We understand that managing security for Office 365 can be difficult and complex. As we continue to see common identity-related attacks against authentication like password spray, replay, phishing...

Apr 21, 2020
We understand that managing security for Office 365 can be difficult and complex. As we continue to see common identity-related attacks against authentication like password spray, replay, phishing...
Apr 8, 2020
With the recent shift of much of the global workforce to home office work environments, it’s a good time to revisit Audio/Video conferencing security best practices. In this blog we will highlight...
Mar 31, 2020
In the new work-from-home (and school-from-home) era, between adding your family “full-time” to your home wifi and the cloud providers and ISPs scrambling to increase capacity, many of you have...
Mar 5, 2020
You cannot open a news site or turn on the television today without rightfully hearing about the coronavirus. While governments and medical systems scramble to respond and contain the virus, it is...
Feb 24, 2020
Who knew that way back in 1964 Bob Dylan would predict the challenges we’re facing with the cloud in 2020. Times they are a-changin’. We’re in the midst of an evolution in IT, led by the rapid...
Feb 6, 2020
Following the Tweet from the Microsoft Security Intelligence account January 30, 2020 (https://twitter.com/MsftSecIntel/status/1222995250911703041?s=20), we at SecureSky were a little curious whether...
Jan 15, 2020
I am pleased to have participated in and been named a co-editor of the most recent release (version 1.1) of the Center for Internet Security Microsoft 365 Foundations Benchmark. Sharing SecureSky’s...
Dec 18, 2019
Cloud Computing Adoption Will Accelerate We’re not going out on a limb in predicting cloud services will continue to grow. The information technology world is experiencing a tectonic shift, led by...
Nov 22, 2019
1.0 Introduction Welcome back to SecureSky’s series on Business Email Compromise (BEC) Attack and Detection! In Part 1 of this blog series, we introduced BEC attacks, and discussed why BEC attacks...
Nov 12, 2019
Using Application Security Groups Setting up infrastructure in Azure can, at times, seem quite daunting with all of the available options one can configure within each service. In this blog, we will...