22 Jan 2020

How phishers harvest Office 365 credentials


With over 150 million active subscribers, Office 365 is, unsurprisingly, on top of hackers’ minds. And now, hackers are using a technique that doesn’t even require users to give up their credentials. Learn how they do it and get protected.

A phishing scam that harvests users’ credentials

The latest cyberattack on Microsoft Office 365 involves harvesting users’ credentials. Scammers use this previously unseen tactic by launching a phishing message to users, asking them to click on an embedded link. What makes this scam more insidious than traditional phishing scams is that the URL within the message links to a real Microsoft login page.

How does it work?

The phishing message resembles a legitimate SharePoint and OneDrive file-share that prompts users to click on it. Once they do, they are taken to an Office 365 login page where they will be asked to log in if they haven’t already.

After they’ve logged in, they’ll be prompted to grant permission to an app called “0365 Access.” Users who grant permission effectively give the app […]

How phishers harvest Office 365 credentials2020-01-23T08:44:48-07:00
21 Jan 2020

Is Your Computer Being Held Hostage? What to Do.


Ransomware attacks happen more than you think, and cyber criminals are constantly cooking up new variations. Back up data; keep security up to date and take on those hackers! These are just a few tips you'll get in this blog. Cloud-based, advanced threat protection is important, too. Contact GeeksHD to learn how we deliver it with Office 365.

Is Your Computer Being Held Hostage? What to Do.2020-01-23T08:46:54-07:00
21 Jan 2020

How Confident Is Your Business In Recovering From A Breach?


Did you know that 90% of small businesses ignore data protection? Are you one of the 90%? Don't panic—we've got you covered. Check out this article for tips on how you can help your customers upgrade their security measures. And if you're looking for more on best-in-class cybersecurity solutions, our team at GeeksHD can help. Give us a call to get started today.

How Confident Is Your Business In Recovering From A Breach?2020-01-23T08:47:30-07:00
21 Jan 2020

Is Your Email System as Advanced as its Attackers?


Is your email system as advanced as its attackers? The cost of a data breach or other attack is more than you think. Office 365 Advanced Threat Protection and GeeksHD can help you stay ahead.

Is Your Email System as Advanced as its Attackers?2020-01-21T08:17:04-07:00
20 Jan 2020

Customer story: Landgren


For Swedish real estate company Landgren, technological innovation is their key to success. Without an IT department, the company struggled to protect its sensitive company data, especially as business grew. After adopting a comprehensive security solution from Microsoft 365 Business, Landgren was able to easily comply with strict European data privacy standards. With security standards met, company leaders were able to focus on improving mobility and facilitating collaboration among employees. Ready to take your security solution to the next level? Contact our team at GeeksHD for more.

Customer story: Landgren2020-01-23T08:49:20-07:00
20 Jan 2020

What you need to know about Android accessories


Did you know that you can connect a mouse to your Android tablet and use it as you normally would on a desktop computer? A mouse is just one of the many accessories supported by many types of Android devices. Depending on which accessory you use, you can make your device easier or much more fun to use.

USB keyboards, mice, and gamepads

Android phones and tablets don’t usually have standard, full-size USB ports, so you can’t plug a USB accessory directly into it. To connect such an accessory to the device, you’ll need a USB on-the-go (OTG) cable. This is a micro-USB adapter that you can purchase from any computer store for a couple of dollars.

From there, your accessories should work without needing any further configuration. In fact, USB OTG allows you to use other USB devices, such as a flash drive, with your Android device.

Keep in mind that not every Android device has the port that’s required to support USB OTG. This is the case with some […]

What you need to know about Android accessories2020-01-23T09:10:10-07:00
17 Jan 2020

Helpful Mac keyboard shortcuts you should be using


Pointing and clicking with a mouse is great. There are times, however, where using the mouse to perform simple tasks interrupts productivity and slows you down. Try these helpful Mac keyboard shortcuts to help you work more efficiently.

Minimizing (or “Docking”) the front app window: Command + M

Use this combination when you have several apps, browsers, or Finder windows open and want to minimize the active one. To minimize all open windows at once, press Option + Command + M.

Closing an active window: Command + W

This shortcut lets you close active apps or programs like browsers, Finder, Thesaurus, or any app that allows multiple tabs to be open simultaneously. To close all tabs without quitting the program entirely, press Option + Command + W.

Quitting a program: Command + Q

Clicking the red X button in most Mac apps and programs, like Mail, only puts them in the dock. This shortcut lets you fully quit an application.

Force quitting a program: Option + Command + Escape

If an app becomes unresponsive, you […]

Helpful Mac keyboard shortcuts you should be using2020-01-23T09:10:02-07:00
15 Jan 2020

Guest Wi-Fi 101


People today expect Wi-Fi access when they’re visiting your office. However, setting up your Wi-Fi the wrong way can create a stressful experience for them. Additionally, this can also expose your confidential information to malicious hackers. So what’s the right way to do it?

Never give guests access to your primary Wi-Fi

Giving your guests access to your company’s main Wi-Fi connection might seem like a good idea, but you should avoid this at all costs.

Anyone with a little technical know-how can potentially access everything on your company network, including confidential data. In addition, if any of your visitors’ mobile devices have been compromised, it’s possible that they can transmit malware to your entire network.

Ways to create secondary Wi-Fi for guests

If your router comes with built-in guest Wi-Fi support (you can check this feature through a quick web search), you can use it to create a separate “virtual” network. This means guests will have access to the internet without directly connecting to your company’s primary network.

If your router doesn’t […]

Guest Wi-Fi 1012020-01-23T09:09:54-07:00
14 Jan 2020

Risk by the numbers: 15 cybersecurity stats that matter most to your business


You know that many small and mid-size businesses are unprepared for today's cyberthreats. Is your business prepared to weather any cyber storm? If you're not, don't worry, we can help. At [$profile.organization]*, we can ensure that you have the best weapons in your security arsenal. Check out these statistics to inform the conversation about how to ramp up your company's security measures.

Risk by the numbers: 15 cybersecurity stats that matter most to your business2020-01-23T09:09:45-07:00
13 Jan 2020

Quiz: How Secure Are You


How do you know if your company is secure or at risk of becoming a cybercrime victim? Take this 10-question quiz to find out and get tips for using Office 365, Windows 10 Enterprise and Enterprise Mobility + Security to address your most pressing security concerns

Quiz: How Secure Are You2020-01-13T17:07:59-07:00