Microsoft Office Mobile Apps Now Support Co-Authoring Encrypted Documents

Microsoft has announced that its Office mobile apps now support co-authoring documents encrypted with sensitivity labels. This capability has been available on the Office desktop and web clients for a while now, and it’s finally making its way to the iOS and Android versions of the app. With the new co-authoring feature, the Microsoft Office […] Continue reading Microsoft Office Mobile Apps Now Support Co-Authoring Encrypted Documents

OneDrive Sync Support Now Generally Available for Apple M1 Macs

Microsoft announced today that its OneDrive sync client for Mac is now generally available for Apple M1-powered Macs. The updated OneDrive version launched in public preview for Office Insiders back in December 2021. It allows the app to natively on M1 processors which should lead to better performance. “We’re excited to announce that OneDrive sync […] Continue reading OneDrive Sync Support Now Generally Available for Apple M1 Macs

What’s New in Microsoft Teams – February 2022

Microsoft has detailed new features and capabilities that arrived in its Teams collaboration platform in February. This month, the biggest improvements include a new mute notifications feature for meetings, a Compact mode for chats, end-to-end encryption (E2EE) support for mobile, and more. 1. Mute meeting notifications First up, Microsoft is now rolling out the ability […] Continue reading What’s New in Microsoft Teams – February 2022

Recording Podcasts via Microsoft Teams Best Practices Guide

During the pandemic, Microsoft Teams has become a popular tool for recording podcasts because it provides an easy way to bring in guest speakers. In this article, Jason Wynn shares his top best practices for recording podcasts using Teams. With the future of podcasting changing all the time, content creators are starting to realize that […] Continue reading Recording Podcasts via Microsoft Teams Best Practices Guide

How to Encrypt Emails in Outlook (Microsoft 365)

Outlook email encryption ensures that any email you send with Microsoft’s email client is encrypted before it leaves your computer. In this guide, we’re going to detail the multiple ways to use email encryption in Outlook, as well as why you may want to start using this feature whether it’s for business communications or personal […] Continue reading How to Encrypt Emails in Outlook (Microsoft 365)

Google Drive accounted for 50% of malicious Office document downloads

By Deeba Ahmed
OneDrive was responsible for 19% while 15% of malicious Microsoft Office documents were downloaded through Sharepoint in 2021.…
This is a post from HackRead.com Read the original post: Google Drive accounted for 50% of malicious Of… Continue reading Google Drive accounted for 50% of malicious Office document downloads

Microsoft Office Apps to Block All Downloaded VBA Macros By Default

Microsoft is finally getting ready to block Visual Basic for Applications (VBA) macros downloaded from the internet by default in several Office apps. The Redmond giant has already started restricting Excel 4.0 (XLM) macros, and this change will now impact all VBA macros in Word, PowerPoint, Visio, Access, and Excel files. By default, Microsoft Office […] Continue reading Microsoft Office Apps to Block All Downloaded VBA Macros By Default

MJFChat: How Microsoft Viva Helped Us Move to a 4-Day Work Week

  In my role as Petri’s Community Magnate, I will be interviewing a variety of IT-savvy technology folks. Some of these will be Petri contributors; some will be tech-company employees; some will be IT pros. We will be tackling various subject areas in the form of 30-minute audio interviews. I will be asking the questions, […] Continue reading MJFChat: How Microsoft Viva Helped Us Move to a 4-Day Work Week

Attackers connect rogue devices to organizations’ network with stolen Office 365 credentials

Attackers are trying out a new technique to widen the reach of their phishing campaigns: by using stolen Office 365 credentials, they try to connect rogue Windows devices to the victim organizations’ network by registering it with their Azure AD…. Continue reading Attackers connect rogue devices to organizations’ network with stolen Office 365 credentials