What is Ransomware: Malicious software designed to encrypt a victim’s files and then demand payment, generally in anonymous Bitcoin, in exchange for decrypting the files. As with other malware infections, ransomware attacks typically start with employees falling victim to phishing emails or visiting compromised websites. Unlike other malware infections, however,…
Common security threats – Social Engineering
What is Social Engineering: There are two ways to steal anything — you either take it yourself or you get someone else to give it to you. Social engineering is a broad umbrella term for any tactics designed to exploit and manipulate trust. Hence, the victim hands the attacker what…
Common security threats – Phishing
What is phishing: Any attempt to compromise a system and steal information by tricking a user into responding to a malicious message. The most common phishing attacks involve emails armed with malware hidden in attachments or links to infected websites. However, phishing can be conducted via other methods such as…
Common security threats – Zero-Day Attack
The first key to any effective security game plan is knowing what you’re up against. We decided to share some of our knowledge and create for you a set of short, informative but simple blogs where you’ll learn all about ten of the most common threats your company is likely…
From eWorker to Office Warrior
With work locations in Canada, the US, Europe and Dubai, the iRangers team is spread around the world. Some of the iRangers work in our offices, while others connect remotely. Dima Razbornov has been working as part of the team remotely for 4 years and this spring he joined the…
Microsoft Intune – helps you simplify IT delivery
With thousands of organizations taking their infrastructure to the Microsoft Cloud platform today, we at iRangers are observing a common pattern they are struggling with. We notice that often organizations are not aware of all the benefits and possibilities that come with the integration of Microsoft Cloud. One of these…
Conditional Access = taking security to the next level
Conditional access and data security requirements? We know that enterprises need to secure their data while keeping productivity in mind. We were recently engaged in a project that is like many projects we do, a migration from Exchange to Office 365. However, this project was quite different as well. Unlike…
Group-Based Azure AD Licensing is now free and ready to go
Hey Mr. Admin, are you still assigning licenses to users manually? Well, better pause right there and call me, I’ll talk you out of it! Or just read through this short post. Previously we had a preview of Group-Based Azure AD Licensing, now they are GA and cost nothing. Yay, we…
Microsoft Enterprise Mobility + Security
The realities of the modern workplace are very different from what they used to be just a few years ago. Do you miss the good old days, when you only had to remember one password to login into your computer and everything you needed was right there? Well, most likely…
SENDAS PERMISSIONS ON MOBILE
Struggling with granting SendAs permissions on user’s cellphones? Just use our lifehack to set it up! Not so long ago, Misha Hanin wrote about the most convenient way to tackle multiple email addresses on your desktop. Now, we want to help you solve the challenge of setting up Receive As / Send…