Cybersecurity

Essential Eight Revisited

The Australian Essential Eight: The Most Bang for Your Cybersecurity Buck?

A few years ago, I wrote a blog post about the Australian Essential Eight. I wanted to raise awareness and draw wider attention to this handy little framework (it is well known in Australia, of course, just not so much in the rest of the world). Now...
Read more...
Multi-tenant 365

My Favorite Multi-tenant Tools for Microsoft 365 Cloud

Today I want to address something that Managed Services Providers in particular struggle with daily. And that is managing dozens if not hundreds of Microsoft tenants, each of which represents a unique security boundary, with its own set of users, devices, licenses, security configurations, and so on. This problem is...
Read more...
A friendly reminder

A friendly reminder about least privilege access and other simple stuff

I just spent an exhausting 36 or so hours helping a customer out of a really bad situation. Well, technically they aren't out of the woods yet, but things are clearing up anyway. And I am at the point now where I exit, handing off the bulk of remaining tasks...
Read more...
Reader question: Deny-by-Default?

Reader Question: How can I set up a “Deny-by-Default” Conditional Access Policy?

It has been a while since I took a question from a reader and turned it into a blog post. It is one of my favorite things to do here on ITProMentor, but the “busy-ness” of life has taken me away from the keyboard a lot in recent months. Now...
Read more...
Selling the Security & Compliance Journey

Selling the Digital Transformation Journey: Security & Compliance

When I talk to customers about their Digital Transformation Journey, I always like to give them the "10,000 foot view" so to speak. I suggest that we explore two different angles or "big pictures"  in order to paint an image that customers can then imagine themselves into....
Read more...
Unboxing Microsoft Defender for Business: Device-based Conditional Access

Unboxing Microsoft Defender for Business, Part 4: Integration with MEM and Conditional Access

Welcome back to this series! Microsoft Defender for Business (MDB) is a huge product with lots of ground to cover. So far we have discussed the Simplified configuration process, Threat & Vulnerability Management, and Attack Surface Reduction Rules. Since we began our...
Read more...
Unboxing Defender for Business, Part 2: Threat & Vulnerability Management

Unboxing Defender for Business, Part 2: Threat & Vulnerability Management

Last time we looked at how to get started with Microsoft Defender for Business and the so-called "Simplified configuration process," which helped us onboard our first Windows devices and apply basic policies to manage antivirus and firewall settings across the organization. In this blog post, we will ask the...
Read more...
The three opportunities for MSP's moving forward

The three opportunities for MSP’s moving forward

The writing has been on the wall a while now; with a mass exodus to cloud services such as Microsoft 365 from traditional on-premises infrastructure, it was only a matter of time before those selling MSP services had to either evolve or die off. And with
Read more...

Helping IT Consultants Succeed in the Microsoft Cloud

Have a Question? Contact me today.