My top policies for securing device registration in Microsoft 365
By default in Microsoft 365 Users can register or join any device into your active device inventory in Entra. Additionally,…
By default in Microsoft 365 Users can register or join any device into your active device inventory in Entra. Additionally,…
Allowing users to access resources from any device is the equivalent of an airline company like United saying, “you know…
In today’s remote and hybrid workforce, we’re getting more pushback than ever from customers on preventing access to corporate resources…
The Nigerian price scam is probably one of the most well known phishing emails out there today but all memes…
In today’s digital age, cyberattacks are constantly evolving, and one of the fastest-growing threats in the Microsoft 365 ecosystem is…
I’ve spoken to countless MSPs looking to elevate their security game and provide a stronger offering for their clients. Yet,…
Many of us have set up a geo-blocking conditional access policy to prevent sign ins from unapproved countries. If you…
In today’s digital landscape, securing local admin accounts is paramount. Mismanagement of these accounts can lead to severe security breaches,…
Securing SharePoint Online is a multi-layered approach and can get highly complex due to the nature of permissions. I would…
As cybersecurity insurance continues to evolve, I believe we are going to continue to see stricter requirements in reporting as…