<img height="1" width="1" src="https://www.facebook.com/tr?id=1529264867168163&amp;ev=PageView &amp;noscript=1">
blog_listing_hero_img.jpg

ENow Software blog

07
May

Microsoft Exchange Server attacks: The Fast and the Furious

There are still thousands of cyberattacks targeting zero-day security vulnerabilities in Microsoft Exchange Server faster and more furious every single day as malicious hackers...
Read More
03
Mar

Office 365 Security: Do You Have a People Problem?

Many organizations regard their people as their greatest asset. There is no disputing that the ability to hire great talent is a critical component to success, but in today’s...
Read More
16
Dec

Archiving Mail in Office 365 Part 1

Archiving email is an amazingly old topic in the world of email. Products which store email in another location instead of a mailbox have existed in one form or another for...
Read More
02
Dec

What We've Learned Working Remote Over the Past 8 Months in 2020

It’s no secret that the IT landscape has changed dramatically over the past 8 months. Due to the pandemic, organizations have had to pivot overnight, and what was hoped to be a...
Read More
12
Nov

Moving Application Authentication to Azure Active Directory

Microsoft 365 offers a wide variety of services beyond the full stack of services like Exchange Online, Microsoft Teams, etc. In particular, you can use Azure Active Directory as...
Read More
04
Nov

Microsoft 365 Security Assessment Part 2

Last week I shared part one of my Microsoft 365 Security Assessment where we took a deep dive into securing things related to Azure Active Directory. If you haven’t had a chance...
Read More
28
Oct

Microsoft 365 Security Assessment Part 1

 As a Microsoft 365 certified Security Administrator, and Microsoft certified Azure Security Engineer I have recently done a number of Microsoft 365 security assessments. Some of...
Read More
29
Jul

How to Prevent Users from Using Weak Passwords

How to prevent users from using weak passwords Last week, fellow MVP Nicolas Blank wrote an interesting article called having an identity crisis and it talked about all kinds of...
Read More
14
Jul

Having an Identity Crisis

In this article, I’m going to tie together how our email address is used to craft common attacks against our identity services, how we are exposed and what we can do about it. My...
Read More
30
Jun

Securing Exchange Servers

Securing Exchange Servers Securing Exchange servers is hard. I mean it can be a giant pain sometimes. There are what, hundreds of millions or maybe billions of lines of code...
Read More

Enjoying the blog? Subscribe!

Subscribe to Email Updates