Recent updates
-
Microsoft Online Archive Introduction
Updated onArticleAn online archive mailbox can store older email messages in a way that they won't occupy space in your primary mailbox. If your primary mailbox is full, you won’t be able to send or receive mail until it is no longer full. The specialized online archive mailbox appears alongside your other mailbox folders in Outlook. You can manually move email messages by dragging and dropping them to the online archive.
To access your online archive, open the Outlook desktop application, or log into Outlook on the web (https://outlook.office.com/mail/).
Your Visible-IT Help Topics Email Archiving Microsoft Online Archve
-
Course: 2312 - Working Remotely 2
Updated onArticleGive the gift of cybersecurity! Take a few minutes to learn about the common holiday scams of 2023 and review some tips for enjoying the holidays safely. Best wishes from your friends at Infosec!
Additional Information Visible-IQ Security Awareness 2023 Course Catalog
-
Installing Microsoft Authenticator
Updated onWorkflowPlease note the instructions included on this page are for setting up MFA for Office 365 for Work on your mobile device. If your organization has a policy that prevents you from installing work related applications on your device please contact your supervisor.
Additional Information Reference Information
-
MFA Enrollment for Microsoft Office 365
Updated onArticlePlease note the instructions included on this page are for setting up MFA for Office 365 for Work on your mobile device. If your organization has a policy that prevents you from installing work related applications on your device please contact your supervisor.
Additional Information Reference Information
-
Fluid Networks Managed Network Security Components
Updated onChecklistClients who are under a fully managed Agreement benefit from a number of network security protections just by having our standard Endpoint Security and Firewall technologies deployed. In addition, we have numerous enhancements we can deploy to complement our standard security protections. See below for an exhaustive list of how Fluid Networks protects your computers, servers and networks when you sign up for a fully managed network environment with us.
Your Visible-IT Help Topics Managed Services Hub What's Included with All-in Seat Price Managed IT
-
Banners: Business Email Compromise
Updated onArticleThroughout the past few years, there has been an increase in business email compromise attacks, which typically spoof CEOs' and CFOs' email addresses to initiate wire transfers, request small-dollar gift cards for charity events, or reward staff for their work. In these cases, the email is typically coming from an executive at the organization and is directed to either an executive assistant or to junior employees in his or her department. For example:
- David Smith <[email protected]>
- [email protected] <[email protected]>
Additional Information Visible-IR (Incident Response) Email Security
-
Banners: Known Address in Display Name
Updated onArticleDisplay name deception is the most common form of email spoofing and is often successful because many email clients (especially on mobile devices) show only the display name. With this kind of attack, criminals can insert the identity of a trusted address masking the real email address in use. Since common consumer mailbox services, such as Gmail and Yahoo, allow a user to specify any value in the display name, this type of attack is simple and cheap to stage from such a service. For example:
- David Smith <[email protected]>
- [email protected] <[email protected]>
Additional Information Visible-IR (Incident Response) Email Security
-
Banners: Company's Name Appears in Display Name
Updated onArticleSimilar to display name deception in this kind of attack, criminals can insert the identity of a company name or a trusted brand (such as the name of the bank used by the targeted individual) into the display name. Since common consumer mailbox services, such as Gmail and Yahoo, allow a user to specify any value in the display name, this type of attack is simple and cheap to stage from such a service. For example:
- Bank of America <[email protected]>
- Bank of America <[email protected]>
Additional Information Visible-IR (Incident Response) Email Security
-
Banners: Domain Look-Alike
Updated onArticleIn cases where a domain is protected by email authentication and domain spoofing is not possible, attackers try to deceive the recipient by registering and using domains that are similar to the impersonated domain. These types of attacks, known as lookalike domain attacks, often use homoglyphs or characters that appear similar to the original characters in the impersonated domain. For example:
- [email protected] vs DAVID.SMITH@G00GLE.COM (replacing letter O with number 0)
- [email protected] vs David.Smith@googIe.com (replacing lowercase L with uppercase I)
Additional Information Visible-IR (Incident Response) Email Security
-
Banners: Exact Display Name Impersonation
Updated onArticleDisplay name deception is the most common form of email spoofing and is often successful because many email clients (especially on mobile devices) show only the display name. With this kind of attack, criminals can insert the identity of a trusted individual (such as the name of an executive at the targeted company) or a trusted brand (such as the name of the bank used by the targeted individual) into the display name. Since common consumer mailbox services, such as Gmail and Yahoo, allow a user to specify any value in the display name, this type of attack is simple and cheap to stage from such a service. For example:
- David Smith <david.smith@google.com>
- David Smith <david.smith@yahoo.com>
Additional Information Visible-IR (Incident Response) Email Security