Here’s an important warning about something that could affect your business: A security flaw has been found in Microsoft Bookings. The popular tool is used for scheduling appointments – but the flaw could allow scammers to create unauthorized accounts and get hold of false certificates. Why should you be worried? If scammers create fake accounts pretending to be senior people in your business, they could trick your employees into sharing sensitive information. This could give them access to your business systems and even let them reset passwords, locking you out of all your accounts. If your business uses Microsoft 365, it’s doubly important to be aware of this issue. The security flaw comes from a feature in Microsoft Bookings called "Shared Booking Pages”, which is usually turned on by default under the Microsoft 365 licence. When someone creates a shared booking page, it creates a new account without going through the usual security checks. This is how scammers can slip through the cracks. This security alert is a reminder of how important it is to keep an eye on the tools we use every day. Check if you’re using Microsoft Bookings in your business and consider disabling it if you don't need it. It’s also a good idea to keep your systems updated and have an IT expert (like us) review your security settings. It can go a long way towards protecting your business. If this sounds a bit overwhelming, don’t worry. My team can help, get in touch.Here’s an important warning about something that could affect your business: A security flaw has been found in Microsoft Bookings. The popular tool is used for scheduling appointments – but the flaw could allow scammers to create unauthorized accounts and get hold of false certificates. Why should you be worried? If scammers create fake accounts pretending to be senior people in your business, they could trick your employees into sharing sensitive information. This could give them access to your business systems and even let them reset passwords, locking you out of all your accounts. If your business uses Microsoft 365, it’s doubly important to be aware of this issue. The security flaw comes from a feature in Microsoft Bookings called "Shared Booking Pages”, which is usually turned on by default under the Microsoft 365 licence. When someone creates a shared booking page, it creates a new account without going through the usual security checks. This is how scammers can slip through the cracks. This security alert is a reminder of how important it is to keep an eye on the tools we use every day. Check if you’re using Microsoft Bookings in your business and consider disabling it if you don't need it. It’s also a good idea to keep your systems updated and have an IT expert (like us) review your security settings. It can go a long way towards protecting your business. If this sounds a bit overwhelming, don’t worry. My team can help, get in touch. #Microsoft #Bookings #CyberSecurity
No Limits Media LLC’s Post
More Relevant Posts
-
Here’s an important warning about something that could affect your business: A security flaw has been found in Microsoft Bookings. The popular tool is used for scheduling appointments – but the flaw could allow scammers to create unauthorized accounts and get hold of false certificates. Why should you be worried? If scammers create fake accounts pretending to be senior people in your business, they could trick your employees into sharing sensitive information. This could give them access to your business systems and even let them reset passwords, locking you out of all your accounts. If your business uses Microsoft 365, it’s doubly important to be aware of this issue. The security flaw comes from a feature in Microsoft Bookings called "Shared Booking Pages”, which is usually turned on by default under the Microsoft 365 licence. When someone creates a shared booking page, it creates a new account without going through the usual security checks. This is how scammers can slip through the cracks. This security alert is a reminder of how important it is to keep an eye on the tools we use every day. Check if you’re using Microsoft Bookings in your business and consider disabling it if you don't need it. It’s also a good idea to keep your systems updated and have an IT expert (like us) review your security settings. It can go a long way towards protecting your business. If this sounds a bit overwhelming, don’t worry. My team can help, get in touch.Here’s an important warning about something that could affect your business: A security flaw has been found in Microsoft Bookings. The popular tool is used for scheduling appointments – but the flaw could allow scammers to create unauthorized accounts and get hold of false certificates. Why should you be worried? If scammers create fake accounts pretending to be senior people in your business, they could trick your employees into sharing sensitive information. This could give them access to your business systems and even let them reset passwords, locking you out of all your accounts. If your business uses Microsoft 365, it’s doubly important to be aware of this issue. The security flaw comes from a feature in Microsoft Bookings called "Shared Booking Pages”, which is usually turned on by default under the Microsoft 365 licence. When someone creates a shared booking page, it creates a new account without going through the usual security checks. This is how scammers can slip through the cracks. This security alert is a reminder of how important it is to keep an eye on the tools we use every day. Check if you’re using Microsoft Bookings in your business and consider disabling it if you don't need it. It’s also a good idea to keep your systems updated and have an IT expert (like us) review your security settings. It can go a long way towards protecting your business. If this sounds a bit overwhelming, don’t worry. My team can help, get in touch. #Microsoft #Bookings #CyberSecurity
