Category: News
How to setup Multifactor / 2 factor authentication on office365 Outlook Email
Set up 2-step verification for Office 365
Once your admin enables your organization with 2-step verification (also called multi-factor authentication), you have to set up your account to use it.
By setting up 2-step verification, you add an extra layer of security to your Office 365 account.
When you sign in with your password, a code sent to your phone as a second verification that it is you and not someone else with your stolen password.
- You will need to check if your admin has turn on multifactor authentication.
If they haven’t, when you try to do these steps you won’t see the options in Office 365. - Sign in to Office 365 with your work or school account with your password like you normally do.
The quickest was is https://portal.office.com
After you choose Sign in, you’ll see this page:
Managed Services , cyber security and data protection
Sterling IT has been providing clients in Wetherill Park, Smithfield, surrounding suburbs, as well as the whole of Australia, Managed Services before it become a buzz word.
How do you check if your company’s and personal passwords have been breached and are for sale on the dark web?
Continue reading “Managed Services , cyber security and data protection”Belong internet discount promo coupon code for new NBN installation
Looking for a new NBN Connection ?
If you are signing up to Belong internet, use the following discount code to get $20 off
IAFPK9LBG
or you can go direct to the page
https://www.belong.com.au/iaf?promo=IAFPK9LBG
Change and what to do in mandatory notifiable data breach regulations and notifications from 22nd February 2018 in Australia – NDB
The Australia Government is implementing a new initiative with regards to data security and privacy from 22nd Feb 2018, here in Australia.
If an Australia Business has been breached or lost data must report the incident to the privacy commissioner and notify their clients.
How to disrupt attacks caused by social engineering – by Microsoft
(Copy – This post is authored by Milad Aslaner, Senior Program Manager, Windows & Devices Group. )
A decade ago, most cyber-attacks started with a piece of malware or a complex method to directly attack the infrastructure of a company.
Continue reading “How to disrupt attacks caused by social engineering – by Microsoft”