In today’s digital landscape, protecting sensitive information is crucial, especially in email communication. Outlook’s Email Encryption feature empowers users to safeguard their confidential messages, keeping unauthorized eyes at bay. This guide explains when, why, and how to use Outlook Email Encryption to ensure your emails are secure and compliant. When Should You Use Outlook Email…Continue Reading Send Encrypted Emails in Outlook: A Complete Guide
What is happening to Grammarly at S&T? Am I affected?
All paid Grammarly licenses will change from @mst.edu email addresses to @umsystem.edu email addresses. This transition will move all paid licenses to a Grammarly enterprise licenses to ensure enhanced data protection and privacy, aligning with UM System policies. We will need to know if you want to have a Grammarly enterprise license which will incur…Continue Reading What is happening to Grammarly at S&T? Am I affected?
Microsoft Authenticator
There are four common forms of second factor authentication: Using a hardware security token or an authenticator application, such as Microsoft Authenticator, provides the best security. As there are scenarios where a hardware security token cannot be used the most robust second factor to use is an authenticator application. Account security can be improved by…Continue Reading Microsoft Authenticator