How Microsoft 365 Identified Suspicious Behavior Other Security Programs Missed

You may be confident that your employees would never share logins or behave in this way, but ultimately, that’s beside the point. As phishing attacks grow more and more sophisticated and frequent every day, every business needs to be concerned about the potential repercussions associated with employee credentials being accidentally compromised.

How to Shift from a Reactive to a Proactive Cyber Security Approach

As you’ve probably heard, cyber attacks are up this year. But while big-name breaches tend to get the most attention, it isn’t just enterprise companies that are at risk. In fact, some hackers specifically target SMBs and mid-market companies, due to the lax security that many have.

Consider this: while many business owners rate cybersecurity as a top concern, only 57% have actually implemented any type of security plan.

Microsoft Defender: Rebranding and Simplifying Microsoft’s Security Tools

Microsoft Defender: Rebranding, Modernizing, and Simplifying Microsoft’s Security ToolsAnnounced at Ignite 2020, Microsoft has consolidated their threat protection products and is rebranding them as Microsoft Defender (Microsoft 365 Defender and Azure Defender). The Microsoft 365 Defender line Now Includes:Microsoft 365 Defender (previously Microsoft Threat Protection)Microsoft Defender for Endpoint (previously Microsoft Defender Advanced Threat Protection)Microsoft Defender for […]