• Facebook
  • Twitter
  • LinkedIn
  • OUR PARTNERS
  • TESTIMONIALS
  • BLOG
Contact Us: 0207 952 8123
Cloudscape
  • Cloud
    • Hosted Email
    • Hybrid Cloud
    • Online Backup
    • Private Cloud
  • IT Support
    • Apple Mac Support
    • Managed IT Support
    • Network Support
    • Ongoing Support
    • PC’s & Servers
  • Telecoms
    • Hosted VoIP
  • IT Services
    • IT Relocation
    • IT Projects
    • IT Consultancy
    • GDPR Services
  • Cyber Security
  • Contact
  • Menu Menu

Tag Archive for: IT Project Management

Tackle your business challenges head on – With Power Apps

in Cyber Security, IT Tips

“I wish I could find an app for that.”

We’ve all been there; you find yourself wishing you could automate-away menial tasks, but you can’t find solutions that do the job. Well, now thanks to Microsoft’s ‘PowerApps’ feature within Office365 you can dispense with menial tasks through the power of automation, freeing you up to focus on the stuff that matters!

Are efficient collaboration and workflow management a constant struggle in your business?

Well-honed work processes are fundamental to the smooth running of any business. Seamless, efficient and error-free work processes are the holy grail for many businesses and spending time implementing such processes will save you time and money in the long run.

Relying on a multitude of applications to achieve a simple objective is one of the common impediments to efficiency in the office. Many users of Office 365 are guilty of inflexibility when it comes to the use of the services and tools they have available to them; preferring to stick to the familiar legacy products. If this sounds like you, then you might want to invest time in exploring alternative tools that could ultimately transform the way your business operates for years to come.

Finding solutions that address seemingly complex processes may seem like a daunting task; it can be a challenge finding the tools that give the results you need and operate within your business’ specific requirements. You may want to consolidate data gathered on various platforms or improve your business’ operation by developing your own app but have no idea where to look to implement these changes… well, that’s where ‘PowerApps’ comes in.

Introducing PowerApps

In essence, PowerApps is a suite of resources that lets you and your team create applications that simplify and streamline cumbersome processes and modernise dated workflows. Increase agility, efficiency and improve productivity by building your own apps and do away with some of the inflexible, off-the-shelf applications you may currently be using.

Improve efficiency and minimise the error by letting your team construct and run an unlimited number of custom apps that simplify and speed up processes. Use visual tools to identify and tackle business-related issues, then tap into the value of your data using apps that help bring together and make sense of information stored in numerous locations.

Simplicity. ‘Developing apps’ may sound very complex and technical, but thanks to pre-made templates, the intuitive ‘drag and drop’ nature of the interface and the ability to deploy apps instantly, you don’t need a degree in Computer Science to develop your own apps with PowerApps. Instead, your team can start building almost immediately without the need for extensive training.

Innovation potential. Power Apps enable digital transformation through the implementation of apps for countless scenarios. Use both Canvas and Model-driven apps to address your business’ unique problems.

Customisation potential. The customisation potential of ‘Canvas Apps’ allows you to develop applications that are optimised for very specific tasks and job roles. You can develop apps for various platforms (mobile, desktop, tablet) and tailor every aspect to your requirements, right down to the smallest details.

Build apps that tap into your data. Create ‘Model-driven’ apps that use your current processes and data streams. Consolidate information from multiple sources and make sense of the data your business holds without having to endure the tedium of manual data entry.

Create Low-code websites. Create a visually attractive and immersive, low-code website for customers and potential customers to interact with. Utilise your data-based, model-driven apps and integrate them with Power BI reports, dashboards and charts to create impressive-looking, but ultimately simple to implement websites that are sure to impress external users.

The PowerApps suite will enable your team to streamline, innovate and improve efficiency like never before. So why not introduce it to your business and allow your team to develop simple, effective and customised solutions to your business’ unique operational challenges.

 

Struggling to find a solution that fits around your business?

