4 min read
Getting Started with Risky Users in Microsoft 365
Risky user detections are one of the leading indicators of account compromise in Microsoft 365. By default, you will not get alerted as an MSP for a...
4 min read
Risky user detections are one of the leading indicators of account compromise in Microsoft 365. By default, you will not get alerted as an MSP for a...
4 min read
In a previous post, I walked you through an incident response playbook for Token Theft via AiTM. This playbook can be leveraged for BEC incidents as...
8 min read
Token theft is one of the fastest growing attack methods. Lately, I talk to one customer or MSP a week that has had some form of breach that involved...
3 min read
Have you ever opened a seemingly harmless Word document, only to have it trigger a script that could have encrypted your entire device? What saved...
1 min read
CloudCapsule Available in Australian Datacenter Based on client feedback, we've expanded our datacenter presence to include an Australian location...
2 min read
Understanding The BEC Threat Your business email is the primary target for cybercriminals using phishing, business email compromise (BEC), and...
2 min read
If you want to provide secure access to your corporate data on personal smart phones without enrolling that device under full IT management, stay...
2 min read
When it comes to data protection, we usually throw out all of our security protections when external collaboration and guest users are added to the...
2 min read
Are you looking to streamline vendor onboarding requests in your organization? In this post we’ll explore an end-to-end automation built in Power...
3 min read
By default in Microsoft 365 Users can register or join any device into your active device inventory in Entra. Additionally, a common method of...