Created: Tuesday, 10 November 2020
Written by Ella Coles
Making sure your employees have set an email signature with the same style, branding and information can be a major hassle. It’s manageable when you’re small, but as you start to grow, it’s a real time waster, especially as employees typically send email from multiple devices - laptops, mobile phones and tablets.
That's why we set up our customers with the Exclaimer cloud email signature service. Each employee gets the business’s signature added to every email, whatever device it's sent from.
With Exclaimer it’s very simple to promote new products or show off an award. Just update the central template and everybody’s emails will immediately go out with the new information. Exclaimer works with both Microsoft 365 (formerly Office 365) and Google Workspaces (formerly Google G Suite).
Contact us if you want your employees to have professional email signatures.
Created: Tuesday, 27 October 2020
Written by Ella Coles
A criminal offered a Tesla employee a million dollars to run a program on his work computer. Luckily for Tesla, they reported it and Tesla worked with the authorities to catch the baddies. If the employee had run that program, Tesla likely would have been held to ransom, had their intellectual property stolen etc.
This is a high profile case against a huge organisation, but it is a sign of things to come and will trickle down to small and medium businesses.
Businesses need to protect their IT from employees in other, more ordinary circumstances, eg:
- Deleting everything in their email mailbox before they leave because they honestly believe it’s right thing to do
- Deleting information if they are sacked or about to be
- Stealing information from the business before they leave a company
- Access systems after they have left the company
Small businesses are especially vulnerable as many give all employees access to almost everything. One of the best steps any business can take is to adopt a “Principle of Least Privilege”. Each employee has the minimum access to perform their job and nothing more. A good place to start is:
- Remove admin rights on devices
- Remove admin rights on cloud/web services
- Limit access within line of business applications
- Structure files/folders and limit access
At telanova, we are experts at making sure employees can access what they need to do their job, while limiting access to everything else. Engage telanova as your IT team and we will secure your systems.