At Cloudscape, we use our extensive experience to deliver custom-fit technology solutions to SMEs in London and the home counties. Technology should serve your business’ aims and aspirations, it shouldn’t be something to mould your operation around. We are experts in Cloud-computing and we know how empowering Cloud Services can be when leveraged correctly, so let us help you tailor Office 365 so that it works for your business and the unique challenges you face. Call us on 0207 952 8123 or send us an email info@cloudscape.it.

https://cloudscapeit.co.uk/wp-content/uploads/2020/06/3.jpg 303 807 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-07-06 07:00:592020-06-15 12:25:26Tackle your business challenges head on – With Power Apps

Criminals Exploit Pandemic with Brute-Force RDP Attacks

in Cyber Security, IT Tips

ESET is the latest security company to notice a sharp spike in RDP-based hacks over the last few months. The anti-malware company spotted a rise in the number of brute-force attacks using the remote access protocol, and said that cyber-criminals have been using it to distribute ransomware.

The Remote Desktop Protocol is a proprietary Microsoft protocol that allows people to access Windows from outside the network. Companies often leave their RDP ports open without taking proper security measures, ESET warned. That can lead to malware infections.

The company has tied the spike in attacks to the COVID-19 pandemic. With lots of office workers forced to log in from home, RDP has become a common way for them to access machines back at the office, it explained. It distributed a graph showing daily attacks against unique clients rising from just under 30,000 in December to over 100,000 during May.

ESET created a new detection layer that spots repeated login attempts from external environments. It adds offending IP addresses to a blacklist that it uses to protect all of its clients. For that to work, though, companies must enable the Network Level Authentication (NLA) RDP option on their servers. This is something that Microsoft has already recommended in the past as a protection against the BlueKeep worm that emerged last year, which exploited a vulnerability in RDP.

Other things you can do to protect yourself against RDP include disabling it altogether if you don’t need it, the company says, or at least creating access control lists that limit the number of users allowed to connect directly over the internet. Use strong, complex passwords for all accounts, along with multi-factor authentication, it advises. If possible, use a VPN gateway to broker all connections from outside your local network. We covered some protection techniques in April.

ESET isn’t the only company to have noticed a rise in RDP-based attacks. In March, Shodan noticed an uptick in the number of devices exposing RDP to the internet. A month later, Kaspersky reported the same thing, warning that the number of Bruteforce.Generic.RDP attacks had “rocketed across almost the entire planet” since March.

Exposed RDP problems are so bad that the FBI even warned about it in 2018, and reportedly sent out another warning this month to K–12 schools in the US about an increase in RDP-based ransomware attacks during the pandemic.

 

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

 

News Source: https://www.infosecurity-magazine.com/

https://cloudscapeit.co.uk/wp-content/uploads/2020/07/computer-programmer-using-computer-at-work-6DZFUU6.jpg 800 1200 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-07-01 11:57:482020-07-01 11:58:34Criminals Exploit Pandemic with Brute-Force RDP Attacks

Researchers Find New Calendar-Based Phishing Campaign

in Cyber Security, IT Tips

Researchers have once again spotted crooks using calendar invitations to mount phishing attacks. The Cofense Phishing Defense Center found the attack in enterprise email environments protected by Proofpoint and Microsoft, it announced last week.

The phishing scam uses iCalendar, which is a media type that lets users store and exchange calendaring and scheduling information, including events and tasks. iCalendar files are usually delivered with an .ics extension. The company found the attackers using this file with the subject “Fault Detection from Message Center,” from a sender with the display name Walker. It came from a legitimate account belonging to a school district, indicating that the attackers were using a compromised email. That enabled them to bypass email filters relying on the DKIM and SPF technologies that authenticate sending domains.

When the victim opens the .ics file, it proposes a calendar entry displaying the URL, along with a message saying that it is from a security center. The web page behind the URL is hosted on Microsoft’s SharePoint site, and displays another link to a phishing site hosted by Google that appears to show a Wells Fargo login page.

Victims gullible enough to cooperate must submit their login details, PIN and account numbers, along with their email credentials. Doing so hands the attackers the keys to the kingdom. The phishing site will then send them to the legitimate Wells Fargo website to quell any suspicion.

This may be a new campaign, but it is not a new technique. A similar attack cropped up last June, when Kaspersky found attackers using Google’s auto-add feature. In that attack, smartphone users would see the invitation as a pop-up invitation, displaying a link to a phishing URL that asked for their credit card data and personal information.