To view or add a comment, sign in
-
Here’s an important warning about something that could affect your business: A security flaw has been found in Microsoft Bookings. The popular tool is used for scheduling appointments – but the flaw could allow scammers to create unauthorized accounts and get hold of false certificates. Why should you be worried? If scammers create fake accounts pretending to be senior people in your business, they could trick your employees into sharing sensitive information. This could give them access to your business systems and even let them reset passwords, locking you out of all your accounts. If your business uses Microsoft 365, it’s doubly important to be aware of this issue. The security flaw comes from a feature in Microsoft Bookings called 'Shared Booking Pages”, which is usually turned on by default under the Microsoft 365 licence. When someone creates a shared booking page, it creates a new account without going through the usual security checks. This is how scammers can slip through the cracks. This security alert is a reminder of how important it is to keep an eye on the tools we use every day. Check if you’re using Microsoft Bookings in your business and consider disabling it if you don't need it. It’s also a good idea to keep your systems updated and have an IT expert (like us) review your security settings. It can go a long way towards protecting your business. If this sounds a bit overwhelming, don’t worry. My team can help, get in touch. https://lnkd.in/g3ds5rC5
To view or add a comment, sign in
-
Here’s an interesting anecdote from our Managing Director, on how passive management of your MSP creates risk for your organization. #RideIntoTheDangerZone #ExpectWhatYouInspect #CheckYourMSPsMath #DontHaveKennyLoggins
Entrepreneur, Managing Director - Technology Transition Paradigm LLC; Shareholder - Shipshape IT LLC. President of Information Technology Foundation of Montgomery County Public Schools - 501(c)3
“I’m alright”, he says. Let’s say he has Kenny Log-ins. He’s a business owner whom I know socially, but not well. He’s in a long-term contract with a large & well-known DC/Balt area MSP. When I ask him about the job his MSP is doing, the answer was, “I’m alright.” Having Kenny Log-ins is a term for business execs that have no PW strength enforcement, had the same MSP for years, with the same security & tech stack over that entire time. And doesn’t take time to inspect, nor prioritize performing any kind of due diligence on the security which that vendor has in place. It’s not expensive nor time-consuming to avoid having Kenny Log-ins. But still, it’s a tough objection to overcome when a prospect’s senior exec is friends w the PoC for the MSP & the prospect and MSP owner are friends. It’s safe to say he didn’t take a meeting the first time I asked. So we pivoted to their data & security as a method of demonstrating the level of their MSP’s performance. Three weeks later, after a meeting with the client & our conducting some baseline security reviews, we’ve found: - The prospect has recent credential sets (user name & PW) from three dozen of his employees available for sale on a Dark Web ID theft forum. - The prospect does not enforce regular password changes on any staff. - The prospect didn’t have three of the four DNS mail handling and authentication security protocols enabled. DM for nerd translation, or read my blog on the topic @ https://lnkd.in/er2X99Xh - The prospect did not have multifactor authentication on their remote access VPN. - The CEO’s compromised credentials have Global Admin Privileges for Office 365/Azure. His password was only seven digits, and only numeric. This was his only account and his user name was his email address. 🤯 Quoting The Offspring: You gotta keep’em separated… The ‘Kenny Lessons’ for business owners, c-level, & ops execs evaluating a Managed Services Provider or Staff, are the following: - If the MSP isn’t advocating basic security Group Policy / Intune Policy for Entra AD such as password strength mandates (12 characters) & password change frequency, it’s a 🚩 - If the MSP isn’t asking questions about, nor proposing solutions for Password Vaults, off-line / air-gapped data backups, conditional access (pls ask what this is), & Internet Security Awareness Training (ISAT), then you have a vendor that is not prioritizing security on your technology roadmap. 🚩 - If the MSP doesn’t have an on-boarding procedure that includes inspecting, & when needed - fixing prior failures regarding your DNS mail handling and authentication security protocols; it demonstrates a lack of pro-active management on important security elements. 🚩 - If the long term MSP has left their client’s remote access VPN in place without configuring it for multi-factor authentication, your vendor is taking you on a Ride Into the Danger Zone. 🚩 #CheckYourMSP #Security&DarkWeb✔️ #DontHaveKennyLog-ins #12CharachterAlphaNumeric+!
