How to Protect against Token Theft | Conditional Access
In today’s digital age, cyberattacks are constantly evolving, and one of the fastest-growing threats in the Microsoft 365 ecosystem is…
In today’s digital age, cyberattacks are constantly evolving, and one of the fastest-growing threats in the Microsoft 365 ecosystem is…
In a previous post, I showed you how to automate user onboarding via a Microsoft Form and Power Automate flow.…
Below are all of the latest feature updates coming to Microsoft 365 Automated Security Assessments mapped to the CIS Controls…
In last weeks post, I showed you how to use Microsoft Forms and Power Automate to automate employee onboardings across…
Employee onboarding can be both time consuming and prone for human error across our technicians. In this article, I am…
I’ve spoken to countless MSPs looking to elevate their security game and provide a stronger offering for their clients. Yet,…
Below are all of the latest feature updates coming to Microsoft 365 Automated Security Assessments mapped to the CIS Controls…
As MSPs, we still get plenty of helpdesk tickets which can be summarized as the following: My email is running…
If you are looking for a superior multi-tenant management tool for Microsoft 365, CIPP and Microsoft 365 Lighthouse are often…
Many of us have set up a geo-blocking conditional access policy to prevent sign ins from unapproved countries. If you…