Blue Team Blog

Get the latest info on CloudCapsule, Microsoft 365,
cybersecurity trends, and MSP best practices.

 

  Subscribe Today

Security

8 min read

Token Theft Playbook: Incident Response

Token theft is one of the fastest growing attack methods. Lately, I talk to one customer or MSP a week that has had some form of breach that involved...

Read More

3 min read

Deploy Attack Surface Reduction Rules from Microsoft Intune

Have you ever opened a seemingly harmless Word document, only to have it trigger a script that could have encrypted your entire device? What saved...

Read More

1 min read

Australian Datacenter & Essential 8 Baseline Now Available

CloudCapsule Available in Australian Datacenter Based on client feedback, we've expanded our datacenter presence to include an Australian location...

Read More

2 min read

vCIO Playbook - BEC - Business Email Compromise

Understanding The BEC Threat Your business email is the primary target for cybercriminals using phishing, business email compromise (BEC), and...

Read More

2 min read

Protecting Corporate Data on Personal Cell Phones

If you want to provide secure access to your corporate data on personal smart phones without enrolling that device under full IT management, stay...

Read More

2 min read

Data Protection with Guest Users in Microsoft 365

When it comes to data protection, we usually throw out all of our security protections when external collaboration and guest users are added to the...

Read More

2 min read

Automating Vendor Onboarding Requests

Are you looking to streamline vendor onboarding requests in your organization? In this post we’ll explore an end-to-end automation built in Power...

Read More

3 min read

Top policies for securing device registration in Microsoft 365

By default in Microsoft 365 Users can register or join any device into your active device inventory in Entra. Additionally, a common method of...

Read More

3 min read

Build a Governance Layer for Application Inventory Management + Free Templates

Managing a software application inventory for a business can feel overwhelming. With the rapid proliferation of SaaS tools, lack of governance, and...

Read More
Extend your Entra log retention to gain valuable insight on threat behavior

3 min read

Retaining Entra Sign-in Logs Beyond 30 Days

In today’s security landscape, retaining audit and sign-in logs for an extended period is crucial for effective threat detection and incident...

Read More

Incredible Insights.
Amazingly Affordable.

$250/Month
Unlimited tenants. Up to 1K users per tenant.
Cancel anytime. No long-term contracts.