Protect clients where they’re most vulnerable: email
With new communication options popping up monthly, email may look old fashioned to some. But five decades on, email is still the leading form of electronic communication. In fact, its use only continues to grow. More than 280 billion email messages were exchanged globally in 2018, and almost 350 billion are forecast by 2023. However, […]
How to set up security after assessing vulnerabilities with Office Protect
Office Protect is Sherweb’s in-house Microsoft 365 add-on designed to increase security risk assessment capabilities and baseline cybersecurity. It provides recommendations for best practice security settings as well as threat prevention, monitoring and reporting. In the most basic of terms, Office Protect helps organizations add an extra layer of defense against malicious attacks and unintentional […]
Manage PowerShell permissions and prevent unauthorized access
If you are an average computer user, it’s likely you’ve never even heard of PowerShell. However, if you’re an admin, a more tech savvy user, or a nefarious individual who wants to hack into other people’s systems, PowerShell scripting can be a powerful office tool. So what is it? What is PowerShell? Using PowerShell scripting […]
Monitor Microsoft 365 mailbox activity with audit logs
Do you ever wish you could monitor every activity in your inbox and intercept security threats? That would certainly be wonderful, but as a business owner, you're busy enough as it is. You barely have enough time for your main responsibilities, so how can you be expected to stay on top of security, too?Fortunately, you can with Office Protect's Mailbox Audit Logs Always On setting. This allows you to keep a close eye on all important mailbox activities without having to do so manually.
Office Protect Feature, Block Bad File Extension Attachments
Security is very important when you own a small business. After all, you wouldn’t let just anyone into your building, would you? And you definitely wouldn’t allow a stranger to enter your premises and bring an unknown object that could cause harm. Bad attachments are just the same when sent in an email. While we […]
