How to setup Multifactor / 2 factor authentication on office365 Outlook Email

Set up 2-step verification for Office 365

Once your admin enables your organization with 2-step verification (also called multi-factor authentication), you have to set up your account to use it.

By setting up 2-step verification, you add an extra layer of security to your Office 365 account.
When you sign in with your password, a code sent to your phone as a second verification that it is you and not someone else with your stolen password.

  • You will need to check if your admin has turn on multifactor authentication.
    If they haven’t, when you try to do these steps you won’t see the options in Office 365.
  • Sign in to Office 365 with your work or school account with your password like you normally do.
    The quickest was is https://portal.office.com
    After you choose Sign in, you’ll see this page:
Continue reading “How to setup Multifactor / 2 factor authentication on office365 Outlook Email”

Managed Services , cyber security and data protection

Sterling IT has been providing clients in Wetherill Park, Smithfield, surrounding suburbs, as well as the whole of Australia, Managed Services before it become a buzz word.

How do you check if your company’s and personal passwords have been breached and are for sale on the dark web?

Continue reading “Managed Services , cyber security and data protection”

Change and what to do in mandatory notifiable data breach regulations and notifications from 22nd February 2018 in Australia – NDB

The Australia Government is implementing a new initiative with regards to data security and privacy from 22nd Feb 2018, here in Australia.
If an Australia Business has been breached or lost data must report the incident to the privacy commissioner and notify their clients.

Continue reading “Change and what to do in mandatory notifiable data breach regulations and notifications from 22nd February 2018 in Australia – NDB”

How to disrupt attacks caused by social engineering – by Microsoft

(Copy – This post is authored by Milad Aslaner, Senior Program Manager, Windows & Devices Group. )

A decade ago, most cyber-attacks started with a piece of malware or a complex method to directly attack the infrastructure of a company.

Continue reading “How to disrupt attacks caused by social engineering – by Microsoft”