Phishing Examples for the Microsoft Office 365 Attack Simulator – Part One

Why would you want to simulate a phishing attack on your own organization? Email hygiene filters work wonders, effectively identifying and blocking a substantial portion of email sent across the global Internet as SPAM or containing malicious content. Even with such a high rate of filtering success, as in life …

Enable Users to Easily Submit Junk, Phishing, and SPAM Messages in Outlook

The email security analysis capabilities in Microsoft Office 365 are unmatched in the industry, offering subscribers the best protection available from email categories such as junk, SPAM, phishing, malicious, etc. But, from time to time a message will slip through that should have been classified as SPAM. If you are …

Configure Microsoft Cloud App Security to Analyze SonicWall Logs

One of the greatest dangers for any network today is not knowing what applications are running within its boundaries and how the data could be leaking externally. These applications are often installed by users not knowing the potential hazards these applications may cause, malicious applications that have somehow entered the …

Securing Small to Midsize Local Networks – A Practical Approach

Introduction Many large companies, governments, militaries, etc. hire teams of top notch security personnel to provide continuing evaluation and guidance to keep their organization as secure as possible. But, what about the small to medium size companies where there may be only a small team of administrators, engineers, etc. who …