With some of
our remote working tools and technology, Nimbus can help you continue to carry
on serving your customers as if you were still in the office.
You can continue to complete projects, serve your clients and achieve your company and personal goals.
We have been advising and providing for remote working long before this current pandemic led increase in demand. Indeed, some of the various teams within Nimbus have remote working as a portion of their working week.
There are a number of basics that need to be covered:
✔ Do you have reliable broadband connectivity?
✔ Do you have the necessary equipment? (Laptop/PC/Webcam)
✔ Do you have the productivity applications? (Office 365)
✔ Do you have the facility to communicate and collaborate with colleagues, clients and suppliers? (Microsoft Teams)
✔ Do you have access to your files and applications that which in some cases can be non cloud based (Remote Desktop, VPN)
Below are the solutions and services we are actively rolling out to customers at present:
Office 365 – allows you to access email, shared files and folders & lets you access all the well-known office applications like Word, Excel, Outlook etc
If you are not already doing so, now is certainly the right time to start leveraging the benefits of your Office 365 applications.
Your OneDrive will allow you to work on your own specific files and folders which you can send links to or attach copies of. However, if you embrace SharePoint this will allow for better collaboration amongst your team and colleagues with everybody that needs to can access the necessary data and can amend files and documents in real time.
Microsoft Teams – If you are running O365 this will generally be included and can also be used within the RDS
This application which is very much the buzz word at the minute can really help with tying everything together.
It is essentially the hub for all your applications. You can stay in the one place while working on all files and tools for a more efficient workflow.
It is also the one place for conversations, meeting and calls. You can chat privately one to one with colleagues, suppliers and customers. Or indeed you can have instant group conversations, join meetings with HD audio and video all in the one place instead of using multiple apps.
Remote Desktop – Best option if you run applications that are not cloud based and keeps everything in one place
If you are looking to maximise the efficiency of your workforce while they work remotely then Nimbus can help.
Using Remote Desktop makes it easy to manage and access all applications plus data from any location and any device.
Just like working at your desk, you’ll be able to access your desktop, applications, shared files and folders using a secure connection to help prevent data breaches and maintain privacy.
VPN (Virtual Private Network)
A Virtual Private Network is a service that allows you to connect to the your organisations network via an encrypted tunnel to ensure your online privacy and protect your sensitive data.
It redirects your internet traffic through a specially configured secure connection. This way, the VPN hides your IP address and encrypts all the data you send or receive.
Need assistance with remote working?
Call us on 028 900 800 30 or email: email@example.com
Intuitive and professional email signature software designed for Office 365
Exclaimer is easy to use, professional email signature software that’s designed for Office 365. It works by using your company’s Office 365 Directory to pull through your contact details and attach it to all outbound or inbound emails from your mailbox. With a web-based management portal, signatures can be quickly designed and applied to any individual or group without needing any digital or design expertise.
Its smart and intuitive signature editor features a handy drag-and-drop interface, so signatures can be easily duplicated and updated instantly. Exclaimer also works wherever your employees go, on any device they carry – be it when they are on their daily commute, working from home or at a client site. Every signature sent through their Office 365 mailbox will look the same, no matter whether they use desktop PC and Mac, tablet or mobile, ensuring your brand has the same look and feel everywhere.
Call us today on 028 90080030 for more information
combines email, file storage, collaboration, and productivity applications,
including OneDrive and SharePoint. Together, they are the crock of gold of
sensitive data and files that phishers are looking to exploit.
On obtaining a single set of legitimate Office 365 credentials, a phisher can conduct spear phishing attacks from within the organization, impersonating employees in order to extract a financial payback. Attackers mimic the protocols and appearance of Office 365 messages and interfaces to trick users into disclosing their login credentials and here are the type of attacks to look out for:
The Voice Message Attack:
Office 365 indicates you have an email. The subject line reads: “Incoming: You
received a voice message from +1 508 *** – 250 seconds.” It’s personalized with
your first name in the body of the message. Along with the realistic-looking
phone number, the email contains a phishing link you can click on to hear your
message. Don’t! It’s a trap.
