13 June 2025
Most people are aware of the risk of clicking malicious links. However, iBizify would like to highlight a relatively new, growing security threat. The attack is sophisticated, executed by coordinated human teams, assisted by AI. It can bypass standard security mechanisms, and is performed discreetly.
It targets users of Microsoft 365 Business services, and other similar services. This phishing attack is particularly concerning, given that it uses sophisticated methods to effectively bypass multi-factor authentication – which is a common first line of defence against phishing attacks and password compromises.
⚠️ These emails will usually come from someone you know. The email address will be true and correct. It may pass standard security checks.
The breach begins with a phishing email or message that comes from a familiar address, such as a colleague, friend, or family. They may include the sender’s legitimate email signature, their name, and other details, making them look extremely convincing.
Here are a couple of examples of such email content, but the email may take any form:
These attacks often evade the detection of standard security software, due to the verified sender, and the use of an “innocent” service, such as OneNote, Pandadoc, amongst others.
The following describes the general nature of attacks iBizify has evaluated. In fact, every attack and its process can be very different.
Exercise extreme caution if you receive an email asking you to open a document or click a link, even if you know the sender. These links may lead to phishing sites that collect your login details and register a new multifactor authentication device for further access. Attackers could gain full remote access to your mailbox and other services.
Unlike regular attacks in the past, these are often handled in by human teams, who are on standby to maximise the attack in real time.
Typically, the attacker downloads copies of all accessible information. Within the mailbox, mail rules are configured to conceal activities, followed by the dispatch of hundreds or thousands of phishing emails to contacts. Sent items are automatically deleted, and incoming emails are also removed to hide concerned replies. An automatic response is sent to further convince recipients of the legitimacy of the phishing email.
After a breach, attackers often analyse stolen data to understand the victim’s systems and maximise their gains, delaying the actual attack by days or weeks. This delay increases the impact, as victims may be unaware of the breach for some time, making the original cause harder to identify.
When your email account is compromised in this way, attackers typically collect addresses from all your past emails, not just your contacts in the address book. The impact is thus far greater than similar attacks in the past.
If an email link or request for action is unexpected, don't click or respond - even if you know the sender. If you're unsure why you received the document, verify by phoning the sender first.
⚠️ Never use email to question the validity of an email you have received. If the sender’s account has been compromised, the response may well come from the attack team!
If you believe you may have clicked through and shared your details, please contact iBizify or your trusted IT service / support provider for urgent advice. I urge you to remain vigilant and take precautions to protect your accounts and information.
To help prevent such breaches, and be better prepared should you experience one:
Need help? iBizify has supported many business and personal clients, including IT companies and service providers, in handling and preventing attacks and breaches. We have assisted with email, website, phone, and other online service attacks.
31 October 2024
Malicious messages are on the rise. Industry experts estimate that such attacks have risen over 6- to 10-fold since the beginning of the COVID19 pandemic in 2020. In iBizify’s opinion, these threats are now the most significant, beyond traditional malware and direct attacks.
Whilst most attacks are delivered by email, such messages can be delivered via almost any medium including email, text, social media, WhatsApp and even phone calls.
These threats deceive people into revealing sensitive information such as passwords, bank account details, etc. and can be categorised into two variations:
Seemingly benign phishing attacks are often used to gather intelligence to prepare a Spear Phishing attack.
THINK BEFORE YOU CLICK! Look out for…
If you are still convinced the message is genuine, and feel the need to click:
Hover over links to reveal the actual destination. Look at the domain name – the bit before the .com, .co.uk, etc. If the email claims to be from Lloyds Bank, but the destination domain is not a Lloyds domain but rather amazonaws.com (a commonly used tool for phishing) or some other unknown value, then do not click!
Consider not using the email links at all, and instead contact the provider directly using known-good contact information.
Malicious messages may appear to be from someone you know, they may even include your friend or colleague’s name and contact details. Never assume a message is safe even if it is from a known contact.
You will never get legitimate messages direct from Microsoft / Apple support claiming they have detected malware on your device (or similar).
Never let anyone connect to your device unless you truly know who they are, and have especially good reason to do so.
Here is an example of a strong password:
8Q{{a>0g13C9gi29.<yW
Could you remember this and type it in every time? Probably not, which is a solid reason to make use of a reputable password manager such as Keeper Security.
