In 2021, ransomware remains an extremely impactful threat, with an estimated attack occurring every 11 seconds. Not only is the frequency of ransomware increasing, but it is reported the average...
Subscribe to our blog!

Foundational Security Controls for Microsoft Teams
Apr 26, 2021 | O365 Security, | Email Compromise, | Cloud Security, | Microsoft 365, | Office 365, | Microsoft Teams
Work-from-home requirements over the past year forced many organizations to rapidly increase adoption of video and collaboration applications like Microsoft Teams and Zoom without thorough security...
Investigating User Account Compromises in Office 365
Sep 1, 2020 | O365 Security, | Email Compromise, | Cloud Security, | Microsoft 365, | Office 365
Unfortunately, almost every organization at some point will have to manage a situation where a user’s account has been compromised. In this blog post, we present O365 native tools and techniques that...

SecureSky Cyber Threat Center Sees Greater Than 6 Times Increase In Attacks
Apr 2, 2020 | BEC, | Email Compromise, | Cloud Security, | Azure Security, | Phishing, | Coronavirus, | Security Operations, | WFH, | Work From Home, | Covid-19
But There’s Still a Lot of Good Things Happening In These Trying Times! One of the most staggering statistics reported recently from the SecureSky Cyber Threat Center is seeing a 6x-7x increase in...

SecureSky’s Top 5 2020 Cloud Security Predictions
Dec 18, 2019 | O365 Security, | Email Compromise, | business e-mail compromise, | Cloud Security, | Azure Security
Cloud Computing Adoption Will Accelerate We’re not going out on a limb in predicting cloud services will continue to grow. The information technology world is experiencing a tectonic shift, led by...

Detecting BEC Attacks and Compromise - Part 5
Nov 22, 2019 | O365 Security, | BEC, | Email Compromise, | Cloud Security
1.0 Introduction Welcome back to SecureSky’s series on Business Email Compromise (BEC) Attack and Detection! In Part 1 of this blog series, we introduced BEC attacks, and discussed why BEC attacks...

Configuration of Office 365 to Detect BEC Attacks - Part 4
Sep 25, 2019 | O365 Security, | Email Compromise, | business e-mail compromise, | Cloud Security
1.0 Introduction In Part 1 of this blog series, we introduced Business E-mail Compromise (BEC) attacks, and discussed why BEC attacks are increasing. In Part 2, we used recent BEC investigations to...

Configuration of Office 365 to Protect Against BEC Attacks - Part 3
Sep 4, 2019 | O365 Security, | BEC, | Email Compromise, | business e-mail compromise, | Cloud Security
In Part 1 of this blog series, we introduced Business E-mail Compromise (BEC) attacks, and discussed why BEC attacks are increasing. In Part 2, we used recent BEC investigations to discuss how BEC...

Threat Investigation: Anatomy of A Business E-Mail Compromise Attack - Part 2
Aug 5, 2019 | O365 Security, | BEC, | Email Compromise, | business e-mail compromise
The Unassuming Threat: Business E-Mail Compromise & Office 365 Vulnerabilities Business e-mail compromise (BEC) is a class of cyber-crime that is growing rapidly. Over the past five years, BEC...

The Unassuming Threat: Business E-Mail Compromise - Part 1
Aug 4, 2019 | O365 Security, | BEC, | Email Compromise, | business e-mail compromise
Across the globe, companies and organizations of all sizes have faced an increasing onslaught of the cyber-crime known as business e-mail compromise (BEC). Perpetrated by organized crime groups, BEC...