There is a simple way to explain one of the biggest threats to any organization’s infrastructure. It’s just one word: complexity.

Complexity is the absolute enemy of security and productivity. The simpler you can make your productivity and security solutions, the easier it will be for IT to manage and secure—making the user experience that much more elegant and useful.

Microsoft bans swearing on Skype, in email, Bing and Office 365 docs

Microsoft bans swearing on Skype, in email, Bing and Office 365 docs

Microsoft has advised users of upcoming changes to its services' terms-of-use agreement that will make it a potentially account-closing offence to use offensive language on Skype or in a Word document.

The tweaked agreement, which comes into effect on May 1, 2018, includes the following new code-of-conduct item:
Don’t publicly display or use the Services to share inappropriate content or material (involving, for example, nudity, bestiality, pornography, offensive language, graphic violence, or criminal activity).
And if you disobey?
If you violate these Terms, we may stop providing Services to you or we may close your Microsoft account.

Protect Your Business: 10 Digital Security Strategies to Counter Threats

Protect Your Business: 10 Digital Security Strategies to Counter Threats

Want to strengthen your digital security? In this note to small and medium businesses, we offer 10 strategies to help you better protect your business.

In general, we only hear about serious digital security breaches when they affect celebrities or when it comes to cyberattacks targeting large multinational organizations.

Getting the best connectivity and performance in Office 365

Getting the best connectivity and performance in Office 365

Traditional enterprise networks are designed primarily to provide users access to applications and data hosted in company operated datacenters. A secondary use has been as a gateway for access to the Internet for communications and web browsing. In this model, there is minimal or no network security between users and the company operated datacenters, and a substantial security perimeter between users and the Internet with many network devices such as firewalls, anti-virus scanners, data loss prevention, and intrusion detection devices.

Measure and grow engagement with group insights in Yammer

Measure and grow engagement with group insights in Yammer

Yammer helps you engage employees across organizational groups, form communities and run cross-company initiatives. Community managers play a large role in creating and nurturing groups for these purposes. We want to empower community managers to make better decisions around their efforts on Yammer by helping them better understand the activity happening in their groups.

Plan your permissions strategy

Plan your permissions strategy

An effective permissions strategy will enhance the manageability and performance of your site, ensure compliance with your organization’s data governance policies, and minimize the cost of maintenance for you and your organization.

Why strategize?
Most websites are created speedily, with the aim of solving a particular problem or getting a specific set of information to people who need it quickly.

Introducing Microsoft 365

Introducing Microsoft 365

To address the commercial needs from the largest enterprise to the smallest business, we are introducing Microsoft 365 Enterprise and Microsoft 365 Business.

Microsoft 365 Enterprise is designed for large organizations and integrates Office 365 Enterprise, Windows 10 Enterprise and Enterprise Mobility + Security to empower employees to be creative and work together, securely.

New Office 365 capabilities help you proactively manage security and compliance risk

New Office 365 capabilities help you proactively manage security and compliance risk

Missing a key security signal could mean not catching a breach, but the number of security signals is increasing exponentially. It’s becoming impossible to manually prioritize them. That’s why Office 365 applies intelligence to help you proactively manage risk and ward off threats.

How to Deal with Ransomware

How to Deal with Ransomware

What is Ransomware?
Ransomware is a type of malware or virus that prevents user access to devices, files or applications, requiring the victim to pay a ransom (money or information) to regain access. The ransomware that we most often see encrypts the user’s files (for example: Crowti, Tescrypt and Locky) and then asks the user to pay a ransom in bitcoins (or similar payment method). If you would like to learn more about ransomware in general, you should take a look at the articles and blog posts listed under the references section at the end of this post.