Getting started with email security in Microsoft 365 | Phishing protections
The Nigerian price scam is probably one of the most well known phishing emails out there today but all memes aside, over 90% of all cyberattacks begin with phishing. In…
The Nigerian price scam is probably one of the most well known phishing emails out there today but all memes aside, over 90% of all cyberattacks begin with phishing. In…
In today’s digital age, cyberattacks are constantly evolving, and one of the fastest-growing threats in the Microsoft 365 ecosystem is token theft, also known as token replay attacks. This attack…
I’ve spoken to countless MSPs looking to elevate their security game and provide a stronger offering for their clients. Yet, many find themselves stuck—unsure where to begin or what roadmap…
Many of us have set up a geo-blocking conditional access policy to prevent sign ins from unapproved countries. If you haven’t already, look to implement this as it gives you…
In today’s digital landscape, securing local admin accounts is paramount. Mismanagement of these accounts can lead to severe security breaches, compromising sensitive data and systems. What are your standards when…
Securing SharePoint Online is a multi-layered approach and can get highly complex due to the nature of permissions. I would say most of the settings in SharePoint online are not…
As cybersecurity insurance continues to evolve, I believe we are going to continue to see stricter requirements in reporting as it relates to common questionnaire topics such as organizations requiring…
In a previous article, I discussed initial user compromise with cookie hijacking and the subsequent attacks we could see after. This week, I wanted to zoom in on persistence techniques…
In previous articles, I’ve talked about how Passkeys are one of the strongest forms of MFA that you could roll out in an organization given that they are considered phishing…
MFA methods have evolved greatly over the years to accommodate shifts in the attack surface as well as new attack methods. In this article, I wanted to cover the evolution…