Automate Travel Request in Microsoft 365 | Secure Travel
Many of us have set up a geo-blocking conditional access policy to prevent sign ins from unapproved countries. If you…
Many of us have set up a geo-blocking conditional access policy to prevent sign ins from unapproved countries. If you…
In today’s digital landscape, securing local admin accounts is paramount. Mismanagement of these accounts can lead to severe security breaches,…
Securing SharePoint Online is a multi-layered approach and can get highly complex due to the nature of permissions. I would…
As cybersecurity insurance continues to evolve, I believe we are going to continue to see stricter requirements in reporting as…
In a previous article, I discussed initial user compromise with cookie hijacking and the subsequent attacks we could see after.…
In previous articles, I’ve talked about how Passkeys are one of the strongest forms of MFA that you could roll…
MFA methods have evolved greatly over the years to accommodate shifts in the attack surface as well as new attack…
As a general principle, you should always try to institute a strict policy of requiring managed devices to access corporate…
Checklist do not equal compliance One of the major gaps I hear when talking to MSPs about security and compliance…
Checklist do not equal compliance One of the major gaps I hear when talking to MSPs about security and compliance…