how to build your Zero Trust modern workplace with Microsoft 365

Thank you so much for reading my blog about: How to build your modern workplace with Microsoft 365. In this article I’ve written an high-level approach of an implementation and shift from a more traditional organization towards a cloud focused organization. I would love to receive feedback in in the comment, on Linkedin or Twitter.… Continue reading how to build your Zero Trust modern workplace with Microsoft 365

Cybersecurity for local governments – in 10 steps

Thank you so much for reading my blog about: Cybersecurity for local governments. In this article I’ve written an high-level approach for implementation and shift from a more a more classic or less secure environment towards future proof. I would love to receive feedback in in the comment, on Linkedin or Twitter. Also read: The value of Microsoft 365 E3… Continue reading Cybersecurity for local governments – in 10 steps

Best Zero Trust sources Microsoft 365 + Azure

Hi! I’ve merged great Microsoft content in one article and provided the greatest screenshots or links to valuable content. Happy reading! If you have other useful sources give a comment. Also read: How to build your Zero Trust workplace with Microsoft 365 Microsoft’s approach to Zero Trust Networking and supporting Azure technologies 02:19 An overview… Continue reading Best Zero Trust sources Microsoft 365 + Azure

Microsoft is delivering automated Security Operations (SecOps) for any organization

Hi There! I’m happy that you find your way to one of the series of blogs about Microsoft 365 Security. You may find earlier articles that will help to understand the scenario where I wanted to position this solution in. First Article: How to build your Zero Trust modern workplace with Microsoft 365. This articles… Continue reading Microsoft is delivering automated Security Operations (SecOps) for any organization

Technical High-level Modern Workplace implementation with M365

Thank for reading my blog about: the technical implementation for a Microsoft 365 workplace. In this article I’ve written an high-level approach of an implementation and shift from a more traditional organisation towards a cloud focused organization. If you not totally ‘fan’ of the cloud idea please read this article: The value of Microsoft 365… Continue reading Technical High-level Modern Workplace implementation with M365

Modern Workplace security: 5 steps to use Microsoft Teams in a safe way

In this blog I will go through 5 basic security improvement for organization that are shifting to Microsoft Teams. Also read my previous article: The Value Of Microsoft 365 E3 and E5. Security improvements are embedded in Teams, it just needs activation I’ve met a lot of organizations over the last months implementing Microsoft Teams,… Continue reading Modern Workplace security: 5 steps to use Microsoft Teams in a safe way

The value of Multi-Factor Authentication – Get your story right!

Azure AD Conditional Access

I’ve tried something different last night. To write the story of Multi-factor authentication and bring the relation in the eco-system of Microsoft. Everything is connected. I would love a comment, share or a reply to see if this content is valuable for you! Thanks, Jasper Creating the modern workplace! – Vision Increase mobility: People are working from… Continue reading The value of Multi-Factor Authentication – Get your story right!

When and why should you start with Microsoft 365 business Premium

Microsoft 365 Business Premium

Earlier I’ve brought the article: The value of Microsoft 365 E3 and E5. Due the request I’ve written this article about Business Premium. To respect the content of the previous article the creating the modern workplace is crucial to read before reading this one. Global value of the Microsoft 365 stack will be the same.… Continue reading When and why should you start with Microsoft 365 business Premium

The value of Microsoft 365 E3 or E5

Shift to M365 E5 the attack chain

Creating the modern workplace! Digital business transformation. Every company has a digital transformation initiative. Microsoft 365 drives this digital transformation. Increasing agility. The ability to respond to and drive market change quickly is the fundamental measure of business agility. Empower information workers and firstline workers so they can collaborate and communicate better. Internally as with… Continue reading The value of Microsoft 365 E3 or E5

The top 10 security recommendations we should consider while working from home!

Cloud Discovery 30 days Demo

Mobile working is a standard, today. Companies are not longer protected by their infrastructure in their corp-environment. Crucial document data is moving away from centralized systems because it’s easier to work on them on our own document systems. The irrelevance of bombastic systems in corporate environment is holding collaboration down. Does it sounds familiar? the… Continue reading The top 10 security recommendations we should consider while working from home!

Secure your corporate information, not your devices!

Information protection & governance

Introduction I’ve seen multiple customers struggling with their corporate information. Most of the time this data is secured in a traditional way without flexibility to collaborate. Result: People find other way to collaborate: Dropbox, OneDrive, Box, Mails, Private-mails, whatsapp,.. You don’t want your personal data published on the web. Why do we allow organizations to be less… Continue reading Secure your corporate information, not your devices!

Modern Desktop implementation – Behind the scenes

Modern Device Management

Introduction & Vision At Synergics we truly believe the mission of Microsoft to empower every person and every organization on the planet to achieve more. Every great implemented project start with a vision and with goals/milestones. In the first project we delivered workshops to understand the transformation needs of the organization. we identified these digital outcomes below.… Continue reading Modern Desktop implementation – Behind the scenes

Office 365 ATP Recommended Configuration Analyzer – Best Practices!

Office 365 ATP Recommended Configuration

Office 365 Advanced Threat Protection is growing and evolving over time. Writing documentation takes time – automation doesn’t. Automatically export your O365 ATP settings in one HTML file to see the scores and recommendations. Solution: ORCA! Orca is a report that you can run in your environment which can highlight known configuration issues and improvements… Continue reading Office 365 ATP Recommended Configuration Analyzer – Best Practices!

Protect apps with Microsoft Cloud App Security Conditional Access App Control

Exchange Online Conditional Access App Control

A lot of companies are struggling with data leakage when it comes to their exchange online environment. Easy fix! Enable: Microsoft Cloud App Security Conditional Access App Control! First, check the 7 seconds demo. It explains the unnecessary words! Scenario: You have all your devices enabled in Microsoft’s endpoint manager aka Intune You are able to have… Continue reading Protect apps with Microsoft Cloud App Security Conditional Access App Control

The Multi-factor-authentication struggle? AND the solution!

Sign in status Azure AD

The struggle for a Multi-factor authentication implementation is REAL and most of the time, really frustrating? Some frequently asked questions and answers below! Let’s change problem into a solution. We don’t want to use Multi-factor authentication – it’s too complex! Ask the people in your organization if they use the same password as their corporate… Continue reading The Multi-factor-authentication struggle? AND the solution!