Microsoft 365 users are waking up to a major change in how they view their files after the office software’s default font finally began to change.

Aptos, which was previously known as Bierstadt, replaces Calibri, a long-serving font that became the default for the Microsoft 365 in 2007.

Microsoft describes Aptos as a “precise, contemporary sans serif typeface inspired by mid-20th-century Swiss typography.”

Microsoft has changed your default font

Aptos belongs to the “grotesque sans serif” genre, which is characterized by its block-style letters without calligraphic flourishes or contrast between thick and thin strokes, according to the new font’s designer, Steve Matteson, citing Helvetica as one of the genre’s most famed examples, which was created by Switzerland’s Haas Type Foundry in 1957.

Redmond first shared that it had started looking for a new default font in 2021, and by July 2023, it confirmed that Aptos would be rolling out to “hundreds of millions of users” of Word, PowerPoint, Excel, and Outlook users in the months following the announcement.

Principal Program Manager for fonts and Typography, Microsoft Office Design, Si Daniels, said that the new font should embody “professionalism, adaptability, subtle flourishes of expression, and more clarity.”

Given that few users opt to select another font other than the default, it clearly has a lot to live up to. Documents written in Aptos will now circulate in every single sector in a variety of capacities, highlighting the need for versatility above all else.

Besides Regular, Aptos is available in Light, SemiBold, Bold, ExtraBold, and an even heavier Black.

Moreover, Microsoft 365 users will continue to notice design tweaks and improvements beyond font changes – the company has also revealed a new theme, encompassing a new color palette, text styles, and more.

If you are looking for an expert to help you find the best solutions for your business talk to GCInfotech about a free technology assessment

Published with consideration from TechRadar SOURCE

Email is a terrific tool that brings together friends, family, and business connections. But, unfortunately, it also has a terrible underbelly — spam, often called junk mail.

Stopping junk mail requires diligence, patience, and following specific steps. Unfortunately, that might not be enough to eliminate or even cut down on the spam you receive on any given day — but you can try.

It’s time to learn more about junk mail and how you can (attempt to) stop it.

What is junk mail

Like its physical counterpart, junk mail is typically unsolicited messages and usually contains commercial advertisements. Some junk mail also includes viruses and malware, which could cause real damage to your computer. To stop junk mail, you need first to understand how it happens. Most spam results from mailing lists bought and sold by businesses that contain your contact information. This information is often collected through above-board means, but deception often also plays a role.

For example, a mailing list could have gotten your information after you created an account on certain websites, such as a retailer you frequent or a company you seek more information. Sometimes this information gets collected after someone tricks you into applying online for a “free” gift or visiting a government or official site that is neither.

Today, most email services have a built-in spam blocker separating these messages from legitimate ones. And yet, nothing is foolproof, which means your inboxes will sometimes contain these annoying messages.

What you can do right now

The better combat junk mail, there are various steps you can take. Some can help with current emails, while others are more proactive.

First, use a junk mail filter on your email account: Most of the best email providers include junk mail filters automatically with their service. These tools filter unwanted or unsolicited emails, so you don’t have to.

Junk mail filters typically analyze the content of a message when it comes into your account, looking for keywords and phrases most likely to be found in these types of emails. As a result, junk mail filters not only clear your inbox of annoying messages, they can also protect you from phishing scams and other threats.

A good rule is not to open an email from someone you don’t know. If you’ve already done so, there’s an even more important rule: never open or click on links in unsolicited emails. Many bad things can happen when you do, such as dangerous files being accidentally installed onto your computer, prompts from questionable websites asking for your personal details, and suddenly more junk mail entering mailbox.

You might also consider unsubscribing from unwanted newsletters. These types of messages are often the result of visiting a website and entering your contact details. For example, you might be in the market for a new car, and upon visiting a site, you’re asked to enter your name and email address. That information is typically sold to mailing list companies, hence the steady rise in junk mail.

There are different ways you can do this. First, you can look for an unsubscribe link at the bottom of an email. Clicking on the “unsubscribe” link, and following the directions, will eventually remove you from that mailing list.  You can also attempt to contact the sender directly and ask to be removed from the list. This solution is best when there isn’t an unsubscribe link in an email.

Another solution is to use a newsletter management service and request that your name is removed from subsequent emails. The best newsletter management services typically make it relatively pain-free for someone to get removed from a list. These services are typically very responsive to these types of requests, although it might take awhile before you see a drop-off of mail.

