The Macnamara Blog
If you need to share a document with an external third party, you should do so securely. Sometimes password protecting and emailing the document is not such a good idea (see Why you shouldn’t password protect your Office Documents). You might consider instead giving them temporary access to the folder itself (see How to share
Perhaps you need to collaborate on documents, provide files for the external colleague to download, or even provide a location for them to upload files to your tenancy. If you need to share a folder with people outside of your organisation, you can do this securely with SharePoint.
Protecting your sensitive data with a password seems like a good thing to do, right? So why would we say it is not a clever idea? Because protecting the location is better than protecting the document.
In our post on how to spot a fake email, we covered some easy ways to identify the spams, scams and spoofs that inevitably land in your inbox.
But it’s not easy to write one post covering everything. And it’s not uncommon for us to receive a few reports a day from our clients of scamming: there’s a lot of it out there, much of it increasingly hard to identify.
That’s why we’re going to break it down further today and take you through the anatomy of a scam email.
As we move increasingly towards online services, securing your account is more important than ever.
While computer viruses still exist, they’re no longer the route of choice for hackers to get control of your data. Instead, the prevalence of online services means that the bad guys are targeting your cloud services, such as your email and file storage.