top of page

Search Results

35 items found for ""

  • How to Spot and Avoid the Domain Name Services Expiration Notice Scam

    Domain Name Services Expiration Notice Internet Domain owners may receive an invoice from Domain Name Services or a similar-sounding company via the US Postal Service. The letter warns you that your domain name is about to expire and urges you to renew and transfer it by paying a fee. This scam tries to trick you into paying for a service you don't need and a transfer you don’t want. This is phishing using the USPS. How Does this Con Work? This disreputable company mails a message that looks legitimate and urgent. They use a name and logo that appears to be official and sounds vaguely familiar. They list your domain name and use official-looking phrases and references, such as terms, period covered, and include a credit card form. They are careful to avoid outright mail fraud by including disclaimers like “this notice is not a bill” and “you are under no obligation” scattered in the body of the letter. Still, they intend to fool your busy accounts payable department into paying for something you don’t need. We receive a flurry of calls and messages from our clients whenever a batch of these direct mail "Domain Name Services Expiration Notices" goes out. The one I got in today’s mail triggered this warning blog. Domain web hosting, DNS hosting, domain name hosting, and mail hosting come with charges from multiple vendors. It's confusing and easy to get tricked. How can you protect yourself from scams? Take steps to avoid falling for this and similar phishing scams. Here are our tips: Confirm that the sender is an established vendor to your organization. For emails, always check the sender's email address and the website's domain name. If they don't match your registrar's name or if they use a generic or free email service, be suspicious. Don't click on links or attachments in the message. Instead, go directly to your registrar's website and log in to your account. You can check the status and expiration date of your domain name there. Don't pay for any service that you didn't request or that you don't recognize. If you have any doubts, contact your registrar's customer support and verify the message's authenticity. Our clients should not hesitate to contact our HelpDesk whenever they receive an unusual or suspicious email, text message, phone call, or letter. Does your organization need an IT Support Provider to look out for your security? Contact Slingshot today for a no-charge review. #Phishing #Scam #Cybersecurity

  • Essential Tips for Protecting Yourself from Cyber Attacks

    Identify and avoid typical internet scams: a guide from Slingshot Cyber-attacks are on the rise, and anyone can be a target. Whether it's through phishing emails, compromised accounts, or phone calls, scammers use various methods to trick you into giving up your personal or financial information. In this post, we will cover some of the most recent attempted intrusions observed at Slingshot and how you can protect yourself from Cyber Attacks. Phishing Emails Phishing involves sending fraudulent emails that appear to come from legitimate sources, such as your bank, your employer, a business contact, or a government agency. The goal is to lure you into clicking on a link, opening an attachment, or entering your credentials on a fake website. The link or attachment may contain malware that infects your device, or the website may steal your login details or other sensitive data. How to spot a phishing email: Look for spelling and grammar errors, mismatched sender names and addresses, urgent or threatening language, or requests for personal or financial information. How to protect yourself from phishing emails: Don't click on links or open attachments from unknown or suspicious senders. Verify the sender's identity by contacting them through another channel. Use a strong and unique password for each account and enable two-factor authentication. Email Compromises Email compromise involves gaining unauthorized access to an email account and using it to send malicious emails to the account owner's contacts. The attacker may use the compromised account to impersonate the owner, request money or information, or spread malware. The attacker may also use the account to access other online services that are linked to the email address, such as social media, online banking, or cloud storage. How to spot an email compromise: Look for unusual or unexpected emails from your contacts, such as requests for money, personal information, or urgent favors. Check your sent folder and trash folder for any emails that you didn't send or delete. Look for signs of unauthorized activity on your other online accounts, such as password changes, login alerts, or transactions. How to protect yourself from email compromise: Change your email password immediately and use a strong and unique password. Always enable Multi-Factor Authentication. Notify your contacts that your email account was hacked and warn them not to open any emails from you that seem suspicious. Review your email settings and revoke any unauthorized access or forwarding rules. Telephone Scams Telephone scams are a type of cyber-attack that involves making fraudulent phone calls to deceive unsuspecting individuals. The caller may pretend to be a representative from a bank, your health insurance agency, a government agency, a tech support company, or a charity. The caller may claim that there is a problem with your computer, your bank account, your taxes, or your social security number. The caller may ask you to verify your personal or financial information, pay a fee or a fine, or purchase a gift card or a wire transfer. How to spot a telephone scam: Look for pressure tactics, unusual requests, spoofed numbers, or poor-quality calls. Legitimate organizations won't ask you to verify sensitive information over the phone, pay with gift cards or wire transfers, or threaten you with legal consequences. How to protect yourself from telephone scams: Hang up immediately if you receive a suspicious call. Don't engage in conversation or provide any personal or financial information. Call the organization directly using a trusted phone number (not the one provided by the caller) and ask if there are any issues with your account or service. Educate yourself and your family members about common phone scams and how to avoid them. Cyber-attacks can cause serious damage to your organization’s reputation, privacy, security, and finances. By being aware of the common signs and methods of online scams, you can reduce your risk of becoming a victim. If something sounds too good to be true, it probably is. Stay vigilant, trust your instincts, and protect your personal information. Slingshot Clients should not hesitate to contact our helpdesk for review of any suspicious emails, or calls. Slingshot Clients should notify our helpdesk immediately when they have any concerns or think they may have been scammed. Slow down and think it through before you click. Get help. If your Spidey Senses are tingling, hang up on an unusual caller, and delete the email. NEVER enter your email credentials into a website form and NEVER forward your Multifactor Code to anyone. There is no legitimate reason for anyone to know your secret email password. If you need CyberSecurity guidance to protect your organization, contact Slingshot to schedule a free IT Systems review #EmailScam #PhoneScam #Cybercrime #PhishingEmail #Phishing #Emailhacked #Cybersecurity

