Cum sa creezi o regula de retention policies (arhivare) in Office 365
Vrei sa setezi o regula de retention policies in Office 365:
[mai mult...]Soluții pentru problemele tale IT
Vrei sa setezi o regula de retention policies in Office 365:
[mai mult...]Vrei sa setezi o regula de jurnal pentru toate conturile in Office 365.
[mai mult...]Daca ai acces webmail prin interfata horde, poti configura singur optiunea de “out of office”.
[mai mult...]Two-factor authentication (2FA) is a great security tool, and we always recommend it. Most apps make it pretty easy to turn on 2FA, and LinkedIn is no exception. Here’s how to enable it and make yourself safer.
You can turn on two-factor authentication from either the LinkedIn website or the mobile app, but either way, you’ll need to be logged in to your LinkedIn account. Go ahead and do this first.
Click on your avatar in the top-right corner of the LinkedIn website. In the menu that opens, click the “Settings & Privacy” option.
Click on the Account tab, scroll down to the “Two-Step Verification” section, and then click the “Change” link.
The section will expand. Click the “Turn On” button.
You can choose whether to use an authenticator app to generate a code for you or to receive SMS (text) messages with the code. We strongly recommend using an authenticator app as it’s more secure, but two-factor authentication using SMS is still much safer than not using two-factor authentication at all.
Choose your method—we’re going to use an authenticator app—and then click the “Continue” button.
Enter your password in the prompt that appears and then click “Done.”
The instructions for adding an account to your authenticator app are displayed. Add a new account in your authenticator app, scan the QR code using your phone’s camera, and once the account is created, enter the six-digit code from the authenticator app into the text box in LinkedIn and click “Continue.”
Two-factor authentication is now turned on. Click on “Recovery Codes” to display the backup codes, so you can still get in if you ever lose your phone.
Click “Copy Codes” and save them somewhere secure. You’ll need them to get into your LinkedIn account if you ever lose or wipe your phone.
Now that you’ve turned on two-factor authentication, you’ll need to log in again through any other devices you use, such as your phone.
Turning on two-factor authentication in the mobile app is the same on the iPhone, iPad, and Android. Open the app and tap your profile picture.
Then select the “View Profile” link.
Tap on the Settings gear in the top-right corner.
Open the “Privacy” tab, scroll down, and then tap “Two-Step Verification.”
Select the “Set Up” button.
You can choose whether to use an authenticator app to generate a code for you or to receive SMS (text) messages with the code. We strongly recommend using an authenticator app as it’s more secure, but two-factor authentication using SMS is still much safer than not using two-factor authentication at all.
Choose your method—we’re going to use an authenticator app—and tap “Continue.”
Enter your password in the prompt that appears and then tap the “Submit” button.
The instructions for adding an account to your authenticator app are displayed. Add a new account in your authenticator app and then tap “Continue.”
Enter the six-digit code from the authenticator app into the text box in LinkedIn and tap “Verify.”
Two-factor authentication is now turned on. You won’t have to enter the two-factor code on your phone, although you will have to enter it if you access LinkedIn on any other device.
Tap the “Recovery Codes” link to display the backup codes, so you can still get in if you ever lose your phone.
Tap “Copy Codes” and save them somewhere secure. You’ll need them to get into your LinkedIn account if you ever lose or wipe your phone.
Now that you’ve turned on two-factor authentication, you’ll need to log in again on any other devices you own using the two-factor code.
[mai mult...]Phishing is designed to trick you into giving your password or other information to an imposter.
For example, let’s say you get an email claiming to be from your bank. The email says your account may be compromised, and you should click this link to take action. You click the link in the email and end up on a site that looks just like your bank’s real website. In a rush to secure your account, you type your password and possibly other details like your credit card number. Boom, you’ve been phished. The attacker now has your bank account’s username and password, as well as any other information you provided. That wasn’t your bank’s real website. You got an email from a scammer.
Security professionals recommend against clicking links in emails like this. Instead, go to your bank account’s website directly and sign in. Similarly, if someone claiming to be from your bank calls you on the phone, it’s a good idea to hang up and call your bank’s customer service number directly to see if the call is legitimate.
You could end up on a phishing site in many other ways. Maybe you click a link to buy something on the web and end up at what looks like Amazon.com or another legitimate store, for example. Perhaps you click a link to email someone and end up on what appears to be a Google login screen for your Gmail account.
There’s one thing you can do to spot phishing sites: Examine the URL, which is the address of the web page. For example, if you bank with Chase, you’d look to verify you were on chase.com. But phishing sites could be clever—for example, a phishing site might use the domain “secure.chase.com.example.com/onlinebanking/login”.
If you understand URLs, you’ll realize that that particular URL is actually hosted on “example.com” and not “chase.com”.
Similarly, some phishing websites will use characters that look similar to other characters. It’s all part of making the URL look similar to the real one. After all, many people likely don’t examine the URL at all. Even people who do may just be trained to look for something like “chase.com.” Not everyone understands how to decode that line of text.
If you use a password manager, you have additional protection. This is true as long as your password manager can automatically fill your credentials, whether it’s 1Password, LastPass, Dashlane, Bitwarden, or even the password-saving feature built right into your web browser.
If you save a login for a website like Chase.com or Amazon.com, your password manager will remember it and offer to automatically fill it in for you when you’re on Chase.com or Amazon.com. If you end up on a different website, your password manager won’t offer to enter your credentials—after all, you’re on a different website. Your password manager doesn’t fall for the disguised URL.
This protection isn’t fancy, and you won’t see a big red “warning” message pop up. But you will quickly notice that wait a minute; your password manager isn’t offering to sign you in on this website. Why is that? Once you’ve noticed something is amiss, you might quickly discover you’re not on the website you thought you were on.
Peace of Mind When Logging In
Your password manager doesn’t just make it faster to enter your credentials while browsing the web. It gives you peace of mind while it goes about its job.
If you’re signing into your email online, you don’t need to double-check the domain before typing your username and password. You know that, if your password manager is offering to fill your credentials automatically, it’s already checked that the domain is a match with the one saved in your database.
Of course, the same features are available when you use a password manager on a mobile device like an iPhone, iPad, or Android phone. Use your password manager to enter credentials, and you’ll be protected from phishing on the mobile web, too.
[mai mult...]