To view or add a comment, sign in
-
Here’s an important warning about something that could affect your business: A security flaw has been found in Microsoft Bookings. The popular tool is used for scheduling appointments – but the flaw could allow scammers to create unauthorized accounts and get hold of false certificates. Why should you be worried? If scammers create fake accounts pretending to be senior people in your business, they could trick your employees into sharing sensitive information. This could give them access to your business systems and even let them reset passwords, locking you out of all your accounts. If your business uses Microsoft 365, it’s doubly important to be aware of this issue. The security flaw comes from a feature in Microsoft Bookings called 'Shared Booking Pages”, which is usually turned on by default under the Microsoft 365 licence. When someone creates a shared booking page, it creates a new account without going through the usual security checks. This is how scammers can slip through the cracks. This security alert is a reminder of how important it is to keep an eye on the tools we use every day. Check if you’re using Microsoft Bookings in your business and consider disabling it if you don't need it. It’s also a good idea to keep your systems updated and have an IT expert (like us) review your security settings. It can go a long way towards protecting your business. If this sounds a bit overwhelming, don’t worry. My team can help, get in touch.
Microsoft Bookings Flaw Let Hackers Create/Impersonate User Acccounts
https://cybersecuritynews.com
To view or add a comment, sign in
-
Here’s an important warning about something that could affect your business: A security flaw has been found in Microsoft Bookings. The popular tool is used for scheduling appointments – but the flaw could allow scammers to create unauthorised accounts and get hold of false certificates. Why should you be worried? If scammers create fake accounts pretending to be senior people in your business, they could trick your employees into sharing sensitive information. This could give them access to your business systems and even let them reset passwords, locking you out of all your accounts. If your business uses Microsoft 365, it’s doubly important to be aware of this issue. The security flaw comes from a feature in Microsoft Bookings called "Shared Booking Pages”, which is usually turned on by default under the Microsoft 365 licence. When someone creates a shared booking page, it creates a new account without going through the usual security checks. This is how scammers can slip through the cracks. This security alert is a reminder of how important it is to keep an eye on the tools we use every day. Check if you’re using Microsoft Bookings in your business and consider disabling it if you don't need it. It’s also a good idea to keep your systems updated and have an IT expert (like us) review your security settings. It can go a long way towards protecting your business. If this sounds a bit overwhelming, don’t worry. My team can help, get in touch. #Microsoft #Bookings #CyberSecurity A security flaw in Microsoft Bookings has been uncovered. This flaw, inherent in the default configuration of Microsoft Bookings, potentially allows attackers to create unauthorized Entra (formerly Azure AD) accounts and obtain fraudulent certificates.
