3 min read
5 Microsoft Entra Security Features You Might Not Know About
Microsoft Entra has a wealth of security features that often fly under the radar—yet they can make a significant difference in protecting your...
3 min read
Microsoft Entra has a wealth of security features that often fly under the radar—yet they can make a significant difference in protecting your...
3 min read
In this CloudCapsule Partner Spotlight, we jumped into a great conversation with Joe Markert, CEO of TransformITive, and Robby Prochnow, their Chief...
4 min read
Risky user detections are one of the leading indicators of account compromise in Microsoft 365. By default, you will not get alerted as an MSP for a...
4 min read
In a previous post, I walked you through an incident response playbook for Token Theft via AiTM. This playbook can be leveraged for BEC incidents as...
8 min read
Token theft is one of the fastest growing attack methods. Lately, I talk to one customer or MSP a week that has had some form of breach that involved...
3 min read
Have you ever opened a seemingly harmless Word document, only to have it trigger a script that could have encrypted your entire device? What saved...
1 min read
CloudCapsule Available in Australian Datacenter Based on client feedback, we've expanded our datacenter presence to include an Australian location...
2 min read
Understanding The BEC Threat Your business email is the primary target for cybercriminals using phishing, business email compromise (BEC), and...
2 min read
If you want to provide secure access to your corporate data on personal smart phones without enrolling that device under full IT management, stay...
2 min read
When it comes to data protection, we usually throw out all of our security protections when external collaboration and guest users are added to the...