Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Microsoft 365

Find Risky Inbox Rules in Office 365

Inbox Automation such as forwarding, redirecting, and moving items around can be crucial to many business operations. For example today I was integrating receipt bank, a third party receipt and invoicing system which in turn integrates with our accounting software. Like many respectable third party systems, it supports a robust API for fetching invoices from my suppliers. However it does not do them all and like in many instances, mailbox automation comes in to help.

How were we Hacked? Part 2

I wrote recently about how Office 365 accounts are most commonly breached - through leaked credentials. This covered the different ways that credentials can be breached through various factors, including many human misconceptions and failures can be mixed with other internal and external forces. This article is going to cover the anatomy of what happens after the hacker has gained access. There are many things a hacker may be seeking including information extraction or means of corporate espionage.

How were we Hacked? Part 1

When we read about hackers, we either think of people in Anonymous wearing Guy Fawkes masks or else that film from the mid-’90s were roller blade rolling teens bring down the baddies with elaborate rabbits and trojan horses. While complicated CIA type hacking may exist the VAST majority of hacking is simply someone getting your password and logging in online just like you would The VAST majority of hacking is simply someone getting your password and logging in online just you would

Practical IT Security Guide to Protecting your People

There is that song by Baz Luhrmann, well it was actually a speech of his first that was later made it into a catchy jingle. It goes … If I could offer you only one tip for the future, sunscreen would be it A long-term benefits of sunscreen have been proved by scientists Whereas the rest of my advice has no basis more reliable Than my own meandering experience, I will dispense this advice now Unfortunately in securing your business, there is no Sunscreen type solution.