How to supercharge your MSP Security Program
Profitability in security isn’t won by piling on tools. It’s earned by changing the client conversation. In this weeks blog post, I capture the highlights from an interview with Mike…
Profitability in security isn’t won by piling on tools. It’s earned by changing the client conversation. In this weeks blog post, I capture the highlights from an interview with Mike…
In March 2023, Microsoft announced the deprecation of managing authentication methods in the legacy multifactor authentication and self-service password reset (SSPR) policies. Beginning September 30, 2025, authentication methods can’t be…
Below are all of the latest feature updates coming to Microsoft 365 Automated Security Assessments mapped to the CIS Controls CloudCapsule is a tool I’ve been working on over the…
In today’s AI-driven, threat-heavy landscape, “good enough” Microsoft 365 management isn’t enough. To unpack what great looks like, we sat down with Nathan Taylor, an industry veteran who’s helped hundreds…
Microsoft Entra has a wealth of security features that often fly under the radar—yet they can make a significant difference in protecting your environment. The best part? Many of these…
Recently, I sat down with Joe Markert, CEO of Transformative, and Robby Prochnow, their Chief Revenue Officer, to explore how their MSP has evolved from traditional IT support to becoming…
Earlier this year, Microsoft made the E5-Security add-on available for Business Premium subscribers. It’s packed with a ton of amazing security features. Additionally, it is a significantly reduced price than…
Below are all of the latest feature updates coming to Microsoft 365 Automated Security Assessments mapped to the CIS Controls CloudCapsule is a tool I’ve been working on over the…
Risky user detections are one of the leading indicators of account compromise in Microsoft 365. By default, you will not get alerted as an MSP for a new risky user.…
I recently did a webinar on Token theft where I broke down one of the fastest growing attacks: Token theft via AiTM phishing. In this article, I will summarize that…