Archive: March 2026
14 posts from March 2026
DMARC, SPF, and DKIM Explained: Email Authentication for M365
Master DMARC, SPF, and DKIM authentication protocols to protect Microsoft 365 email domains from spoofing and phishing attacks.
OneDrive Security Settings Every Admin Should Configure
Essential OneDrive security configurations for administrators. Practical guide to protecting OneDrive environments in Microsoft 365.
The MSP Guide to Microsoft Secure Score Optimization
Complete guide to improving Microsoft Secure Score for your clients. Actionable recommendations for MSPs managing multiple Microsoft 365 tenants.
Top 10 Telivy Alternatives in 2026
Buyers exploring alternatives to Telivy typically compare these 10 tools
How to Detect Compromised Microsoft 365 Accounts
Practical techniques to detect compromised Microsoft 365 accounts. Step-by-step guide for MSPs investigating suspicious activity and account takeovers.
Microsoft 365 Security for Healthcare: HIPAA Compliance Checklist
Complete HIPAA compliance checklist for Microsoft 365 in healthcare. Essential configurations for MSPs supporting healthcare organizations.
Azure AD Conditional Access Policies: A Complete Setup Guide
Step-by-step guide to implementing Azure AD Conditional Access policies for zero trust security. Essential for MSPs protecting enterprise environments.
Business Email Compromise Prevention in Microsoft 365
BEC caused $2.9B in losses in 2023. Learn how to prevent business email compromise in M365 with mail flow rules, DMARC, and monitoring.
Top 10 Augmentt Alternatives in 2026
Buyers exploring alternatives to Augmentt typically compare these 10 tools
How MSPs Can Sell Security Assessments as a Recurring Service
Security assessments are the highest-margin service MSPs can offer. Learn how to package, price, and sell them to existing and new clients.
Microsoft Teams Security Settings You Are Probably Ignoring
Most Teams deployments use default settings that are too permissive. Here are the security settings every M365 admin should review.
Microsoft 365 Compliance Audit Guide for HIPAA, SOC 2, and CIS
How to run an M365 compliance audit against HIPAA, SOC 2, and CIS Benchmarks. Covers audit logging, DLP, retention, and encryption.
SharePoint Security Best Practices: Stop Oversharing Before It Costs You
SharePoint oversharing is one of the top M365 security risks. Learn how to lock down permissions, sharing links, and external access.
Why MSPs Need Automated Microsoft 365 Security Audits
Manual M365 audits don't scale. Learn why automated security assessments are essential for MSPs managing multiple tenants.