This attack shows that cyber-crooks are still using the same attack vectors to deliver their scam material. Cofense also points out that using legitimate domains designed to host user content is a common tactic, and a perennial problem for the likes of Microsoft and Google. It gives the attackers an air of legitimacy because they get to take advantage of these sites’ built-in SSL certificates, which add the reassuring green padlock icon to the side of the URL in a browser’s address bar.

 

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

 

News Source: https://www.infosecurity-magazine.com/

https://cloudscapeit.co.uk/wp-content/uploads/2020/07/computer-developer-working-with-computers-at-night-MD8HUP9.jpg 800 1200 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-07-01 11:57:002023-01-27 13:24:57Researchers Find New Calendar-Based Phishing Campaign

Online Learning Platform Exposes Data on One Million Students

in Cyber Security, IT Tips

Over one million North American students have had their data exposed after a popular online learning platform left it in a publicly accessible cloud database, according to vpnMentor.

Researchers from the firm claimed that the Elasticsearch database belonging to provider OneClass was left completely unsecured.

The trove contained over 27GB of data, amounting to 8.9 million records, including many students’ full names, email addresses, schools/universities, phone numbers, account details and school enrollment details.

Although OneClass secured the database just a few days after being notified on May 20 this year, it subsequently claimed that the exposed information was merely test data, according to vpnMentor.

“However, during our investigation, we had used publicly available information to verify a small sample of records in the database,” the researchers continued.

“Taking the PII data from numerous records, we found the social profiles of lecturers and other users on various platforms that matched the records in OneClass’s database. Based on this, we doubt the veracity of OneClass’s claim and stand by our assessment.”

It goes without saying that hackers could have conducted highly effective follow-on phishing emails with the exposed data, with a view to obtaining financial details from victims, or even spreading malware.

“Furthermore, OneClass users are very young — including minors — and will generally be unaware of most criminal schemes and frauds online. This makes them particularly vulnerable targets. It’s also likely many of them use their parent’s credit cards to sign up, exposing their whole family to risk,” vpnMentor explained.

“With so many students relying on remote learning due to coronavirus, OneClass could be experiencing a surge in new users. Hackers could quickly create fraudulent emails using the pandemic and related uncertainty as a pretext to contact potential victims, posing as OneClass and asking them to divulge sensitive information.”

That’s not to mention the reputational hit to OneClass itself and a potentially significant regulatory compliance burden. Headquartered in Toronto, the firm provides online education resources to millions of students in North America.

 

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

 

News Source: https://www.infosecurity-magazine.com/

https://cloudscapeit.co.uk/wp-content/uploads/2020/07/modern-man-working-remotely-on-a-computer-from-hom-MD83EXU.jpg 800 1200 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-07-01 11:55:212020-07-01 11:56:34Online Learning Platform Exposes Data on One Million Students

Businesses Lack a Workable Ransomware Recovery Strategy

in Cyber Security, IT Tips

More than a third of businesses do not have a ransomware emergency plan in place, or are not aware if one exists within their company.

According to research from Ontrack of 484 organizations, 39% either did not have or were not unaware of a ransomware strategy, while 26% admitted they couldn’t access any working backups after an attack.

“The threat of ransomware has never been greater” said Philip Bridge, president of Ontrack. “The fact that only 39% of respondents to our survey have an emergency plan in place for a ransomware attack is shocking. They are gambling with their and their customers’ data.

“It is imperative, now as ever, to ensure your organization has processes and procedures in place to mitigate the impact of any cyber-attack and protect sensitive data,” added Bridge.

As the third anniversary of the NotPetya attacks were marked at the weekend, David Grout, CTO of EMEA at FireEye, said NotPetya highlighted the need for resiliency, backup and preparation, as well as the importance of being able to track and identify the perpetrators and understand their motives.

“In terms of what can be done to mitigate the effects of these attacks, primarily, it is essential that patches are made available quickly and that they are widely adopted. If a discovered vulnerability can be exploited, it is highly likely that threat groups will use it, and continue to do so until it is fixed, inflicting untold damage,” he said.

“The NotPetya attack could have been mitigated by ensuring updates to software were regularly conducted, as well as thorough assessments of a given organization’s security, especially through simulated cyber-breaches.”

Speaking to Infosecurity, BH Consulting CEO Brian Honan said, with ransomware becoming an increasing concern for many organizations, he is seeing more businesses take steps to tackle the threat.

