Microsoft Office 365 Best Practices

Office 365 has the tools you need to work anytime, anywhere, on any device.

It’s the same Office you’ve used for years, plus all the benefits of the cloud.

Microsoft Office 365 is a cloud-based subscription service that brings together the best tools for the way people work today. By combining best-in-class apps like Excel and Outlook with powerful cloud services like OneDrive and Microsoft Teams, Office 365 lets anyone create and share anywhere on any device.

Office 365 can provide your business and team:

Business email and calendaring – Access email, contacts, and shared calendars anywhere. With Office 365, you can work wherever you work best.

File storage and sharing – Store, sync, and share your files so everyone has access to the latest. Get anytime, anywhere access from your favourite devices.

Online meetings – Meet wherever you are and never miss a meeting. Send an instant message or choose online multi-party audio and HD video to work together face-to-face, virtually anywhere.

Teamwork hub – See content and chat history anytime in team chat or in private chat. Schedule small group or team meetings. Post an email in the thread to keep the team in the loop.

Intranets and team sites – Inform and engage people across your organization with a mobile and intelligent intranet. Connect team members to shared content with team sites.

Task management – Take the chaos out of teamwork and get more done. Create new plans, organize and assign tasks, share files, chat about what you’re working on, and get updates on progress.

Content services – Create, coordinate, protect, and harvest your content to gain value from it everywhere in its lifecycle. Capture new documents on the go, manage compliance, and reduce risk.

Business process automation – Streamline, automate, and transform processes with rich forms, workflows, and custom mobile apps.


Built-in privacy and compliance tools to protect your company from external threats and data leaks.

Did you know? ‘Two in every five businesses (43%) identified Cyber Security breaches in the last 12 months. ‘

The most common cyber security breaches were:
• Staff receiving fraudulent emails (75% of businesses and 74% of charities experiencing breaches)
• Others impersonating the organisation online (28% and 27%)
• Viruses and malware (24% and 24%).

Cyber Security Survey, Ofcom Gov 2018

Office 365 can offer the following
Guard against unknown threats with advanced threat protection; Get extended protection against unknown threats from spam, malware, viruses, phishing attempts, and malicious links through a set of security features called Advanced Threat Protection

Safe attachments in the inbox; Suspicious email attachments are scanned in real time with sophisticated techniques that detect new types of malware previously not seen

Click protection against suspicious links – Attackers sometimes try to hide malicious URLs with seemingly safe links that are redirected to unsafe sites. The Safe Link feature scans suspicious links in real time to protect users from clicking through to unsafe sites.

Protect your company data on personal mobile devices; Secure your business data on employees’ personal devices through a series of security policies such as requiring PIN access to view company data like email on personal devices. This reducing the risk of non-employees intentionally or unintentionally accessing your business data.

Restrict copying and saving of your business data on personal devices; Restrict the copying and saving of company information to personal apps or unauthorized locations with mobile app protection policies. You can also prevent users from forwarding company data to their personal email accounts.

Mobile app protection also prevents users from changing the sender email ID to personal or non-business accounts, ensuring users cannot forward company data to their personal accounts.

Use information protection to control how your company information is transmitted and viewed with information rights management: Ensure only authorized people can access sensitive company information by applying security policies like “Do Not Forward,” “Encrypt,” etc. on emails.