  • Sunsetting QuickBooks Desktop: What You Need to Know

    What’s Happening with QuickBooks Desktop? Intuit will stop selling new licenses and subscriptions for QuickBooks Desktop products to streamline its services and enhance security. If you have an active subscription, you can continue to renew it until Intuit decides to phase out those subscriptions. There’s no timeline, but don’t be surprised when they start sunsetting older desktop products. What Options do we have? Organizations with 20-30 users can move to the still-supported QuickBooks Enterprise desktop subscriptions, but for small businesses, that is an expensive upgrade. The rest of us are being channeled to their QuickBooks Online offerings that currently range in price from $ 30 (1 user and few features) to $200 (25 users and many features) per month. For Slingshot, we would spend $60 monthly for three online users. That will be less expensive than the $100 monthly we currently pay for two licenses for QuickBooks Desktop Premier. It's clear that Intuit wants everyone to use their online version, so expect to see drastic increases in the cost of desktop subscriptions. Is Desktop QuickBooks better? For one big reason, it is better. Because we’ve used QuickBooks Desktop since the 90s, we are familiar with how it works, how we make our entries, generate reports, manage inventory, customers, and invoicing, and synchronize it with our PSA. What are folks saying? Clients who have switched report that the online version is very different and doesn’t look or work the same way. They say it takes a while to figure out where stuff is located in the online version. They are frustrated with the transition and the awkwardness of learning a new application. Eventually, the new online routines take hold, and they adjust and accept it.  Change is difficult, but we don’t have much of a choice. In a nutshell, be prepared for QuickBooks Desktop sunsetting. If you have an active subscription, you can continue renewing it until Intuit changes its policy or crushes you with exorbitant annual subscription increases. Alternatively, you can dive in and convert to QuickBooks Online. If you have an ancient version of QB's Desktop that was a one-time purchase (not subscription-based) and want to stick with the desktop a while longer, you need to move fast and purchase licenses to the current QuickBooks Desktop products. After July 2024, QuickBooks Desktop will not be available for new licensees. After July 31, 2024, Intuit will no longer sell new subscriptions to the following Desktop products in the US QuickBooks Desktop Pro Plus QuickBooks Desktop Premier Plus QuickBooks Desktop Mac Plus QuickBooks Desktop Enhanced Payroll Existing customers of Desktop Pro Plus, Premier Plus, Mac Plus, and Enhanced Payroll subscribers can continue to renew their subscriptions after July 31, 2024. Intuit will continue to provide security updates, product updates, and support for existing subscribers as per the subscription terms. All QuickBooks Desktop Enterprise subscriptions (Silver, Gold, Platinum, and Diamond) will remain available for new subscribers after July 31, 2024. Enterprise Gold, Platinum, and Diamond include integrated payroll. These subscriptions run from about $ 2,000 to $ 5,000 annually. Need Guidance with QuickBooks? Slingshot is ready to assist. Reach out to schedule a free review and consultation today. #QuickBooks #QuickBooksonline #Quickbooksdesktop #QuickbooksMigrate #QuickBooksRetired

