5 min read
Microsoft Licensing: Teams Unbundling Expands Collaboration Options
Microsoft has announced a major change to its licensing strategy. Starting November 1, 2025, organizations worldwide can purchase Microsoft 365 and...
2 min read
Keri LaRue : Jun 13, 2025 9:00:00 AM
Most IT leaders already know email is the primary attack vector. You see it every day through phishing attempts, spoofed domains, and impersonated vendors that slip past filters.
What’s changing is not just the frequency of attacks but the sophistication behind them. Threat actors are eroding trust by mimicking executives, exploiting gaps in authentication, and manipulating the signals users rely on to determine legitimacy.
The scale of the impact is measurable:
Filtering isn’t enough. Trust is the new battleground.
For a deeper dive into this shift, listen to Part 1 of our podcast series on email security where we unpack how attackers are undermining trust and what IT leaders can do about it.
For organizations on Microsoft 365, Defender for Office 365 is the baseline control. It isn’t just anti-spam; it’s tenant-level protection that integrates with Microsoft’s broader security ecosystem.
Plan 1 (included in Microsoft 365 Business Premium):
Plan 2 (included in Microsoft 365 E5 or E5 Security add-on):
Signals across identity, endpoints, and apps converge. Even if a phishing email gets through Outlook, related activity in other parts of the Microsoft ecosystem can still trigger containment.
Microsoft, Google, and Yahoo now require SPF, DKIM, and DMARC for bulk senders. This is not theoretical. Misconfigured or missing records will block legitimate business email.
By 2026, Gartner projects 90% of organizations will enforce DMARC, up from just 20% in 2023.
Email security is no longer just about filtering threats. It’s about restoring trust. As attackers evolve, defenses must evolve too. The Sourcepass Center of Excellence for Microsoft helps IT teams strengthen their Microsoft ecosystem with strategic guidance, authentication best practices, and layered protection that scales.
Whether you're auditing your domain setup or evaluating Defender capabilities, now is the time to take a closer look at how trust is built and maintained across your email infrastructure.
In Part 2, we’ll examine how attackers are using AI to scale phishing campaigns and how Microsoft is responding with its own machine learning. Parts 3 and 4 will explore advanced authentication methods like MTA-STS and BIMI, and how to align email security with a Microsoft-powered defense-in-depth strategy.
5 min read
Microsoft has announced a major change to its licensing strategy. Starting November 1, 2025, organizations worldwide can purchase Microsoft 365 and...
5 min read
On September 30, 2025, Microsoft will retire legacy multi-factor authentication (MFA) and self-service password reset (SSPR) policies in Entra ID...
5 min read
Small and midsize businesses are increasingly targeted by sophisticated cyber threats, yet many advanced security solutions have historically been...
The most effective way to protect children online is to combine layered technical controls with ongoing, honest conversations about digital risks....
Digital safety requires a layered approach that combines intentional habits, clear boundaries, and ongoing education. Protecting children and...
Microsoft’s new email security standards (MTA-STS, TLS-RPT, DANE, and DNSSEC) are redefining how organizations protect email in transit. These...