Typewritter with paper that says send a mail

What is, and where is the Outlook Safe Senders List? Why You Need to Know

One topic that seems to get overlooked is MS Outlook’s “Safe Senders” list. Recently I was asked about whitelisting a perspective email address that was expected to be going to send important emails. I suggested using Outlook “Safe Senders”

What it is and How it Works

When you receive an email from someone and you right-click on the header you will get a list of selections…
Picture showing right clicking the header of an email message

When you select “Add Sender to Safe Senders List” the email address from the sender is placed in a special address list. All emails received are compared to that list and if found they will automatically go to your inbox. Think of it as your personal “Whitelist”.

But, what if you add someone and you didn’t mean to? Where is your “Safe Sender” List?

If you happen to mistakenly add someone to the list or wanted to check or update “your safe sender” list click on your junk settings. I’m using Office 365 desktop, other desktop versions of outlook are similar. Click on the “Junk Settings” button.
Picture of outlook toolbar

Here are the selections after you select the toolbar “Junk” button. Select “Junk E-mail Options…”

Outlook toolbar selections

A dialog box will pop up, select “Safe Senders” on the tab bar.

Dialog popup

From this dialog box, you can “Add”, “Edit” and “Remove” the addresses in your “Safe Sender” list. A few other selections are “Also trust email from my Contacts” and “Automatically add people I email to the Safe Senders List. You can also Import or Export to a file.

Conclusion

Our email has certainly proved to be the basic communication standard in modern times and features like “Safe Sender” in Outlook is an unsung hero in managing our email senders. If you would like to hire me for a project, or need IT support I have plans and features available for any size business. Happy computing!

We all have one, I’ll show you mine

Much like opinions or certain body parts

In today’s modern infrastructure we all have a router, let’s see what we can find out.

Backstory

I’m always thinking of ways to keep ransomware away from my customers and while I was pondering this article I thought why not ask my router some questions. Since that’s the first place our outside internet connection comes from.

The Interview

ME:
Hey, Router what do you do for me?
ROUTER: I take your single internet connection and share it among your devices so everyone can have internet access. router
ME:
Since you’re my first link to the outside world why don’t you do more to protect me? Wouldn’t that make sense and save me from having a million things about security to remember?
ROUTER: That does sound logical, but I’ve been a loyal member of your infrastructure for years. Remember? I was there back in 2015 when the power was out. I was lonely, but when it was over, I was there. How about in 2013 when we first met? You were so happy to have WiFi and me an “all-in-one router”, we loved each other. Router
ME:
Sure, I remember some good times. But, criminals have gotten smarter and I must have modern protection to keep up with modern threats, so how about protecting me better?
ROUTER: I’m doing my best here, it’s not easy keeping a steady flow, keeping the data conversations going to the right device. You don’t need anything else, we’re family. Router
ME:
Let’s face it, you don’t have the right skills. I need a modern solution to keep up with modern threats.
ROUTER:  Could we Talk about something else, I really don’t understand what you’re talking about. Besides, I have other things to do right now. Router

Even the router agrees, it cannot protect us in the modern workplace. We need much better protection.

So, I researched. Here’s the thought process…

My considerations:

  • Easy to manage
  • Provides immediate protection
  • Provides ongoing protection
  • Is easy for customers to obtain, and has a great ROI
Product Comparison
Comparison List (click to download)

My choice

I chose WatchGuard because they not only check all the boxes but allow customers to obtain the device and pay monthly for service protection and subscription. This allows customers to get the right device at a reduced cost that could otherwise be cost-prohibitive. Plus, ongoing protection is included (one of the most important parts of ongoing protection). Skip keeping the subscription active and that could leave you inadvertently unprotected.

Besides, WatchGuard devices come in a variety of solutions. This means a device can be uniquely configured specifically for customers’ network needs.

WatchGuard Products
WatchGuard Products

Layers of protection

We need Unified Threat Management for modern threats and layered protection. My job is offering the best solutions for keeping your business continuity protected.

Call me and let’s replace your router with a firewall

Want more information? Give me a call. I’m always happy to help. 972.571.4808

The Unspoken Hero or Silent Killer of your Business

In our busy internet influenced life we often don’t think too much about how being without our electronic stuff would be. Because of a recent electrical storm, I didn’t think too much about it. Until I thought about a nearby restaurant and wondered if they had a particular item on the menu, I immediately grabbed my tablet, turned it on, then it hit me, the power is out and there is no internet (duh!). Imagine this same scenario but this time we need to send an important document, a powerpoint presentation, or even a contract. But, instead of just the electricity being down we’re permanently down because our computers drive has just crashed.

The silent killer is definitely the outage, and not having access to our data. We depend on it, and it would destroy our business without it. Even for a short time I couldn’t last long without the internet.

Most of the time being a computer consultant I go about doing my regular tasks. These tasks are unseen by customers and occur on an ongoing basis, its just part of the job to spend so much time working with backups. Recently with my new “Managed Service” offering I changed my strategy because of the difference between a consultant that is called when things just break, and a true “Managed Service” provider.

There are several factors to consider when creating a good backup plan. What kind of business is involved? How long could this customer be without their files? How many days could they gap if they lost part of their information? If a ransomware attack occurred how are the backups stored? What if a tornado landed?

Computer Hardware

Certainly, the list can go on, but, taking the most important ones and developing the plan is what a good consultant and a “Managed Service” provider do. I just started implementing mock ransomware attacks on my managed service clients as an ongoing test to make 100% sure they are ready. Have concerns that when your network crashes you’re ready? Give me a call, I’ll be happy to offer a 68 point network review at no cost. In the Dallas / Ft. Worth area call 972-571-4808.

Time face
What was your time?

Should you want to see how long you could go without your network or internet connection, turn off or unplug your electronic devices and see how much time it takes you before you reach for one.