1 min read
Updates to CloudCapsule Essentials
New Features for CloudCapsule Essentials As summer winds down, we’re excited to share the latest updates to CloudCapsule Essentials—the platform many...
1 min read
New Features for CloudCapsule Essentials As summer winds down, we’re excited to share the latest updates to CloudCapsule Essentials—the platform many...
2 min read
Strengthening Security with SMB1001 CloudCapsule now includes the SMB1001 baseline, joining frameworks within our platform like the CIS Controls,...
3 min read
Microsoft Entra has a wealth of security features that often fly under the radar—yet they can make a significant difference in protecting your...
3 min read
In this CloudCapsule Partner Spotlight, we jumped into a great conversation with Joe Markert, CEO of TransformITive, and Robby Prochnow, their Chief...
4 min read
Risky user detections are one of the leading indicators of account compromise in Microsoft 365. By default, you will not get alerted as an MSP for a...
4 min read
In a previous post, I walked you through an incident response playbook for Token Theft via AiTM. This playbook can be leveraged for BEC incidents as...
8 min read
Token theft is one of the fastest growing attack methods. Lately, I talk to one customer or MSP a week that has had some form of breach that involved...
3 min read
Have you ever opened a seemingly harmless Word document, only to have it trigger a script that could have encrypted your entire device? What saved...
1 min read
CloudCapsule Available in Australian Datacenter Based on client feedback, we've expanded our datacenter presence to include an Australian location...
2 min read
Understanding The BEC Threat Your business email is the primary target for cybercriminals using phishing, business email compromise (BEC), and...