“However, many of these steps focus very much on the preventive aspect of security controls and in particular on ensuring effective anti-virus software is in place. While this is an important element in protecting against ransomware, organizations do need to take a more holistic approach to protecting their businesses and ensuring they can continue to function and recover from an attack should it happen.”

Honan recommended having robust data backup and data recovery strategies in place. “The key is to ensure business resilience in the event of a ransomware attack,” he said. “To achieve this, organizations should incorporate their incident response processes, for all cyber-attacks and not just for ransomware attacks, with their business continuity plan so they can continue to operate, while looking to recover from secure backups.

“A good backup strategy that is regularly reviewed, secured and tested to ensure the data can be recovered is one of the most effective defenses against ransomware.”

 

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

 

News Source: https://www.infosecurity-magazine.com/

https://cloudscapeit.co.uk/wp-content/uploads/2020/07/student-with-computer-studying-at-school-PM72WH3.jpg 800 1200 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-07-01 11:38:062024-05-15 14:26:06Businesses Lack a Workable Ransomware Recovery Strategy

Tackle your business challenges head on – With Microsoft Teams

in Cyber Security, IT Tips

Effortless internal communication is vital to any business but without the proper tools, it can be harder to achieve than you might think. That’s where Microsoft Teams comes in; as this comprehensive collaboration platform integrates with the office apps making communication and collaboration a breeze.

Is poor communication hindering your business’ productivity potential?

It’s easy to get complacent when it comes to internal communication. You may think you have it covered, but if you ever find yourself trawling through email threads trying to make sense of things and if misinterpretation and miscommunication is a common feature of your daily office life then you should consider using new communication platforms to make things easier.

Many users of Office 365 like to remain within the familiar territory of the trusty, familiar family of apps: word, excel, Outlook and PowerPoint. However, Office 365 also contains a plethora of other productivity, communication and efficiency-boosting tools that you should make the effort to become familiar with.

Email remains an indispensable communication tool and it will likely remain so for a very long time. It’s not without its flaws however, as keeping track of multiple email threads and managing attachments can be a confusing, and often a time-consuming ordeal. Sending files via email can be a minefield; expect the file type to be changed and say goodbye to the original as it undergoes multiple edits by various individuals throughout your business. It may eventually return to you unrecognisable but hopefully, it won’t have been renamed!

 

So, what’s the answer? Say ‘hello’ to Microsoft Teams

If you’re an Office 365 user look no further for all your communication and collaboration needs – Microsoft teams have you covered! It incorporates an extensive range of features and its seamless integration with the Office apps means Teams is the only internal communication platform you’ll ever need. Here’s a brief overview of the tools on offer within Teams:

  • Instant Messaging. Emails have their place, but when you just want a quick and easy informal discussion with your team they can prove slow and clunky. Teams’ instant messaging capability allows you to chat with your team both on an individual or group basis in real-time – from anywhere, on any device! The user-friendly chat interface makes keeping on top of conversations easy and simplifies the file-sharing process.
  • Live Document editing. By taking advantage of Office 365’s cloud capabilities, several members of your team can collaborate on a single document at the same time. This eliminates the risk of files disappearing into the Email abyss and lets you keep an eye on editing as it occurs. You know where your files are always because they never leave your control; they remain in the cloud and can easily be accessed through the chat interface. This means you can view a document at any time without having to send an email asking for it to be sent to you!
  • Teams and Channels. ‘Teams and Channels’ are the structures around which you organise group collaboration on the Microsoft teams app. ‘Teams’ are where you gather a group of individuals for collaboration on a certain topic of work. This might be centred around a particular client, a common interest or a business goal. ‘Channels’ are structures that you set up within ‘Teams’ that act as subcategories of the main project. Channels can be set up to focus on very specific topics and you can make them ‘public’ (available to anyone in the Team) or ‘private’ (accessible only to those you choose). These structures make it easy to organise conversations and keep on top of file sharing by thanks to seamless integration with Sharepoint’s file storage architecture.
  • Video and Voice Calling. Microsoft Teams’ Voice/Video calling feature is based on the ‘Skype’ platform and allows you to hold virtual meetings with anything from 2 to 250 participants. Ideal for getting the team together for that weekly pep talk!

 

Struggling to find a solution that fits around your business?

