Entries by Bob Appleby (1518)

Thursday
Apr042024

Searching in Outlook

Since Office 365 and version 2019 has been released, the capabilities of the Outlook Search function has greatly improved. To get started look for the Seach field at the top of the Outlook screen. This will get you started. Also, take a look at Microsoft’s Support page located here. This will provide you with the syntax you can use to further detail your search criteria to the results you are looking for.

Wednesday
Apr032024

BE WARY OF INBOUND EMAILS THAT CONTAIN ENCRYPTED .PDF FILES

By now, everyone’s antennae should stand at attention whenever an email lands in your inbox that has a file attachment. The latest attempt to install malware onto computers via email phishing campaigns is courtesy of the Russian hacking crew “Coldriver”. The email possesses an encrypted .PDF file that the recipient is urged to open – the hackers respond to the plea for help to receive the decryption password they reply with a malicious hyperlink that downloads/installs malware onto the recipient’s machine.
Monday
Apr012024

Apple device owners are being targeted for password reset requests

A report coming through The Register is reporting that Apple device owners are being targed by a multi-factor authentication bombing campaign.

This isn't anything new that is occurring but an ongoing issue as one of the methods of phishing attempts to trick you into sharing your password with bad actors. But according to The Register Apple device owners are being targeted and should be more aware of this happening to you.

Always check the e-mail address to help you determine whether information coming through is coming from a known source or not. But an even better way to protect yourself is never to use the links that are provided in an e-mail request to change or update a password. Always log into the site by typing in the URL yourself for the site that you are attempting to make any changes in. If the source of the request for a password change his real that message should show up as being generated at that site which you can check at that time.

Be careful not to give away any of your security lockdowns.

Friday
Mar292024

What should I consider when purchasing a new tablet?

This is an interesting question because there are a lot of things that you need to consider when purchasing a tablet. The first of course is which world you want to live in whether it is the Apple iOS environment or if you I want to be in the Android environment.

Next you need to decide whether or not you are willing to work only on Wi-Fi or whether you want the added capability of having Internet access through cell towers as well. Of course having wireless cell connectivity will cost you more but if you do need to have Internet access no matter where you're located then that might be an option that you need to consider. If you already have a cell phone understand that if you need to have cellular connection most cell phones do have the ability to act as a mobile hotspot and you can turn them into that as needed for your other Wi-Fi devices to utilize that connectivity. It is a matter of what your needs are and how comfortable you are in being able to switch back and forth between connectivity options with your cell phone.

The last thing you need to consider it's how you use the tablet. In other words what applications do you need to run to do the things that you like to do with your tablet. For example, I decided to go to an Android device from a company called Boox that produces a tablet that is mainly used for handwriting. The tablet screen is based on the same technology as the Kindle so it works well both indoors and outdoors, that's backlit so it's good in the dark, and has special hand touch recognition circuitry so that it lends itself to handwriting with a pen very well. But it's not good for primarily our videos. The screen is not responsive enough for that purpose. For most people this would not be a good choice because they all want to use the tablet has a portable video screen.

Another consideration is choosing A vendor who's device is more generic then specialized to allow you the greatest latitude of applications and functions for that device over time. I would consider a device from a company like Samsung over Amazon’s fire series for that reason unless do you like the integration with Amazon services that the fire tablets have built in.

Try to look for a tablet that has the newest version of the operating system available so that you get the longest functionality out of the device over time. Realize that the operating systems on these tablets have an end of life time that make them less usable years down the road. I have an old iPad 2 that I can currently only use with a short list of applications because it's not compatible anymore with most of the current video programs like Netflix, HULU and YouTube TV to extend you video streaming consumption. It's the issue we have with manufacturers building obsolescence into their system so you have to continue to purchase new ones over time.

I hope this helps with getting you started in making some decisions on what your best choices are in purchasing a new tablet for yourself.

Thursday
Jan182024

Sophos - Leader for the 14th Time

 

Threats change. Sophos continues to be recognized.

For the 14th consecutive time, Sophos has been named as a Leader in the 2023 Gartner® Magic Quadrant™ for Endpoint Protection Platforms.

We believe this ongoing recognition is a testament to our relentless innovation, deep threat expertise, and continuing adaptation that enables us to defend customers from even the most sophisticated adversaries.

