The end of passwords….but for real?
Some of you out there might be thinking, “not another article on the end of passwords, we’ve been listening to this for years.” And to your credit, you are spot…
Some of you out there might be thinking, “not another article on the end of passwords, we’ve been listening to this for years.” And to your credit, you are spot…
If you want to provide secure access to your corporate data on personal smart phones without enrolling that device under full IT management, stay tuned because in this article, I…
Did you know that users outside your organization can initiate Teams chats with other members of your team by default in Microsoft 365? Attackers are leveraging this to conduct sophisticated…
If Microsoft 365 security feels very ad hoc and reactive to you today, stay tuned because in this blog I am going to show you a tool I built that…
When it comes to data protection, we usually throw out all of our security protections when external collaboration and guest users are added to the mix. Guest users can: Download…
By default in Microsoft 365 Users can register or join any device into your active device inventory in Entra. Additionally, a common method of maintaining persistence for hackers is to…
Allowing users to access resources from any device is the equivalent of an airline company like United saying, “you know what, we are just going to let our pilots fly…
In today’s remote and hybrid workforce, we’re getting more pushback than ever from customers on preventing access to corporate resources on personal or Byod devices. In this article, I want…
The Nigerian price scam is probably one of the most well known phishing emails out there today but all memes aside, over 90% of all cyberattacks begin with phishing. In…
In today’s digital age, cyberattacks are constantly evolving, and one of the fastest-growing threats in the Microsoft 365 ecosystem is token theft, also known as token replay attacks. This attack…