The defense of digital information and IT assets against internal and external, malicious and accidental threats.

, , , , , , , , , , , , , , ,

Restrict Access to Office 365 Exchange Online: Limiting by Network, IP, Client, Group or Policy | HowTo | 1 of 2

Active Directory Federation Services (AD FS) 2.0 provides a way to configure access restriction policies. Office 365 & Exchange Online customers using Single Sign-On (SSO) who require these policies can now use Client Access Policy rules to restrict access based on the location of the computer or device that is making the request and prevent access […]

, , , ,

Office 365 & Exchange Online Password PowerShell Commands | HowTo

The Admin Centres for Office 365 and for Exchange Online are great for simple and singular tasks regarding password management and policy, however, if you wish to carry wider tasks or bulk user management PowerShell is the best option. You can manage multiple domains simultaneously, or script the commands to include a CSV file of as […]

, , , , , ,

User Password Expiry settings in Office 365 | HowTo

In Office 365 and Exchange Online the simplest and easiest place to change the expiry term for passwords is in the Admin Centre. The expiry term is set at 90 days by default, with a default 14 day notice prior to the expiry. You can also disable password expiry, however as always, this is not […]

, , , , ,

Microsoft Azure achieves ISO Certification for Cloud Security

Microsoft Azure has taken a major step ahead of its rival cloud platforms with its continued commitment to security in the form of ISO 27017 cloud security certification. Achieving compliance with the ISO27017 cloud security certificate dictated that Microsoft had to adhere to 44 different cloud risk and threat model controls. With these additional security […]

, , , , , , , , , , , , , , , ,

Office 365 SSO Security Guidance: Single sign-on and remote access

Office 365 SSO: The secure configuration of this cloud-hosted service aligns with government’s guidance on implementing the Cloud Security Principles. You can find out more regarding implementation of Federation in order to Restrict Access to Office 365. 1. What is Office 365 SSO (Single Sign-On)? A Microsoft Online user usually signs in using the username and […]

, , , , ,

Passwords, encryption and good practice

Passwords should be complex and changed regularly. Encryption should be implemented for any business critical information and especially for any information which is mobile or transported in any fashion. Why then do we still get asked the question “why do we need to change our passwords so often” and “do we have to have such […]

, ,

Cyber Security and Cyber Fraud

Cyber security and cyber fraud. Look, there is no easy answer to this, albeit many pundits, commentators and politicians would have you believe there is. First of all, I’m a technologist, I love it. However, technology does not hold the key to the solution to this issue. The simplistic application of some ethereal technical solution […]