27Aug
25Aug
Poser alert: Do you think this may be leveraged for Social engineering? Or what…?
Interesting thing appeared in my WordPress comments over the weekend: it appears that someone lifted content from my blog and re-posted it as their own. Why or how WordPress picked up on this and alerted me via my comments is unknown at this time (maybe some WordPress geeks out there...
20Aug
Protecting extra-sensitive accounts and data sets in Microsoft 365, Part 1: Identity
As I have previously pointed out on this blog before, all of the best security products, like Microsoft Cloud App Security or Microsoft Defender Advanced Threat Protection, are held hostage in E5 plans. But there is a really big cost delta in the SMB space between the Business plan and...
15Aug
Teams, SharePoint and OneDrive best practices? Part 3: Data governance
In part 1 of this series, we discussed external sharing and chat. In part 2, we dealt with access controls and notifications. Now, we turn our focus to Data governance, a very important conversation indeed when it comes to compliance. And when it comes to compliance, every organization is going to...
13Aug
Teams, SharePoint and OneDrive best practices? Part 2: Access control and notifications
In part 1 of this series we discussed how there is really no such thing as "best practices" on a rich and flexible collaboration platform like Office 365, which includes many applications--Teams, SharePoint and OneDrive to name just a few. However, you can certainly end up with some "bad" practices...
08Aug
Teams, SharePoint and OneDrive best practices? More like considerations… Part 1: External sharing and communication
This article is part of a series. Also see Part 2, Part 3. Ever since I released the Office 365 Email Security Checklist, I have had a lot of people asking me for similar best practices checklists related to the "other" Office 365 services--especially Teams, SharePoint Online and OneDrive for Business. The...
06Aug