Introduction: Email Phishing Protection Guide – Enhancing Your Organization’s Security Posture

The Email Phishing Protection Guide is a multi-part blog series written to walk you through the setup of many security focused features you may already own in Microsoft Windows, Microsoft Office 365, and Microsoft Azure. By implementing some or all of these items, an organization will increase their security posture against phishing email attacks designed…

1

Phishing Examples for the Microsoft Office 365 Attack Simulator – Part Three

This is the third post of a multi-part blog with examples to use as part of a phishing simulation in the new Microsoft Office 365 Attack Simulator tool. For background information on the tool and this blog series, click on Part One below. Phishing Examples for the Microsoft Office 365 Attack Simulator – Part One…


Phishing Examples for the Microsoft Office 365 Attack Simulator – Part Two

Examples of Phishing Emails for the Microsoft Office 365 Attack Simulator – Part Two This is the second post of a multi-part blog with examples to use as part of a phishing simulation in the new Microsoft Office 365 Attack Simulator. For background information on the tool and this blog series, click on Part One…


Phishing Examples for the Microsoft Office 365 Attack Simulator – Part One

Why would you want to simulate a phishing attack on your own organization? Email hygiene filters work wonders, effectively identifying and blocking a substantial portion of email sent across the global Internet as SPAM or containing malicious content. Even with such a high rate of filtering success, as in life nothing is perfect, and this…


Enable Users to Easily Submit Junk, Phishing, and SPAM Messages in Outlook

The email security analysis capabilities in Microsoft Office 365 are unmatched in the industry, offering subscribers the best protection available from email categories such as junk, SPAM, phishing, malicious, etc. But, from time to time a message will slip through that should have been classified as SPAM. If you are a Microsoft Managed Service Provider…


Configure Microsoft Cloud App Security to Analyze SonicWall Logs

One of the greatest dangers for any network today is not knowing what applications are running within its boundaries and how the data could be leaking externally. These applications are often installed by users not knowing the potential hazards these applications may cause, malicious applications that have somehow entered the network, or a combination of…


Securing Small to Midsize Local Networks – A Practical Approach

Introduction Many large companies, governments, militaries, etc. hire teams of top notch security personnel to provide continuing evaluation and guidance to keep their organization as secure as possible. But, what about the small to medium size companies where there may be only a small team of administrators, engineers, etc. who take care of everything in…