Getting started with email security in Microsoft 365 | Phishing protections
The Nigerian price scam is probably one of the most well known phishing emails out there today but all memes aside, over 90% of all cyberattacks begin with phishing. In…
The Nigerian price scam is probably one of the most well known phishing emails out there today but all memes aside, over 90% of all cyberattacks begin with phishing. In…
In today’s digital age, cyberattacks are constantly evolving, and one of the fastest-growing threats in the Microsoft 365 ecosystem is token theft, also known as token replay attacks. This attack…
In a previous post, I showed you how to automate user onboarding via a Microsoft Form and Power Automate flow. Today we are shifting the focus to user offboarding. When…
Below are all of the latest feature updates coming to Microsoft 365 Automated Security Assessments mapped to the CIS Controls I am excited to announce the soft-launch of an automated…
In last weeks post, I showed you how to use Microsoft Forms and Power Automate to automate employee onboardings across customers. This week, I am going to show you how…
Employee onboarding can be both time consuming and prone for human error across our technicians. In this article, I am going to show you how to create a tailored onboarding…
I’ve spoken to countless MSPs looking to elevate their security game and provide a stronger offering for their clients. Yet, many find themselves stuck—unsure where to begin or what roadmap…
Below are all of the latest feature updates coming to Microsoft 365 Automated Security Assessments mapped to the CIS Controls I am excited to announce the soft-launch of an automated…
As MSPs, we still get plenty of helpdesk tickets which can be summarized as the following: My email is running very slow I am unable to send or receive email…
If you are looking for a superior multi-tenant management tool for Microsoft 365, CIPP and Microsoft 365 Lighthouse are often two of the top considerations. To put things simply, Partner…