Email rules

The SANS Internet Storm Centre Diary has an interesting, if technical, article about the use and misuse of email forwarding rules. Office 365 Mail Forwarding Rules (and other Mail Rules too) (sans.edu) Why is this of interest to you? As part of my MSc studies we looked at email attacks …

You must do this if you use Microsoft 365

Looking at an ransomware encrypted laptop

Do you want more security from ransomware? Michael, one of the support team over at Octagon Technology has written about one of the often overlooked steps by user of Microsoft 365. Microsoft 365 Security – Octagon Technology You should also look at their Pick-up and Go solution – 365R.

Triple AAA – the most important concept in information security

Authentication – Authorisation – Accountability For good security you must authenticate (A number one) who has access to your information. Then, once they have proven beyond a doubt who they are, that should authorise (the second A) them to access only that information they are entitled to and no more. …