Email is the biggest threat vector used by cybercriminals as it’s the most efficient method to deliver and spread ransomware.
To ensure you, your staff and your school stay safe, we provide a number of options:
Our Anti-Spam solution can block Spam and Junk emails from filling up your inboxes. The Anti-Spam protection includes a detection engine and set of automated actions including Mark as Spam and Quarantine.
Our DLP solution provides the industry’s most advanced tools to identify and mark files containing confidential, financial, and personally identifiable information, including credit card numbers, National Insurance numbers and banking information.
We can set rules to state whether the content is quarantined, the user is alerted, and/or the file is encrypted.
Backups provide an additional layer of protection for your O365 data in case of a disaster, such as a cyber attack or malware. This ensures that you can restore your data and minimise downtime in case of an emergency.
For more information, please get in touch:
Frequently Asked Questions:
Phishing is a type of online scam where criminals pose as a trustworthy organisation to steal sensitive information such as passwords, credit card numbers, or other confidential information from unsuspecting victims. They usually do this through fake emails, texts, or websites that look similar to legitimate ones.
- Never share your passwords with anyone
- Never respond to emails that ask you to confirm personal information
- Never click on or open suspicious links or attachments
- If you’re taken to a login page or website, never attempt to log in or enter your personal information
- If it appears to be from someone you know contact the original sender by telephone or create a new email to ask them if the email is genuine
- Do not do anything the email tells you to do
- Report the email by clicking the ‘Report Message’ or ‘Report Phishing’ on the right hand side of the message:
- The email will then be sent to us for analysis. If the email is malicious, we can take action to prevent others from receiving the phishing attack
- Delete the email
- If you have entered any financial details, contact your bank immediately and tell them that you have been the victim of an email scam. Do not wait to contact us before doing this.
- If you have entered your school password, change your password immediately. If you have used this password on other accounts, change it on those as well.
- Contact us so we can advise you what to do next.
- Run a full antivirus scan on your computer or device.
- Data Protection: Backups provide an additional layer of protection for your O365 data in case of a disaster. This ensures that you can restore your data and minimise downtime in case of an emergency.
- Compliance: Many industries have regulations that require organisations to maintain backups of their data in case of an audit. Backing up O365 data helps organisations comply with these regulations.
- Retention: O365 provides a retention policy, but it may not be sufficient for an organisation’s needs. Backing up O365 data allows organisations to retain data for a longer period of time.
- Archiving: Backups can be used as an archive, allowing organisations to easily access historical data.
- E-discovery: In case of legal disputes, backups can be used to provide evidence in a timely manner.
This is a popular misconception. Microsoft only guarantee access to their services and not the data contained within them.
In Microsoft’s service agreement, which you have to agree to to use their products and services, they state:
We strive to keep the Services up and running; however, all online services suffer occasional disruptions and outages, and Microsoft is not liable for any disruption or loss you may suffer as a result. In the event of an outage, you may not be able to retrieve Your Content or Data that you’ve stored. We recommend that you regularly backup Your Content and Data that you store on the Services or store using Third-Party Apps and Services.
Microsoft’s Shared Responsibility Policy also states that:
For all cloud deployment types, you own your data and identities. You are responsible for protecting the security of your data and identities, on-premises resources, and the cloud components you control (which varies by service type).