For the collective sake of your organisation and others, always report malicious emails if you can. Doing so will help prevent others from receiving the same.
If you believe you may have shared your login details or other sensitive information, please change any relevant passwords and contact the host of the service for advice. If you are part of an organisation, then inform your manager. If you shared financial information, contact your bank or card provider as soon as possible. For more information on what to do please visit https://www.ncsc.gov.uk/collection/phishing-scams/what-to-do.
If your organisation is an iBizify Manage subscriber, we will already be supporting you in securing your systems and helping your staff to work safely.
iBizify offers a wide range of managed security tools and services from backups, and password managers to vulnerability and endpoint assessments, and online security baselining.
If you have any questions or would like to discuss your IT security, then contact us by scheduling a call at https://ibizify.net/callback/
22 August 2023
These instructions assume you already have a Microsoft 365 account set up with a username and password. They are aimed at iBizify Microsoft 365 customers.
?? If you have not used Authenticator before, you might first be prompted to sign into a personal Microsoft account to facilitate backing up your Authenticator codes. If you have a personal Microsoft account, we recommend doing this. If not, you can create one or skip this process.
?? Your phone may ask you to give Authenticator permission to use your camera. You need to allow this.
In future when you sign into a new device, or periodically thereafter you may be asked to approve a sign in request on your phone after having entered your password.
?? If you ever receive a sign in approval on your phone when you are NOT signing in, report the incident to your administrator or support team.
01 March 2023
The Microsoft 365 “email quarantine” captures incoming spam, phishing, malware and other unwanted email in a secure container. Such emails are locked in the quarantine either until they expire, or you request they be released.
Learn more about malicious emails, phishing, and what to do about them.
We are in the process of reconfiguring the quarantine to capture more regular threats for our iBizify-managed Microsoft 365 clients. We are also working to prevent the delivery of certain file attachment types (such as HTML) that are regularly used to carry phishing attacks.
The side effect of this is that on occasion you may find that some benign email that you did want to receive may not reach your Inbox or even your “Junk mail” folder. To counter this, where there is doubt of the legitimacy of one or more email items, you will receive an email from quarantine@messaging.microsoft.com that look like this:
The irony isn’t lost on us, that this important message does look like a phishing email. Check that it is indeed from quarantine@messaging.microsoft.com before you click!
In this notice, you can see who sent the quarantined message, when it was sent, and what the subject is.
You have four ways to respond:
1. Ignore it. The quarantined email will be deleted after thirty days.
2. Review Message. If you aren’t sure about it, you can look at the message safely by previewing its contents.
3. The message will be released to your mailbox.
4. Block Sender. In this scope, this option won't actually have any affect because the sender is already blocked from reaching your inbox.
27 March 2022
We've simplified our pricing structure for development and consultancy services.
Previously only usable for technical support, service packs can now also be used for software / web development, integrations, migrations, and more.
We simply apply a 1.5 multiplier. For example: 2 hours of development would use 3 units; 5 hours would use 7.5 units.
This means it’s now really easy to purchase one or two ten-packs and use them for a variety of projects and support all through one simple billing process.
11 September 2021
Out with the old and on with the new...
This iBizify is simpler, bolder and more rounded than the old one.
21 July 2021
We completed our move to Claydon House in Aylesbury recently - a new workspace to increase productivity, create a professional meeting environment, a bit more desk space, and room to grow. We are very pleased with the results.
Conveniently, our office address now matches what has always been our postal address. You can find our location on Google of course.
19 December 2020
When you need to get a new computer for your business in a hurry, it can be tempting to grab a cheap deal from a local store or from the top of Google. After all, many devices look alike – they have screens, keyboards, more or less features. However, what you buy and how much you spend will dictate a great deal about the experience you get with that device months or years after the purchase. Here we discuss what to look for in a business PC and how to avoid pain later.
This article assumes you are looking for a Windows-based PC for general, everyday use. If you use specialist or particularly demanding software you should consult the vendor to ensure the specifications are appropriate. We discuss Apple Macs below. Call us for advice if you are uncertain.