At Cloudscape, we use our extensive experience to deliver custom-fit technology solutions to SMEs in London and the home counties. Technology should serve your business’ aims and aspirations, it shouldn’t be something to mould your operation around. We are experts in Cloud-computing and we know how empowering Cloud Services can be when leveraged correctly, so let us help you tailor Office 365 so that it works for your business and the unique challenges you face. Call us on 0207 952 8123 or send us an email info@cloudscape.it.

https://cloudscapeit.co.uk/wp-content/uploads/2020/06/2.jpg 303 807 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-06-29 07:00:042020-06-15 12:25:38Tackle your business challenges head on – With Microsoft Teams

350,000 Social Media Influencers and Users at Risk Following Data Breach

in Cyber Security, IT Tips

Personal data of an estimated 100,000 social media influencers has been accessed and partially leaked following a breach at social media marketing firm Preen.Me, Risk Based Security has discovered. The same breach has also led to more than 250,000 social media users having their information fully exposed on a deep web hacking forum, leaving these individuals at risk of being targeted by scams.

The leak was discovered by Risk Based Security’s data breach research team on June 6 when a known threat actor revealed they had compromised Preen.Me’s systems and were holding the personal information of over 100,000 affiliated influencers under ransom on a popular deep web hacking forum. The actor shared 250 records via PasteBin on the same day, and two days later on June 8, stated their intention to release the other 100,000 records, although this has not yet occurred.

The information includes influencers’ social media links, email addresses, names, phone numbers and home addresses. It was noted that those affected appear to be associated with cosmetic or lifestyle-related content.

Roy Bass, senior dark web analyst, Risk Based Security, commented: “While passwords were not leaked, threat actors can search for compromised passwords from other database leaks and link them to the accounts through email addresses/other personal information, or employ brute force techniques. We observed one threat actor state his intention to do so.

“They [those exposed] are also susceptible to spam and substantial harassment via their leaked contact information, as well as spear-phishing and identity theft scams if enough personally identifiable information is gathered.”

Then on June 14, the same cyber-criminal fully leaked the details of over 250,000 social media users who use Preen.Me’s application, ByteSizedBeauty. This includes their social media links, as well as personal information such as home and email address, date of birth, eye color and skin tone.

Bass added: “Regarding the other social media users, they are vulnerable to the previously mentioned threats with an increased risk for spear-phishing and identity theft scams due to more personal information being leaked.”

 

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

 

News Source: https://www.infosecurity-magazine.com/

https://cloudscapeit.co.uk/wp-content/uploads/2020/06/thought-catalog-UK78i6vK3sc-unsplash.jpg 800 1200 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-06-26 16:52:262020-06-26 16:53:24350,000 Social Media Influencers and Users at Risk Following Data Breach

NCSC: One Million Phishing Messages Reported in Two Months

in Cyber Security, IT Tips

The National Cyber Security Centre (NCSC) has announced that in just two months of its Suspicious Email Reporting Service being launched, it has received one million reports.

According to a statement, the service, which was launched in April as part of the Government’s Cyber Aware campaign, receives a daily average of 16,500 emails.

NCSC chief executive officer Ciaran Martin called the number of reports a “milestone” and said it was “testament to the vigilance of the British public.”

He added: “The kind of scams we’ve blocked could have caused very real harm and I would like to thank everyone who has played their part in helping to make the internet safer for all of us.”

Ed Macnair, CEO of Censornet, said: “Although it is positive to see people being vigilant against spam and phishing attacks, these figures from the NCSC demonstrate the extent of the problem. Cyber-criminals will continue to capitalize on the hysteria surrounding COVID-19 to exploit both organizations and individuals, preying on their curiosity and vulnerability.”

Figures show that 10% of the scams were removed within an hour of an email being reported, and 40% were down within a day of a report. Also, 10,200 malicious URLs linked to 3485 individual sites have been removed thanks to the one million reports received.

The Suspicious Email Reporting Service was co-developed with the City of London Police. Its commander Karen Baxter said: “Unquestionably, a vast number of frauds will have been prevented, thanks to the public reporting all these phishing attempts. Not only that, but it has allowed for vital intelligence to be collected by police and demonstrates the power of working together when it comes to stopping fraudsters in their tracks.”

