Blog

M365 + Azure security insights, audit guides, and comparison research.

Comparisons

Top 10 Adaptive Shield (Falcon Shield) Alternatives in 2026

Buyers exploring alternatives to Adaptive Shield (Falcon Shield) typically compare these 10 tools

By Michael de Blok · June 3, 2026
Comparisons

Top 10 AppOmni Alternatives in 2026

Buyers exploring alternatives to AppOmni typically compare these 10 tools

By Michael de Blok · May 20, 2026
Identity Security

Microsoft Entra ID vs Azure AD: What Changed and What MSPs Need to Know

Microsoft rebranded Azure AD to Entra ID. Learn what changed, what MSPs should know, and how to migrate or update configurations.

By 365 Security Assessment Team · May 13, 2026
Identity Security

Securing Microsoft 365 for Remote and Hybrid Workforces

Secure Microsoft 365 for remote and hybrid workers. Configure VPN, device compliance, MFA, and Conditional Access policies.

By 365 Security Assessment Team · May 11, 2026
Threat Detection

How to Set Up Microsoft 365 Audit Logging and Alert Policies

Step-by-step guide to configuring Microsoft 365 audit logging, unified audit logs, and alert policies for security monitoring.

By 365 Security Assessment Team · May 8, 2026
MSP Business

The True Cost of a Microsoft 365 Security Breach for SMBs

Calculate the real financial impact of Microsoft 365 security breaches on SMBs. Understand breach costs, downtime, and ROI of security investments.

By 365 Security Assessment Team · May 6, 2026
Comparisons

Top 10 Huntress Alternatives in 2026

Buyers exploring alternatives to Huntress typically compare these 10 tools

By Michael de Blok · May 6, 2026
Compliance

Microsoft 365 Security for Financial Services: SOX and SEC Compliance

Implement Microsoft 365 security controls for SOX, SEC, and regulatory compliance. MSP guide to data protection and audit trails.

By 365 Security Assessment Team · May 4, 2026
Identity Security

How to Migrate from Per-User MFA to Conditional Access

Step-by-step guide to migrate from per-user MFA to Conditional Access in Microsoft 365. Reduce IT burden and improve security.

By 365 Security Assessment Team · May 1, 2026
Security Assessments

Top 10 Microsoft 365 Security Misconfigurations We Find in Every Audit

Discover the most common Microsoft 365 security misconfigurations we find during audits. Learn how to fix them in your tenant.

By 365 Security Assessment Team · April 29, 2026
Identity Security

Zero Trust Architecture in Microsoft 365: A Practical Approach

Implement zero trust security in Microsoft 365 using Conditional Access, identity verification, and least privilege principles. Step-by-step practical guide.

By 365 Security Assessment Team · April 27, 2026
Data Protection

Microsoft 365 Data Loss Prevention (DLP) Policies: Setup Guide

Complete guide to configuring Microsoft 365 DLP policies to protect sensitive data across email, Teams, and SharePoint. Step-by-step setup instructions.

By 365 Security Assessment Team · April 24, 2026
MSP Business

How to Present Security Assessment Results to Non-Technical Clients

Learn strategies for communicating complex security assessment findings to non-technical stakeholders effectively and building client confidence.

By 365 Security Assessment Team · April 22, 2026
Comparisons

Top 10 Coro Alternatives in 2026

Buyers exploring alternatives to Coro typically compare these 10 tools

By Michael de Blok · April 22, 2026
Email Security

Exchange Online Protection vs Defender for Office 365: What Do You Need?

Compare Exchange Online Protection and Defender for Office 365. Learn which email security solution fits your organization's threat profile.

By 365 Security Assessment Team · April 20, 2026
Threat Detection

Responding to a Microsoft 365 Security Incident: Step-by-Step

Step-by-step incident response guide for Microsoft 365 security breaches. Learn containment, forensics, and recovery procedures for MSPs.

By 365 Security Assessment Team · April 17, 2026
Data Protection

Microsoft 365 Backup: Why Native Retention Is Not Enough

Learn why Microsoft 365 native retention falls short for backup and recovery. Discover third-party solutions for comprehensive data protection.

By 365 Security Assessment Team · April 15, 2026
Identity Security

How to Audit Microsoft 365 Admin Roles and Permissions

Comprehensive guide to auditing Microsoft 365 administrative roles and permissions. Learn best practices for privileged access management.

By 365 Security Assessment Team · April 13, 2026
Compliance

CIS Microsoft 365 Foundations Benchmark: Implementation Guide

Learn how to implement CIS Microsoft 365 Foundations Benchmark for comprehensive security baseline and compliance hardening.

By 365 Security Assessment Team · April 10, 2026
Email Security

Phishing Simulation and Security Awareness Training for M365 Users

Implement phishing simulation and security awareness training for Microsoft 365. Reduce email compromise risk through behavioral training and metrics.

By 365 Security Assessment Team · April 8, 2026
Comparisons

Top 10 SaaS Alerts Alternatives in 2026

Buyers exploring alternatives to SaaS Alerts typically compare these 10 tools

By Michael de Blok · April 8, 2026
Compliance

Microsoft 365 Retention Policies: A Practical Guide for MSPs

Master Microsoft 365 retention policies. Learn to implement email and document retention across your client organizations with practical step-by-step guidance.

By 365 Security Assessment Team · April 6, 2026
MSP Business

How to Build a Security-First MSP Practice

Learn how MSPs can transition to a security-first business model. Build competitive advantage through comprehensive Microsoft 365 security services.

