Microsoft Defender EASM

Microsoft Defender EASM – for vulnerability monitoring. Today, IT departments manage a vast array of digital services hosted in various vendors’ cloud services, not to mention their own local systems that must be provided for their organization, meeting the demands of today’s hybrid work. In many organizations, systematic continuous development and monitoring are carried out […]
Recording: NIS2 & Microsoft 365 Webinar

On the morning of August 22, 2024, we held a webinar covering the NIS2 EU directive and Microsoft 365 environments. The topic attracted a good number of attendees. Did you miss the webinar? No worries, you’re on the right page now. Continue reading. What requirements does the NIS2 EU directive bring for Microsoft 365 services […]
NIS2 – An easy, two-day effort?

NIS2 – An easy, two-day effort, I’ve heard it said. However, this may not be the case and requires a slightly more comprehensive approach to the matter. This is especially true for organizations where administrative cybersecurity may have previously taken a back seat. The NIS2 EU directive comes into force this October. Now, at the […]
A Summer of Disruptions

A summer of disruptions from a cybersecurity perspective. July, the most important holiday month for Finns, is nearing its end as this blog is being written. I couldn’t help but follow world events and also how we IT professionals have once again been called back from our holidays. In my opinion, it has been a […]
Why upgrade to Business Premium?

I’m often asked why upgrade to Business Premium? A simple “spoiler” answer: Because it’s the first license level in Microsoft 365 services’ Business licensing that brings information security and data protection services with it, bundled into a comprehensive license package. With it, you can also get rid of an office server or third-party security solutions […]
Engaging Users in Cybersecurity Efforts

Have you ever wondered how to engage users in cybersecurity efforts? Cybersecurity is a vital part of an organization’s operations and competitiveness. Neglecting it can, at worst, temporarily interrupt operations or even paralyze them permanently. Human error is the biggest cause of security incidents. But how can organizations improve their resilience in cybersecurity regarding users, […]
Communication Security Part 2

In the first part of communication security, I discussed message hygiene, specifically how we can better protect ourselves from the misuse of our email domains and enhance message deliverability. This second section will cover what should be considered to safeguard incoming email traffic and our users from malicious messages. Attack Methods Are Evolving Some of […]
Communication Security Part 1

In this two-part blog post, we will cover: what every organization should consider today to protect their email domains from misuse, how to improve the delivery of their messages, and what should be taken into account regarding phishing and malicious message protection for incoming messages. In this first part, we focus on message hygiene, i.e., […]



