Introduction: Email Phishing Protection Guide – Enhancing Your Organization’s Security Posture

The Email Phishing Protection Guide is a multi-part blog series written to walk you through the setup of many security focused features you may already own in Microsoft Windows, Microsoft Office 365, and Microsoft Azure. By implementing some or all of these items, an organization will increase their security posture …

Ways to Learn New Microsoft Technology and Stay Current

In the many Microsoft Partner and customer meetings I am in each week, I am often demonstrating and telling stories about how Microsoft technologies can enhance our personal and professional lives. With the latest Microsoft cloud applications I focus on, I find many people are intrigued by the truly unique …

Phishing Examples for the Microsoft Office 365 Attack Simulator – Part Three

This is the third post of a multi-part blog with examples to use as part of a phishing simulation in the new Microsoft Office 365 Attack Simulator tool. For background information on the tool and this blog series, click on Part One below. Phishing Examples for the Microsoft Office 365 …

Phishing Examples for the Microsoft Office 365 Attack Simulator – Part Two

Examples of Phishing Emails for the Microsoft Office 365 Attack Simulator – Part Two This is the second post of a multi-part blog with examples to use as part of a phishing simulation in the new Microsoft Office 365 Attack Simulator. For background information on the tool and this blog …

Phishing Examples for the Microsoft Office 365 Attack Simulator – Part One

Why would you want to simulate a phishing attack on your own organization? Email hygiene filters work wonders, effectively identifying and blocking a substantial portion of email sent across the global Internet as SPAM or containing malicious content. Even with such a high rate of filtering success, as in life …

Configure Microsoft Cloud App Security to Analyze SonicWall Logs

One of the greatest dangers for any network today is not knowing what applications are running within its boundaries and how the data could be leaking externally. These applications are often installed by users not knowing the potential hazards these applications may cause, malicious applications that have somehow entered the …

Part 1: Planning a Migration From Avaya to Skype for Business

At a recent Microsoft Ignite 2017 session about migrating to Skype for Business, a show of hands in the audience was requested for attendees who are planning to move from Avaya to Skype for Business. Of the several hundred attendees, more than 75% of the hands were raised. As I …

Microsoft Ignite 2017: Common Questions About Microsoft Teams

I work in the One Commercial Partner (OCP) organization at Microsoft where I work with many customers and Microsoft Partners to help answer deep technical questions, review technical designs, and ensure successful implementations of Office 365 products. As part of this role, I recently worked at the Expo area for …

Developing an Office 365 Skype for Business Cost Analysis

When assisting customers planning to upgrade or replace existing telecom services, I am often asked about reliability, security, overall value, and costs associated with Microsoft Office 365 Skype for Business. After answering the reliability and security questions about the Microsoft Cloud, I then focus the discussion on trying to understand …

IoT Project for Anyone – Designing IoT Microsoft Power BI Dashboard

IoT Project for Anyone Blog Series: This is one of a series of blogs developed as part of an overall IoT implementation project for beginners. The project will walk through the hardware needed, operating system installation, data collection and a Power BI dashboard to view the data. These blogs can …