BOOK AN APPOINTMENT WITH AN IT SPECIALIST TODAY

Microsoft Makes Anti-Spam Changes

Microsoft Makes Anti-Spam Changes

The year 2020 is not the only thing that is coming to an end. Microsoft is slowly rolling out changes meant to deter spam. This is causing some features to come to an end and changing the way a few Microsoft products, most notably email, is used. As a business owner, it is important to stay on top of changes with the software and programs that your business utilizes. Here is a little bit more information about the anti-spam changes and what those changes can mean for your business.

Microsoft Antispam

Why Is Microsoft Making Anti-Spam Changes?

Microsoft recently released an add-on: Microsoft Defender for Office 365 Plan 2. Many of the anti-spam changes were made when this add-on released, and a few more are expected to roll out at the end of January 2021. The primary reason for these changes is to better protect your business against phishing attacks, spoofing attacks, and to limit the number of spam emails that are sent. Some of these changes affect all Microsoft products as a whole, while others are geared toward specific products, such as email.

Why Should Your Business Be Aware of These Changes?

Your business needs to be aware of these changes because they can alter the way your business operates. You may need to update software or you may need to retrain your staff on how to use products. As these changes roll out, many IT professionals are already receiving phone calls from those that they serve letting them know that they can no longer use certain features and asking for a workaround. Releasing an email to your staff or providing them training as a group can help prevent mass emails or phone calls to your IT professional.

What Types of Changes Is Microsoft Making?

One of the biggest changes that Microsoft has made so far is disabling automatic e-mail forwarding. This has changed the way that your office may forward emails to other employees in the business and clients outside of the business. One of the major changes that is expected to happen at the end of January 2021 involves no longer allowing the “allow list” or “block list” from the SPAM policy setting in Exchange Office to function. Instead, you will need to add your allow or block list elsewhere. Finally, Microsoft is making subtle changes to all license-level software to increase protection and decrease phishing and spoofing risk. While you may not necessarily see these changes, you may find that you need to update your software if it does not automatically self-update.

Microsoft is making anti-spam changes to decrease spam and to help prevent phishing and spoofing attacks when using Microsoft Office 365. If you own a business, you need to be aware of these changes, as it can impact these products. Your IT professional can help advise your office on the changes that are being made and update your software to ensure you are using the latest Microsoft Office products.

More Like This

157-Year-Old Lincoln College Succumbed To A Ransomware Attack

157-Year-Old Lincoln College Succumbed To A Ransomware Attack On May 13th, 2022, a college that has remained open through two world wars, the 1918 Spanish flu epidemic, and the Great Depression will close its doors. The college has been struggling to stay afloat in recent years, and the coronavirus pandemic and a recent ransomware attack …

157-Year-Old Lincoln College Succumbed To A Ransomware Attack Read More »

Read More

AA22-131A: Protecting Against Cyber Threats to Managed Service Providers and their Customers

Original release date: May 11, 2022 Summary Tactical actions for MSPs and their customers to take today: • Identify and disable accounts that are no longer in use. • Enforce MFA on MSP accounts that access the customer environment and monitor for unexplained failed authentication. • Ensure MSP-customer contracts transparently identify ownership of ICT security …

AA22-131A: Protecting Against Cyber Threats to Managed Service Providers and their Customers Read More »

Read More

Zero Trust Networks: What Are They?

Zero Trust Networks: What Are They? The internet has brought a world of opportunity for businesses. It is easy for companies to reach out to consumers and offer them products or services without a physical storefront. However, this also opens businesses up to the risk of data breaches and cyber attacks. Cyber attacks can be …

Zero Trust Networks: What Are They? Read More »

Read More

AA22-117A: 2021 Top Routinely Exploited Vulnerabilities

Original release date: April 27, 2022 Summary This joint Cybersecurity Advisory (CSA) was coauthored by cybersecurity authorities of the United States, Australia, Canada, New Zealand, and the United Kingdom: the Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), Federal Bureau of Investigation (FBI), Australian Cyber Security Centre (ACSC), Canadian Centre for Cyber Security …

AA22-117A: 2021 Top Routinely Exploited Vulnerabilities Read More »

Read More

Can Ransomware Spread Through Business WiFi Networks?

Can Ransomware Spread Through WiFi? Ransomware has been a menace to businesses large and small for years, and the problem is only getting worse. One of the most insidious aspects of ransomware is its ability to spread through wifi networks, infecting multiple computers and devices. This can cause severe disruptions to business operations, as employees …

Can Ransomware Spread Through Business WiFi Networks? Read More »

Read More

AA22-110A: Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure

Original release date: April 20, 2022 Summary Actions critical infrastructure organizations should implement to immediately protect against Russian state-sponsored and criminal cyber threats: • Patch all systems. Prioritize patching known exploited vulnerabilities. • Enforce multifactor authentication. • Secure and monitor Remote Desktop Protocol and other risky services. • Provide end-user awareness and training. The cybersecurity …

AA22-110A: Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure Read More »

Read More