Get Customised Security Posture Templates Tailored to your Needs - Join our Early Adopter Program

Blogs

Get the latest articles on securing 365 and your business

Octiga Announces Benefit Partnership with The ASCII Group

Members of The ASCII Group gain preferential Octiga terms

Read Story

Microsoft Office 365 Secure Score Limitations for MSPs

Limitations of the M365 Secure Score for MSPs. Understand potential restrictions when enhancing security posture of Microsoft 365 environments.

Read Story

Desired State Configuration without Managing PowerShell Code

Discover how Octiga's SaaS automation engine tackles challenges in Desired State Configuration (DSC) for effective management.

Read Story

Cyber Security Approach for SMEs

Cybersecurity is essential, but does it always have to be expensive? Find out these helpful cybersecurity tips for the workplace in SMEs and other organisations.

Read Story

Recent News

Visit Blog

5 reasons why MSPs can’t win the Microsoft 365 security game using Secure Score (and what to do about it)

While Microsoft Secure Score offers a quantifiable assessment of security posture, it has striking limitations. We share five reasons why MSPs need a better tool.

Read Story

Microsoft 365 Breaches - As preventable as they are common

Sash Vasilevski, Octiga co-founder and cyber security expert, explains why stopping unauthorised access to Microsoft 365 is complex, requiring specialist tools, like Octiga.

Read Story

Octiga Announces Benefit Partnership with The ASCII Group

Members of The ASCII Group gain preferential Octiga terms

Read Story

A Closer Look at the Midnight Blizzard Crew

Russian group the Midnight Blizzard crew (Nobelium, APT29, Cozy Bear, Iron Hemlock, The Dukes) has been targeting personal credentials.

Read Story

Microsoft Office 365 Secure Score Limitations for MSPs

Limitations of the M365 Secure Score for MSPs. Understand potential restrictions when enhancing security posture of Microsoft 365 environments.

Read Story

Octiga Vs Flying Solo with Office 365 Security for MSPs

The purpose of the Octiga Office 365 security app is not to replace M365 security but to ensure that MSPs can deliver it consistently, coherently and rapidly to all your clients. A short video explains how Octiga makes MSPs' work super efficient and super fast.

Read Story

Office365 Security Audit: Automate, Remediate, Repeat

Explore key Office365 auditing challenges for MSPs and discover effective solutions to enhance business performance.

Read Story

SharePoint Online Security - Best Practice Guide for MSPs

Protect your SME's Office 365 with SharePoint Online Security Best Practices. Safeguard against breaches.

Read Story

Why MSPs need to Reconsider SIEM for Office 365 Security

The advantages of SIEM make it a go-to tool for Office 365 security; however, the long list of implementation pitfalls can sometimes exceed its benefits. Here are some insights on why MSPs need to reconsider Office 365 SIEM and how they can turn them around.

Read Story

How to Confidently Bundle Office 365 Security for MSPs

Learn how bundles can enhance MSP service offerings and help grow their business & increase client retention.

Read Story

Secure Office 365 with PowerShell via the CIS approach - Pt 2

In Part 2, we address Office 365 security audit activities. PowerShell commands for scripting and remediating Office 365 audit log.

Read Story

Why MSPs Should not Apply MFA Solutions Blindly

As MSPs scale, MFA's practical implementation can increase business operation costs. Here're some multi-factor authentication challenges, and recommendations that can control MSPs burnout.

Read Story

MSP Business Scalability Challenge for Office 365 Security

Discover the hurdles MSPs encounter in scaling Office 365 security and explore effective solutions.

Read Story

Desired State Configuration without Managing PowerShell Code

Discover how Octiga's SaaS automation engine tackles challenges in Desired State Configuration (DSC) for effective management.

Read Story

Secure & Manage Office 365 with PowerShell – The CIS Approach

PowerShell Office 365 security through CIS approach? Here are the best Office 365 PowerShell commands to secure your organisation.

Read Story

Baseline Security (Posture) Monitoring is the New Breach Monitoring

Learn how to turn security baselines configurations into a multi-dimensional cloud security asset to increase efficiency and revenue.

Read Story

NIST Cybersecurity Framework for Office 365

Strengthen your understanding of the NIST Cybersecurity Framework (CSF) and what implication does it have on cloud security.

Read Story

Zero Trust Model for Cloud Security

A detailed explanation of the zero trust model for cloud security, its principles and an approach to the implementation of it.

Read Story

Public vs Private Cloud Security: A Simple Explanation

Learn the basics of private and public cloud security and understand the differences between the two.

Read Story

Security Trends for Managed IT Service Providers

Explore 2021's top trends for managed IT services, including security advancements and platform scalability.

Read Story

Top 4 Security Pain Points in Office 365 and their Solutions

Office 365 configurations come with a learning curve, and implementing these security features can be a tedious task, especially for non-experts. Here's an article discussing the top Office 365 security pain points with practical mitigation solutions.

Read Story

Cloud Security vs. Network Security: Which is Best for your SME?

An article to simplify and educate SMEs about cloud security vs network security. How to choose the right security strategy for your SME!

Read Story

SME Cybersecurity Automation Tools Using Microsoft 365

Effective Microsoft Office 365 security solutions for SMEs to strengthen their security without using complex configurations & technical expertise.

Read Story

The Biggest Cyber Attacks and Tips to Build Cyber Resilience

Recent cyber attacks broke records and left everyone shocked. Find out about the biggest cyber attacks and learn tips for much stronger security!

Read Story