Microsoft

People Leave. Access Lingers. Projects Stay Exposed.

The contract ended Friday. The laptop went home for the weekend. Your site superintendent promised to drop it off Monday morning. Standard stuff. It happens...

Read More
a square icon with four different colored squares

Windows 10 End of Life – Are you Prepared?

A decade after its release in 2015, October 15, 2025 is the End of Support date for Windows 10. Now, this does not mean that...

Read More
the screen of a laptop with the windows security button highlighted

Microsoft Defender for Endpoint: 365 Setup Guide – Step 10

You might be wondering how “Defender for Endpoint” differs from “Defender for Office 365.” Both involve the Defender platform, but Defender for Endpoint implements the...

Read More
Photo of a desktop computer with a blue loading screen, perhaps being erolled with Microsoft Intune

Microsoft Intune Setup Guide: Microsoft 365 Configuration – Step 9

Click Here for Step 8 When it comes to device configuration and onboarding, we cannot overstate the convenience of Microsoft Intune. For the 9th installment...

Read More
phishing, credentials, data

Why You Need A Third-Party Phishing Filter

Around 3.4 billion phishing emails are sent every day. Are you Properly Protecting Your business against this ever-increasing threat? According to Cofense, a phishing email...

Read More
a close up of a cell phone with icons on it

Defender for Office 365: Microsoft Setup Guide – Step 8

Click Here for Step 7 Microsoft Defender for Office 365 is a security solution designed to protect your organization’s email and collaboration tools from evolving...

Read More
artist, colorful, paint brush

Microsoft Customization Tools: 365 Setup Guide – Step 7

Click Here for Step 6 Customizing the appearance of your Microsoft tenant has not only aesthetic advantages, but also helps better secure your organization. In...

Read More
silhouettes, hierarchy, people

Conditional Access Policies: Microsoft 365 Setup Guide – Step 6

In part 6 of our Microsoft 365 Setup Guide we are covering Conditional Access Policies. Learn how to configure them and why cybersecurity experts recommend...
Read More
person working on blue and white paper on board

MFA Best Practices: Microsoft 365 Setup Guide – Step 5.5

In our previous chapter of the Microsoft 365 Setup Guide, we covered the different forms and locations of Multi-Factor Authentication. In this installment, we are...

Read More

Types of MFA: Microsoft 365 Setup Guide Step 5

Multi-factor authentication is a non-negotiable baseline for tenants in Microsoft 365. In order to maintain bare-minimum cybersecurity in a Microsoft tenant, enforcing MFA for all...

Read More