  • Why Is Google Sending My Mail to Junk? Tips to Avoid Having Your Emails Marked as Spam

    Without DNS Updates, Google Will Send Your Emails to Spam Folders Google and  Yahoo have made significant changes to their email authentication requirements. These updates enhance email security and combat spam but can redirect improperly configured emails to the spam folder. All organizations that send emails must implement improved email authentication configurations to ensure the deliverability of their outbound messages. Otherwise email will go to Junk. Email Authentication Changes Effective February 2024, Google and Yahoo have implemented new guidelines for email senders. These requirements impact all senders, not just high-volume ones. Senders must implement specific DNS (Domain Name Services) authentication protocols: SPF (Sender Policy Framework) DKIM (DomainKeys Identified Mail) DMARC (Domain-based Message Authentication, Reporting, and Conformance). Additionally, user-friendly practices like one-click unsubscribe links are encouraged. Google and Yahoo are ensuring that email communication remains secure and reliable. Adopting these changes and implementing the necessary authentication measures is crucial to successful email deliverability. Be assured that most email hosts will quickly adopt these strict authentication requirements. Slingshot Information Systems has deployed these enhanced DNS authentication measures for many clients to prevent important messages from being sent to Junk or blocked. Organizations that don’t address the new requirements will see the percentage of undelivered emails skyrocket. We can quickly and painlessly implement these changes for your business in a few minutes. Contact Slingshot today for your free 30-minute online business IT needs review. #spf #dkim #dmarc #SPAM #JunkFolder #Junk #dns #emaildeliverability

  • Guarding Your Digital World: How to Stay Safe from Phishing Attacks

    You probably have secret passwords that you use to access your email, bank, Amazon account, and other online resources. Phishing is when a cyberattacker tries to trick you into giving them those passwords or other important information by masquerading as someone you trust. Sometimes, people who are up to no good try to trick you into giving them your personal information, like your passwords, credit card numbers, or even your full name. They do this by pretending to be someone you trust, like a friend, a colleague, or a company you know. Hackers send you messages that look real but aren't from the advertised sender. These scam messages might ask you to click on links or share your secret information. Phishing is like when a fisherman uses an artificial lure to trick fish into biting the hook. In the same way, these phishers use forged email addresses in emails that look urgent and official to try and catch your personal information. It's essential to be very careful online. Slow down! Don't click on suspicious links or give out your private details to anyone unless you're sure it's safe. No one needs your email credentials. Double-check who's sending you messages, and if you're not sure, ask your trusted IT helpdesk for assistance. Don't hesitate to call the sender to verify using a number from your contacts. Cybersecurity is essential to protect your personal information and devices from online threats. Here are some of the best cybersecurity protections you can use: 1. Strong, Unique Passwords: Use strong and unique passwords for all your online accounts. Avoid easily guessable information like birthdays or common words. Consider using a password manager to help you securely create and store complex passwords. 2. Multi-Factor Authentication (MFA): Enable MFA whenever possible. This adds an extra layer of security by requiring you to provide more than just a password, such as a temporary code sent to your phone or an authenticator app to access your accounts. 3. Regular Software Updates: Keep your operating system, software, and apps up to date. Software updates often include security patches that fix vulnerabilities that hackers can exploit. 4. Firewalls: Use a firewall, which acts as a barrier between your device and potential threats from the internet. 5. Endpoint Detection & Response, Antivirus and Anti-Malware Software: Install reputable EDR, antivirus, and anti-malware software on your devices. These programs can help detect and remove malicious software, viruses, and activity. 6. Safe Browsing Habits: Be cautious when clicking on links or downloading files from unknown sources. Avoid suspicious websites (is it really Adobe.com?) and emails, and don't download attachments or click on links from senders you don't recognize. 7. Secure Wi-Fi: Use a strong, unique password for your Wi-Fi network and enable encryption (WPA3 is the latest standard). Avoid using public Wi-Fi networks for sensitive activities if possible. If you must use public Wi-Fi, make sure it's really the official airport network. 8. Data Encryption: Use encryption tools or services, especially for sensitive data. This ensures that even if someone gains access to your files, they can't read them without the encryption key. 9. Regular Backups: Back up your data regularly to an external device or a secure cloud service. In case of a cyberattack, you can restore your important files. 10. Awareness and Education: Stay informed about common online threats and phishing scams. Educate yourself about safe online practices, and teach them to your family members and friends. 11. Privacy Settings: Adjust the privacy settings on your social media accounts and other online platforms to limit the information you share with the public. 12. Secure Your Mobile Devices: Apply the same security practices to your smartphones and tablets. Use screen locks, enable encryption, and be cautious when downloading apps. 13. Network Security: If you have a home network, change the default login credentials for your router, and consider using a strong, unique password. Regularly check for firmware updates for your router. 14. Employee Training (for Businesses): If you're in a business or organization, provide cybersecurity training to employees to prevent data breaches and other security incidents. 15. Incident Response Plan: Have a plan in place for what to do if you suspect a security breach. Knowing how to respond can minimize damage and help you recover more quickly. Remember that cybersecurity is an ongoing effort. New threats emerge regularly, so staying vigilant and updating your defenses is crucial to maintaining your online safety. Don't Panic - Take your time - If it seems a little off, don't click it. Contact Slingshot to learn how to protect yourself from suspicious emails or phone calls.