The ‘Action Required’ Attack
The message arrives with a subject
line that says something like, “Action Required: [email_address] information is
outdated—You must revalidate your account.” The message includes a link that is
generally hosted on a legitimate although hacked website to bypass
reputation-based email filtering systems. This is a trick to get you to
disclose your Office 365 login credentials. This could be the first step in a
multiphase attack, providing the attacker with all they need to begin
conducting lateral attacks within your organization using the compromised
Office 365 account.
The Shared File Attack
shared-file attack, you receive a file-sharing notification in an email message
from a common name, such as “John” or “Julie.” You know someone named John or
Julie, don’t you? You’re then redirected to a fake OneDrive login page where
the phisher then harvests your account credentials. You assume you’ve been
logged out. The phisher is counting on you to sleepwalk through your use of
Office 365. That way, you won’t question what’s happening.
How to prevent Office 365 Phishing Attacks:
User Awareness Training
Knowledge is power! The more informed your users are to the current threats and alert to them, the more likely they will be to spot a phishing attack. User Awareness Training is key to this and Nimbus can provide this training.
2. Add extra security
The second is to add an additional security layer that sits insideOffice 365. This solution leverages artificial intelligence (AI), including machine learning (ML), uses real-time behavioural analysis to protect from unknown threats, whereas traditional fingerprinting and reputation methods detect only known threats. With this predictive approach, AI-based technologies leverage huge amounts of data to identify abnormal behaviours and inconsistent characteristics in the way’s emails are built and sent to identify a potential new threat. Again Nimbus can offer this product as part of your multi-layered security approach to cyber security.
Email is a must-have for easily doing business. For everything from work, shopping, social media and keeping in touch, the benefits email provides has made organisations more efficient and productive than ever before.
Even with all these benefits, having an email address does come with its security risks. With the increasing threats of viruses and spyware from spam and phishing emails, it’s now more important than ever before to ensure you are protected.
Ensure your business security with these tips for keeping their emails safe and identity spam emails:
Poor grammar and spelling
A well known way to identify spam is when the email is full of spelling or grammatical mistakes or looks like it has been translated online. However, with the quality of these spam emails improving, it’s now more important than ever before to make sure your staff and colleagues are thoroughly checking all emails for any indication of a spam email.
Unknown or odd email address
With spear-phishing attacks becoming increasingly more advanced, personalisation in emails, both for businesses and spam, is another way hackers try to convince the recipient that it’s a legitimate email. A way to check this out is to review the email address of the sender. If the address looks unrealistic, has a domain that you don’t recognise or isn’t related to the sender’s name or company, then this email should not be trusted.
The email’s content
With the amount of emails we all receive each day, it can be hard to spot what is genuine. Two common traits in spam emails are requests to provide sensitive information and offers which seems too good to be true.
If anything about the email’s content makes you unsure, don’t click any links and get in touch with the sender company to find out if it’s legitimate.
Strange attachments and links
Company emails will often have a call to action, in the form of a link or attachment, prompting you to find out more. Spam emails providing links and attachments can infect your PC with damaging viruses and spyware.
To check this, you can hover over email links to see if they look genuine or not. It’s a good way to see if they are malicious, without actually clicking on the link. Implementing an email and web threat protection to help to prevent end users from clicking on malicious links. Nimbus have a number of options available for this.
Ensuring your customers safety
Though spam is a major concern, this shouldn’t prevent businesses from taking advantage of using email as a way of effectively communicating. Being aware of how to spot spam, and implementing an email security solution, which can identify and remove 99% of spam before it reaches the mailbox, as well as ensuring emails are safe by implementing a backup storage solution will protect users from risks and give them confidence online.
Microsoft Office 365 – NOT Automatically backed up
There is a common misconception amongst customers that once they have an Office 365 subscription in place then they are covered for a quick restoration in the event of a security threat or event such as a user error, file deletion (intentional and unintentional) or indeed a ransomware attack. However, this is not the case and while you have high availability to access your data at any time, when you encounter a security threat or event you need a solution that will insure you have quick access to your Office 365 data, greatly improve your RTO (recovery time objective) while keeping you compliant with your retention and data loss policies.
Office 365’s popularity makes it the #1 target for cybercriminals.
Hackers can easily exploit the productivity suite by concentrating on known weaknesses in the out-of-the-box security tools from Microsoft. These days it’s so easy to fall prey to cyber criminals. A hacker sends an exclusive offer with an attachment loaded with malware and, before you know it, you’ve lost crucial data and they’ve scored easy money. But why should you back up your data as a defence against these foul predators? We’ve got five reasons you should hear…
The Cost of a breach has the potential to wreak significant damage to SMBs.
