When autocomplete results are available use up and down arrows to review and enter to select.
While multi-factor authentication (MFA), stronger password requirements, increased security awareness, and other factors have increased our ability to protect businesses, the arms race between the proverbial “red” vs “blue” team is ever evolving.
Bad actors are constantly researching and employing new ways to bypass these defenses. Learn about these new approaches that both security testers and the real bad guys are using to breach organizations and invade your privacy.
Learning Objectives
Understand the ongoing requirements for maintaining Multi-Factor Authentication (MFA) effectiveness.
Recognize the need for continuous management of email security solutions.
Comprehend why Microsoft Teams is not secure by default and requires configuration.
Identify insecure features exposed during Azure/M365 tenant setup.
Learn how OneNote malware is the new Office Macro attack.
Discover lesser-known "dual-use" products in Microsoft 365 that can be exploited by attackers.
Realize that successful phishing attacks can often be facilitated by simple phone calls.
Implement strategies to protect your organization from vulnerabilities.
Duration: 60-minutes
Recorded on Oct. 30, 2024.