It would be best if you also considered using the Surfshark Incogni tool, which will identify and communicate with dozens of data brokers so that your personal details can be deleted from databases stored by brokers. There are over 4,000 data brokers worldwide that now collect consumer information. Yes, 4,000!

Proactive steps you can take

Moving forward, there are a few online behavioral changes you can make to stop junk mail. These include:

Don’t engage: Your personal information is crazed by companies and organizations, good and bad. So from now on, be extra careful about who gets this information. When visiting a new website, for example, decide whether it’s worth handing over your email without making a purchase. And if you do decide to hand over this information, read the fine print first to see how this information is collected and used.

Trick them: You can give them a different email address when registering. This email can be a secondary email address you only use for website registrations. That way, any would-be solicitations are already separated from emails from your primary account. Perhaps a better way to do this is by using a mechanism like Apple’s Hide My Mail or the open-source SimpleLogin. These tools keep your personal email address private by creating unique, random addresses forwarded to your email. These addresses are made per incident, so you can quickly delete them when no longer necessary.

Start over: If you find it impossible to avoid spam, you can also consider the nuclear option and stop using your current email address. This would require signing up for a new email account and telling your important contacts about the switch, including any company you do business with. Once that tedious task is complete, use the new address and change some of your online habits, as mentioned above.

It’s hard to stop junk mail, but that doesn’t mean it’s impossible. There are various steps you can take to at least limit the amount of spam you receive. Luckily, some of the most straightforward steps get done automatically by whoever supplies you with your email. Beyond this, you can take additional steps, including proactive ones, to improve your situation.

If you are looking for an expert to help you find the best solutions for your business talk to GCInfotech about a free technology assessment

Published with consideration from TechRadar SOURCE

As the owner of a small- or medium-sized business (SMB), you may feel like you’re always stretched thin. You have to manage tight budgets, juggle multiple roles, and make sure your employees have the tools and resources they need to do their jobs. It can be tough to find time to focus on growing your business. But what if there was an all-in-one solution that could help you do it? Enter Microsoft 365.

Do more with less

Microsoft 365 is a comprehensive suite of tools and services designed to help SMBs get more done. It delivers the full power of Office apps, including Word, Excel, and PowerPoint, with the convenience of cloud-based collaboration. It also gives you access to features like secure file sharing, document workflow automation, and real-time communication. Best of all, Microsoft 365 is designed to work with the tools and services you already use.

With Microsoft 365, you can save time and money by eliminating the need for additional software or hardware. It’s easy to set up and manage, and it’s available at affordable price points. You can even use a single subscription to cover all the devices in your business, from PCs to phones to tablets.

Stay connected, wherever you are

By leveraging Microsoft 365, you can keep your team connected and engaged, regardless of their location. With cloud-based services like Microsoft Teams, you can have virtual meetings, chat with colleagues, and collaborate on projects in real time. And when you need to access files, emails, or other data while away from the office, you can do so securely with the Microsoft 365 mobile app.

Gain valuable insights with AI

Tools like Power BI and Azure AI enable you to gain valuable insights into your business. With Power BI, you can quickly create interactive dashboards that provide up-to-date information about the performance of your company. This can help you make better decisions and identify trends that could be a source of new opportunities.

Meanwhile, Azure AI allows you to leverage the power of artificial intelligence (AI) to improve customer service, automate processes, and optimize your business operations.

Secure your data

Finally, Microsoft 365 offers a range of advanced security features that help protect your data and keep your business safe. These include multifactor authentication, data loss prevention, and encryption to keep sensitive information secure. And if you ever need assistance with any of these functions, Microsoft’s world-class support team is always on hand to help.

In today’s competitive world, it’s essential for SMBs to have the tools and resources they need to succeed. Microsoft 365 can help you do just that. With its easy setup, affordable pricing, and powerful features, it’s a great way to give your business an edge. Try it today and see the difference Microsoft 365 can make in your SMB’s growth.

Don’t know where to get started? Contact us today! We’re here to help you discover the full potential of Microsoft 365.

If you are looking for an expert to help you find the best solutions for your business talk to GCInfotech about a free technology assessment

Published with consideration from TechAdvisory.org SOURCE

2022 sees rise in ‘unwanted’ emails as phishing attacks remain popular

A large proportion of your work emails may not be useful in any way, a new report examining billions of messages has claimed.

