sa.global

Tag

Security

Cybersecurity Awareness Month

As Albert Einstein said, “The world is a dangerous place…” and the same holds true for the Internet and the importance of Cybersecurity. In some form or another, we are all connected to the internet, whether it’s via our smartphones or the computer by which you are reading this blog….

As Albert Einstein said, “The world is a dangerous place…” and the same holds true for the Internet and the importance of Cybersecurity. In some form or another, we are all connected to the internet, whether it’s via our smartphones or the computer by which you are reading this blog….

Calling the world on Microsoft 365 Phone System

For a long time, Microsoft has quietly supported an enterprise-level business phone system. The evolution of this beginning in Lync, migrating to Skype for Business and finally concluding with Teams and their Microsoft 365 Phone System. Skype for Business & Teams has had a lot of media coverage for their…

For a long time, Microsoft has quietly supported an enterprise-level business phone system. The evolution of this beginning in Lync, migrating to Skype for Business and finally concluding with Teams and their Microsoft 365 Phone System. Skype for Business & Teams has had a lot of media coverage for their…

Deployment Strategy For Power BI App Workspaces

Power BI App Workspaces have come a long way over the past couple of years. New features provide powerful methods for deploying reports; centralizing the heavy lifting around data modeling, while still giving users the ability to share reports and self-service reporting. Having a good strategy for organizing App Workspaces…

Power BI App Workspaces have come a long way over the past couple of years. New features provide powerful methods for deploying reports; centralizing the heavy lifting around data modeling, while still giving users the ability to share reports and self-service reporting. Having a good strategy for organizing App Workspaces…

How Microsoft 365 can help you work with your remote team

Back in March 2020, COVID-19 hit several states hard and rushed many businesses into figuring out how remote workers fit into their overall company strategy. It was commonplace at that point in time to see posts online from IT teams asking what solutions everyone else was using or how to…

Back in March 2020, COVID-19 hit several states hard and rushed many businesses into figuring out how remote workers fit into their overall company strategy. It was commonplace at that point in time to see posts online from IT teams asking what solutions everyone else was using or how to…

Is it still a data breach when someone gives the attacker the keys?

It is safe to assume that, if you are reading this blog, you have received one of those spam messages that state something like “here is your voicemail” or “see attached invoice”. What these emails have in common is that they are most likely sent from a legitimate account that…

It is safe to assume that, if you are reading this blog, you have received one of those spam messages that state something like “here is your voicemail” or “see attached invoice”. What these emails have in common is that they are most likely sent from a legitimate account that…

WFH Safety & Best Practices

On December 31st 2019, China reported its first case of COVID-19 (LINK). Less than a month later WHO declared it an international public health hazard and many of us didn’t fully comprehend the impact it would have on our daily lives then. Now, 3 months into this world pandemic, we have…

On December 31st 2019, China reported its first case of COVID-19 (LINK). Less than a month later WHO declared it an international public health hazard and many of us didn’t fully comprehend the impact it would have on our daily lives then. Now, 3 months into this world pandemic, we have…

Multi-factor authentication in Office 365

Multi-factor authentication is a necessity these days.  As mentioned in our previous blog post (LINK), scammers are actively trying to gain access to end-user mailboxes for their own malicious activities. Most people think of this attack as hacking, but this couldn’t be further from the truth; often access is gained…

Multi-factor authentication is a necessity these days.  As mentioned in our previous blog post (LINK), scammers are actively trying to gain access to end-user mailboxes for their own malicious activities. Most people think of this attack as hacking, but this couldn’t be further from the truth; often access is gained…

Musings on security

We at sa.global take our and our customers’ digital security safely. We feel, though, that one of the best ways to improve digital security on a global scale is by improving everyone’s knowledge on the subject. To that end, we’ve made the following posts about various aspects of security. Multi-factor…

We at sa.global take our and our customers’ digital security safely. We feel, though, that one of the best ways to improve digital security on a global scale is by improving everyone’s knowledge on the subject. To that end, we’ve made the following posts about various aspects of security. Multi-factor…

Life with YubiKey; Physical Security Tokens – It’s not there yet

Back in 2018 Google announced the Titan security key with overwhelming internal success. Since Microsoft hasn’t entered this market yet, we thought we’d give the leading 3rd party provider, YubiKey, a spin. YubiKey is a physical access token that plugs into the USB port of your computer. When a website…

Back in 2018 Google announced the Titan security key with overwhelming internal success. Since Microsoft hasn’t entered this market yet, we thought we’d give the leading 3rd party provider, YubiKey, a spin. YubiKey is a physical access token that plugs into the USB port of your computer. When a website…

Custom Background with Office 365 login portal

Here’s a security tip that you can implement in just a couple minutes that will help protect your Office 365 environments from phishing attacks. The attack looks like this: A scammer sends your users an email that looks like something from Microsoft, asking them to log in (using their login…

Here’s a security tip that you can implement in just a couple minutes that will help protect your Office 365 environments from phishing attacks. The attack looks like this: A scammer sends your users an email that looks like something from Microsoft, asking them to log in (using their login…