Blue Team Blog

Get the latest info on CloudCapsule, Microsoft 365,
cybersecurity trends, and MSP best practices.

Subscribe Today

Security (2)

3 min read

5 Microsoft Entra Security Features You Might Not Know About

Microsoft Entra has a wealth of security features that often fly under the radar—yet they can make a significant difference in protecting your...

Read More

3 min read

The Future of MSPs: Unlocking Business Value, Not Just Managing IT

In this CloudCapsule Partner Spotlight, we jumped into a great conversation with Joe Markert, CEO of TransformITive, and Robby Prochnow, their Chief...

Read More

4 min read

Getting Started with Risky Users in Microsoft 365

Risky user detections are one of the leading indicators of account compromise in Microsoft 365. By default, you will not get alerted as an MSP for a...

Read More

4 min read

Token Theft Playbook: Proactive Protections

In a previous post, I walked you through an incident response playbook for Token Theft via AiTM. This playbook can be leveraged for BEC incidents as...

Read More

8 min read

Token Theft Playbook: Incident Response

Token theft is one of the fastest growing attack methods. Lately, I talk to one customer or MSP a week that has had some form of breach that involved...

Read More

3 min read

Deploy Attack Surface Reduction Rules from Microsoft Intune

Have you ever opened a seemingly harmless Word document, only to have it trigger a script that could have encrypted your entire device? What saved...

Read More

1 min read

Australian Datacenter & Essential 8 Baseline Now Available

CloudCapsule Available in Australian Datacenter Based on client feedback, we've expanded our datacenter presence to include an Australian location...

Read More

2 min read

vCIO Playbook - BEC - Business Email Compromise

Understanding The BEC Threat Your business email is the primary target for cybercriminals using phishing, business email compromise (BEC), and...

Read More

2 min read

Protecting Corporate Data on Personal Cell Phones

If you want to provide secure access to your corporate data on personal smart phones without enrolling that device under full IT management, stay...

Read More

2 min read

Data Protection with Guest Users in Microsoft 365

When it comes to data protection, we usually throw out all of our security protections when external collaboration and guest users are added to the...

Read More

Incredible Insights.
Amazingly Affordable.

$250/Month
Unlimited tenants. Up to 1K users per tenant.
Cancel anytime. No long-term contracts.