Archive | October 2014

Outlook for Mac updated for Office365 Subscribers

Microsoft has released an updated Outlook for the Mac, which delivers improved performance and reliability and a fresh look and feel that is unmistakably Microsoft Office. This release offers a more familiar and consistent experience between Outlook on the PC, Outlook on the web and Outlook Web App (OWA) for iPad, iPhone and Android devices.

The new Outlook for Mac includes:

  • Better performance and reliability as a result of a new threading model and database improvements.
  • A new modern user interface with improved scrolling and agility when switching between Ribbon tabs.
  • Online archive support for searching Exchange (online or on-premises) archived mail.
  • Master Category List support and enhancements delivering access to category lists (name and color) and sync between Mac, Windows and OWA clients.
  • Office 365 push email support for real-time email delivery.
  • Faster first-run and email download experience with improved Exchange Web Services syncing.

01 Mail All Retina

OneDrive for Office365 users increasing from 1TB to “Unlimited”

This past July Microsoft expanded the OneDrive included with Office 365 subscriptions to 1 Terabyte. This was a move prompted by competition from DropBox and Google.  Now Office365 Home, Personal, and University subscribers will soon have no cap on storage for OneDrive with OneDrive for Business customers being upgraded in early 2015.

Source: OneDrive Blog

Microsoft launches Skype Qik video chat app

The Skype team at Microsoft has released a new companion app. Often the actual intent of a text based message is indeed lost. There are a host of short video messaging apps out there but now we have an option from a business focused company that works alongside a business class application.

Download here:




Source: Skype Blog

The weakest link in Two Factor Authentication: Your Phone

When we configure Two Factor Authentication for customers the most convenient way to do it is using SMS or an app on their phone. You almost always have your phone with you and its easy to use as second form of authentication. However many users do not have their phone secured. If your phone has any authentication methods tied to it, or has any important data on it for that matter you need to secure it with a PIN. While a PINB adds a delay in accessing your phone it ensures someone who picks up your phone cannot easily use it to circumvent your Two Factor Authentication.

Two Factor Authentication, what it is and why you should use it

Think no one can guess your password? Maybe not but the likelihood is more on the side of “maybe so.” Adding a “Two-Factor Authentication” will better protect you and your online life. Enabling these services adds an extra layer of protection to your accounts.

You can also think of them as deadbolts to your online house. These features significantly improve the security of your accounts because they require something only you will know or have, like a personalized code or PIN and your phone.

Even if your password gets stolen, it will be more difficult for someone to access your account if you’ve enabled these services.

Two-factor authentication (also referred to as two-step or multi-factor authentication or verification or 2FA) is an overly technical-sounding term for a simple solution.

It’s a security tool that uses multiple verification techniques to prove that the person attempting to log onto an account is really them.

Some of these methods include:

  • Something you know: a password, code, passphrase or PIN
  • Something you have: a physical token, chip, fob, or phone

These methods provide an extra layer of security. Most people only have one layer – their password – to protect their account. But combining something you know (your password) with something you have (your phone, token, etc.), makes your account even more secure.

There’s no universal method, but most web services that offer account protection beyond the password require the use of a phone, email account, physical device (token, chip, fob, etc.), texting service, your knowledge of a social networking account, etc.

Here’s how many services typically work:

  1. You enter a phone number or an alternate email. (This is a way for the online service to contact you when you want to access your account.)
  2. The service provider generates and sends you a verification code. This code is only good for one use – otherwise it would be just like a password!
  3. Once you receive the code, you enter it in, along with your username and password and gain access to your account. (This step can vary depending on the web service you’re using.)

Here are step-by-step instructions on some popular platforms:

Email Providers:

Social Networks:

Change your DropBox password immediately

Dropbox users should update their passwords and enable two-factor authentication. A hacker is claiming to have collected 7 million usernames and passwords.

To change your password, log in to your Dropbox account, click on your name and choose “settings.” Then, click on the security tab. If you have not already configured it, configure for two factor authentication.

At this time Dropbox states they have not been hacked and that any information collected is from third party apps.


OneDrive for iOS8: PIN Support and more

A majority of mobile phone users are storing at least some data in the Cloud, with the explosion of growth Office365 many of our customers are storing sensitive information there and accessing it from their iPads and iPhones.

Microsoft has recently updated OneDrive for iOS8 to support a PIN. Enabling this feature will add another layer required to access your files with your OneDrive app for iOS. We cannot strongly enough stress the importance of securing company data that is accessible from private devices that can be easily lost or stolen.

In addition to this change Microsoft has made the app make better use of the new larger 4.7″ and 5.5″ iPhone 6 screen sizes.

Source: OneDrive Blog

Share large OneDrive files with

Many if not most mail services have a limit for attachments in the low megabytes. While there are a number of ways to move files this is certainly one of the easiest and with 15G free with every / OneDrive account its among the least expensive.

In order to send a large file with OneDrive simply upload the file to your OneDrive and then from choose Insert and then Share From One Drive. You will then be able to browse your OneDrive storage and select any file. The recipient of your email will then receive a link that they can download the file without needing a OneDrive account.


Source: Office Blogs

My computer is infected with what??

We have been asked for a cheat sheet to quickly explain some of the terms our staff and other companies staff are using are when explaining your workstation is infected:

Common types of Malware designed to harm your computer, such as viruses, worms, Trojan horses and rootkits.

  • A computer virus is a program that attaches itself to an application or “host file” and then spreads by making copies of itself. Some type of human action (e.g. opening an attachment) is always required for a virus to take effect. Once a virus gets onto your computer it might modify, delete, or steal your files, make your system crash, or take over your machine.
  • A computer worm is like a virus, but it infects other computers all by itself, without human action and without a host file. It usually infects other computers by sending emails to all the names in your email address book.
  • A Trojan horse is a program that tricks you into running it by appearing useful or harmless. However, once it is run it damages your computer, usually by providing “back door” access to the computer. This allows hackers to control or use your computer, destroy or steal files, install viruses or spyware, or run arbitrary programs.
  • A rootkit is a program that allows an intruder to gain access to your system without your knowledge by hiding what it is doing on the system. The intruder can then install difficult-to-detect back doors into your system to seize control.

Cyberattacks & Malware: The Culprit are working with you.

Everyone is aware of Malware and cyberattacks today. The media covers every credit card breach and every security loophole discovered. But the reality for many businesses is that the blame for security breaches lies inside the office. Criminals in faraway countries may design and launch the attacks, but their success is often due more to human error than technology.

While your business can and does implement technology to limit the companies vulnerability to a wide variety of attacks, technology isn’t your only line of defense. Numerous studies indicate that cyberattacks are often successful because company employees let the attackers in.

A 2014 study conducted by IBM found that in 2013, human error was involved at some level in more than 95 percent of security incidents. The most common “mistake” was an employee clicking on a malicious email link that compromised the corporate defenses in some way.

The very best defense today is employee vigilance. We cannot stress enough that each employee with access to company resources be aware of Malware and that you company have an email policy that helps employees determine unsafe emails.