Research from Hornetsecurity analyzing 25 billion business emails found nearly half (40.5%) are ‘unwanted’, and could even represent a serious threat to businesses.

The report also revealed how email remains an incredibly popular threat vector, with the most common kind of malicious messages being phishing attacks – emails pretending to be from well-known companies, sometimes quite convincingly – which made up 39.6% of all threats.

False sense of security

When it comes to malicious email attachments, Archive files such as Zip made up the greatest proportion (28% of messages), followed by web files (HTML) at 21%. Text based files were also commonly employed, with tainted Microsoft Word documents making up 12.7%, PDF 12.4% and Excel 10.4%.

The report also found new methods are being developed by cybercriminals in response to the changing digital landscape. For instance, attacks exploiting the macro capabilities in Microsoft 365 are no longer viable since Microsoft disabled the feature last year, specifically to shore up its security.

As a result of this, new tactics have been adopted. HTML smuggling has risen, where hidden LNK or ZIP files are contained within web links to deploy malware.

Hornetsecurity CEO Daniel Hofmann warned that given the prevalence of cloud based systems, such as Microsoft 365, their use should merit the same level of caution. Hornetsecurity’s report found that a quarter of respondents did not know that 365 could be a potential gateway for ransomware – some even presumed it was invulnerable to such threats.

“Ongoing training should be in place to prevent fraudsters from manipulating the trust people have in Microsoft and other office systems”, Hoffman advised. He also made specific mention of Microsoft Teams, adding that “it’s also critical to ensure all data shared via this platform is backed up.”

Other reports have found a similarly high – or even higher – proportion of spam emails in people’s accounts. Recent findings from Kaspersky, for instance, put the figure between 45-85%.

If you are looking for an expert to help you find the best solutions for your business talk to GCInfotech about a free technology assessment

Published with consideration from TechRadar SOURCE

Microsoft 365 offers a convenient way to share calendars. In this guide, we will walk you through how you can quickly and easily do so to let others — even those without a Microsoft 365 account — view your calendar.

What is Outlook?

Outlook is a personal information manager from Microsoft, available as part of the Microsoft 365 suite. Aside from managing multiple email accounts, Outlook also allows users to quickly access calendar and task features. Users can also customize their view of Outlook through several ways, including the use of add-ons and plugins that improve productivity. Overall, Outlook is a powerful tool that can help individuals and organizations stay on top of their communications.

Use Outlook on the web

Outlook on the web is a free, web-based version of Microsoft Outlook that includes many of the same features as the desktop version. You can use Outlook on the web to access your email, calendar, contacts, and tasks from any computer with an internet connection.

Additionally, you can connect your Microsoft 365 or another email service based on Microsoft Exchange Online to Outlook. Through this integration, you can then easily share your calendar by following these steps:

  1. To access the Calendar, click on the calendar icon at the bottom of the page.
  2. Go to the Calendar page and find the toolbar at the top of your screen. Click on Share and then select which calendar you want to share with others. Remember that you can only share calendars that you own.
  3. Enter the email address or name of who you’d like to share your calendar with.
  4. To secure your calendar, determine the permission levels of your recipients. These options include:
    • Can view when I’m busy ⁠– allows users to view only certain details of your calendar when you’re busy
    • Can view titles and locations ⁠– shows users when you’re not available, including additional details such as the event’s title or location
    • Can view all details ⁠– lets users see all details about an event in your calendar
    • Can edit ⁠– enables permitted users to modify details in your calendar
    • Delegate ⁠– authorizes users to edit your calendar and share it with others
  5. The final step is to click on Share. You can cancel sharing your calendar by clicking on the Trash icon.

Another method of sharing your calendar is by publishing it and sending the URL to others. Here’s how you can do this:

  1. Go to Settings, then View all Outlook settings in Calendar.
  2. Click on Shared calendars.
  3. After you select Publish a calendar, choose which calendar to make public and how much information recipients will be able to see.
  4. Once you’ve set the permission levels, you can click Publish.
  5. Next, choose between an HTML or an ICS link. The HTML link allows recipients to view your calendar through a browser like Google Chrome or Mozilla Firefox. Meanwhile, users can use an ICS link to import your shared calendar and view it on their own Outlook calendar.

