Microsoft today introduced an app launcher and “My apps” page for Office 365. The company is hoping to get its Office 365 customers to use more apps by giving them a new sections dedicated to starting ...
When Microsoft started with Office products, there were only a handful of them— Word, Excel, PowerPoint. While most of the consumers still use the same set, Microsoft Portfolio has expanded to over ...
Microsoft Office has been around since the olden days, but that doesn't mean all of its features are well-known. Here are some of its secrets.
Without a doubt, my favorite thing about Office 365 is that Microsoft is constantly adding new features and capabilities to it. Better still, my Office 365 subscription plan costs the same as it did ...
Microsoft this week for the first time offered its Office for Mac applications in Apple’s Mac App Store. “We’re excited to announce that Office 365 is now available on the newly redesigned Mac App ...
PALO ALTO, Calif.--(BUSINESS WIRE)--Today Spin Technology, Inc. introduced Application Risk Assessment and Access Management as a new module for SpinOne for Office 365 SaaS data protection platform.
Microsoft on Wednesday announced previews of two new Office document security protections for Office 365 E5 subscribers that aim to block malicious payloads. One of the previews is a new Safe ...
Microsoft has renamed its Office 365 update channels and added options. You might have to make changes in your configuration and deployment tools. As more organizations move to the Microsoft 365 ...
Wilkes University offers current students, faculty and staff access to Microsoft's Office 365. This provides access to the various programs within the Office 365 suite via the web or to be downloaded ...
A phishing campaign has been discovered that doesn't target a recipient's username and password, but rather uses the novel approach of gaining access to a recipient's Office 365 account and its data ...
Microsoft warns that with the shift to remote working, customers are exposed to additional security threats such as consent phishing, besides conventional credential theft and email phishing attacks.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results