Microsoft is delivering automated Security Operations (SecOps) for any organization

Hi There! I’m happy that you find your way to one of the series of blogs about Microsoft 365 Security. You may find earlier articles that will help to understand the scenario where I wanted to position this solution in. First Article: How to build your Zero Trust modern workplace with Microsoft 365. This articles… Continue reading Microsoft is delivering automated Security Operations (SecOps) for any organization

how to build your Zero Trust modern workplace with Microsoft 365

Thank you so much for reading my blog about: How to build your modern workplace with Microsoft 365. In this article I’ve written an high-level approach of an implementation and shift from a more traditional organization towards a cloud focused organization. I would love to receive feedback in in the comment, on Linkedin or Twitter.… Continue reading how to build your Zero Trust modern workplace with Microsoft 365

Modern Workplace security: 5 steps to use Microsoft Teams in a safe way

In this blog I will go through 5 basic security improvement for organization that are shifting to Microsoft Teams. Also read my previous article: The Value Of Microsoft 365 E3 and E5. Security improvements are embedded in Teams, it just needs activation I’ve met a lot of organizations over the last months implementing Microsoft Teams,… Continue reading Modern Workplace security: 5 steps to use Microsoft Teams in a safe way

When and why should you start with Microsoft 365 business Premium

Microsoft 365 Business Premium

Earlier I’ve brought the article: The value of Microsoft 365 E3 and E5. Due the request I’ve written this article about Business Premium. To respect the content of the previous article the creating the modern workplace is crucial to read before reading this one. Global value of the Microsoft 365 stack will be the same.… Continue reading When and why should you start with Microsoft 365 business Premium

The value of Microsoft 365 E3 or E5

Shift to M365 E5 the attack chain

Creating the modern workplace! Digital business transformation. Every company has a digital transformation initiative. Microsoft 365 drives this digital transformation. Increasing agility. The ability to respond to and drive market change quickly is the fundamental measure of business agility. Empower information workers and firstline workers so they can collaborate and communicate better. Internally as with… Continue reading The value of Microsoft 365 E3 or E5

The top 10 security recommendations we should consider while working from home!

Cloud Discovery 30 days Demo

Mobile working is a standard, today. Companies are not longer protected by their infrastructure in their corp-environment. Crucial document data is moving away from centralized systems because it’s easier to work on them on our own document systems. The irrelevance of bombastic systems in corporate environment is holding collaboration down. Does it sounds familiar? the… Continue reading The top 10 security recommendations we should consider while working from home!

Protect apps with Microsoft Cloud App Security Conditional Access App Control

Exchange Online Conditional Access App Control

A lot of companies are struggling with data leakage when it comes to their exchange online environment. Easy fix! Enable: Microsoft Cloud App Security Conditional Access App Control! First, check the 7 seconds demo. It explains the unnecessary words! Scenario: You have all your devices enabled in Microsoft’s endpoint manager aka Intune You are able to have… Continue reading Protect apps with Microsoft Cloud App Security Conditional Access App Control

The Multi-factor-authentication struggle? AND the solution!

Sign in status Azure AD

The struggle for a Multi-factor authentication implementation is REAL and most of the time, really frustrating? Some frequently asked questions and answers below! Let’s change problem into a solution. We don’t want to use Multi-factor authentication – it’s too complex! Ask the people in your organization if they use the same password as their corporate… Continue reading The Multi-factor-authentication struggle? AND the solution!