Share via Outlook.com

Just like Outlook on the web, Outlook.com allows you to share your calendar directly or publish it. The methods for sharing on these two platforms are similar, with the exception that you have just two choices for how recipients may utilize your calendar: Can view all details and Can edit.

Here’s how you can publish your calendar on Outlook.com:

  1. Open the Calendar view by clicking on the calendar icon.
  2. Go to the Settings menu and choose View all Outlook settings.
  3. Go to Calendar and choose Shared calendars.
  4. In “Publish a calendar,” choose the Calendar you want to publish and how much information it will show.
  5. Once you’re done, click on Publish and share your calendar either through an HTML or ICS link.

Easy access through Outlook on iOS and Android

If you’re on the go or don’t have access to your desktop, you can still share your calendar via Outlook’s mobile app by following these steps:

  1. On your Outlook app, select Calendar from the hamburger menu at the top-left corner of the screen.
  2. Go to Share then, under Add People, select the recipients you’d like to invite by inputting their names or email addresses.
  3. Next, go to the top-right corner of the app and tap on the Check button.
  4. To edit the permission level of a certain user, you can tap their name on the list of recipients. Like with Outlook on the web, you can choose the permission options such as “Only When I’m Busy,” “Only Titles and Locations,” “All Details,” “Can View,” “Can Edit,” and “Delegate.”
  5. If you want to remove a user from your recipients, go to the bottom of the page and tap on Remove.
  6. After you’ve set permissions, tap on the Check button at the top-right corner of the page to share your calendar with your selected users.

There’s no doubt that Microsoft 365 offers a variety of tools that help you stay organized. If you’re interested in learning more about the benefits of Microsoft 365, please don’t hesitate to contact us. Our IT experts will be glad to help.

If you are looking for an expert to help you find the best solutions for your business talk to GCInfotech about a free technology assessment

Published with consideration from TechAdvisory.org SOURCE

There are three Microsoft 365 tools that are typically used for office communication and collaboration: Microsoft 365 Groups, Yammer, and Microsoft Teams. While these three are similar, did you know that there are subtle differences that set them apart from each other? Let’s take a look at some of these.

Microsoft 365 Groups

With Microsoft 365 Groups, every member gets a shared inbox, calendar, project planner, notebook, and document library. You can also integrate third-party apps like Twitter, Trello, and Mailchimp to Groups so notifications are sent directly to your shared inbox.

This means all relevant messages and information are sent to one place, so if your organization normally communicates via email, Microsoft 365 Groups is ideal. What’s more, HR and sales departments that communicate with external parties will also find plenty of uses for its email features.

A big downside of Microsoft 365 Groups, however, is email overload. Since all messages and notifications are sent to one inbox, users may become overwhelmed by the number of emails they have to sort through every day.

Microsoft Teams

Microsoft Teams, a chat-based collaboration platform, works with Skype for Business, so you can text, call, video chat, and share files with colleagues. Thanks to its seamless integrations with other Microsoft 365 apps, you can even work on shared files without leaving the app.

Unlike Groups, Microsoft Teams is designed for more advanced collaboration, making it great for completing projects with tight deadlines or other tasks requiring immediate feedback.

Yammer

Much like Groups and Teams, Yammer works well with other Microsoft 365 tools like Outlook and OneDrive. However, Yammer is a professional social media app designed to foster open communication and break down barriers between teams.

Yammer serves like a virtual office bulletin board: important files and announcements can be shared with the entire company through this platform. Users can also see the most popular post on their feeds, follow it, and even comment.

Yammer also takes design elements and features from social media apps like Facebook, making it a popular choice for companies with millennials in their workforce.

Although we’ve discussed the fundamental differences between Groups, Teams, and Yammer, we’ve barely scratched the surface of what each app can do. To figure out which apps you need, you must understand how your employees work, how they like to collaborate with one another, and what you want to achieve from such collaborations.

Fortunately, there’s another way to find the right app for your business: ask the experts. Contact us today for an IT assessment!

If you are looking for an expert to help you find the best solutions for your business talk to GCInfotech about a free technology assessment

Published with consideration from TechAdvisory.org SOURCE

Microsoft is a provider of powerful and intuitive tools that improve efficiency, productivity, and security. And as phishing attacks become more sophisticated and prevalent, Microsoft is taking steps to protect its users, one of which is releasing powerful cybersecurity tools via Microsoft 365 Defender. Here are some of them.

