Share Documents Securely | SharePoint
Securing SharePoint Online is a multi-layered approach and can get highly complex due to the nature of permissions. I would…
Best Practices for Break Glass Accounts
Image Generated by Copilot 🙂 I get a lot of questions around best practices for break glass accounts in Microsoft…
Cybersecurity Insurance | MFA Reporting in Microsoft 365
As cybersecurity insurance continues to evolve, I believe we are going to continue to see stricter requirements in reporting as…
What’s New in Microsoft 365 | June Updates
Below are all of the latest feature updates coming to Microsoft 365 Automated Security Assessments mapped to the CIS Controls…
Prevent bad actors from maintaining persistence in Microsoft 365
In a previous article, I discussed initial user compromise with cookie hijacking and the subsequent attacks we could see after.…
How attackers can bypass phishing-resistant MFA | Use these protections!
In previous articles, I’ve talked about how Passkeys are one of the strongest forms of MFA that you could roll…
How to Manage Secrets securely in PowerShell | Azure Key Vault
In this guide, we’ll explore how you can leverage Azure Key Vault to securely manage secrets in your single-tenant or…
What’s New in Microsoft 365 | May Updates
Below are all of the latest feature updates coming to Microsoft 365 Editable Versions available If you would like editable…
The strongest form of MFA? | Why your MFA may need an upgrade
MFA methods have evolved greatly over the years to accommodate shifts in the attack surface as well as new attack…
How to secure access on personal devices across your customers
As a general principle, you should always try to institute a strict policy of requiring managed devices to access corporate…