Raw Thoughts

2025 in Cybersecurity (and a Look Back at 2024)

2025 in Cybersecurity (and a Look Back at 2024)

It's hard to believe that we're closing in on the end of 2024. For me at least, it has been one of those years where being busy keeps the time moving! It's also been an active year in cybersecurity so, in the spirit of turning the page, let's have a look back at 2024...

read more
Ready. Set. (Entra) Passkey!

Ready. Set. (Entra) Passkey!

Now that Passkeys are generally available, we can start thinking of strategies to implement phishing resistant authentication in our environments! Microsoft has provided a lot of guidance on rolling out Passkeys in general. In this article, I'll talk through some...

read more
Mandatory MFA is Finally Upon Us

Mandatory MFA is Finally Upon Us

We're a little over a month out from Microsoft's upcoming MFA mandate. On October 5th, 2024, the Entra Admin Center, Intune Admin Center, and Azure portal will finally mandate multifactor authentication. This means that, regardless of your tenant settings, you will be...

read more
Can Payments take a Page from the FIDO book?

Can Payments take a Page from the FIDO book?

Payment card fraud is as old as payment cards themselves. First, we used embossed cards and phone calls in the clear to process payments. Then, we had to trust service staff to take our cards away from us to process them. The majority of them were just doing their...

read more
Your Ransom Payment Punched the Next Victim

Your Ransom Payment Punched the Next Victim

I recently came across an article stating that ransomware attacks targeting healthcare organizations surged following the Change Healthcare incident. For a quick recap, the Change Healthcare attack crippled the filling of prescriptions and other healthcare operations...

read more
Data Loss Prevention for Any SMB

Data Loss Prevention for Any SMB

It's time for a new guide for MSPs! The Safeguards within CIS Control 3 speak to the need for proper Data Protection. Implementation Group 1 (i.e.: the minimum we should do) covers some basic data management and protection practices such as: Establishing and...

read more