Author: Adam Bishop
-

Passkeys: The Future of Secure Online Authentication
In recent years, the adoption of passkeys has seen a significant rise. According to recent research, awareness of passkeys has jumped from 39% in 2022 to an impressive 57% in 2024. Even more encouraging is that 62% of those who are aware of passkeys are actively using them to secure their online accounts. This shift…
-

Outlook Quarantine
Understanding Quarantine Policies in Microsoft Defender for Office 365 In today’s digital landscape, email security is paramount. Microsoft Defender for Office 365 offers robust protection through its quarantine policies, ensuring that potentially harmful or unwanted messages are effectively managed. Here’s a closer look at how these policies work and what they mean for users. What…
-

Beware the Phishing Phantoms
As the eerie chill of Halloween creeps in, it’s not just ghosts and goblins you need to watch out for. In the shadowy corners of the internet lurk the sinister phishers, ready to trick you into giving up your precious information. This Halloween, arm yourself with knowledge and stay one step ahead of these digital…
-

Has OneDrive caused an issue with your files?
When setting up a new Windows PC, some of your files may be relocated to the cloud without you noticing. This can be beneficial or problematic. If this happens, remember Douglas Adams’ advice: Don’t panic. First, understand what’s going on. Windows creates a set of standard folders (Desktop, Documents, Downloads, Pictures, Music, Videos) in your…
-

Understanding OneDrive Personal Vault
In today’s digital age, safeguarding sensitive information is more crucial than ever. Whether it’s personal documents, financial records, or cherished photos, ensuring their security is paramount. Enter OneDrive Personal Vault—a feature designed to provide an extra layer of protection for your most important files. What is OneDrive Personal Vault? OneDrive Personal Vault is a secure area within…
-

Unmasking Phishing Emails
Phishing is a cyberattack where malicious actors impersonate reputable organizations to steal sensitive information, deploy ransomware, or compromise systems. With the increasing volume of emails sent daily, distinguishing between legitimate and phishing emails has become more challenging. However, there are several telltale signs to help identify phishing attempts. By being vigilant and recognizing these signs,…

