Online Collaboration Products Offer Extended Trial Periods to Help Prevent Coronavirus Spread

It is early March 2020 and the Coronavirus spread continues to be the top news story and concern for many people and organizations. There are reports of masks and hand sanitizer being cleared from store shelves. Large companies such as IBM, AT&T and Verizon who were scheduled to attend the …

Email Phishing Protection Guide – Part 20: Recommended Security and Anti-Phishing Training from Microsoft Ignite 2018

The Email Phishing Protection Guide is a multi-part blog series written to walk you through the setup of many security focused features you may already own in Microsoft Windows, Microsoft Office 365, and Microsoft Azure. By implementing some or all of these items, an organization will increase their security posture …

Email Phishing Protection Guide – Blog 19: Email Phishing Protection Security Checklist

The Email Phishing Protection Guide is a multi-part blog series written to walk you through the setup of many security focused features you may already own in Microsoft Windows, Microsoft Office 365, and Microsoft Azure. By implementing some or all of these items, an organization will increase their security posture …

Email Phishing Protection Guide – Part 18: Increase Security with Microsoft Secure Score

The Email Phishing Protection Guide is a multi-part blog series written to walk you through the setup of many security focused features you may already own in Microsoft Windows, Microsoft Office 365, and Microsoft Azure. By implementing some or all of these items, an organization will increase their security posture …

Email Phishing Protection Guide – Part 17: Control Application Consent Registrations in Microsoft Office 365 and Azure

The Email Phishing Protection Guide is a multi-part blog series written to walk you through the setup of many security focused features you may already own in Microsoft Windows, Microsoft Office 365, and Microsoft Azure. By implementing some or all of these items, an organization will increase their security posture …

Email Phishing Protection Guide – Part 16: Disable Office 365 Legacy Email Authentication Protocols

The Email Phishing Protection Guide is a multi-part blog series written to walk you through the setup of many security focused features you may already own in Microsoft Windows, Microsoft Office 365, and Microsoft Azure. By implementing some or all of these items, an organization will increase their security posture …

Email Phishing Protection Guide – Part 15: Implement the Microsoft Azure AD Password Protection Service (for On-Premises too!)

The Email Phishing Protection Guide is a multi-part blog series written to walk you through the setup of many security focused features you may already own in Microsoft Windows, Microsoft Office 365, and Microsoft Azure. By implementing some or all of these items, an organization will increase their security posture …

Email Phishing Protection Guide – Part 14: Prevent Brute Force and Spray Attacks in Office 365

The Email Phishing Protection Guide is a multi-part blog series written to walk you through the setup of many security focused features you may already own in Microsoft Windows, Microsoft Office 365, and Microsoft Azure. By implementing some or all of these items, an organization will increase their security posture …

Email Phishing Protection Guide – Part 13: Update Your User Password Strategy – Now!

The Email Phishing Protection Guide is a multi-part blog series written to walk you through the setup of many security focused features you may already own in Microsoft Windows, Microsoft Office 365, and Microsoft Azure. By implementing some or all these items, an organization will increase their security posture against …

Email Phishing Protection Guide – Part 12: Discover Exactly Who is Attacking Your Office 365 User Identities

The Email Phishing Protection Guide is a multi-part blog series written to walk you through the setup of many security focused features you may already own in Microsoft Windows, Microsoft Office 365, and Microsoft Azure. By implementing some or all of these items, an organization will increase their security posture …