Practical Protection: Updating Your Password Policies
This week on Practical Protection, we are talking about Password Policies, what NIST thinks, and offer some advice on staying secure.
This week on Practical Protection, we are talking about Password Policies, what NIST thinks, and offer some advice on staying secure.
Copying data from Windows endpoints to USB storage devices is one of the largest sources of data leakage. In this article, we discuss two simple solutions to avoid this problem.
Microsoft reported yet another nation-state attack, code-named Peach Sandstorm. In this blog, we discuss the threat actor and provide steps to defend against similar attacks.
In this blog, Thijs Lecomte dives into how to protect you public-facing infrastructure with Microsoft Defender's External Attack Surface Management tool.
Terminating employees is never fun, but it does happen. And when it happens, you need to know the necessary steps for removing their access. This blog serves as a checklist for removing employees with Microsoft 365 Accounts,
No one likes spending money! In this episode of Practical Protection, we dive into imposing cost on attackers, hopefully deterring them from attacking in the first place.
Dynamic watermarking is a new feature for sensitivity labels that's intended to provide a visual deterrent to screen captures of confidential documents. The feature works by using the email address of the signed-in user as a watermark. Everything works and the feature seems effective, but this isn't something to use with every sensitivity label.
After identifying what networking data you should ingest into Sentinel, the next step is to start creating alerts and incidents using the data. And that is exactly what we cover in this episode of Practical Sentinel.
Looking to score that raise? In this episode of Practical Protection, we dive into Microsoft 365 Secure score, how it works, and help you better secure your Microsoft cloud environments.
Incident Response is all about people, process, and technique. In this episode of Practical Protection, we review different issues that can arise during incident response.
Securing Teams meetings with Teams Premium offers organizations multiple options to protect sensitive information. In this blog, we review those options and share some tips along the way.
In the wake of the recent CrowdStrike outage, Paul Robichaux dives into what you and your organization should do to prepare for the next unforeseen Microsoft outage.