The short answer is as much as you can or want to. A more helpful question is “what is the minimum I should spend?” because this is where things go wrong. There is a wealth of low-end PCs available. Many of which look great from the outside, often the same or better-looking than their more expensive counterparts. We’ll discuss this more below, but in the meantime, here is a rough guide based on 2018 laptops:
Minimum spend for a sensible business laptop: £700 - £1,000 + VAT
Recommended spend for a business laptop: > £1,100 - £1,400 + VAT
Minimum spend for “luxury”, a convertible or more powerful laptop: > £2,000 ++
There is also a huge variety of options in the “luxury”, convertible or super-powerful market. We are going to focus on everyday business laptops here.
Cheap laptops are often fine for general home use, if you don’t expect many years of service. For business use, you will want something dependable that is not going to demand a lot of time and money for service or repair. Here is why:
Cheap laptops often shout the same big numbers as their more expensive counterparts, such as processor speed and amount of memory. What they don’t shout about is the cheap and slow variants of components used. It is usually the things you cannot see on the device, and the things not mentioned on the specification sheet that will let you down.
For example, it might shout about having 2,000 GB of storage – but you will probably find it is an old, slow hard disk or a cheap “hybrid” drive, which you will quickly want replaced. It might have an Intel i5 or an i7 – but it’s an old, power-hungry variation that will be slow and kill the battery.
Cheap laptops cut out anything that isn’t an absolute requirement for pretty much anyone. This means, business features get the chop. You might not feel you need these, but – further down the line – you will. This often means costly upgrades later.
When you look “under the bonnet” of a cheap laptop, you start to see where they cut the cost in production. Weak structures, poor strain relief, and things packed in in such a way that makes it hard or impossible to repair, service or upgrade. This not only means the device will be unlikely to cope with a bit of rough and tumble, but also that when you need more from it (and you will!) – it won’t be able to help you.
We find that customers who purchase a cheap laptop rarely get more than one or two years of useful life from them. A well specified laptop can usually last at least three times that! When you look at it this way, you can realise that a cheap laptop is actually an expensive laptop.
Cheaper laptops often have everything hard-wired in and are difficult or impossible to disassemble. This means if things go wrong, you are likely to need to buy a new laptop rather than be able to repair it.
Ironically, high end / luxury devices also suffer from this issue, but for different reasons – because they are generally built to be compact, light and fancy looking over being serviceable. This is something to consider if you are in the market for a high-end device – be sure you can afford the servicing!
Operating systems and software cost money. To save money, cheap laptops employ two key tactics:
Both points often mean that service and upgrades are required before the cheap laptop is useable for business – money better spent on a business-grade PC.
In this article we have focussed on laptops as they are most common. However, don’t forget about desktop PCs.
You typically get a lot more for your money in a desktop, and they are usually far more serviceable and will provide many more years of service. You can also easily add / upgrade the displays, change keyboards, add storage etc. You can also “hard-wire” them in so you can have a fully reliable cabled connection to your network without dependency on WiFi, for example. A desktop tends to be more dependable and “ready to go” without fuss – which can better suit some work scenarios.
If you don’t need the portability, then see what desktop you can get for your budget, whilst observing the above points.
If you prefer Macs then in many ways your options are far simpler. Simply visit https://www.apple.com/mac/ and take your pick. Consider:
Macs tend to be more expensive vs. their PC counterpart, and generally they are not as serviceable / repairable as mid-range PCs (but quite equivalent in the high-end market).
Whether you should choose a Mac or a PC is an endless, unresolvable argument. Why? Because it’s down to individual choice, and down to whether the software you want lives better on one or the other platform. You can pretty do anything you like on both. Choose which you prefer and don’t listen too much to what others say.
When considering what to purchase, it’s important to stop and think carefully about your needs vs. what is available for your budget. Avoid the plethora of cheap home laptops to get the most return from your investment.
iBizify support is available in both an ad-hoc ‘pay-as-you-go’ basis at £40 per hour (discounted pre-pay packs available) as well as customised monthly packages. These can be used for “how-to” as well as technical support.
If you need help finding the perfect PC for you, then discuss your needs with us and we will find options for you from the whole market.
If you'd like to find out what can be achieved, then please book a call back.
This article was written by Steve Munden of iBizify.net
True False True 2020-12-19 12:53:00 2024-02-09 12:43:39 0 0 what-to-look-for-in-a-pc-for-your-small-business
info@ibizify.net
01296 252 010
iBizify.net Ltd, Claydon House, 1 Edison Road, Rabans Lane Industrial Area, AYLESBURY HP19 8TE
IT consultancy, integration, research, development, and cloud services
Simplicity Promise