Cost is a big factor for small to medium-sized businesses. Many SMBs are less likely to spend on cyber security because they don’t think they’ll ever be targeted. Since they only hear about large breaches in the news, they believe hackers only go after corporate money. But 47% of small businesses have already reported a cyber-attack in 2019, an increase of 14% from 2018 (Hiscox, 2019). If your business were to suffer from a data breach, those hours of lost productivity and loss of customer confidence due to reputational damage could fold a small to medium-sized business overnight. The cost of purchasing a backup solution for your Office 365 data far outweighs the risks of going without.
Layered security is the best approach.
Your Office 365 email is automatically secured with standard protection; known as Exchange Online Protection (EOP). But due to advanced exploits, EOP can’t protect you against social engineering techniques that land in your inbox. Think about how you would protect your business from intrusion; safety alarms, changing the locks on windows and doors, keeping your valuables in a safe place and out of reach are all valid ways to secure your safety. So, choosing additional security tools – such as email security and backup – to protect your Office 365 data is the best way to keep your business safe.
Office 365 is vulnerable to attack.
The number of compromised Office 365 accounts are growing. More than 1.5 million malicious emails were delivered by hackers in March 2019 using 4,000 compromised accounts (Barracuda, 2019). These are infiltrated by tricking the user with a combination of social engineering tactics, brand impersonation and phishing methods to successfully retrieve their credentials. Unfortunately, since most people use the same or similar password combinations for other accounts, these were also compromised too. It’s a vicious circle. But even if you were to fall foul to these techniques (and everyone does), having additional security software and a robust BCDR (Business Continuity and Disaster Recovery) process in place could make all the difference
The Data Protection Act 2018 (the UK’s implementation of GDPR) stipulates that any data should be ‘handled in a way that ensures appropriate security, including protection against unlawful or unauthorised processing, access, loss, destruction or damage.’ Businesses that do not comply could be faced with hefty fines, risking reputational damage and more. 86% of SMBs feel they cannot adequately defend themselves against cyber breaches (Ponemon, 2018). Implementing an effective cyber security strategy, including data backup, can help alleviate that pressure and aid your data compliance.
What is the solution?
SkyKick Cloud Backup is a market-leading backup solution that helps protect your Office 365 data. Featuring unlimited backup storage, powerful search mechanics and one-click data restore, it’s one of the fastest and easiest ways to get your productivity back on track. If you’re using Office 365 for your email, to store files in the cloud via OneDrive for Business, or to communicate and share files with your colleagues via Office 365 Groups and SharePoint, SkyKick will back up everything automatically up to six times per day. So, even if you delete a file by accident, chances are that it will be saved on a previous backup and can be easily recovered.
SkyKick back up and stores your files separately.
With SkyKick, all your files are backed up and stored separately to eliminate cross-file infection. If you’re storing files in OneDrive for Business, once you save the document to your personal drive, the system will automatically overwrite the original and sync the new version. While it is possible to return to an old version with Microsoft’s File Versioning feature, if the file is infected via malware or corrupted, all versions will be affected.
Data Recovered in minutes.
Restoring individual data from Office 365 can take IT Technicians up to 6 hours, due to a long and complicated export and import process. But with SkyKick, your files can be recovered in minutes with the one-click restore feature. The solution also allows your files to be restored in bulk on OneDrive for Business, with SharePoint folders, lists, sub-sites and sites bulk restore available in late 2018. Plus, all your Office 365 data can be recovered to the exact same location it was saved within.
Why Choose SkyKick cloud back up?
Unlimited Backup – No data caps, no retention limits, and up to six daily backups.
One-Click Restore – Powerful search indexing means we can find and restore emails in minutes, not hours.
No File Overwrites – All data is backed up separately to eliminate the risk of cross-file infection.
Exact Location and Data Recovery – Individual or bulk data can be recovered to the same location, so you know exactly where to look.
Aids Data Compliance – Helps you comply with data protection and litigation policies.
Ultra Secure – All data is backed up with encryption in transit and at rest, remaining safe in UK or EA Azure data centres.