Blog Posts, User Communication
The security of two-step verification lies in its layered approach. Compromising multiple authentication factors presents a significant challenge for attackers. Even if an attacker manages to learn the user’s password, it is useless without also having...
Blog Posts, User Communication
Delay Sending Have you ever clicked send and then suddenly realised you forgot the attachment, or included a recipient who should not receive that email. You try to catch it but it is too late, it has gone. To mitigate against that there is a setting in outlook which...