Practical Protection: Who Watches the Watchers?
Are you on watch for data breaches? This Blog talks about how soft skills, trainings, and investments can be used as tools to minimize the harm from data breaches.
Are you on watch for data breaches? This Blog talks about how soft skills, trainings, and investments can be used as tools to minimize the harm from data breaches.
Microsoft 365 Copilot costs $30/user/month. At that price level, you don't want to assign Copilot licenses to all and sundry in your tenant. That's a recipe for dramatic overspending. In this article, we consider how to select people to receive Copilot licenses on the basis of real need rather than want.
Microsoft 365 Groups display either a default or custom photo to highlight the intent of the group (or team). Some organizations like to exert central control over Microsoft 365 group photos. This article explores how to achieve this goal with PowerShell.
On July 18, Microsoft revealed that the monthly Microsoft 365 Copilot cost will be $30/user. That's on top of an 'eligible' license like Microsoft 365 E3 or E5. The costs of adopting a digital assistant based on artificial intelligence might rule the prospect out for many organizations.
Microsoft recently announced two new products to the Entra family, Entra Private Access and Entra Internet Access. In this blog, we break down each product and help you decide if they are worth the hype.
Most of us don’t spend much time poking around in the unified audit log, but all of us probably should. In this article, we dive into 5 things you need to know about Microsoft 365 auditing.
In this blog, Richard Dean Teases his TEC 2023 session and explores the complexities of Multi-Tenant Management using Microsoft solutions.
Misconfigured Conditional Access policies may introduce unnecessary risk to your tenant. That is why it is important to make sure these policies are properly configured. In this blog, Brandon Colley reviews the five most common Conditional Access misconfigurations.
It's time to armor up for battle with Microsoft's DMARC. In this article, Damian Scoles talks about new improvements to DMARC and how you can use them to protect against email attacks.
Recently, security researchers at JumpSec labs identified a vulnerability in Teams that allows malware delivery through Teams chat. Microsoft Acknowledged the vulnerability but didn't release any immediate remedies. In this blog, we will discuss two practical methods to avoiding malware delivery within Teams.
You can’t disrupt a chain if you can’t identify the links. In this blog, Paul Robichaux goes over some of the ways you can break a Kill Chain in your environment. And it all starts with asking yourself the right questions.
In this Blog, James Yip explains how to conduct sensitive file inventory and background labeling using the Purview Information Protection Scanner.