  • Why Outsourcing Technology Maintenance and Support Helps You Focus on Your Business

    It's nearly impossible to operate a growing, successful business without technology. From managing finances to communicating with clients, technology is integral in the process of keeping your business up and running. However, working toward a secure and efficient technology foundation for your workflow requires much time and effort. This is where outsourcing your technology maintenance and support can be a help, allowing you and your team to focus more on your core operations and activities. IT support teams that offer outsourced IT maintenance, management, and security for their clients are often called Managed Service Providers or MSPs. These firms partner with your business to provide a holistic approach to securing and caring for your data and operational IT environment. Some of the services commonly provided by MSPs are: Response to IT incidents to help mitigate damage Continuous remote monitoring to detect and prevent potential security issues within your systems Patch and version management so your systems are running on the most appropriate updates Onsite support for more complex issues that require physical maintenance Cloud hosting and migration services to help you leverage cloud tools and workflow Backup and disaster recovery solutions to help secure your critical company and client data Outsourcing technology maintenance and support can be a great way for businesses of all sizes to free up resources, save money, and give their teams more time to focus on core functions. Here are a few pro-business advantages to partnering with a trusted IT support vendor for outsourced technology management and security. Cost-efficiency Hiring in-house employees to manage your technology can be expensive, especially for small and mid-sized businesses. According to Glassdoor.com, the average IT employee with four to six years of industry experience commands a salary of $80,462 (USD) per year.[1] For small to mid-size businesses, outsourcing their IT maintenance and support can be cost-efficient, reducing the added expense of hiring costs, salaries, taxes, and other benefits. Access to expertise The technology landscape is constantly evolving, and it's difficult for small and mid-sized businesses to find/retain skilled IT professionals. As a company grows, its technology needs to expand, often requiring very specialized assistance in technologies such as: Cloud services Virtualization AI and Machine Learning Backup and disaster recovery Software development Network infrastructure maintenance Management of remote devices and users Focus on core business workflow As a business owner, you want your focus to be on growing your business and expanding your customer base, not fixing technology-related issues. Outsourcing technology maintenance and support allows you to channel your resources toward business development and other critical areas of company excellence. Improved Security Cybersecurity breaches are becoming more rampant, and businesses of all sizes are vulnerable to these threats. Outsourcing technology maintenance and support provides you with access to reliable security measures that will help keep your business secure from external threats such as: Malware, viruses, and other malicious attacks Data breaches Ransomware attacks Phishing attempts Smaller businesses often do not have the resources needed to protect their technology from cyber threats, which makes outsourcing an effective way to protect their business data and sensitive customer information. Scalability As businesses grow, their technology needs also grow. Scaling up an in-house IT team may be quite challenging, and it is definitely time-consuming and expensive. Outsourcing technology maintenance and support to a trusted IT support vendor enables businesses to scale up or down easily, depending on their needs. The flexibility of outsourced technical support enables businesses to adapt to changing circumstances without being limited by their existing technological resources. Conclusion: Letting Slingshot handle your technology maintenance and support provides a wide range of benefits for your business, regardless of your company’s size. From cost savings and access to IT specializations to improved security and scalability, outsourcing allows you to focus on your core business processes while knowing your technology is in good hands. With these advantages, it's no surprise that outsourcing technology security, maintenance, and support is becoming the preferred option for businesses like yours looking to operate efficiently and cost-effectively.

  • Make It Stop!

