Hello, all! As you can see, it’s been a while since my last article here. This blog was once my platform for sharing everyday IT support advice. However, I’ve moved out of the traditional IT space within the past two years and into pure cloud engineering / devops. As a result of this, I don’t … Continue reading
This is part of an ongoing series of Office 365 Best Practices which should in place for every organization – big or small, business or non-profit. “Spoofing” is a spam technique in which malicious actors pose as legitimate senders for their own nefarious purposes – monetary gain, account access, etc. A common spoof attempt seen … Continue reading
This is part of an ongoing series of Office 365 Best Practices which should in place for every organization – big or small, business or nonprofit. If you’ve seen my “Enable Audit Log” guide for Office 365, then you know how important it is and how to enable. By default, logs are kept for only … Continue reading