1. Anti-phishing

The most dangerous types of phishing scams involve emails that are disguised to appear like it’s from an entity. An attacker may use cunning tactics, such as referring to the victims by their nickname. They may even take over actual email accounts and use these to trick their victims.

Through machine learning, Defender creates a list of contacts that users normally communicate with. It then employs an array of tools, including standard anti-malware solutions, to differentiate acceptable from suspicious behaviors.

2. Anti-spam

Since common phishing campaigns utilize spam emails to victimize people, blocking spam is a great way to protect your company from such attacks.

Defender’s anti-spam technology addresses the issue by examining both an email’s source and its contents. If an email is found to come from an untrustworthy source or has suspicious contents, it is automatically sent to the Spam folder. What’s more, this feature regularly checks the activity of people in your company to ensure that none of them sends out spam emails.

3. Anti-malware

Malware, such as ransomware and spyware, can spread via phishing emails. Ransomware locks systems and files from users until a ransom is paid. Spyware, on the other hand, steals data by recording keystrokes, copying clipboards, and taking screenshots, among other methods.

Defender employs a multilayered defense against both known and unknown types of malware. This covers the different stages of email transmission security, including filtering potentially harmful attachments, and real-time threat response. Microsoft also regularly deploys new definition updates to keep its defenses armed against the latest threats.

4. Sandbox

It’s not uncommon for some users to accidentally open a malicious email attachment, especially if they’re not careful.

Defender resolves this issue by opening all attachments in a sandbox first. This sandbox is an isolated environment, so if the attachment is malicious, it will only infect the sandbox and not your actual system. Microsoft will then warn you not to open the file. If it’s safe, you will be able to open it normally.

5. Safe Links

Instead of attachments, some phishing emails contain URLs that lead to fraudulent websites — often made to look like legitimate ones — that require victims to provide their personal information. Some of these URLs also lead to pages that download malware into a computer.

Through a process called URL detonation, Safe Links protects users by scanning the links in their emails and checking for malicious behavior, such as the transmission of malware. If the link opens a malicious website, Microsoft Defender will warn users not to visit it. Otherwise, users can open the destination URL normally. Even so, the service will rescan the link in the succeeding days and report any suspicious changes.

What’s great about Safe Links is that it also scans links in emails from people within your company and works on files uploaded to Microsoft Teams and SharePoint.

6. User Submissions

Defender allows you to set a specific mailbox to send emails you deem a threat. The User Submissions feature lets you set criteria for both malicious and safe email and identify mailboxes besides your spam folder to keep these messages in. This feature gives your administrators greater control over which emails to flag and which to report to Microsoft.

7. Enhanced Filtering

If your company uses third-party services to route emails to your on-premises environment before they are sent to Microsoft 365, you will benefit from Enhanced Filtering for Connectors. Defender uses inbound connectors to determine the trustworthiness of email sources. The more complex your routing scenario is, the more likely that an email’s inbound connectors will not reflect its real source.

Enhanced Filtering preserves authentication signals that may have been lost over the course of routing emails. This maximizes the effectiveness of Microsoft 365’s overall filtering capabilities, helping it detect spam and phishing emails.

If you need an email service that promotes efficiency while protecting your business, we can deploy and manage Microsoft 365 for you. Call us today to get started.

To learn more about how to safeguard your business, or if you are looking for an expert to help you find the best solutions for your business talk to GCInfotech about a free technology assessment.

Published with consideration from TechAdvisory.org SOURCE

Keeping employee productivity up, maintaining operational efficiency, and streamlining communications are just some of the challenges in today’s hybrid workplace. Fortunately, organizations can overcome these problems with the help of Microsoft 365’s dynamic new features. Let’s take a look at the most promising upgrades in M365.

Work seamlessly with Windows 365

Windows 365 is a cloud service that allows users to experience a more powerful and more agile version of Windows 10 or 11. Also called the “Cloud PC”, Windows 365 will enable you to access your entire PC — including personalized apps and settings — from any device. This means Windows 365 users can start working from anywhere right away, which is especially useful when finishing an urgent task or getting the most out of a productivity streak.

Windows 365 eliminates logistical complexities and security concerns that often get in the way of efficient hybrid working. With a Cloud PC, you can start working on your office computer, pick up where you left off on your tablet during your commute, and jump right back in on your desktop if you’re working from home the next day.

