Automate Travel Request in Microsoft 365 | Secure Travel
Many of us have set up a geo-blocking conditional access policy to prevent sign ins from unapproved countries. If you haven’t already, look to implement this as it gives you…
Manage Local Admin Accounts Securely | Top Tips
In today’s digital landscape, securing local admin accounts is paramount. Mismanagement of these accounts can lead to severe security breaches, compromising sensitive data and systems. What are your standards when…
What’s New in Microsoft 365 | July Updates
Below are all of the latest feature updates coming to Microsoft 365 Automated Security Assessments mapped to the CIS Controls I am excited to announce the soft-launch of an automated…
Share Documents Securely | SharePoint
Securing SharePoint Online is a multi-layered approach and can get highly complex due to the nature of permissions. I would say most of the settings in SharePoint online are not…
Best Practices for Break Glass Accounts
Image Generated by Copilot 🙂 I get a lot of questions around best practices for break glass accounts in Microsoft 365 so wanted to document them in this article. To…
Cybersecurity Insurance | MFA Reporting in Microsoft 365
As cybersecurity insurance continues to evolve, I believe we are going to continue to see stricter requirements in reporting as it relates to common questionnaire topics such as organizations requiring…
What’s New in Microsoft 365 | June Updates
Below are all of the latest feature updates coming to Microsoft 365 Automated Security Assessments mapped to the CIS Controls I am excited to announce the soft-launch of an automated…
Prevent bad actors from maintaining persistence in Microsoft 365
In a previous article, I discussed initial user compromise with cookie hijacking and the subsequent attacks we could see after. This week, I wanted to zoom in on persistence techniques…
How attackers can bypass phishing-resistant MFA | Use these protections!
In previous articles, I’ve talked about how Passkeys are one of the strongest forms of MFA that you could roll out in an organization given that they are considered phishing…
How to Manage Secrets securely in PowerShell | Azure Key Vault
In this guide, we’ll explore how you can leverage Azure Key Vault to securely manage secrets in your single-tenant or multi-tenant PowerShell scripts. This will enable you to securely access…