    MFA Fatigue Attacks Multi-Factor Authentication (MFA) adds unparalleled security to your mail and network accounts. Microsoft reports that “MFA can block over 99.9% of account compromise attacks.” Most of our clients have implemented some level of MFA and we are working to protect 100% of them. In response, the bad operators are using aggressive techniques to circumvent MFA. We have experienced firsthand MFA Fatigue Attacks. In this scam, cybercriminals barrage users with MFA authentication requests. They often strike late at night when users are asleep and not at their sharpest. Often the recipient will approve the request just to make the annoyance go away. Unfortunately, blindly approving the authentication request can give hackers access to your email, contacts, calendar, SharePoint, and OneDrive data. Watch this 3-minute video to learn more about this con. If you have any questions or feel you may have been compromised, don’t hesitate to contact us for assistance. Clients can email our helpdesk directly to open a support ticket.

  • Microsoft 365 Users Targeted with Voicemail Phishing Emails

    We see frequent fake voicemail phishing attempts on our clients. The emails include subject line phrases such as “Voicemail Transcript” and “Missed Call” and HTML attachments with names such as Voicemail.wav.html. The attachments appear to be typical audio files with the familiar "wav" suffix included in the file name. If clicked, the attachments lead users to a fake Microsoft login page. It’s already populated with your email address and will prompt for your Microsoft 365 password. If you give up your private email credentials, the bad guys will: 1. Take over your email account 2. Email your contacts as you 3. Gain access to all of your messages, contacts, calendar, and your OneDrive and SharePoint data. 4. Comb through your data in search of valuable passwords Don't get duped! Protect Yourself Never open unverified email attachments. If someone you know sends you an attachment you're not expecting, check if it is really them via another contact method - call them. Never enter credentials before checking the actual URL of the site. Is it Microsoft? Enable multi-factor authentication (MFA). If you accidentally give up your password to a phishing attack, MFA will likely stop the bad guys from logging into your account. Slow down; if an email is unexpected, unusual, or feels a little off, stop before you blindly click yourself into a whole lot of pain. Our clients can always ask us to check it out before opening.

  • Backup for Microsoft 365

    Protect Your Data—Protect Your Business Your business constantly creates data that fuels your operations and growth. Much of that data is stored in Microsoft 365. So, who is responsible for protecting and backing it up? You may believe that Microsoft maintains all your Microsoft 365™ data. However, the reality is the burden can fall on you – unless you opt for Data Protection for Microsoft 365. Adding this vital online backup service can help protect you from security incidents such as ransomware and business email compromise, as well as file and account deletions that exceed the default Microsoft retention policies. With Data Protection for Microsoft 365, we can help you recover files and accounts at any time, even if they are accidentally or maliciously deleted by an insider or external cybercriminal. Automate Backup to protect your files We will manage your Backup for Microsoft 365 to: • We will manage your Backup for Microsoft 365 to: • Back up Microsoft 365 Exchange™ every four hours • Back up Microsoft 365 OneDrive® every six hours • Back up Microsoft 365 SharePoint® (including Microsoft Teams® files and data that are stored in SharePoint) every six hours. Custom- and sub-libraries are backed up and can be recovered individually as needed Retain and recover your data We will use the solution to help ensure you can: • Recover the data you want swiftly and easily • Meet retention requirements for data storage • Retain and recover Microsoft 365 Exchange email, calendars, contacts, and tasks for seven years • Retain and recover Microsoft 365 OneDrive data for seven years • Retain and recover Microsoft 365 SharePoint data and permissions for seven years Extend and Modernize Data Protection We can help you: • Keep your data protection services up-to-date as your new business units or employees adopt Microsoft 365 • Avoid lost time, reduced productivity, and frustration while trying to recover irrecoverable data, such as expired or permanently deleted files and sites • Maintain effective business continuity by recovering files, ranging from individual requests to complete employee or business reinstalls Conclusion Using Slingshot's Cove Data Protection Backup for Microsoft 365 can help protect your business and data against accidental and malicious acts of file and account deletion. If this online backup service helps you restore your business after a security incident such as ransomware, the ROI on your investment will be exponential. Protect your business and your productivity. Get peace of mind knowing you can recover your Microsoft 365 data for any reason, at any time. Start today. *Fair use policy includes up to 1TB of Microsoft 365 data per user. Need more information? Watch this 1.5-minute video on M365 Backup

