Tag: Office 365

Recent articles

Office 365 is Now Microsoft 365, What Does That Mean for You?

On April 21, 2020, Microsoft is rebranding and making changes to its subscription bundle. Specifically, Office 365 becomes Microsoft 365!   I know what you are thinking: Isn’t Office 365 also Microsoft Office 365? So, has Microsoft just removed Office from the bundle since it is now only Microsoft 365? What happened to the Office? Where did it go? I use Office. What am I […]

2min Read »

Information Rights Management and External Sharing Policies

Technology and innovation continue to shape our world, as businesses are forced to keep pace in an accelerated environment of cloud computing, artificial intelligence, and machine learning. Coupled with a new focus on IT decentralization with flexible, mobile workforces who are seeking more productive and efficient means of collaboration, today’s IT landscape is a complex […]

2min Read »

Protecting Sensitive Data is as Easy as DLP 

Data volume has been growing exponentially, dramatically increasing opportunities for theft and accidental disclosure of sensitive information.  Sirius Edge reports that according to International Data Corp, the “global data-sphere” will reach 163 zettabytes by 2025. To put that in perspective, if every gigabyte in a zettabyte were a brick, one zettabyte would be the equivalent of […]

2min Read »

Office 365 Advanced Threat Protection:

Safe Links and Safe Attachments Over the last few decades, the means and modes of communication have shifted dramatically.  Organizations are increasingly embracing collaboration and instant-messaging tools like Slack and Microsoft Teams in place of “old school” methods like phone calls, text, and emails.  However, despite the appearance of modern communications and collaboration tools, a […]

2min Read »

I Don’t Know Where to Look

Using Cloud App Security to Detect and Protect Moving resources to the cloud increases flexibility for employees and IT alike.  Users can increase mobility and productivity in an increasingly decentralized and perimeter-less environment while not sacrificing access to traditional on-premise services.  However, this also introduces new challenges and complexities for keeping your organization secure. Every […]

2min Read »

Conditional Access: Modernizing Multi-Factor Authentication

In today’s increasingly decentralized IT environment, the modern security perimeter now extends beyond an organization’s network to include user and device identity.  People connect from organization-owned, personal, and pubic devices on and off their corporate networks using various device types on varying platforms.  In this environment, security of user accounts is more important than ever.  […]

2min Read »

Didn’t I Just Change That?

Debunking Common Password Policy Myths Looking for more tips to protect your organization (and yourself)? Check out our security series, 10 Fail-Safe Tricks for Maximizing Security. We’ll be releasing new articles and videos each week for every topic. Click here to get the content directly in your inbox. For today’s installment of 10 Fail-Safe Tips […]

2min Read »

Phishing In Your Company Pond?

6 Steps to Improving Your Security Training & Fighting Social Engineering  Looking for more tips to protect your organization (and yourself)? Check out our security series, 10 Fail-Safe Tricks for Maximizing Security. We’ll be releasing new articles and videos each week for every topic. Click here to get the content directly in your inbox. In […]

2min Read »

Securing Office 365 in 8 Simple Steps

As adoption has increased, Office 365 has become an attractive surface for cybercriminals targeting hosted email, user credentials, and personal/organizational data.  According to Cisco’s recent Cybersecurity Report, more than 90 percent of breaches start with email.  Attackers spread ransomware and other malware remarkably easily through email, which means that securing Office 365 is of critical […]

2min Read »