Endpoint protection that works for you and with you

Sophos Endpoint delivers unparalleled threat protection and powerful EDR and XDR tools. Designed for real-world environments and real-world threats, highlights include:

 

  • CryptoGuard anti-ransomware protection that detects and rolls-back both local and remote ransomware attacks
  • 60+ exploit mitigations that are deployed automatically – no configuration required
  • Adaptive Attack Protection which automatically applies more aggressive protection when a device is under attack
  • Critical Attack Warning that identifies an active estate-wide attack and proactively notifies customers so they can take immediate preventative action

 

 

Wednesday
Jan172024

Sophos wins BIG in CRN's ARC Awards

Scott Barlow, VP of Global MSP, Cloud Alliances at Sophos, spoke about the company’s impressive performance in the 2023 CRN Annual Report Card Awards. Sophos emerged as the top winner in five security categories, including data security, extended detection and response (XDR), cloud security, and SMB and enterprise network security.
In a video interview with CRN, Barlow attributed the company’s success to its commitment to the channel and its partner programs. Sophos’ MSP program, cloud security program, and the Sophos Partner Program have been well-received by partners, who appreciate the ability to manage all their security solutions from a single portal.
Congratulations to Sophos on their well-deserved wins!

Learn More

Friday
Nov032023

Planned Power Outage, West Penn Power, Sunday 12a-6a, Eastern Westmoreland Area 

Per West Penn:

There will be a planned power outage during this coming weekend. West Penn Power will be performing work Sunday night, between 12:00 am and 6:00 am. Areas to be affected are New Alexandria, Latrobe, Derry and Blairsville.

 

Monday
Oct302023

DUCKTAIL Spread via Compromised LinkedIn Profiles

By Cluster25 Threat Intel Team
October 25, 2023

Linkedin has been targeted as reported above using LinkedIn messages as a vector for executing identity theft attacks.

If it’s not enough for North Korean and Iranian hackers using this ultra-popular professional networking web site for cyber espionage, other groups are using it to distribute malware. Cybersecurity experts have tracked a malware strain known as ‘Ducktail’ on the platform that is targeting Italian company employees. Hackers are leveraging fraudulent profiles that offer lucrative job via the platform’s messaging system. The email proclaims that an attached .PDF file contains job details - but contains the Ducktail malware to infect the recipient’s system(s).Worth a quick read to be aware!

Click Here to read the article.

Friday
Oct272023

Microsoft List-Field Types

Microsoft List supports various field types and options that enable users to customize their lists according to their needs. Some of the field types and options that are available are:

  • Text: This field type allows users to enter any text value, such as names, descriptions, comments, etc. Users can also specify the maximum number of characters allowed for this field type.
  • Number: This field type allows users to enter any numeric value, such as quantities, prices, ratings, etc. Users can also specify the minimum and maximum values allowed for this field type, as well as the number of decimal places to display.
  • Date and Time: This field type allows users to enter a date and/or a time value, such as deadlines, start dates, end dates, etc. Users can also choose to display only the date or only the time, or both.
  • Choice: This field type allows users to select one or more options from a predefined list of choices, such as categories, statuses, priorities, etc. Users can also specify whether the choices are displayed as a drop-down list, radio buttons, or checkboxes.
  • Yes/No: This field type allows users to indicate a yes or no answer, such as completed, approved, active, etc. Users can also choose to display this field type as a toggle switch or a checkbox.
  • Person or Group: This field type allows users to select one or more people or groups from the organization's directory, such as owners, assignees, members, etc. Users can also choose to display the name only or the name and email address of the selected person or group.
  • Hyperlink or Picture: This field type allows users to enter a URL or upload an image file, such as links to websites, documents, images, etc. Users can also choose to display the URL as a hyperlink or an image preview.
  • Lookup: This field type allows users to select one or more values from another list in the same site, such as products, customers, orders, etc. Users can also choose which column from the source list to display in the lookup field.
  • Calculated: This field type allows users to create a formula that calculates a value based on other fields in the same list, such as totals, averages, percentages, etc. Users can also choose the data type and format of the calculated value.
  • Location: This field type allows users to enter a physical address or a geographic coordinate, such as locations, venues, coordinates, etc. Users can also choose to display the address as a map or a text.
Thursday
Oct262023

What is Microsoft List and How can I use it?

Microsoft List is a powerful tool that allows you to create and manage lists of data, tasks, events, and more. You can use Microsoft List to organize your work and personal life, collaborate with others, and access your lists from anywhere. Here are some of the benefits of using Microsoft List:

 

  • You can customize your lists with different views, filters, sorting, and formatting options.
  • You can integrate your lists with other Microsoft 365 apps, such as Teams, SharePoint, Outlook, and Power Automate.
  • You can use templates to create lists quickly and easily, or start from scratch and build your own.
  • You can share your lists with others and control their permissions and access levels.
  • You can use smart rules and alerts to automate workflows and get notified of changes or updates.