Here’s an important warning about something that could affect your business: A security flaw has been found in Microsoft Bookings. The popular tool is used for scheduling appointments – but the flaw could allow scammers to create unauthorised accounts and get hold of false certificates. Why shou
https://cybersecuritynews.com
To view or add a comment, sign in
-
🚦How to secure M365 with PIM and why you might not be able to🚦 💡In this post I’ll explain what PIM is, why it should be present in every Entra ID configuration, and why you might not be able to use it. I’ll also highlight some more advanced options that we recommend to strengthen security with PIM beyond the most basic set-up💡 When using Microsoft Entra Privileged Identity Management – or PIM for short - you need to elevate your account to access administrator privileges, providing just-in-time access. Even in the most basic scenarios, where you already have signed in with MFA and just need to click to activate, you get three main benefits: 🥇You will be protected from yourself. Hopefully you are already using separate accounts for admin privileges. Adding PIM to this further reduces the chance of you accidentally doing something fatal when operating as for example Global Admin (GA). 🥈Security by obscurity. Should your admin account be compromised, having to elevate will add an extra layer of security even though no requirements for the activation itself is added. 🕵️♀️You will be able to see when admin privileges are used and why. If for example someone consistently is elevating to Global Admin to configure Conditional Access, you might want to consider to change the access level that user has, or teach not to elevate to higher privilege than necessary. To further increase security, we recommend to configure the following: 🪪Force user to re-authenticate when activating a privileged role. This can be achieved with an Authentication Context in Conditional Access, and configuring this for the appropriate roles. 💪Require stronger authentication strength for activating certain roles like GA, like the default Phishing-resistant MFA strength-level or a custom policy enforcing use of FIDO2 security key for such log-ins. 📧 Send an e-mail to your regular user account every time your admin account elevates. When you need to elevate your account, you simply go to https://aka.ms/PIM and click “Activate” on the role you need to elevate to. You choose how long the elevation lasts, and add a comment on why you are elevating. In the image below you can see some possible settings for elevating GA. You can even require a second person to approve to be able to elevate to GA. 🤔 You might be wondering why you might not have access to PIM. As promised, here is why: you need Entra ID P2 licenses to use PIM – but only for the administrators. If you have Entra ID Governance licenses these also include PIM. Join our webinar tomorrow where my colleague Simon Skotheimsvik in CloudWay will share more Entra ID fundamentals, and I will show you an easier way to track those PIM activations: https://lnkd.in/deZbtsna #entra #PIM #microsoft365 #security
To view or add a comment, sign in
-
Very thorough article on how to secure your M365 tenant using PIM. Great writeup!
🚦How to secure M365 with PIM and why you might not be able to🚦 💡In this post I’ll explain what PIM is, why it should be present in every Entra ID configuration, and why you might not be able to use it. I’ll also highlight some more advanced options that we recommend to strengthen security with PIM beyond the most basic set-up💡 When using Microsoft Entra Privileged Identity Management – or PIM for short - you need to elevate your account to access administrator privileges, providing just-in-time access. Even in the most basic scenarios, where you already have signed in with MFA and just need to click to activate, you get three main benefits: 🥇You will be protected from yourself. Hopefully you are already using separate accounts for admin privileges. Adding PIM to this further reduces the chance of you accidentally doing something fatal when operating as for example Global Admin (GA). 🥈Security by obscurity. Should your admin account be compromised, having to elevate will add an extra layer of security even though no requirements for the activation itself is added. 🕵️♀️You will be able to see when admin privileges are used and why. If for example someone consistently is elevating to Global Admin to configure Conditional Access, you might want to consider to change the access level that user has, or teach not to elevate to higher privilege than necessary. To further increase security, we recommend to configure the following: 🪪Force user to re-authenticate when activating a privileged role. This can be achieved with an Authentication Context in Conditional Access, and configuring this for the appropriate roles. 💪Require stronger authentication strength for activating certain roles like GA, like the default Phishing-resistant MFA strength-level or a custom policy enforcing use of FIDO2 security key for such log-ins. 