0:00 - Introduction
0:30 - Trust your gut. Always validate!
1:45 - Device safety
8:36 - Identity safety
16:19 - Phishing attacks
32:45 - Summary
This article includes top recommendations from Microsoft's cybersecurity team for implementing security capabilities to protect your Microsoft 365 environment. This article is adapted from a Microsoft Ignite session — Secure Microsoft 365 like a cybersecurity pro: Top priorities for the first 30 days, 90 days, and beyond. This session was developed and presented by Mark Simos and Matt Kemelhar, Enterprise Cybersecurity Architects.
More about Microsoft 365 Security