This is a common question which frequently arises on the call to prospects and during SharePoint “Art of the possible” workshops. What is the difference between Microsoft OneDrive and SharePoint? In short, think of OneDrive as your desk and SharePoint as a filing...
Harry Boyne
Business Email Compromise
The Challenge: Business Email Compromise is defined by the National Cyber Security Centre as a Phishing attack where the Cyber Criminals attempt to trick a senior executive into transferring funds or revealing sensitive information. The FBI defines the steps of the...
Setup and Management of Active Directory (AD) Conditional Access in the Cloud
The Challenge: In the Cloud, Microsoft defines modern security perimeters extending outside your network. The Solution: User and device identity, where companies have identity-driven signals incorporated as part of their access control. Conditional Access combines...
Technical Assistance with Cyber Essentials, Cyber Essentials Plus and ISO 27001
The Challenge: How do you keep your company’s “cyber hygiene” healthy? The UK Government’s Department for Digital, Culture, Media & Sport's Cyber Security Breaches Survey 2021 confirmed the awareness of Cyber Essentials among businesses stood at 14% with...
SIEM, Email & Microsoft 365 monitoring
The Challenge Evolving threats across your network? How do you detect abnormal behaviour? Start of a potential cyber-attack? How are you notified about security events to prevent cyber breaches? The Solution Technopedia defines Security Information and Event...
A day in the life of an Office Administrator
Hi! I'm Becca, Office Administrator. I head up the logistics here at Chalkline. My role consists of working closely with the Sales and Account Management team to ensure our clients have the very best products. I'm responsible for handling the client’s hardware...
LAN Zero Trust Network Access (ZTNA)
The Challenge: Your Local Area Network (LAN) is subject to attacks; how do you protect it? In The State of Zero Trust Security 2021, 78% of companies worldwide have increased zero trust as a priority, with up to 90% working on zero trust initiatives. With emerging...
Internal IT Policy Templates
The Challenge: With every department having different IT priorities, how do you design an Internal IT policy? Chalkline recommends you review our previous articles on the importance of an Internal IT policy: Remote working: The importance of cybersecurity recommends...
DNS & Web Filtering
The Challenge: The internet is full of Malware, Phishing, Viruses, Ransomware and other malicious content. The Solution: Web Filtering is content control software restricting suspicious URLs on websites users visit. Using Web Filtering to block web threats, you can...