business woman in front of computer screen showing warning message

Some Ways that Microsoft 365 Administrators can Protect Against Business Email Compromise (BEC)

Overview: According to the FBI, business email compromise (BEC) is one of the most financially damaging online crimes.[1] It is also perhaps one of the tricks that even the savviest businessperson may fall for. Email account compromise (EAC) is a closely related tactic. This article examines some ways in which Microsoft 365 administrators can lower

abbyy reporting service flow diagram

Release of New FlexiCapture Reporting Service

The ABBYY FlexiCapture 12 R3 Update 1 includes a new component called the ABBYY FlexiCapture Reporting Service which is compatible with FlexiCapture 12 R3 Update 1 and later (and is not compatible with previous versions). This service collects information about the quality of document processing, the performance of the software and overall effectiveness of FlexiCapture.

green leaf in a water glass with a blackboard of text next to it

Challenges Encourage Growth During the Global Pandemic

Over this past year of 2020, workers and companies have been faced with new challenges relating to the pandemic. Illness, anxiety, fear, and unpredictable circumstances are just a few to mention. Many have had to learn how to make different decisions and adjustments to their everyday routines. Workers have had to learn how to be creative and flexible by molding their home and work environments together. Initially this challenge may have seemed overwhelming and at times not conducive for the workforce, but it is during challenging times like these that great advancements and positive change have had space to take root and grow. This is where recent technological advances in software will help.

Read More

person holding a smart phone with a lock screen showing

Understanding and Using Microsoft 365 App Passwords

In an environment of increasing security restrictions, I have noticed in my role as a Microsoft 365 administrator a misunderstanding among users regarding application (or app) passwords. The core idea of how app passwords came about was the need for Microsoft 365 application designers to provide an authentication mode for a non-interactive login in a Microsoft 365 environment with multi-factor authentication (MFA) policies enforced. There is a bit more to it than that, but an app password provides a way for an application connecting to Microsoft 365 to authenticate with a username and a single password without using a second factor. That begs the question, if the application can authenticate through just a username and password, and multi-factor authentication is enforced in the domain, then how does that satisfy the requirement for multi-factor authentication? This question is perhaps why so many users misunderstand app passwords or have perhaps never thought to create an app password in the first place. We will try to clear up some of the confusion in our post today.