Watch on demand now!
Have you recently rolled out remote working across your organisation or are you wondering whether your Microsoft tenancy is set up correctly? Your cloud could be harbouring a storm, so join our two-part cloud security series to learn more.
We brought together our Penetration Testers and our Technical Architects for a Microsoft 365 and Azure two-part cloud security series. During the sessions, we will show you how to keep your business secure, your data protected and your operations compliant.
Developed and hosted by our Technical Architects team, session two is a live delivery of security features within Microsoft 365. The demo will help you make the most out of the intelligent built-in Microsoft security features which are often not used to their full potential.
During the webinar:
- Implement best security practices on a Microsoft 365 tenancy
- Configure Advanced Threat Protection
- Set up Conditional Access and Mobile Device Management
- Enable Multifactor Authentication
The webinar session is ideal for ICT professionals, Cybersecurity experts, Infrastructure and Systems support teams.
Cloud Security and Microsoft 365 Resources
Five Top Tips To Keep Your Cloud Secure
Security has never been more important, especially as the explosion of homeworking has created more areas for potential vulnerability. This week two of our experts, Paul and Dan share their 5 top tips on securing your cloud, there are links to our recent live hack webinars, where you can watch Penetration Tester, Stuart White carry out a live hack on Microsoft 365 and Azure AD.
Is your cloud harbouring a storm? Part 1: Microsoft 365 and Azure Live Hack
Session one is a live hack demo during which our Pen Tester attacks an organisation's Microsoft 365 tenancy and breaks into a low-level account. Our team show how much data can be breached and exposed by compromising a single account.
Security Assessment and Delivery for M365
We created a staged approach to help you make the most out of the intelligent built-in Microsoft security features which are often not used to their full potential.