How to report on suspicious emails in Office 365 – Part 1

In part one of this two blog series, Tony Akers writes on how to improve the end-user reporting of phishing attacks and how to deploy the correct tools.