business IT support
  1. In 2 Tech
  2. Tech Blog

Tech Blog

Being Cyber Stalked? You can do something.

Ever received an email with an invoice attached that you know is bogus? Are you left wondering about what you can do about it? The Australian Government has a site set up for reporting Cyber attacks and scams, you can enter in a complaint online right here: https://www.acorn.gov.au/ – you can even report it anonymously…

MS Office 365 Exchange Mailbox Creation Fails

Shared Mailbox Creation Fails This article deals with a Shared Mailboxes but the work around applies to a standard mailbox also. The Problem: When creating a shared mailbox with the same email address for a secondary domain, the process fails. For example, you have the two domains: firstdomain.com.au and seconddomain.com.au You have accounts@firstdomain.com.au and want…

Hackers breach email steal thousands of dollars, are you protected?

Aussie Hackers steal hundreds of thousands of dollars A spate of email attacks have reaped hackers hundreds of thousands of dollars when their house deposits were stolen due to compromised email accounts. How it happens Have you ever received an message stating your email account is compromised or over quota and then prompting you to…

Logging into Office 365 Web Access Without Saving Credentials:

Scenario:  You have an Office 365 account,  work or personal, licensed to you or your organisation.  You also have need to occasionally log into Office 365 accounts to access Outlook.  These maybe created for you by other organisations, to which you do not want their credentials saved on your computer as they may interfere with…

Why artificial intelligence is needed in your security arsenal.

1/12/2023 The Role of AI in Antivirus: Enhancing Cybersecurity In today’s interconnected digital landscape, cybersecurity is more critical than ever. As cyber threats continue to evolve, traditional antivirus solutions are no longer sufficient to protect against sophisticated attacks. Enter Artificial Intelligence (AI), a game-changer in the fight against malware, ransomware, and other malicious activities. 1. Understanding…

New ‘Bluekeep’ Windows vulnerability and how to protect your business from it.

Microsoft Windows Security Vulnerability CVE-2019-0708, otherwise known as BlueKeep is the next major threat to computer systems around the world. The BlueKeep vulnerability is present in Microsoft’s legacy operating systems such as Windows 7, Windows Vista, Windows Millenium, Windows XP, Server 2003 and Server 2008 Rest assured if you are running on Microsoft Windows 10,…

Exchange Webmail

Logging into Office 365 Web Access Without Saving Credentials:

Scenario:  You have an Office 365 account,  work or personal, licensed to you or your organisation.  You also have need to occasionally log into Office 365 accounts to access Outlook.  These maybe created for you by other organisations, to which you do not want their credentials saved on your computer as they may interfere with your credentials for O365.  Also, you may not want multiple Outlook profiles and  data hoarding disk space on your computer.

 

Alternative:

I would recommend using Chrome incognito mode or Firefox new private window mode to access the link below.  This will ensure that any other Microsoft Office 365 services that you may use, personally or at work, are not interfered with when you sign in with the credentials found below.  Essentially this ensures the details are not saved in your preferred browser; which can lead to a “mix up” with saved usernames and passwords associated with Office 365.

 

Chrome

To put Chrome into incognito mode, open a chrome Windows as you normally would.  Once Chrome is open, press CTRL + Shift + N on your keyboard and this will open another Chrome window incognito mode.

In the Chrome incognito address bar copy in the link below and press enter

https://outlook.office365.com/owa

From here you will be able to sign in to Outlook Office 365, just enter the e-mail address then click next and enter the password and click on the sign in button.

When you see the option to sign in, click on the NO button.  (As you’re in the incognito mode the credentials will not be remembered anyway.)

You’ll now be signed into Outlook Web Access, also referred to as OWA.

 

Once you have exited Chrome incognito mode the connection will be terminated and you will need to go through the sign in process again to reconnect.

 

Firefox

Open Firefox and then press CTRL + Shift + p on your keyboard.  This will spawn a FireFox Private Browsing window.

In the Firefox Private Browsing address bar copy in the link below and press enter

https://outlook.office365.com/owa

 

From here you will be able to sign in to Outlook Office 365, just enter the e-mail address then click next and enter the password and click on the sign in button.

When you see the option to sign in, click on the NO button.  (As you’re in the incognito mode the credentials will not be remembered anyway.)

You’ll now be signed into Outlook Web Access, also referred to as OWA.

 

Sign-In Details (Office 365 Link)

https://outlook.office365.com/owa

Phishing Attacks and how to protect yourself

How to protect yourself from phishing attacks What is phishing Phishing emails pretend to be from a trusted brand such as the ATO, the post office, larger retail stores etc. It’s a non-targeted attack sent out to a lot of people. The attackers know that a large percentage will fail but they only need a…

How to add a MS Shared Mailbox account to your iPhone

Shared mail boxes are part of MS Office 365’s Exchange email system and are a fantastic resource. They hold 50GB of email, is free of cost and can be assigned to one person or to multiple people in a team. The only stipulation is that you have to have an existing email license in order…

Hackers breach email steal thousands of dollars, are you protected?

Aussie Hackers steal hundreds of thousands of dollars A spate of email attacks have reaped hackers hundreds of thousands of dollars when victim’s house deposits were stolen due to compromised email accounts. How it happens Have you ever received an message stating your email account is compromised or over quota and then prompting you to…

Is your Mac slowing down?

It’s not unusual for a Mac or iMac to slow down after a few months or years of usage. Computers have always been prone to getting bloated and clogged up with both user files and programs, and the modern age of large disks and memory have just allowed us to store more and more without…

Get rid of the Windows Lock Screen!

Apart from the Windows Lock Screen being very nice to look at, it serves no purpose and adds a barrier to you logging in.               If you’d like to get straight the logon screen and avoid the Lock Screen altogether, here’s how. Open the windows registry editor (regedit.exe) and…

Windows 10 update reboots when you don’t want it to!

If you’ve ever had the experience of Windows rebooting to install updates whilst you are trying to work then you know how frustrating it is. Thankfully there is something you can do to prevent this from happening. Click on Start, then the Settings Cog.           This will open the Settings Window….

Request IT Support at the bottom

GOT IT PROBLEMS?
GET IN2TECH...

To audit your IT infrastructure and get a comprehensive report

REQUEST IT SUPPORT

Got IT problems?
Get In2Tech to manage your business's IT