This blog presents security-related Microsoft Azure assessment findings collected by SecureSky in 2021 against our clients across all verticals ranging from partial cloud migrations to complex...

Mar 30, 2022 | Azure, | Microsoft 365
This blog presents security-related Microsoft Azure assessment findings collected by SecureSky in 2021 against our clients across all verticals ranging from partial cloud migrations to complex...
Mar 25, 2022 | Threat Hunting, | Queries Series, | Microsoft Sentinel
In response to our recent LinkedIn post, we have had requests on how Microsoft Sentinel users can check their environment for any potentially malicious Russian scanning activity. SecureSky and other...
Mar 8, 2022 | Cloud Security, | azuresentinel, | microsoftsentinel, | SIEM
Since the launch of the Microsoft (originally Azure) Sentinel Security Information and Event Management (SIEM) and Security Orchestration, Automation and Response (SOAR) solution in 2019, it has...
Aug 24, 2021 | BEC, | Email Compromise, | Cloud Security, | Microsoft 365, | Office 365, | ransomware
In 2021, ransomware remains an extremely impactful threat, with an estimated attack occurring every 11 seconds. Not only is the frequency of ransomware increasing, but it is reported the average...
Apr 26, 2021 | O365 Security, | Email Compromise, | Cloud Security, | Microsoft 365, | Office 365, | Microsoft Teams
Work-from-home requirements over the past year forced many organizations to rapidly increase adoption of video and collaboration applications like Microsoft Teams and Zoom without thorough security...
Dec 9, 2020 | Phishing Awareness, | Online Awareness, | Video Conferencing Safety
The COVID-19 pandemic has already created a golden opportunity for malicious actors to prey on human desires to help others or to discover a “deal.” Initial reports indicate campaigns to donate to...
Sep 1, 2020 | O365 Security, | Email Compromise, | Cloud Security, | Microsoft 365, | Office 365
Unfortunately, almost every organization at some point will have to manage a situation where a user’s account has been compromised. In this blog post, we present O365 native tools and techniques that...
Aug 4, 2020 | O365 Security, | BEC, | business e-mail compromise, | Cloud Security, | Azure, | Microsoft 365, | Office 365, | Email Administration
In our previous post, we provided an overview of each of the 12 Foundational Security Controls that should be implemented for every Office 365 environment to deter business email compromise (BEC),...
Jun 10, 2020 | O365 Security, | BEC, | business e-mail compromise, | Cloud Security, | Azure, | Microsoft 365, | Email Administartion, | Office 365
As many organizations continue to adjust to an extended and potentially permanent remote workforce, dependency on cloud services has increased rapidly – as Microsoft CEO Satya Nadella stated in a...
May 11, 2020 | O365 Security, | AV Conference Best Practices, | Microsoft 365, | Teams, | Zoom
This blog expands upon SecureSky’s “Top 10 Audio/Video Conferencing Security Best Practices” blog posted on April 8, 2020. If you have not read that blog yet, we encourage you to do so, as it...