By 365 Security Assessment Team · April 3, 2026
Security Assessments

Microsoft 365 Security Assessment vs Penetration Testing: What Is the Difference?

Compare security assessments and penetration testing for Microsoft 365. Understand which approach works best for your organization's risk profile.

By 365 Security Assessment Team · April 1, 2026
Email Security

DMARC, SPF, and DKIM Explained: Email Authentication for M365

Master DMARC, SPF, and DKIM authentication protocols to protect Microsoft 365 email domains from spoofing and phishing attacks.

By 365 Security Assessment Team · March 30, 2026
Data Protection

OneDrive Security Settings Every Admin Should Configure

Essential OneDrive security configurations for administrators. Practical guide to protecting OneDrive environments in Microsoft 365.

By 365 Security Assessment Team · March 27, 2026
Security Assessments

The MSP Guide to Microsoft Secure Score Optimization

Complete guide to improving Microsoft Secure Score for your clients. Actionable recommendations for MSPs managing multiple Microsoft 365 tenants.

By 365 Security Assessment Team · March 25, 2026
Comparisons

Top 10 Telivy Alternatives in 2026

Buyers exploring alternatives to Telivy typically compare these 10 tools

By Michael de Blok · March 25, 2026
Threat Detection

How to Detect Compromised Microsoft 365 Accounts

Practical techniques to detect compromised Microsoft 365 accounts. Step-by-step guide for MSPs investigating suspicious activity and account takeovers.

By 365 Security Assessment Team · March 23, 2026
Compliance

Microsoft 365 Security for Healthcare: HIPAA Compliance Checklist

Complete HIPAA compliance checklist for Microsoft 365 in healthcare. Essential configurations for MSPs supporting healthcare organizations.

By 365 Security Assessment Team · March 20, 2026
Identity Security

Azure AD Conditional Access Policies: A Complete Setup Guide

Step-by-step guide to implementing Azure AD Conditional Access policies for zero trust security. Essential for MSPs protecting enterprise environments.

By 365 Security Assessment Team · March 18, 2026
Email Security

Business Email Compromise Prevention in Microsoft 365

BEC caused $2.9B in losses in 2023. Learn how to prevent business email compromise in M365 with mail flow rules, DMARC, and monitoring.

By 365 Security Assessment Team · March 11, 2026
Comparisons

Top 10 Augmentt Alternatives in 2026

Buyers exploring alternatives to Augmentt typically compare these 10 tools

By Michael de Blok · March 11, 2026
MSP Business

How MSPs Can Sell Security Assessments as a Recurring Service

Security assessments are the highest-margin service MSPs can offer. Learn how to package, price, and sell them to existing and new clients.

By 365 Security Assessment Team · March 9, 2026
Collaboration Security

Microsoft Teams Security Settings You Are Probably Ignoring

Most Teams deployments use default settings that are too permissive. Here are the security settings every M365 admin should review.

By 365 Security Assessment Team · March 7, 2026
Compliance

Microsoft 365 Compliance Audit Guide for HIPAA, SOC 2, and CIS

How to run an M365 compliance audit against HIPAA, SOC 2, and CIS Benchmarks. Covers audit logging, DLP, retention, and encryption.

By 365 Security Assessment Team · March 5, 2026
Data Protection

SharePoint Security Best Practices: Stop Oversharing Before It Costs You

SharePoint oversharing is one of the top M365 security risks. Learn how to lock down permissions, sharing links, and external access.

By 365 Security Assessment Team · March 3, 2026
MSP Security

Why MSPs Need Automated Microsoft 365 Security Audits

Manual M365 audits don't scale. Learn why automated security assessments are essential for MSPs managing multiple tenants.

By 365 Security Assessment Team · March 1, 2026
Identity Security

Microsoft 365 MFA Best Practices: Beyond Just Turning It On

MFA alone isn't enough. Learn Microsoft 365 MFA best practices including Conditional Access, phishing-resistant methods, and MFA fatigue prevention.

By 365 Security Assessment Team · February 27, 2026
Threat Intelligence

Dark Web Monitoring for MSPs: What You Need to Know in 2026

Learn how dark web monitoring helps MSPs protect clients from credential leaks and breaches. Practical guide with tools and strategies.

By 365 Security Assessment Team · February 25, 2026
Comparisons

Top 10 Manual Audit (Big 4) Alternatives in 2026

Buyers exploring alternatives to Manual Audit (Big 4) typically compare these 10 tools

By Michael de Blok · February 25, 2026
MSP Security

Office 365 Security Best Practices Every MSP Should Follow

Essential Office 365 security best practices for MSPs. From MFA enforcement to mail flow audits, protect your clients' M365 tenants.

By 365 Security Assessment Team · February 23, 2026
Security Assessments

The Complete Microsoft 365 Security Assessment Checklist for 2026

A step-by-step M365 security assessment checklist covering MFA, conditional access, mail flow, SharePoint, Teams, and compliance settings.

By 365 Security Assessment Team · February 21, 2026
Comparisons

Top 10 Microsoft Secure Score Alternatives in 2026

Buyers exploring alternatives to Microsoft Secure Score typically compare these 10 tools

By Michael de Blok · February 11, 2026
Comparisons

Top 10 Orca Security Alternatives in 2026

Buyers exploring alternatives to Orca Security typically compare these 10 tools

By Michael de Blok · January 28, 2026
Comparisons

Top 10 Wiz Alternatives in 2026

Buyers exploring alternatives to Wiz typically compare these 10 tools

By Michael de Blok · January 14, 2026