Practical Protection: Who Watches the Watchers?
Are you on watch for data breaches? This Blog talks about how soft skills, trainings, and investments can be used as tools to minimize the harm from data breaches.
Are you on watch for data breaches? This Blog talks about how soft skills, trainings, and investments can be used as tools to minimize the harm from data breaches.
Implementing zero trust in the world is a big hassle, often uncomfortable, and frequently dorky—plus, it can be expensive. At the same time, moving closer to a zero trust model helps harden your network significantly, and you may already have many of the tools and techniques you need available without much extra cost. In this article, we discuss how to take baby steps toward Zero Trust.
In this edition of Practical Protection with Paul Robichaux, we dive into understanding what multi-tenant applications are, what they can do, and how to manage them in order to keep your tenant and users safe.
In this week's show, Steve and Paul discuss Microsoft 365 Copilot. Not a sat-nav for your car, powered by the Microsoft Cloud, but an AI assistant that can help people with their daily tasks using OpenAI technologies. And nearly an episode doesn't go by without Exchange patches - but this time the Outlook issues could be pretty serious, so make sure you take a listen. Talking of Outlook - authenticator comes to mobile Outlook - is it a good thing? Plus much more..
Many Microsoft 365 and Exchange Server logs contain IP addresses. To find out where the IP addresses come from and if they are internal or external, PowerShell developers can use online web-based geolocation services. It's important not to overuse the services because you could be throttled.
Azure AD system-preferred authentication means that users must use their strongest authentication method when they sign-into Azure AD. The change emphasizes the desirability of strong authentication methods over weak. Now in preview, Microsoft plans to make the policy effective for everyone in July 2023.
Microsoft 365 security is a big topic. Focus is important when it comes to getting things done. In this article, we suggest five areas that administrators could work on during 2023 to improve the security posture of their tenant. You might already have established full control over some of these areas. Even if you have, it's still good to consider if you can improve security.
In this article, Julian Stephan reviews the most common user experience scenarios to consider in your tenant-to-tenant migration planning and how to add in the adoption of security and productivity features.