Stop drowning in M365 security changes: Join our continuing education …
Maximize your learning with Continuing Education tailored for M365 Admins, covering critical security and configuration updates monthly.
Maximize your learning with Continuing Education tailored for M365 Admins, covering critical security and configuration updates monthly.
Baseline Security mode is live! Be sure to opt-in for user level impact.
Iran has a sophisticated cyber warfare unit that has successfully hit USA, UK and Isreal water systems in the recent past.
Defender for Office has a new way of making it easy for you to deploy policies. Instead of […]
Even though quarantine management has been assigned outside of IT you should still monitor when an email has been released from quarantine because phishing is the #1 method that criminals use to gain a foothold in your network.
It was my pleasure to introduce peer groups to Third Tier. In 2024, we're introducing focused learning groups for Defender, Intune, Public speaking and more
Despite criminal masterminds and "security researchers" always coming up with the next greatest tool for causing financial damage to our businesses and economy, there are patterns.
Defense implies a reactionary approach. Prevention set the scene where ransomware can't get you in the first place.
The Chrome version of Edge has a full set of Group Policy and Intune configuration options that can enhance security.
Once these two items have been set the ability of PlugX to take advantage of innocent people should be thwarted.
let's say that you've come across a situation, and you want to remove a device from the network - remotely, while you investigate. Interestingly this device, need not be enrolled in Defender for Business. It can an unmanaged device to
Microsoft recently published an analysis of the techniques used by one popular phishing-as-a-service provider. We'll take that analysis and implement a solution based upon it