Practical Protection: Understanding Entra ID and Passkeys
This Episode of Practical Protection is all about Passkeys, how they are different from other credential types, and how they could put an end to phishing.
This Episode of Practical Protection is all about Passkeys, how they are different from other credential types, and how they could put an end to phishing.
In this article, Thijs Lecomte discusses how to identify malicious emails using Microsoft Defender for Office 365.
Sometimes simulation testing is the best way to see how your org would react to threats, but at what cost? Check out this article, and see what testing would best fit your org.
If there's one topic all administrators can agree on, it's that security is something every organization should work to improve in 2022. In this two-part article series, we explain ten different ways to improve tenant security that every administrator should consider. The first part reviews five ways to harden tenant security without the need for extra licenses, using controls that every organization can implement.
There’s a lot of debate around the need to separate Microsoft 365 administrator accounts, especially when controls such as Privileged Identity Management exist within an organization. However, even with PIM there are remaining security concerns which necessitate the operation of separate accounts. This article explains the importance of using separate accounts; details how to target different Conditional Access policies for admin and user accounts and highlights how this approach increases your security posture and limits potential attack vectors against administrator accounts.
The cybersecurity paradigm is built on being prepared for the unexpected. Organizations have long relied on strategies like employee training, security procedures and IT solutions help defend against cyber threats. Therefore, it’s imperative for organizations to rethink their security strategies with remote work and the current threat landscape firmly in mind. Paula's talk at TEC, Hacker’s Paradise: Top 10 Biggest Threats when Working from Home, will provide a deep analysis of the top threats to pay attention to, along with practical recommendations for both technical teams and decision makers.
In the second and final part of this series, Tony outlines how to facilitate end-user reporting of suspicious emails.
How to use Exchange Online mail flow rules to improve the effectiveness of your EOP spam filtering and protect Office 365 users from phishing attacks.
Microsoft has improved the phishing and impersonation detection capabilities of Exchange Online Protection and Office 365 Advanced Threat Protection with anti-phishing policies.
The Epsilon data breach that compromised tens of millions of email addresses has been the big news of the email world lately. What are you telling your customers to expect?
A contact of mine just fell victim to a spammer's email address harvester. The premise of the scam is this - you get sent an iPad review unit for 2 months, after which you are free to keep it.