How to Protect against Token Theft | Conditional Access
In today’s digital age, cyberattacks are constantly evolving, and one of the fastest-growing threats in the Microsoft 365 ecosystem is…
In today’s digital age, cyberattacks are constantly evolving, and one of the fastest-growing threats in the Microsoft 365 ecosystem is…
I’ve spoken to countless MSPs looking to elevate their security game and provide a stronger offering for their clients. Yet,…
Many of us have set up a geo-blocking conditional access policy to prevent sign ins from unapproved countries. If you…
In today’s digital landscape, securing local admin accounts is paramount. Mismanagement of these accounts can lead to severe security breaches,…
Securing SharePoint Online is a multi-layered approach and can get highly complex due to the nature of permissions. I would…
As cybersecurity insurance continues to evolve, I believe we are going to continue to see stricter requirements in reporting as…
In a previous article, I discussed initial user compromise with cookie hijacking and the subsequent attacks we could see after.…
In previous articles, I’ve talked about how Passkeys are one of the strongest forms of MFA that you could roll…
MFA methods have evolved greatly over the years to accommodate shifts in the attack surface as well as new attack…
As a general principle, you should always try to institute a strict policy of requiring managed devices to access corporate…