📧 Send an e-mail to your regular user account every time your admin account elevates. When you need to elevate your account, you simply go to https://aka.ms/PIM and click “Activate” on the role you need to elevate to. You choose how long the elevation lasts, and add a comment on why you are elevating. In the image below you can see some possible settings for elevating GA. You can even require a second person to approve to be able to elevate to GA. 🤔 You might be wondering why you might not have access to PIM. As promised, here is why: you need Entra ID P2 licenses to use PIM – but only for the administrators. If you have Entra ID Governance licenses these also include PIM. Join our webinar tomorrow where my colleague Simon Skotheimsvik in CloudWay will share more Entra ID fundamentals, and I will show you an easier way to track those PIM activations: https://lnkd.in/deZbtsna #entra #PIM #microsoft365 #security
To view or add a comment, sign in
-
📆Today is #WorldCloudSecurityDay. 👉This day's observed to raise awareness among individuals on the importance of cloud security, both personal & work accounts included. At work, even one compromised credential can put other accounts at risk. ✨Solution: A well-framed organizational security policy. Security policy has different parts to it. But at its core, your business needs a properly constructed password policy. Are you curious to know more? 🔖Read on here: https://zurl.to/mcIX #cybersecurity #zoho #identitymanagement
Secure Your Work Accounts: 5 Essential Factors for a Strong Password Policy
zoho.com
To view or add a comment, sign in
-
Here’s an important warning about something that could affect your business: A security flaw has been found in Microsoft Bookings. \n\nThe popular tool is used for scheduling appointments – but the flaw could allow scammers to create unauthorized accounts and get hold of false certificates. \n\nWhy should you be worried?\n\nIf scammers create fake accounts pretending to be senior people in your business, they could trick your employees into sharing sensitive information. This could give them access to your business systems and even let them reset passwords, locking you out of all your accounts. \n\nIf your business uses Microsoft 365, it’s doubly important to be aware of this issue. The security flaw comes from a feature in Microsoft Bookings called "Shared Booking Pages”, which is usually turned on by default under the Microsoft 365 licence. \n\nWhen someone creates a shared booking page, it creates a new account without going through the usual security checks. This is how scammers can slip through the cracks. \n\nThis security alert is a reminder of how important it is to keep an eye on the tools we use every day. Check if you’re using Microsoft Bookings in your business and consider disabling it if you don't need it. \n\nIt’s also a good idea to keep your systems updated and have an IT expert (like us) review your security settings. It can go a long way towards protecting your business.\n\nIf this sounds a bit overwhelming, don’t worry. My team can help, get in touch. #Microsoft #Bookings #CyberSecurity https://lnkd.in/gmd782RY
To view or add a comment, sign in
-
Here’s an important warning about something that could affect your business: A security flaw has been found in Microsoft Bookings. The popular tool is used for scheduling appointments – but the flaw could allow scammers to create unauthorized accounts and get hold of false certificates. Why should you be worried? If scammers create fake accounts pretending to be senior people in your business, they could trick your employees into sharing sensitive information. This could give them access to your business systems and even let them reset passwords, locking you out of all your accounts. If your business uses Microsoft 365, it’s doubly important to be aware of this issue. The security flaw comes from a feature in Microsoft Bookings called "Shared Booking Pages”, which is usually turned on by default under the Microsoft 365 licence. When someone creates a shared booking page, it creates a new account without going through the usual security checks. This is how scammers can slip through the cracks. This security alert is a reminder of how important it is to keep an eye on the tools we use every day. Check if you’re using Microsoft Bookings in your business and consider disabling it if you don't need it. It’s also a good idea to keep your systems updated and have an IT expert (like us) review your security settings. It can go a long way towards protecting your business. If this sounds a bit overwhelming, don’t worry. My team can help, get in touch - comment below or contact us at 408-559-2800, email us at [email protected] or visit us at www.trutechnical.com. #Microsoft #Bookings #CyberSecurity https://lnkd.in/epD5Tr-G
Microsoft Bookings Flaw Let Hackers Create/Impersonate User Acccounts
https://cybersecuritynews.com
To view or add a comment, sign in
478 followers