Microsoft Office and productivity software in general are both magnets for cyberattacks, since they’re so common, meaning any successful attempt will have huge ripple effects. If possible, you should use the newest versions of these applications, as they’re much more secure than their predecessors and are patched against many known vulnerabilities.
It’s common when out of office or on a trip to set up an auto-reply message for any emails you may receive while you’re away. You can set up these messages to say nearly anything, but keep in mind that you shouldn’t give out specifics about where you’ll be or otherwise for safety reasons, as […]
Macros are powerful, useful commands in Microsoft Word and Excel. Nevertheless, they can also be used to distribute ransomware. Consider restricting them from within the applications if you regularly receive a lot of documents and spreadsheets and aren’t certain of their safety.
As part of Office 365, Teams is a widely used collaboration tool. Its popularity has made it a common vector for phishing attacks. Look out for strange emails saying you’ve missed a message in Teams and containing embedded links for replying within Teams. If you’re unsure about whether you have important messages to read, open […]
Worried that someone might have accessed your Outlook.com email account? It’s easy to see where and when you (or anyone else) signed into it. Simply use the official Activity page to view all recent successful logins, plus any security challenges (such as asking for another authentication factor) for your account.
While it’s not advisable to sign into your personal email account on a shared machine, there are some precautions that can reduce the risk of doing so. For Outlook.com, choose to sign in with a single-use code instead of a password. You’ll need a linked mobile number to complete this process.
We strive to make this policy simple to read and understand. Please read and review the policy here: https://www.opentext.com/about/privacy
Please confirm you have reviewed the policy and provide consent to Total Defense to use your personal data as detailed in our policy.