In two weeks I’ll be starting at a new company as an Information Security specialist. In order to prepare for this new endeavor I’ll be updating my developer tenant for testing purposes. All best practices I know and found on the internet will be added to the...
Blog
SecurityFacebook advertising scam! Tips and tricks to recognize fake and fraudulent sites
Nowadays it is very easy to buy/purchase a domain, create a website using a template and start selling products. I have noticed a lot of advertisements on Facebook and Youtube that tried to sell products offering amazing deals. My mother also noticed these and decided to purchase a product for my brother’s, at that time unborn, child. She saw an advertisement from a company that sold a child’s playpen for “only” $20,-.
Testing the FEITIAN K27 FIDO Key with Office 365 and other
Portiva asked FEITIAN if they would like to send a trial set of FIDO keys to test and to validate its usability with Windows 10 and mobile devices.
CAA20004 AADSTS90072: User account from identity provider does not exist in tenant
We had two cases where we encountered the error code CAA20004 with the message “AADSS90072: User account from identity provider does not exist in tenant and cannot access the application in that tenant. The account needs to be added as an external user in that tenant...
Security in Office 365 and Azure
Most organizations have moved to Office 365 or a different cloud provider. The protection of identities and data should be their number one priority as credential leaks are for example easier to abuse in a cloud environment. Microsoft implemented a lot of security...
Administration tasks and monitoring in Office 365
Administration tasks consist mostly of incidents, (non)standard changes and monitoring where this blog focusses on monitoring in Office 365. An administrator should proactively monitor the Office 365 environment for alerts and issues. There are a lot of different...