Ways to Learn New Microsoft Technology and Stay Current

In the many Microsoft Partner and customer meetings I am in each week, I am often demonstrating and telling stories about how Microsoft technologies can enhance our personal and professional lives. With the latest Microsoft cloud applications I focus on, I find many people are intrigued by the truly unique innovations our products contain. The…

0

Phishing Examples for the Microsoft Office 365 Attack Simulator – Part Three

This is the third post of a multi-part blog with examples to use as part of a phishing simulation in the new Microsoft Office 365 Attack Simulator tool. For background information on the tool and this blog series, click on Part One below. Phishing Examples for the Microsoft Office 365 Attack Simulator – Part One…

0

Phishing Examples for the Microsoft Office 365 Attack Simulator – Part Two

Examples of Phishing Emails for the Microsoft Office 365 Attack Simulator – Part Two This is the second post of a multi-part blog with examples to use as part of a phishing simulation in the new Microsoft Office 365 Attack Simulator. For background information on the tool and this blog series, click on Part One…

0

Phishing Examples for the Microsoft Office 365 Attack Simulator – Part One

Why would you want to simulate a phishing attack on your own organization? Email hygiene filters work wonders, effectively identifying and blocking a substantial portion of email sent across the global Internet as SPAM or containing malicious content. Even with such a high rate of filtering success, as in life nothing is perfect, and this…

0

Enable Users to Easily Submit Junk, Phishing, and SPAM Messages in Outlook

The email security analysis capabilities in Microsoft Office 365 are unmatched in the industry, offering subscribers the best protection available from email categories such as junk, SPAM, phishing, malicious, etc. But, from time to time a message will slip through that should have been classified as SPAM. If you are a Microsoft Managed Service Provider…

0

Configure Microsoft Cloud App Security to Analyze SonicWall Logs

One of the greatest dangers for any network today is not knowing what applications are running within its boundaries and how the data could be leaking externally. These applications are often installed by users not knowing the potential hazards these applications may cause, malicious applications that have somehow entered the network, or a combination of…

0

Skype for Business Online Calling – Designing a Local Call Backup Route

Moving Private Branch Exchange (PBX) calling services to the cloud is now a common part of a digital transformation to Microsoft Office 365. Moving all calling services to the Microsoft Cloud often results in the partial or full removal of on-premises PBX equipment, a reduction in operational costs and far easier administration. Even with a…

0

Part 3: Planning a Migration from Avaya to Microsoft Skype for Business or Teams

I recently published a blog about planning a migration from an Avaya PBX to Microsoft Skype for Business on-premises and/or in Office 365. In that blog, I referenced several newly certified and very feature rich migration tools now available to streamline migrations from a variety of legacy TDM and IP-PBX environments to Microsoft Skype for…

0

Part 2: Planning a Migration from Avaya to Microsoft Skype for Business or Teams

I recently published a blog about planning a migration from an Avaya PBX to Microsoft Skype for Business on-premises and/or in Office 365. In that blog, I referenced several newly certified and very feature rich migration tools now available to streamline migrations from a variety of legacy IP-PBX environments to Microsoft Skype for Business (or…

0

Skype for Business Phone Deployment and Management Tools

As you plan your migration to Skype for Business from a legacy PBX, one of the areas to research and plan are end user voice devices. This involves deciding how many desk phones and headsets to purchase, what features are required, which manufacturer, what models, etc. A question often over looked with desk phones is…

0