Microsoft to Require Multi-Factor Authentication for Cloud Solution Providers

It might be difficult to fathom how this isn’t already mandatory, but Microsoft Corp. says it will soon force all Cloud Solution Providers (CSPs) that help companies manage their Microsoft Azure and Office365 accounts to use multi-factor authentication. The move comes amid a noticeable uptick in phishing and malware attacks targeting CSP employees and contractors. Continue reading Microsoft to Require Multi-Factor Authentication for Cloud Solution Providers

MJFChat: How stable is Office 365? Can I trust the cloud? – Audio Now Available


We’re starting a new, twice-monthly interview show on Petri.com that will cover topics of (hopefully) high interest to our tech-professional audience. We are calling this show “MJFChat.”

The post MJFChat: How stable is Office 365? Can I trust the cloud? – Audio Now Available appeared first on Petri.

Continue reading MJFChat: How stable is Office 365? Can I trust the cloud? – Audio Now Available

Email Phishers Using New Way to Bypass Microsoft Office 365 Protections

Phishing works no matter how hard a company tries to protect its customers or employees.

Security researchers have been warning of a new phishing attack that cybercriminals and email scammers are using in the wild to bypass the Advanced Threat Protect… Continue reading Email Phishers Using New Way to Bypass Microsoft Office 365 Protections

Hosted Cloud Active Directory®

With IT administrators shifting their infrastructure to the cloud, identity management must shift as well. This shift happens when we take identity management out of the office, traditionally encapsulated within an on-prem Microsoft® Active Direct… Continue reading Hosted Cloud Active Directory®

Email Phishers Using A Simple Way to Bypass MS Office 365 Protection

Security researchers have been warning about a simple technique that cyber criminals and email scammers are using in the wild to bypass most AI-powered phishing detection mechanisms implemented by widely used email services and web security scanners.

Continue reading Email Phishers Using A Simple Way to Bypass MS Office 365 Protection

Hackers Found Using A New Way to Bypass Microsoft Office 365 Safe Links

Security researchers revealed a way around that some hacking groups have been found using in the wild to bypass a security feature of Microsoft Office 365, which is originally designed to protect users from malware and phishing attacks.

Dubbed Safe Li… Continue reading Hackers Found Using A New Way to Bypass Microsoft Office 365 Safe Links

When Identity Thieves Hack Your Accountant

The Internal Revenue Service has been urging tax preparation firms to step up their cybersecurity efforts this year, warning that identity thieves and hackers increasingly are targeting certified public accountants (CPAs) in a bid to siphon oodles of sensitive personal and financial data on taxpayers. This is the story of a CPA in New Jersey whose compromise by malware led to identity theft and phony tax refund requests filed on behalf of his clients. Continue reading When Identity Thieves Hack Your Accountant

Microsoft Office 365 Gets Built-in Ransomware Protection and Enhanced Security Features

Ransomware has been around for a few years, but it has become an albatross around everyone’s neck, targeting big businesses, hospitals, financial institutions and individuals worldwide and extorting millions of dollars.

Last year, we saw some major ra… Continue reading Microsoft Office 365 Gets Built-in Ransomware Protection and Enhanced Security Features

Introduction to the IT Roadmap Planning Tool for Microsoft 365

In this article. I will make an overview of the IT Roadmap Planning Tool for Microsoft 365.

The post Introduction to the IT Roadmap Planning Tool for Microsoft 365 appeared first on Petri.

Continue reading Introduction to the IT Roadmap Planning Tool for Microsoft 365