Category: Identity

0

Quick Update!!

As you know, starting in June of this month I left my job at Protiviti and started working for myself, creating a company called SharePlicity. So far so good, it has been more relaxing...

0

Munich in June

On Wednesday, 27th of June 2018, Rencore will host a Full-day Tutorial on Building modern solutions for SharePoint and Office 365. This will be run by none other than Erwin van Hunen, Hugh Wood, and...

0

Webinar Series: How your IT environment can be compromised

Join me and Netwrix in this practical webinar series about cyber-security. These three webinars walk you through the hacking process, some techniques hackers use once inside your network, and the tools and techniques you...

0

Where is Liam?

It is that time of year where everyone starts to get busy, the weather changes, and people tend to be much happier all around. We have normally got through the winter time and the...

0

Using Risk-based Multi-Factor Authentication – Reporting

In the last post: Using Risk-based Multi-Factor Authentication, I talked about setting up the risk-based policies, in this post we will look at the reporting and alerting mechanisms that are available. Within the Azure...

4

Using Risk-based Multi-Factor Authentication in Microsoft 365

One of the best Security protections that can be used with accounts, is Multi-Factor Authentication. However, the problem arises trying to get the balance between Security and User Experience. You know what I mean,...

0

How secure is #Office365 against cyber-threats?

How secure is Office 365 against cyber-threats? One of the questions I get asked frequently is this. Even with Microsoft providing documentation, guidance and speaking at conference saying how secure it is, we still...

0

Understanding Privileged Access Workstations (PAWs)

For some of the work I do, there is often a need to have a secure workstation that will let me perform tasks for Administration only, and not be vulnerable to any type of...

0

Great Infographic from Microsoft

Cyber-attacks are getting more sophisticated—often using social engineering, zero-day vulnerabilities, and even misconfiguration to break into corporate networks. Thousands of such attacks were reported in 2015 alone. With Windows 10, you can help safeguard...