Raw Thoughts
It’s Time: Drop Persistent Remote Access
Threat actors are using your infrastructure for command and control as a service! When it first became a thing, remote controlling a computer was a thing of magic. So much "how are you doing this?!" Threat actors have caught onto this. Creating one convenient place to...
Modern Security Baby Step: Safe Links and Safe Attachments
In my previous Baby Steps episode, we reviewed smart ways to implement data loss protection for every client. This episode focuses more so on outward protection with Safe Links and Safe Attachments in Defender for Office 365. This is available as a part of the...
Speaking of Digital Transformation: I Lost my Wallet
My kids disappeared my wallet into the Twilight Zone that only kids have access to. We've turned the house upside down looking for it. If you're a parent, you either know what I'm talking about, or you will someday. It's a pain, but not as much of a pain as I thought....
Modern Security Baby Step: Data Loss Prevention
After my previous Modern Security Baby Step, I posted a poll on LinkedIn so that you could decide the next topic! Surprisingly, you voted on Data Loss Prevention Rules I recommend for all! So, let's talk about DLP! Data Loss Prevention is a simple concept. Hunt the...
Text Messaging is Bad MFA
Ahh texting. Arguably the start of the digital communications revolution. The good ‘ol short message service (SMS). To this day, texting is a key method of communication. However, there’s one key thing that texting is not: secure.
How is your MSP’s content game?
Content, and marketing in the MSP space in general, is totally broken. But you can fix it in your own practice!
Modern Security Baby Steps: Mobile Application Management
Implementing MAM is one simple step that you can take for a quick security gain! It will help ensure that data on untrusted devices is at least controlled and protected.
MFA is a Compulsory Item
I might generate a bit of a stir, but this must be said! You cannot be defensible if you are not meaningfully implementing multi-factor authentication. If I'm being honest, having this conversation is getting so old. We've been having it for years yet, somehow,...
Microsoft’s Cyber Signals: Identity is the New Battleground
Microsoft is one of the most powerful, intelligent cybersecurity firms on the planet. Many people don't realize just how much intelligence Microsoft has at their disposal. In their new intelligence brief series, Cyber Signals, Microsoft is pulling back the curtain and...