Email Phishing Protection Guide – Part 2: Train Users with Office 365 Attack Simulator

The Email Phishing Protection Guide is a multi-part blog series written to walk you through the setup of many security focused features you may already own in Microsoft Windows, Microsoft Office 365, and Microsoft Azure. By implementing some or all of these items, an organization will increase their security posture …

Email Phishing Protection Guide – Part 1: Customize Office 365 Logon Portal

The Email Phishing Protection Guide is a multi-part blog series written to walk you through the setup of many security focused features you may already own in Microsoft Windows, Microsoft Office 365, and Microsoft Azure. By implementing some or all of these items, an organization will increase their security posture …

Introduction: Email Phishing Protection Guide – Enhancing Your Organization’s Security Posture

The Email Phishing Protection Guide is a multi-part blog series written to walk you through the setup of many security focused features you may already own in Microsoft Windows, Microsoft Office 365, and Microsoft Azure. By implementing some or all of these items, an organization will increase their security posture …

Ways to Learn New Microsoft Technology and Stay Current

In the many Microsoft Partner and customer meetings I am in each week, I am often demonstrating and telling stories about how Microsoft technologies can enhance our personal and professional lives. With the latest Microsoft cloud applications I focus on, I find many people are intrigued by the truly unique …

Phishing Examples for the Microsoft Office 365 Attack Simulator – Part Three

This is the third post of a multi-part blog with examples to use as part of a phishing simulation in the new Microsoft Office 365 Attack Simulator tool. For background information on the tool and this blog series, click on Part One below. Phishing Examples for the Microsoft Office 365 …

Phishing Examples for the Microsoft Office 365 Attack Simulator – Part Two

Examples of Phishing Emails for the Microsoft Office 365 Attack Simulator – Part Two This is the second post of a multi-part blog with examples to use as part of a phishing simulation in the new Microsoft Office 365 Attack Simulator. For background information on the tool and this blog …

Phishing Examples for the Microsoft Office 365 Attack Simulator – Part One

Why would you want to simulate a phishing attack on your own organization? Email hygiene filters work wonders, effectively identifying and blocking a substantial portion of email sent across the global Internet as SPAM or containing malicious content. Even with such a high rate of filtering success, as in life …

Enable Users to Easily Submit Junk, Phishing, and SPAM Messages in Outlook

The email security analysis capabilities in Microsoft Office 365 are unmatched in the industry, offering subscribers the best protection available from email categories such as junk, SPAM, phishing, malicious, etc. But, from time to time a message will slip through that should have been classified as SPAM. If you are …

Configure Microsoft Cloud App Security to Analyze SonicWall Logs

One of the greatest dangers for any network today is not knowing what applications are running within its boundaries and how the data could be leaking externally. These applications are often installed by users not knowing the potential hazards these applications may cause, malicious applications that have somehow entered the …

Skype for Business Online Calling – Designing a Local Call Backup Route

Moving Private Branch Exchange (PBX) calling services to the cloud is now a common part of a digital transformation to Microsoft Office 365. Moving all calling services to the Microsoft Cloud often results in the partial or full removal of on-premises PBX equipment, a reduction in operational costs and far …