Experience a more powerful Teams app

Teams is now loaded with new apps that are sure to make Microsoft’s communication platform even more collaborative. One of the new apps coming to Teams is Confluence Cloud by Atlassian, which allows users to take notes during a Teams meeting. The notes can be formatted as action items, mentions, tables, and the like to make the salient parts of the meeting more digestible. On top of this feature, the notes are also easily shareable in the Teams channel, allowing everyone to immediately access a copy of the minutes of the meeting.

Salesforce will also be available for Teams. With the Salesforce for Teams app, you can integrate Salesforce records into different chats, calendar meetings, or channels so you can access and refer to the documents during discussions.

There’s also a new Q&A app that will help improve question and answer sessions in meetings or webinars with a large number of participants. Attendees can now ask questions and reply to other participants’ questions throughout the meeting, and organizers can moderate discussions by filtering responses, marking the best answers, and pinning posts. This gives the Q&A more structure and makes it easier for everyone to search for relevant information.

Get better organized to improve productivity

It’s easy to get disorganized when you have several things on your plate. With Microsoft 365’s new features, it is a lot easier to prioritize tasks, organize events, and take necessary breaks in between.

For one, you can now pin emails to the top of your inbox so you can readily find important emails later. Message reminders in Outlook will also help you stay on top of your tasks by nudging you to take action on emails that you might have missed.

There’s also no need to sift through thousands of documents to find the right files to attach to your plan in Microsoft Planner. The app can now show you a list of files related to your agenda that you might want to attach, helping you save time and effort.

What’s more, a new setting in Outlook lets you schedule meetings early or late so you can carve out essential breaks between back-to-back engagements. Scheduling breaks between meetings gives you and your employees time to breathe and prevents you from feeling overwhelmed or burned out.

We’ve only just scratched the surface of Microsoft 365’s newest features. If you want the latest updates on this topic, don’t hesitate to contact us. Our tech experts are always ready to answer your queries.

To learn more about how to safeguard your business, or if you are looking for an expert to help you find the best solutions for your business talk to GCInfotech about a free technology assessment.

Published with consideration from TechAdvisory.org SOURCE

If you want to keep everyone updated on each other’s assignments or improve your team’s productivity, sharing your calendar on Microsoft 365 is a must. In this article, we’ll take a look at how you can sync your schedules on different versions of Outlook.

Outlook on the web

If you have Microsoft 365 or another email service based on Microsoft Exchange Online, follow these steps to share your calendar:

  1. Open the Calendar by clicking on the calendar icon at the bottom of the page.
  2. Once you’re in Calendar, go to the toolbar at the top of the page. Click on Share and choose which calendar you want to share. Keep in mind that you can only share calendars you own and not other people’s.
  3. Indicate whom you want to share your calendar with by entering their email address or name.
  4. Select which activities recipients are permitted to perform on your calendar. You can choose from the following:
    • Can view when I’m busy ⁠– if you want the calendar to show when you’re busy but hide certain details
    • Can view titles and locations ⁠– if you want the calendar to indicate when you’re busy, as well as key details like an event’s title or location
    • Can view all details ⁠– if you want the calendar to reveal all details about an event
    • Can edit ⁠– if you want recipients to be able to modify your calendar
    • Delegate ⁠– if you want recipients to be able to alter your calendar and share it with other users
  5. To proceed, click on Share. If you change your mind, click on the Trash icon to cancel sharing your calendar.

Alternatively, you can publish your calendar and share it with others using a URL. Here’s how you do it:

  1. In Calendar, go to Settings and click View all Outlook settings.
  2. Select Shared calendars.
  3. Go to Publish a calendar and choose which calendar you want to publish and how much information is revealed to recipients.
  4. Click Publish.
  5. You will be given the choice between using an HTML or an ICS link. The HTML link can be used to view your calendar using a browser like Firefox or Google Chrome. An ICS link allows recipients to import your calendar and view it on their own Outlook calendar.

Outlook.com

Like Outlook on the web, Outlook.com allows you to share your calendar directly or publish it. The steps for sharing are exactly like those used in Outlook on the web, too, except you only have two options for how recipients can use your calendar. These are “Can view all details” and “Can edit.