 

Microsoft List is a versatile and flexible solution that can help you manage your information and projects more efficiently and effectively. To learn more about Microsoft List, visit https://www.microsoft.com/en-us/microsoft-365/microsoft-lists/lists-app

Wednesday
Oct112023

Two-Factor Authentication (2FA) in Office 365: A Shield for Your Data

In the digital age, data security is paramount. Office 365’s Two-Factor Authentication (2FA) provides an extra layer of protection to ensure the safety of your personal and work files.

When you set up 2FA, you add an extra layer of security to your Microsoft 365 account sign-in. After entering your password, you’re prompted to provide a second form of authentication, such as a verification code provided by an authenticator app or sent to your phone.

The benefits of implementing 2FA in Office 365 are manifold1. It offers an additional layer of protection from unauthorized access, mitigates phishing threats, and is more efficient than traditional passwords. A maximum passcode entry limit prevents cybercriminals from hacking and accessing sensitive data.

Moreover, the process is manageable and user-friendly. There’s no need for a hardware token generator, and SMS authentication is the most common method of implementation.

In conclusion, setting up 2FA in Office 365 not only simplifies the user experience but also significantly enhances data security. It’s a small step towards safeguarding your digital assets but a giant leap in fortifying your online security.

Friday
Oct062023

Comparison Scores for the Account Health Check

The Account Health Check capability makes it easy for Sophos Endpoint and Server users to optimize their security posture and has already proved hugely popular. We continue to extend this feature, and customers can now compare their own health scores with the average scores of other organizations with a similar number of devices, providing context and motivation for improvement.

In the example below, the customer has an overall score of 49 which is well below the average score of 97. Customers can also compare each of the individual health check scores (e.g., protection installed, policies) to identify where to focus. The drop-down on the right enables users to select their desired comparison cohort.

Thursday
Oct052023

Continued Industry Recognition

Sophos Endpoint continues to garner high praise from experts across the industry, and recent recognition includes:

  • 100% Total Protection Score and two AAA awards in the SE Labs Q2 Endpoint Protection report. Sophos detected and stopped  both commodity, real-world cyberattacks and simulated targeted attacks with 100% accuracy
  • Sophos named a Leader by Frost & Sullivan in their inaugural XDR Radar Report
  • Sophos awarded Best Endpoint Security in the CRN® Tech Innovator Awards
  • Sophos named a Leader in the 2022 Gartner®️ Magic Quadrant™️ for Endpoint Protection Platforms

To learn more about Sophos Endpoint and start a free trial for yourself, visit our website or speak to your Sophos representative or partner.

Gartner, Magic Quadrant for Endpoint Protection Platforms, Peter Firstbrook, Chris Silva, 31st December 2022

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, Magic Quadrant is a registered trademark of Gartner, Inc. and/or its affiliates and are used herein with permission. All rights reserved.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Wednesday
Oct042023

Introducing the Sophos Incident Response Services Retainer

With tangible ‘readiness’ now a key component for cyber resilience, I’m excited to announce the launch of the Sophos Incident Response Services Retainer. It provides all organizations (whether an existing Sophos customer or not) with speedy access to Sophos’ industry-first fixed-cost incident response service in the event of a breach.

The retainer also includes external vulnerability scanning and critical preparedness guidance, enabling organizations to proactively improve their security resilience by pinpointing and resolving issues that reduce the likelihood of a breach in the first place.

Every Minute Counts

The need for go-to incident response support that can activate immediately has never been higher, as revealed in the latest analysis of Active Adversary behavior by Sophos X-Ops:

  • The median dwell time in ransomware attacks fell from nine days in 2022 to five in the first half of 2023
  • Attackers take just 16 hours on average to reach Active Directory (AD)
  • 90% of ransomware attacks occur outside standard weekday business hours

The Sophos retainer cuts red tape, allowing Sophos incident responders to quickly jump into active cyberattacks to investigate and remediate them, minimizing business impact.

The Importance of Preparedness

Planning and preparedness are complementary elements of an incident response strategy. Having a plan is essential, but you also need to be prepared to implement that plan at short notice – and as the research shows, more likely than not outside standard working hours. The Sophos Incident Response Services Retainer gives you on-demand access to a team of incident response experts that will rapidly stop active attacks and get you back to normal operations.

Reducing Cyber Risk for All Organizations

The Sophos Incident Response Services Retainer is available to non-Sophos organizations as well as customers already using Sophos’ endpoint, XDR, network, email, and other security products, or Sophos MDR Essentials. Endpoint configuration health checks and device audits are also included in the retainer for existing Sophos customers.

Organizations that prefer broader services in one package can purchase Sophos MDR Complete, which automatically includes full-scale incident response.

To learn more about this exciting new service, read the Service Brief and speak to your Sophos representative or partner.

