RESOURCES

Sourcepass MCOE Insights

 

View articles and subscribe to stay
up-to-date with all things Microsoft.

 

Subscribe for Articles Straight to Your Inbox

 

Cloud Security

Microsoft Entra ID Authentication Migration: Steps to Secure your Environment | Sourcepass MCOE

3 min read

Entra ID Authentication Migration: Steps to Secure your Environment

On September 30, 2025, Microsoft will retire legacy multi-factor authentication (MFA) and...

Read More
How to Build Digital Resilience and Safety for Families | Sourcepass MCOE

3 min read

How to Build Digital Resilience and Safety for Families

Digital safety requires a layered approach that combines intentional habits, clear boundaries, and...

Read More
Preventing Token Theft and Phishing in Microsoft 365 | Sourcepass MCOE

3 min read

Preventing Token Theft and Phishing in Microsoft 365

Token theft and phishing attacks in Microsoft 365 are rapidly increasing, with over half of...

Read More
Securing Email in Transit with MTA-STS, TLS-RPT, and Dane | Email Security Series Part 4 | Sourcepass MCOE

2 min read

Securing Email in Transit with MTA-STS, TLS-RPT, and DANE 

Attackers don’t just target users anymore. They exploit the gaps in the infrastructure that moves...

Read More
Email Security Best Practices with Microsoft Defender and EasyDMARC | Sourcepass MCOE

3 min read

Email Security Best Practices with Microsoft Defender and EasyDMARC

Microsoft Defender for Office 365 and EasyDMARC are reshaping email security by combining advanced...

Read More
Should You Move Everything to the Cloud? Consideration for IT Leaders | Hybrid Solutions Sourcepass MCOE

2 min read

Should You Move Everything to the Cloud? Considerations for IT Leaders

The cloud promises flexibility, scalability, and innovation—but does moving everything to the cloud...

Read More
Strengthening Email Security with SPF, DKIM and DMARC | Sourcepass MCOE

3 min read

Strengthening Email Security with SPF, DKIM, and DMARC

Email continues to be one of the most exploited entry points for cyberattacks, including phishing,...

Read More