Fake cryptocurrency investment lures made up more than half of all the online scams detected as a result of reporting from the public. In these cases, investors are typically promised high returns in exchange for buying currency such as Bitcoin, but scammers masquerade as crypto exchanges or traders to trick people into handing over money by using fake celebrity endorsements and images of luxury items.

According to the FCA, cryptocurrency investment scams have cost the British public around £27m, as victims are encouraged to invest more and more money.

Macnair also warned of the danger of social engineering attacks, and said it is crucial that organizations take it upon themselves to protect employees from these email attacks in the first instance. “Businesses need to use email security that combines algorithmic analysis, threat intelligence and executive name checking to efficiently protect themselves against these evolving attacks,” he said.

 

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

 

News Source: https://www.infosecurity-magazine.com/

https://cloudscapeit.co.uk/wp-content/uploads/2020/06/ravi-pinisetti-zRMY5cfeBDk-unsplash.jpg 667 1000 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-06-26 16:50:502024-05-15 14:26:42NCSC: One Million Phishing Messages Reported in Two Months

Twitter Data Leak Exposes Business Clients

in Cyber Security, IT Tips

Twitter has contacted its business clients to warn them of a potential breach of their data.

It said that email addresses, phone numbers and the last four digits of card numbers may have been accessed by others, thanks to a technology snafu which exposed the information.

It meant that billing information viewed on ads.twitter.com or analytics.twitter.com may have been exposed in the browser’s cache.

The social network first became aware of the incident on May 20 and said it took immediate action to remediate and notify any affected customers.

The snafu is not thought to have affected consumer users of the service, according to the BBC.

This isn’t the first time something like this has happened on the social platform.

Around a month before this incident, Twitter warned users that non-public information may have been stored in their Firefox browser’s cache.

“This means that if you accessed Twitter from a shared or public computer via Mozilla Firefox and took actions like downloading your Twitter data archive or sending or receiving media via Direct Message, this information may have been stored in the browser’s cache even after you logged out of Twitter,” it said at the time.

Although it’s unclear how many businesses were affected by the May breach, experts generally agreed that incidents of this kind are likely to have a limited impact on customers’ data security and privacy.

“The vector here requires physical access to the device, so it may not be as exploitable as an alert like this might indicate,” explained Edgescan product architect, David Kennefick.

“What Twitter has done is update its headers to include no-store and no-cache, which disables storing data from a website locally.”

Tripwire senior security researcher, Craig Young, added that the incident could still provide a “teachable moment” regarding shared computers.

“Whether you regularly rely on libraries or internet cafes for access or just need to print the occasional boarding pass from a hotel lobby, there can be a risk of exposing personal data,” he argued.

“Ideally, the best solution is to simply avoid using shared computers when entering or accessing personal data but this is not always an option. The next best solution is to bring your own web browser and take it with you when you go.”

 

We’re Cloudscape.

We believe you should have the best backup solutions for your business.

We’ll get to know your business and determine the most appropriate solution to meet your technical requirements while being commercially sensible in cost and productive with time.

If you feel that your data isn’t being backed up correctly, please get in touch.

 

News Source: https://www.infosecurity-magazine.com/

https://cloudscapeit.co.uk/wp-content/uploads/2020/06/yucel-moran-8cMPxOqkLE8-unsplash.jpg 800 1200 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-06-26 16:48:442020-06-26 16:50:36Twitter Data Leak Exposes Business Clients

Tackle your business challenges head on – Delving Deeper into Office 365

in Cyber Security, IT Tips

Welcome to Office 365

The Office 365 offering from Microsoft brings an unprecedented level of convenience, flexibility and productivity potential to the familiar suite off Microsoft Office apps we all know so well. This versatile suite of tools, wrapped in an intuitive, access-anywhere interface is the ‘Swiss army knife’ of daily office life; as it has a solution for almost any challenge you might throw at it.

Like many Office 365 adopters, you may be aware of its potential yet have only used a few of the applications it features. This is understandable, as it can be difficult to know where to begin and exploring the services on offer may seem like a challenging, time-consuming endeavour.

We believe however that you should capitalise on the large range of tools and services you’re paying for, so the following series of blogs aims to guide you through some of the services within Office 365 that you may not be familiar with. We’ll approach the features individually, explaining the purpose, functionality and benefits that each brings. We’ll also explain how using them could further improve productivity, aid communication and streamline workflows in your business.

