Overview: According to the FBI, business email compromise (BEC) is one of the most financially damaging online crimes. It is also perhaps one of the tricks that even the savviest businessperson may fall for. Email account compromise (EAC) is a closely related tactic. This article examines some ways in which Microsoft 365 administrators can lower … Read More
In an environment of increasing security restrictions, I have noticed in my role as a Microsoft 365 administrator a misunderstanding among users regarding application (or app) passwords. The core idea of how app passwords came about was the need for Microsoft 365 application designers to provide an authentication mode for a non-interactive login in a Microsoft 365 environment with multi-factor authentication (MFA) policies enforced. There is a bit more to it than that, but an app password provides a way for an application connecting to Microsoft 365 to authenticate with a username and a single password without using a second factor. That begs the question, if the application can authenticate through just a username and password, and multi-factor authentication is enforced in the domain, then how does that satisfy the requirement for multi-factor authentication? This question is perhaps why so many users misunderstand app passwords or have perhaps never thought to create an app password in the first place. We will try to clear up some of the confusion in our post today.
Summary: Companies can easily implement some improved security standards in their email servers in order to increase the usefulness of email to their customers, vendors and stakeholders. Looking through my email inbox in Microsoft Outlook this morning I went looked over several emails that I have received from companies of various sizes and noticed that … Read More
Have you ever been looking into Optical Character Recognition (OCR) trying to find out more information about it, and you notice that everything you come across mentions that you have to know the difference between fixed vs. semi-structured form design. “I just want to find the right software!! Why does this have to be so … Read More
Summary: Learn how invoice processing software is rapidly becoming a disruptive innovation that allows companies to automate the tiring process of paying bills. As we stated in Part One of this series, sometimes when a new technological invention comes along we wonder how we ever lived without the new device or technological innovation. A “disruptive … Read More
We consider ten factors that will help a company select the proper document scanner. User Friendly Consulting consulted with a high-volume document scanning department at a large telecommunications company by providing expertise in the selection and operating of scanners. During their over two decades of experience with this client, they learned a lot about the … Read More
Accelerated Mobile Pages, an acronym for AMP, is an emerging tool to provide mobile optimized pages to reduce page load times on mobile devices and can easily be implemented in Joomla. As described on the AMP project page, the Accelerated Mobile Pages (AMP) project Google AMP is “an open source initiative that came out of … Read More
CPanel® provides companies with a very easy means of “parking” a temporary (or permanent) sub-domain on top of a main URL that can be used to complete the development process of a a web site. This is a very handy feature for cPanel users because it allows the assignment of a URL that can … Read More