Thank you for registering
To complete your subscription, please keep an eye on your email. You’ll receive a confirmation message shortly. Just click the link in the email to confirm your sign-up.
More IT Security news
Advanced Threat Protection in Microsoft 365
There are many security tools built into the O365 platform, but when you move to M365 E3 or E5, you unlock a whole new set of advanced features for securing your business. In this article, we’re going to look at these tools, except for Endpoint Manager, which we have...
The Importance of Security in Office 365
In the early days of cloud computing there was a lot of concern around the security of data moved to “someone else’s datacenter”. I think it’s clear to most CISOs today that the big providers do a much better job of it security than most businesses can do (or have the...
Mastering Endpoint Security with Microsoft Intune
M365 E3 and E5 brings you Microsoft Intune, Microsoft’s mobile device management (MDM) cloud service. In this article we’ll look at how it can help you manage devices and PCs, mobile apps, protect company data, and enforce security policies. There used to be an...