Traditionally, locating folders within Outlook can be time-consuming, especially in accounts with extensive folder structures. To combat this, I wrote an add-in for Outlook which appears in the toolbar. The add-in provides a seamless solution by incorporating simple search capabilities, enabling me to quickly pinpoint desired folders through searches. It simplifies the navigation process, reducing the hassle of scrolling through a multitude of folders. By enhancing folder accessibility, this add-in empowers me to organize emails more effectively. With quicker access to relevant folders, I can prioritize tasks, retrieve information promptly, and maintain a structured email system. This efficiency boost translates into saved time and increased productivity throughout the workday. Bespoke Outlook add-ins tailored to specific user needs can unlock a plethora of benefits beyond a simple folder search. Customized add-ins might introduce functionalities such as real-time collaboration tools,
As we come to the end of cyber awareness month, we thought we'd share a couple of useful resources that you might find useful. If you have any questions, please feel free to get in touch. Multi-Factor Authentication Sometimes called MFA or 2FA (two-factor authentication) Protection From Malware and Ransomware Tech Support Scams Phishing Working Remotely - Securely We hope you found those useful.
We've become aware of an increasingly common scam which has taken in a number of our customers as well as hearing word of it from family and friends. One of our engineers also had the scam call, so we were able to gain first-hand knowledge of what happens. The scam is well-documented here on The Guardian's website but we also know that more stubborn recipients of the call (like our engineer) will be asked to perform other so-called checks (like CheckDisk/CHKDSK) to see how your PC is running in addition to looking at the Event Viewer. These routines always display something designed to alarm you and to make you think something is wrong with your PC. You're then asked to go to a website where the caller can then fix these for you. People are then directed to payment websites in order to pay for the service. However, the caller will often remain connected to your PC, disabling your anti-virus protection and installing trojans and key-loggers. They'll then get access to c
Comments
Post a Comment