  • Save A Life - Stop Texting & Driving

    Next time you consider texting while driving consider these facts: At 60 MPH you travel 352 feet in the four seconds it takes you go glance at your phone. That's equivalent to about 23 car lengths or 50 feet longer than a football field. Using a cell phone while driving, whether it’s hand-held or hands-free, delays a driver’s reactions as much as having a blood alcohol concentration at the legal limit of .08 percent (National Safety Council) Approximately nine people are killed and more than 1,000 injured daily in the United States in incidents reported as involving a distracted driver, the CDC reports iPhone iOS includes configurations for DND while driving which can be activated automatically or manually. Google's Pixel 2 phones include a similar application. Other Android devices will need to download a free, third-party applications such as Driving Detective. I'm an iPhone guy so I haven't tested it but it is well reviewed. iPhone Do Not Disturb While Driving You can let Do Not Disturb while driving turn on automatically, or you can add it to Control Center for convenient manual access: Go to Settings > Control Center > Customize Controls. Tap the "Plus" next to Do Not Disturb While Driving. Now you can swipe up from the bottom of your screen and tap the car icon to turn the feature on or off.

  • Double Your Monitors, Double Your Fun!

    No New Monitors Required - It's Free Microsoft Windows has a little-known feature that makes it embarrassingly simple to create multiple virtual desktops. If you have two monitors now, imagine turning those into four, six, or more unique desktops. Virtual desktops allow you to organize your work on separate desktops. Picture working on two projects on your laptop during a long flight. Multiple open windows for Outlook, Word documents, Excel spreadsheets, and a browser quickly clutter your desktop. Finding your way back and forth between documents is awkward. Microsoft's Virtual Desktop is our straightforward remedy. Visualize two separate, unique desktops where you organize each project and its open windows on dedicated desktops as you would with two monitors. It's built into Windows, and you can have it working in ten seconds. Learn how below. Create A Virtual Desktop Click the TaskView button located adjacent to the Start button or use the keyboard shortcut Windows Key + Tab. Click the "New desktop" button in the upper left corner of the Task View Window. Open Task View (Windows Key + Tab) now, and you will see your desktop options #1 and #2 in the upper-left corner of the screen and the button to create an additional desktop. Navigating Virtual Desktops Move between virtual desktops using the keyboard shortcut Windows Key + Ctrl + left or right arrow. Time-saving keyboard shortcuts Windows+Tab: Open Task View Windows+Ctrl+D: Create a new virtual desktop Windows+Ctrl+Left or Right Arrow: Switch between virtual desktops Windows+Ctrl+F4: Close the current virtual desktop Esc: Close Task View Conclusion Test out virtual desktops by creating one then opening a set of applications, documents, and browsers dedicated to a task or project. Today, I created a virtual desktop to separate this blog article from my routine desktop. I opened a browser with my blog editor, I had One Note and Word running, and kept a File Explorer window open to the pictures folder where I was creating images for the blog. When calls or messages came in, I seamlessly moved back to my primary desktop to take care of business, then back to the blog desktop where all of my windows were laid out just as I left them. I think you will find virtual desktops useful. If you need a little help, do not hesitate to reach out to us at helpdesk@slingshotis.com or by using our contact form. Slingshot Information Systems is your source for reliable network and computer support services.

  • Shoot-Down 99.9% of Cyber-Attacks

    There are countless ways for cybercriminals to steal your passwords and take over your email account. Once they have your mail, they will leverage its contents to access other accounts, reset passwords, and spoof other users into giving up their credentials. Most data breaches are due to the use of default, weak, or stolen passwords. Losing control of your mail account is a nightmare. It's embarrassing and can threaten your livelihood. Multifactor Authentication or MFA adds a rock-solid security layer to deflect those attacks. The bad guys may have your password, but without your phone, they're foiled, and your data remains yours and safe. Melanie Mayes of Microsoft Security says MFA protects users "by providing an extra barrier and layer of security that makes it incredibly difficult for attackers to get past, MFA can block over 99.9 percent of account compromise attacks. With MFA, knowing or cracking the password won’t be enough to gain access." Seven Easy Steps to lock-down your Microsoft 365 Email 1. Enable MFA in the Microsoft 365 Admin Center 2. Download Microsoft Authenticator for your mobile device 3. Log in to the Microsoft Office Portal with your user account 4. Follow the instructions to configure the mobile app 5. Scan the QR Code to add your account 6. Add your cell number for secondary access 7. Record the authenticator app password for applications that require it Prevent 99.9% of attacks on your accounts by implementing MFA today. Follow this link to our Knowledgebase step-by-step instructions. Contact Slingshot Information Systems for friendly, competent assistance in securing your network.

bottom of page