Microsoft 365 Company Branding – An Easy Way to Avoid Phishing Attacks

On Day 25 of Cybersecurity awareness month, learn to protect your Office 365 suite from credential phishing that uses fake Office 365 sign-in pages. Stay tuned for more blogs in the Office 365 Cybersecurity blog series.  Are there any differences in the above default Microsoft login portals? No, both are legitimate Microsoft login portals with…

Monitoring Azure AD Sign-in Logs and Risky Sign-In Activities

On Day 20 of Cybersecurity awareness month, learn to safeguard risky users from threats and attacks by monitoring Azure AD sign-ins in Office 365. Stay tuned for more blogs in the Office 365 Cybersecurity blog series. There are multiple ways for attackers to gain access to your Microsoft 365 organization. Frequent login failures and disabled account login…

An Admin’s Guide to Review App Permissions & Consents in Microsoft 365

On Day 13 of Cybersecurity awareness month, learn to safeguard your Office 365 environment from phishing attacks by reviewing permissions granted to applications. Stay tuned for more blogs in the Office 365 Cybersecurity blog series.    In today’s rapidly advancing technology, users are no longer required to perform vital activities instead they can manage everything with applications.…

Manage User Consent to Applications in Microsoft 365

On Day 5 of Cybersecurity awareness month, learn to conceal your organization by blocking user consent to suspicious applications. Stay tuned for more blogs in Office 365 Cybersecurity blog series.  Have you ever heard about the illicit grant consent attack in Microsoft 365? It’s a consent phishing attack where a malicious attacker creates an Azure-registered application asking for…

Follow us!