Microsoft 365 Threat Hunting Tool

There are many tools and methods to conduct cyber threat hunting in a Microsoft 365 environment, but sometimes you just need a way to get some useful data that you can analyze quickly to answer that age old question “have we been hacked?”. In my opinion, Microsoft doesn’t make it easy to answer this question…
Read More

Business Email Compromise Defense

While Ransomware continues to dominate the headlines, Business Email Compromise (BEC/EAC) tops the list of financial losses (over $1.8 billion dollars) in the most recent FBI Internet Crime Complaint (IC3) report. This trend shows no signs of slowing down as BEC attacks continue to grow in number and effectiveness. If you are involved in processing financial transactions…
Read More

Phishing Attacks & Defense

Phishing is one of the most common (and effective) forms of cyber attacks today. In this short video, we’ll examine some simple techniques that can be used (by technical and non-technical individuals) to better defend against phishing attacks. For an in-depth exploration of phishing attacks and how you can defend against them enroll in the…
Read More