Publishing your calendar on Outlook.com requires you to::

  1. Click on the calendar icon to open the Calendar view.
  2. In Calendar, go to Settings and click View all Outlook settings.
  3. Go to Calendar and select Shared calendars.
  4. In “Publish a calendar,” select which calendar you’re publishing and how much information it contains.
  5. Click Publish and choose to use either an HTML or ICS link.

Outlook on iOS and Android

If you’re using a mobile version of Outlook, these are the steps for sharing your calendar:

  1. On your Outlook app, click the hamburger button at the top-left corner and select Calendar.
  2. Go to Share and tap on Add People to indicate your calendar’s recipients.
  3. Input each recipient’s name or email address. Once you’re done, tap on the Check button at the top-right corner of the page.
  4. You will see a list of recipients. Tap on a name to edit their permissions and how much information they’re allowed to see. As with Outlook on the web, available options are “Can View,” “Can Edit,” “Delegate,” “Only When I’m Busy,” “Only Titles and Locations,” and “All Details.”
  5. To remove a user from your recipients, tap on Remove at the bottom of the page.
  6. After you’ve set permissions, tap on the Check button at the top-right corner of the page.

The Outlook calendar is an excellent feature for managing your team’s events and workflows and can help boost your efficiency and productivity. If you have other questions and concerns about Microsoft 365, get in touch with us today.

To learn more about how to safeguard your business, or if you are looking for an expert to help you find the best solutions for your business talk to GCInfotech about a free technology assessment.

Published with consideration from TechAdvisory.org SOURCE

More than just offering apps and cloud services designed to boost productivity, Microsoft 365 also provides robust security tools for protecting data from loss and theft. Make the most out of these tools and ensure data security by following these tips.

Take advantage of policy alerts

Establish policy notifications in Microsoft 365’s Compliance Center to help you meet your company’s data security obligations. With these in place, your employees will receive policy tips about sending confidential information anytime they’re about to send messages to contacts outside of the company network. These preemptive warnings can prevent data leaks and also educate users on safer data sharing practices.

Secure mobile devices

Since employees often use personal smartphones or computers to access their work email, calendar, contacts, and documents — especially if they’re working remotely — securing employee-owned devices should be a critical part of protecting your organization’s data. Installing mobile device management features for Microsoft 365 enables you to manage security policies and access permissions/restrictions, and remotely wipe sensitive data from mobile devices if they’re lost or stolen.

Use multifactor authentication

Relying on a single password to protect your Microsoft 365 accounts could lead to account hijacking, which could put your data at risk of being compromised. Instead, enable multifactor authentication (MFA). MFA requires users to supply additional credentials on top of a password before they can access their accounts. This makes it difficult for hackers to access your accounts since they not only have to guess user passwords, but they also need to provide a second authentication factor like a one-time SMS code or a fingerprint scan.

Apply session timeouts

Many employees usually forget to log out of their Microsoft 365 accounts and keep their computers or mobile devices unlocked. This could give unauthorized users unfettered access to company accounts, allowing them to steal sensitive data. By applying session timeouts to Microsoft 365 accounts, email accounts, and internal networks, users will be automatically logged out after a period of inactivity, preventing hackers from taking over users’ devices and accessing private information.

Avoid public calendar sharing

Microsoft 365’s calendar sharing feature allows employees to share and sync their schedules with their colleagues. However, publicly sharing this information is a bad idea because it helps attackers understand how your company works, determine who’s away, and identify vulnerable users. For instance, if security administrators are publicly listed as “Away on vacation,” an attacker may see this as an opportunity to unleash malware on unattended computers.

Employ role-based access controls

Access management is another Microsoft 365 feature that will limit the flow of sensitive data across your organization. It lets you determine which users have access to specific files in your company. For example, rank-and-file employees won’t be able to read or edit executive-level documents, minimizing the risk of data leaks.

Encrypt emails

Encrypting classified information is your last line of defense against data breaches. If hackers intercept your emails, encryption tools will make files unreadable to unauthorized recipients. This is a must-have for Microsoft 365, where files and emails are shared on a regular basis.

Partner with us to ensure your organization’s Microsoft 365 accounts are always secure and compliant with changing data security requirements. Give us a call today — our team of experts are here to help.

To learn more about how to safeguard your business, or if you are looking for an expert to help you find the best solutions for your business talk to GCInfotech about a free technology assessment.

Published with consideration from TechAdvisory.org SOURCE