top of page


Conditional Access Essentials: Naming conventions, personas, emergency access & design process
Master Conditional Access with a Zero Trust, persona-based approach. Learn how to structure policies, avoid security gaps, and keep everything organised with clear naming conventions. From discovery workshops to practical use cases, this guide helps you design scalable, secure policies that work in the real world.
3 days ago9 min read
Â
Â
Â


Configuring M365 Company Branding & Privacy Settings: Simple Tricks to Reduce Phishing Risks
Company branding isn’t just about creating a visual identity - it’s a key security measure for reducing phishing risks. In this post, I dive into how configuring your Microsoft 365 login page with your company’s logo, colours, and even a recognisable background image can help users easily spot fake login pages. Spoiler: there are ducks involved, and you’ll have to read on to understand why!
Jul 86 min read
Â
Â
Â
bottom of page