home.social

#user-training โ€” Public Fediverse posts

Live and recent posts from across the Fediverse tagged #user-training, aggregated by home.social.

fetched live
  1. Me: (notices phone ringing)
    User: (leaves voicemail)
    Me: (@ mentions them in a channel post an hour or two later, attaches voicemail file I got in email)
    Someone Else: (does something with the post)

    Or

    User: (walks up in person)
    Me: Do I need to show you how Slack works again?
    User: (posts in slack channel)
    Someone Else: (does something with the post)

    #Neurodifferent #ActuallyAutistic
    #ADHD #AuDHD #UserTraining @michellepostoncombs

  2. ๐๐ซ๐จ๐ญ๐ž๐œ๐ญ ๐ฒ๐จ๐ฎ๐ซ ๐จ๐ซ๐ ๐š๐ง๐ข๐ณ๐š๐ญ๐ข๐จ๐ง๐ฌ ๐š๐ ๐š๐ข๐ง๐ฌ๐ญ ๐๐‘ ๐œ๐จ๐๐ž ๐ฉ๐ก๐ข๐ฌ๐ก๐ข๐ง๐  ๐ฐ๐ข๐ญ๐ก ๐ƒ๐ž๐Ÿ๐ž๐ง๐๐ž๐ซ ๐Ÿ๐จ๐ซ ๐Ž๐Ÿ๐Ÿ๐ข๐œ๐ž 365

    QR codes are used in phishing attacks for mainly two reasons:

    1๏ธโƒฃ They move the attack away from well-protected corporate environments and onto the victimโ€™s personally owned mobile device, which may be less secure.

    2๏ธโƒฃ They leverage the most common credential theft vector which is the uniform resource locator (URL).

    ๐‡๐จ๐ฐ ๐Œ๐ƒ๐Ž ๐๐ž๐ญ๐ž๐œ๐ญ๐ฌ ๐๐‘ ๐‚๐จ๐๐ž ๐ฉ๐ก๐ข๐ฌ๐ก๐ข๐ง๐ 

    โžก Image Detection in a message inline during mail flow

    โžกThreat Signals

    โžกURL Analysis

    โžกHeuristics-based Rules

    To further increase protection, it is recommended to use:

    โžก๐„๐ฑ๐ญ๐ž๐ง๐๐ž๐ ๐ƒ๐ž๐ญ๐ž๐œ๐ญ๐ข๐จ๐ง ๐š๐ง๐ ๐‘๐ž๐ฌ๐ฉ๐จ๐ง๐ฌ๐ž (XDR): Microsoft Defender XDR provides comprehensive defense against advanced threats like QR code phishing

    โžก๐Œ๐จ๐›๐ข๐ฅ๐ž ๐๐ซ๐จ๐ญ๐ž๐œ๐ญ๐ข๐จ๐ง: Microsoft Defender for Endpoint on Android and iOS includes anti-phishing capabilities that also apply to QR code phishing attacks, blocking phishing sites from being accessed.

    โžก๐„๐ง๐-๐”๐ฌ๐ž๐ซ ๐“๐ซ๐š๐ข๐ง๐ข๐ง๐ : Defender for Office 365 customers can use Attack Simulation Training to educate their end users by simulating real-world phishing attacks and other types of cyber threats.

    techcommunity.microsoft.com/t5

    #qrcode #phishing #mdo #defenderforoffice #defender #xdr #edr #office365 #image #url #microsoft #microsoftsecurity #soc #cyber #cybersecurity #ast #usertraining #awareness #Quishing #cloudsecurity

  3. Ready to Transform How Your Team, Customers, and Users Embrace Technology? ๐ŸŒŸ Discover the Impact of GuideChimp in Numbers ๐Ÿ”ข

    Check it out here: labs64.com/guidechimp

    #useradoption #useronboarding #userexperience #guidedtour #producttour #walkthrough #engagement #digitaladoption #usertraining #usermanual #JavaScript #plugins #GuideChimp