 

Delving Deeper into Office 365

Typically, the uncompromising nature of ‘off-the-shelf’ software solutions requires businesses to mould their processes to fit.  Fortunately, however, there is a level of flexibility inherent in the Office 365 suite that allows you to tailor a package to suit the way you work. In our ‘Delving Deeper’ series we’ll help you mould the Office 365 service offering around the unique operational challenges your business faces.  We’ll help you confront common operational challenges and answer questions you may have such as:

“What can I do to aid communication between my team?”

“How can I make arrange meetings without drowning in Emails?”

“How can I gain control and oversight of my business’ data?”

“Can I automate time-consuming manual tasks?”

“How can I effectively manage projects and group tasks?”

“How can I leverage the value of my data and make data collection easier?”

“Is there a way I can control the use of group chat?”

“I need to do X, Y and Z, is there an app for that?”

Office 365 sometimes offers multiple solutions to questions such as these.  Our guide will help you choose the right solution for the particular challenge you’re dealing with.

 

Struggling to find a solution that fits around your business?

At Cloudscape, we use our extensive experience to deliver custom-fit technology solutions to SMEs in London and the home counties. Technology should serve your business’ aims and aspirations, it shouldn’t be something to mould your operation around. We are experts in Cloud-computing and we know how empowering Cloud Services can be when leveraged correctly, so let us help you tailor Office 365 so that it works for your business and the unique challenges you face. Call us on 0207 952 8123 or send us an email info@cloudscape.it.

https://cloudscapeit.co.uk/wp-content/uploads/2020/06/1.jpg 303 807 Mike Casey https://cloudscapeit.co.uk/wp-content/uploads/2021/02/cloudscape_logo_white.png Mike Casey2020-06-22 07:00:082020-06-15 12:25:50Tackle your business challenges head on – Delving Deeper into Office 365
Page 8 of 13«‹678910›»

Recent Posts

  • What to implement to solve the problems from 2020
  • What to implement in 2021: New year, New start
  • How can the cloud industry adapt to a post-COVID world?
  • Twitter Fined Half a Million Dollars for Privacy Violation
  • Spotify Resets Passwords After Leaking User Data to Partners
  • Remote work is here to stay — but it will not be cheap or easy
  • Is remote working putting you at regulatory risk?
  • 5 Ways To Make Remote Working Your New And Better Normal
  • How hybrid work models are altering cloud strategies
  • Top metrics for effective multicloud management

Archive

Categories

Pages

  • Adapt. Evolve. Grow. Guide
  • Business Continuity Health Check
  • Cloud Services
    • Hosted Email
    • Hybrid Cloud
    • Online Backup
  • Computer Support London
  • Free IT AUDIT
  • Home
  • IT Consultant London
  • IT Services
    • Cyber Security Services London
    • IT Consultancy NEW
    • IT Projects
    • IT Relocation
    • Make Your Business GDPR Compliant
  • IT Support
    • Apple Mac Support
    • Network Support
    • Ongoing Support
    • PC & Server Support
  • Managed IT Support for London
  • Microsoft 365 Secure Landing Page
  • Network Solutions
  • Privacy
  • Private Cloud
  • Tailored for Financial Services and Accounting
  • Thank You
  • Hosted VoIP

FREE IT Technology Audit

Get the most from your technology with a
FREE IT Support Solutions Audit – worth £300.
We‘ll produce a full network report covering 30 key areas in your business. This will give you a great idea where your IT systems need the most attention and importantly where cost savings might be achieved! There is no obligation on your part – the report is completely FREE OF CHARGE

Recent Blog Posts

  • What to implement to solve the problems from 2020
  • What to implement in 2021: New year, New start
  • How can the cloud industry adapt to a post-COVID world?
  • Twitter Fined Half a Million Dollars for Privacy Violation
  • Spotify Resets Passwords After Leaking User Data to Partners

IT Support for London

Cloudscape IT
47 Oxford Drive
Magdalen Street
London
SE1 2FB

0207 952 8123
Email: info@cloudscape.it

© 2025 Cloudscape IT LTD. Registered in England & Wales No. 04565979. Registered Office - 47 Oxford Drive, Magdalen Street, London, England, SE1 2FB. All rights reserved.
  • Facebook
  • Twitter
  • LinkedIn
Scroll to top