18 September 2025
With the exponential growth of cyber attacks and methods over the last two years, the increasing threat of AI based security attacks, and even sophisticated phishing attacks that can evade detection, and even bypass multi-factor authentication, iBizify is continually investigating and deploying new methods and services to secure its managed IT clients safe.
A key area of security for all businesses is passwords and the methods you use to log into applications. Whether you require a second device, one-time password, verification code or some other form of additional step to log in, all of them leave gaps for hackers to take advantage of.
iBizify’s trusted security partner Brigantia are offering a free webinar that will cover everything you need to know about the problem with traditional password processes. Join to discover …
The webinar will take place on:
We look forward to you joining the session.
To reserve your spot on the webinar, follow this link:
https://us06web.zoom.us/webinar/register/3917582061193/WN_qDG0iNsBQROMaJji069VHw
13 June 2025
Most people are aware of the risk of clicking malicious links. However, iBizify would like to highlight a relatively new, growing security threat. The attack is sophisticated, executed by coordinated human teams, assisted by AI. It can bypass standard security mechanisms, and is performed discreetly.
It targets users of Microsoft 365 Business services, and other similar services. This phishing attack is particularly concerning, given that it uses sophisticated methods to effectively bypass multi-factor authentication – which is a common first line of defence against phishing attacks and password compromises.
⚠️ These emails will usually come from someone you know. The email address will be true and correct. It may pass standard security checks.
The breach begins with a phishing email or message that comes from a familiar address, such as a colleague, friend, or family. They may include the sender’s legitimate email signature, their name, and other details, making them look extremely convincing.
Here are a couple of examples of such email content, but the email may take any form:
These attacks often evade the detection of standard security software, due to the verified sender, and the use of an “innocent” service, such as OneNote, Pandadoc, amongst others.
The following describes the general nature of attacks iBizify has evaluated. In fact, every attack and its process can be very different.
Exercise extreme caution if you receive an email asking you to open a document or click a link, even if you know the sender. These links may lead to phishing sites that collect your login details and register a new multifactor authentication device for further access. Attackers could gain full remote access to your mailbox and other services.
Unlike regular attacks in the past, these are often handled in by human teams, who are on standby to maximise the attack in real time.
Typically, the attacker downloads copies of all accessible information. Within the mailbox, mail rules are configured to conceal activities, followed by the dispatch of hundreds or thousands of phishing emails to contacts. Sent items are automatically deleted, and incoming emails are also removed to hide concerned replies. An automatic response is sent to further convince recipients of the legitimacy of the phishing email.
After a breach, attackers often analyse stolen data to understand the victim’s systems and maximise their gains, delaying the actual attack by days or weeks. This delay increases the impact, as victims may be unaware of the breach for some time, making the original cause harder to identify.
When your email account is compromised in this way, attackers typically collect addresses from all your past emails, not just your contacts in the address book. The impact is thus far greater than similar attacks in the past.
If an email link or request for action is unexpected, don't click or respond - even if you know the sender. If you're unsure why you received the document, verify by phoning the sender first.
⚠️ Never use email to question the validity of an email you have received. If the sender’s account has been compromised, the response may well come from the attack team!
If you believe you may have clicked through and shared your details, please contact iBizify or your trusted IT service / support provider for urgent advice. I urge you to remain vigilant and take precautions to protect your accounts and information.
To help prevent such breaches, and be better prepared should you experience one:
Need help? iBizify has supported many business and personal clients, including IT companies and service providers, in handling and preventing attacks and breaches. We have assisted with email, website, phone, and other online service attacks.
31 October 2024
Malicious messages are on the rise. Industry experts estimate that such attacks have risen over 6- to 10-fold since the beginning of the COVID19 pandemic in 2020. In iBizify’s opinion, these threats are now the most significant, beyond traditional malware and direct attacks.
Whilst most attacks are delivered by email, such messages can be delivered via almost any medium including email, text, social media, WhatsApp and even phone calls.
These threats deceive people into revealing sensitive information such as passwords, bank account details, etc. and can be categorised into two variations:
Seemingly benign phishing attacks are often used to gather intelligence to prepare a Spear Phishing attack.
THINK BEFORE YOU CLICK! Look out for…
If you are still convinced the message is genuine, and feel the need to click:
Hover over links to reveal the actual destination. Look at the domain name – the bit before the .com, .co.uk, etc. If the email claims to be from Lloyds Bank, but the destination domain is not a Lloyds domain but rather amazonaws.com (a commonly used tool for phishing) or some other unknown value, then do not click!
