Practical Protection: Banning Apps with Intune
In this in episode of Practical Protection, we dive into some recent IT incidents involving applications, and how Intune can be used to block them from your devices.
In this in episode of Practical Protection, we dive into some recent IT incidents involving applications, and how Intune can be used to block them from your devices.
In this episode of Practical Protection, Paul Robichaux dives into CISA's Microsoft Expanded Cloud Logs Implementation Playbook, its prerequisites, and applying this advice into your organization.
With 2025 in full swing, it's time to do some reflecting! In this episode of practical protection, we look back at the major Microsoft security events in 2024 and how you can prepare yourself for what's to come in 2025.
It's that time of the year again! In this episode of Practical Protection, we review the 2024 Microsoft Digital Defense Report and offer our recommendations to protect against the emerging and current threat.
No one likes spending money! In this episode of Practical Protection, we dive into imposing cost on attackers, hopefully deterring them from attacking in the first place.
Looking to score that raise? In this episode of Practical Protection, we dive into Microsoft 365 Secure score, how it works, and help you better secure your Microsoft cloud environments.
This edition of Practical Protection is all about theory and playing games. In this blog, Paul Robichaux explains how to improve your security posture by setting up hypothetical scenarios in your environment.
In this installment of Practical Protection, Paul Robichaux Talks about Password Banning in your Entra ID Tenant and why everyone should implement this extra layer of protection.
Security is not a one-time thing. We must improve configurations as products evolve and new situations arise. In this blog, James Yip dives into his top five security topics for Microsoft 365 Projects.
It's that time of the year again! Microsoft is releasing their annual Microsoft Digital Defense Report (MDDR), and you may want to give it a read. In this blog, we talk about the highlights from the MDDR and offer some advice to better protect your organization.
Apart from being annoying, advertisements can actually be used to deliver malware. This blog explains what "Malvertising" is and how to secure your network from these attacks.
Recycling is not only good for the planet, but it's also good for the security of your organization. In this article, Paul Robichaux discusses how to properly dispose of your devices so that you stay protected.