Getting started with email security in Microsoft 365 | Phishing protections
The Nigerian price scam is probably one of the most well known phishing emails out there today but all memes…
How to Protect against Token Theft | Conditional Access
In today’s digital age, cyberattacks are constantly evolving, and one of the fastest-growing threats in the Microsoft 365 ecosystem is…
Automate User Offboarding in Microsoft 365 | Full Tutorial
In a previous post, I showed you how to automate user onboarding via a Microsoft Form and Power Automate flow.…
What’s New in Microsoft 365 | September Updates
Below are all of the latest feature updates coming to Microsoft 365 Automated Security Assessments mapped to the CIS Controls…
Automate User Onboarding with HaloPSA and Microsoft 365 | Full Tutorial
In last weeks post, I showed you how to use Microsoft Forms and Power Automate to automate employee onboardings across…
Automate Employee Onboarding in Microsoft 365 | Full Tutorial
Employee onboarding can be both time consuming and prone for human error across our technicians. In this article, I am…
Level up your cybersecurity assessments with this framework
I’ve spoken to countless MSPs looking to elevate their security game and provide a stronger offering for their clients. Yet,…
What’s New in Microsoft 365 | August Updates
Below are all of the latest feature updates coming to Microsoft 365 Automated Security Assessments mapped to the CIS Controls…
How to increase your mailbox storage | Identify Mailbox is Full
As MSPs, we still get plenty of helpdesk tickets which can be summarized as the following: My email is running…
CIPP vs Lighthouse | Deep Dive
If you are looking for a superior multi-tenant management tool for Microsoft 365, CIPP and Microsoft 365 Lighthouse are often…