Microsoft 365 Threat Hunting Tool

There are many tools and methods to conduct cyber threat hunting in a Microsoft 365 environment, but sometimes you just need a way to get some useful data that you can analyze quickly to answer that age old question “have we been hacked?”. In my opinion, Microsoft doesn’t make it easy to answer this question…
Read More

Living with “Lincoln Log Files”

I actually remember the first time I saw Lincoln Logs. It wasn’t at my house. I had some great stuff as a kid, but some toys were just too expensive. I’ve never been able to understand why the most expensive toys are the ones that make YOU do the most work to enjoy them. Suffice it…
Read More

Exploring Cyber Soft Target Indicators (CSTIs)

“Soft Target” is a term used to describe a person, place, or thing that is relatively unprotected and vulnerable to attack. Terrorists, criminals, and otherwise unscrupulous individuals often look for “soft target indicators” when selecting a target (potential victim). Doing so helps an attacker assess the level of personal risk and weigh it against the…
Read More

Dissecting Disinformation & Misinformation

Disinformation and Misinformation is rampant today…or is it? While these TERMS certainly seem to be rampant today many people being exposed to them (or in some cases even using them) aren’t exactly sure what they mean or know how to tell the difference between the two. In this brief video, we’ll take a look at…
Read More

Business Email Compromise Defense

While Ransomware continues to dominate the headlines, Business Email Compromise (BEC/EAC) tops the list of financial losses (over $1.8 billion dollars) in the most recent FBI Internet Crime Complaint (IC3) report. This trend shows no signs of slowing down as BEC attacks continue to grow in number and effectiveness. If you are involved in processing financial transactions…
Read More

Phishing Attacks & Defense

Phishing is one of the most common (and effective) forms of cyber attacks today. In this short video, we’ll examine some simple techniques that can be used (by technical and non-technical individuals) to better defend against phishing attacks. For an in-depth exploration of phishing attacks and how you can defend against them enroll in the…
Read More

Why Do We Even Have That Server?!

Wow! What an end to a good (albeit frustrating) week! In between multiple engagements for several clients this week, I somehow managed to learn that “flowers are like a picnic for butterflies…” Yep, busy week but I still managed to get in all the bedtime stories with the kids! I’ve seen an interesting trend during…
Read More