Defense
Hardening Microsoft 365 against BEC
Roll out conditional access policies that block unfamiliar locations, enforce granular MFA prompts, and add transaction signing for financial teams. Combine with automation to disable suspicious OAuth grants.
“Within 48 hours we eliminated over 90% of privilege-consent attempts and cut invoice fraud attempts in half.” — DMF vCISO Team
Published: October 8, 2025 · Author: Modern Workplace Practice
Defense
VPN emergency response checklist
DMF’s incident playbook covers patch verification, log triage, revoking tokens, and deploying temporary geo-fencing. We also provide PowerShell scripts to validate integrity of core binaries before bringing appliances back online.
- Inventory exposed appliances with Shodan + RMM sync
- Force password resets and rotate shared creds
- Deploy EDR containment policies for lateral movement
Published: October 6, 2025 · Author: DMF Incident Response
Defense
Browser isolation & extension governance
Adopt cloud browser isolation for privileged apps, enforce enterprise extension stores, and use CASB alerts to flag risky sync traffic. Pair with monthly user awareness labs focused on SaaS session hijacking.
Published: October 3, 2025 · Author: DMF Security Engineering