Tuesday
Oct032023

Coming Soon: Critical Attack Warning in Sophos Central

Adaptive Attack Protection came to Sophos Endpoint earlier this year, automatically deploying an elevated level of protection if adversary activity is detected on a particular device. Coming soon, the new Critical Attack Warning extends Sophos Endpoint’s context-sensitive defenses with an estate-wide approach that alerts if adversary activity is detected across multiple devices in the customer’s environment.

When the Critical Attack Warning threshold is met, an alert will be sent to all admins in the Sophos Central account to inform them of the situation and provide attack context and details. Customers can respond themselves using Sophos XDR, seek assistance from their partner, or engage the Sophos Incident Response team, all from within Sophos Central

We’re planning to make Critical Attack Warning available to all customers running Sophos Intercept X Advanced and Sophos XDR via a staged roll-out, due to begin later this month.

Thursday
Sep212023

New Layout option in Microsoft Edge

 

 published 

 

Tuesday
Sep192023

Celebrating National IT Day: A Tribute to the Tech Heroes

Today, September 19, 2023, is National IT Day, a day to appreciate and thank the IT professionals who keep our digital world running smoothly. Whether it’s network engineers, system administrators, database admins, ethical hackers, or any other type of IT expert, they all deserve our recognition and gratitude for their hard work and skills.

IT professionals are the backbone of any modern organization, as they ensure that the computer systems, networks, databases, and software are functioning properly and securely. They also troubleshoot problems, provide technical support, implement new solutions, and constantly update their knowledge and skills to keep up with the ever-changing technology.

IT professionals are not only essential for businesses, but also for society as a whole. They enable us to communicate, learn, work, shop, play, and access information online. They also contribute to innovation, research, education, health care, entertainment, and many other fields that rely on technology.

IT professionals often work behind the scenes, without getting much recognition or appreciation for their efforts. They may have to deal with stressful situations, tight deadlines, complex challenges, and demanding customers. They may also have to work long hours and adapt to changing environments and expectations.

That’s why National IT Day is a great opportunity to show some love and appreciation to the IT professionals in our lives. Here are some ways you can celebrate National IT Day:

  • Send a thank-you note or email to an IT professional you know or work with. Express your gratitude for their service and support.
  • Share a positive review or testimonial about an IT professional or an IT company on social media or online platforms. Highlight their achievements and skills.
  • Buy a gift card or a treat for an IT professional you know or work with. Surprise them with something they like or need.
  • Learn something new about IT or technology. Watch a video, read an article, take a course, or attend a webinar. Expand your knowledge and skills.
  • Support IT students and aspiring IT professionals. Mentor them, offer them advice, connect them with opportunities, or donate to scholarships or programs that help them pursue their education and career goals.

National IT Day is a day to celebrate the tech heroes who make our lives easier and better. Let’s show them how much we value and respect them. Happy National IT Day!

Wednesday
Aug302023

Mom’s Meals issues “Notice of Data Event”: What to know and what to do

If you are a subscriber to Mom's Meals You will want to read this article from Sophos naked security website.

Wednesday
Aug302023

Business OneDrive Storage change

The size of storage subscriptions, however, just significantly shrank, at least for OneDrive users. Microsoft no longer options unlimited cloud storage as part of OneDrive for Business plans. Instead, the default limit is 1TB per user.

There are some options for up to 5TB of storage per user, but those are limited to certain customers. In order to qualify, an organization needs to have five or more users with a OneDrive for Business subscription, specifically plan 2. Even then, there is an initial limit of 1TB per user, but admins can increase that to 5TB per user.

"In response to customer demand, Microsoft has streamlined the purchasing process for customers who use OneDrive for Business standalone plans,” said Microsoft to TechRadar. “Customers currently on these plans will still be able to add seats and renew their license.”

Microsoft's statement explains that organizations with a current OneDrive for Business (Plan 2) subscription can continue to keep that option. Those organizations will even be able to add seats and renew their license. The change appears to only affect new subscribers, who will no longer be able to sign up for a plan with unlimited cloud storage.

TechRadar spotted that the change occurred at some point between July 14 and July 28 this year. Microsoft's website for OneDrive for Business subscriptions now only lists OneDrive for Business (Plan 1). There are also Microsoft 365 subscriptions that include cloud storage, but those are also limited to 1TB per user.

Thursday
Aug102023

How to make a video using Microsoft Stream

Samantha Bahrini, a product manager at Microsoft, walks through the steps of using Microsoft Stream to create and share a how-to video at work. This video shows you how to open Stream and then set up the recording so that you are in the corner speaking to, or referencing, the content on your shared screen. Next it walks you through adding text onscreen to the recording, saving the video, and lastly, adding a title, description, chapters and a transcript. Recording a how-to video in Stream is simple and helps you quickly transfer knowledge at work.