Consider not using the email links at all, and instead contact the provider directly using known-good contact information.
Malicious messages may appear to be from someone you know, they may even include your friend or colleague’s name and contact details. Never assume a message is safe even if it is from a known contact.
You will never get legitimate messages direct from Microsoft / Apple support claiming they have detected malware on your device (or similar).
Never let anyone connect to your device unless you truly know who they are, and have especially good reason to do so.
Here is an example of a strong password:
8Q{{a>0g13C9gi29.<yW
Could you remember this and type it in every time? Probably not, which is a solid reason to make use of a reputable password manager such as Keeper Security.
For the collective sake of your organisation and others, always report malicious emails if you can. Doing so will help prevent others from receiving the same.
If you believe you may have shared your login details or other sensitive information, please change any relevant passwords and contact the host of the service for advice. If you are part of an organisation, then inform your manager. If you shared financial information, contact your bank or card provider as soon as possible. For more information on what to do please visit https://www.ncsc.gov.uk/collection/phishing-scams/what-to-do.
If your organisation is an iBizify Manage subscriber, we will already be supporting you in securing your systems and helping your staff to work safely.
iBizify offers a wide range of managed security tools and services from backups, and password managers to vulnerability and endpoint assessments, and online security baselining.
If you have any questions or would like to discuss your IT security, then contact us by scheduling a call at https://ibizify.net/callback/
22 August 2023
These instructions assume you already have a Microsoft 365 account set up with a username and password. They are aimed at iBizify Microsoft 365 customers.
?? If you have not used Authenticator before, you might first be prompted to sign into a personal Microsoft account to facilitate backing up your Authenticator codes. If you have a personal Microsoft account, we recommend doing this. If not, you can create one or skip this process.
?? Your phone may ask you to give Authenticator permission to use your camera. You need to allow this.
In future when you sign into a new device, or periodically thereafter you may be asked to approve a sign in request on your phone after having entered your password.
?? If you ever receive a sign in approval on your phone when you are NOT signing in, report the incident to your administrator or support team.
01 March 2023
The Microsoft 365 “email quarantine” captures incoming spam, phishing, malware and other unwanted email in a secure container. Such emails are locked in the quarantine either until they expire, or you request they be released.
Learn more about malicious emails, phishing, and what to do about them.
We are in the process of reconfiguring the quarantine to capture more regular threats for our iBizify-managed Microsoft 365 clients. We are also working to prevent the delivery of certain file attachment types (such as HTML) that are regularly used to carry phishing attacks.
The side effect of this is that on occasion you may find that some benign email that you did want to receive may not reach your Inbox or even your “Junk mail” folder. To counter this, where there is doubt of the legitimacy of one or more email items, you will receive an email from quarantine@messaging.microsoft.com that look like this:
The irony isn’t lost on us, that this important message does look like a phishing email. Check that it is indeed from quarantine@messaging.microsoft.com before you click!
In this notice, you can see who sent the quarantined message, when it was sent, and what the subject is.
You have four ways to respond:
1. Ignore it. The quarantined email will be deleted after thirty days.
2. Review Message. If you aren’t sure about it, you can look at the message safely by previewing its contents.
3. The message will be released to your mailbox.
4. Block Sender. In this scope, this option won't actually have any affect because the sender is already blocked from reaching your inbox.
27 March 2022
We've simplified our pricing structure for development and consultancy services.
Previously only usable for technical support, service packs can now also be used for software / web development, integrations, migrations, and more.
We simply apply a 1.5 multiplier. For example: 2 hours of development would use 3 units; 5 hours would use 7.5 units.
This means it’s now really easy to purchase one or two ten-packs and use them for a variety of projects and support all through one simple billing process.
11 September 2021
Out with the old and on with the new...
This iBizify is simpler, bolder and more rounded than the old one.
21 July 2021
We completed our move to Claydon House in Aylesbury recently - a new workspace to increase productivity, create a professional meeting environment, a bit more desk space, and room to grow. We are very pleased with the results.
Conveniently, our office address now matches what has always been our postal address. You can find our location on Google of course.
info@ibizify.net
01296 252 010
iBizify.net Ltd, Claydon House, 1 Edison Road, Rabans Lane Industrial Area, AYLESBURY HP19 8TE
IT consultancy, integration, research, development, and cloud services
Simplicity Promise