Microsoft Offers Multi-Factor Authentication to All Users of its Office 365 Suite

Microsoft Offers Multi-Factor Authentication to All Users of its Office 365 Suite

Multi-factor authentication has been available for administrative roles since June 2013, however, Microsoft recently added multi-factor authentication for all users of its Office 365 suite. “The multifactor authentication increases the security of user logins for cloud services above and beyond just a password,” Microsoft said. The company will also bring multi-factor authentication to Office 2013...

avatar
Duleep Pillai
February 13, 2014
Discover More
Microsoft Offers Multi-Factor Authentication to All Users of its Office 365 Suite

Make Sure Your IT Department Safeguards Your Technology to Avoid HIPAA Security Breaches

The HIPAA Security Rule was enacted in 1996, designed to establish national standards to protect individuals’ electronic personal health information (PHI) used and/or stored by a covered entity. Many healthcare organizations have complex technology environments, thus making it difficult for healthcare providers and business associates to comply with the HIPAA Security Rule policies and procedures....

avatar
Duleep Pillai
February 12, 2014
Discover More
Microsoft Offers Multi-Factor Authentication to All Users of its Office 365 Suite

ATM Operators Must Migrate Away from Windows XP As Soon As Possible

Automated teller machines, commonly known as ATMs, are essentially computers. While they’re not traditional PCs, there’s a user interface, a screen, a processor, various hardware, and an operating system. Did you know most financial institutions are running Windows XP on their ATMs? This is a recipe for disaster when it comes to the end of...

avatar
Duleep Pillai
February 10, 2014
Discover More
Microsoft Offers Multi-Factor Authentication to All Users of its Office 365 Suite

The Benefits of Outsourced IT Support and What to Look For in an IT Provider

As a business owner, the decision between outsourcing vs. in-house IT support can be difficult and time consuming. Ultimately, you want to choose the most effective way to support your IT systems and end-users. But how do you know which option is the most effective for your business? Let’s start by defining the word “outsourcing,”...

avatar
Duleep Pillai
February 3, 2014
Discover More
Microsoft Offers Multi-Factor Authentication to All Users of its Office 365 Suite

How To Create A Social Media Policy For Your Employees

Acceptable vs. Unacceptable Social Media Behavior Social media is extremely popular for consumers and businesses alike. A well-structured social media plan can be powerful when successfully launched, but it can also become a disaster if employees aren’t knowledgeable about acceptable and unacceptable social media behavior. Many business owners struggle when developing policies to make sure...

avatar
Duleep Pillai
February 2, 2014
Discover More