Octiga

Galway, Ireland
2018
  |  By Octiga
Microsoft's security team has recently made a significant discovery regarding an increase in cyber-attacks orchestrated by the Russian state-backed group known as the Midnight Blizzard crew. This group, which also operates under the aliases Nobelium, APT29, Cozy Bear, Iron Hemlock, and The Dukes, has been actively targeting personal credentials, according to Microsoft's findings. The Midnight Blizzard hackers employ residential proxy services to conceal the source IP addresses of their attacks.
  |  By Octiga
Microsoft 365 Secure Score is a comprehensive security analytics tool for a single tenant. It uses a score-based approach to provide actionable recommendations to enhance security. However, MSPs should be aware that the scoring process fails to fit the needs of scaling MSPs in terms of business exceptions, managing multiple clients, remediation and alerting, not to mention making an assessment which is independent of MS upselling.
  |  By Octiga
For someone who interacts with managed service providers daily, I am often asked to highlight the differences between our Office 365 security app Octiga and a SIEM that provides similar functionality OR a Microsoft native tool such as Secure Score. I thought, why not create an informative piece for our users who wish to understand Octiga services better?
  |  By Octiga
Over the last two decades, the M365 service capabilities have developed rapidly and have evolved into a more complex version. In addition, the Security & Compliance Centre has rapidly expanded in response to the rising sophisticated attacks. Office 365 user numbers have reached approximately a whopping 345 million," broadly aligning with the 17% y-o-y increase in commercial revenue.
  |  By Octiga
Despite the tight security services provided by Microsoft, we know how frequently SMEs' Office 365 is breached, either intentionally by hackers or inadvertently by carelessness. In such a scenario, it makes us wonder, can we fully trust Microsoft to protect us from mal actors in 2022?? The simple answer is yes. The complicated answer is: Microsoft is as secure as WE configure it. Does that make you uneasy?
  |  By Octiga
In 2005, a new market emerged when Gartner coined the term "SIEM" OR Security and Information Event Management. Back then, it was a legacy system aggregating event data produced by security devices, systems, network infrastructures and applications. However, it lacked monitoring functionality and was limited to vertical scalability.
  |  By Octiga
The standard shipping container is the unsung hero of the modern world! More on that later…
  |  By Octiga
This is the second blog in a multi part series helping admins, service providers, consultants and security admins to check and achieve a level of security control in Office 365. Part 1 of this series covered the basic PowerShell commands for Authentication through CIS, here we will talk about ‘Audit’.
  |  By Octiga
Microsoft engineers shared that 99.9% of compromised accounts forgot to turn on MFA. Despite so many warnings and proof of the efficacy of MFA, an M365 security report by Coreview reveals that 78% of M365 administrators do not have MFA activated. Isn't that crazy? It's not always perfect (phishing, social engineering and password brute-force attacks, device theft etc.); nevertheless, it is clearly better than not having it. However, if not implemented with care, it can create headaches for MSPs.
  |  By Octiga
If we look at the industry report, the Managed Services Market is forecast to touch USD 557.10 billion by 2028. It has become a mature business now, however the customers' needs are highly complex when compared to traditional businesses. MSP Business opportunity/challenges can be complex to navigate, often involving multiple external market forces, internal drivers, organisational and client-based frictions, resistance to scaling, and of course, both financial and opportunity costs.
  |  By Octiga
Avoid ex-employees accessing accounts or unused licenses.
  |  By Octiga
Octiga Proactive and Reactive Security Across ALL your clients, regardless of license. Set policies, monitor everything, and remediate. Easy enough for your L1s.
  |  By Octiga
Master safe locations for everything from users' business trips to a city/ country for a fixed period of time, all the way up to a fixed IP address or ASN for a backup tool across multiple tenants, and everything in between.
  |  By Octiga
Hello everyone! Welcome to this video where we'll delve into the intricacies of managing MFA (Multi-Factor Authentication) and #MFA roleout. Throughout this session, we'll navigate through various challenging scenarios, including tenants with security defaults, conditional access policies, and per-user MFA. Our main focus will be on Octiga, a powerful tool that analyzes MFA from a risk perspective. We'll explore a template that allows you to easily include or exclude users from MFA policies, giving you greater control over your security measures.
  |  By Octiga
This morning, I stumbled upon some awesome updates from Microsoft that I just had to share. You know how there used to be an extra cost for enhanced security audit information with 365 tenants? Yeah, not the best move, right? Well, guess what? Things are turning around now!
  |  By Octiga
Hey there! In this video, I wanted to update you on the latest release from Octiga. We have introduced new conditional access policy baselines that offer more control over user inclusions, group and role inclusions/exclusions, and the ability to set a generalized template for conditional access policies.
  |  By Octiga
Many of our users compare Octiga Office 365 security app with Microsoft. Being a fan of Microsoft security tools, I want to emphasise that Octiga is not a replacement for Microsoft M365. On the contrary, we manage Office365 security to make its deliverability much easier for super-busy MSPs. Find out how MSPs can make Office 365 multi-client security a piece of cake with Octiga Office 365 security automation as opposed to managing it manually.
  |  By Octiga
Octiga presenting its solution to partners from Newcastle. Exciting presentation delivered by our Director, Dr Robert McFeely, to demonstrate how Octiga will help UK MSPs in solving frequent #M365 security management challenges for multiple clients. Looking forward to giving confidence to UK MSPs to deliver Office 365 security rapidly.
  |  By Octiga
Native auditing tools often lack the ability to customise security according to each organisation’s individual needs. It also lacks continuous auditing automation and easy-to-follow remediation. Octiga gets all these features on a single multi-tenant dashboard, freeing MSPs from the once-off ad hoc audits that go unnoticed.#m365 #office365 #mspartner #managedserviceprovider
  |  By Octiga
Octiga makes it possible to redeploy your MSP’s best-practice security posture consistently, across multiple clients. Set a template posture for your clients and easily manage them in a single click whenever a baseline update is required. Apply & maintain continually and cohesively in a few seconds.
  |  By Octiga
10 Steps to Avoid Breaches and Data Leaks in Office 365.

Octiga is a true SaaS solution, born in cloud. It helps you identify security risks and guides you to properly configure your security posture. Our services alert you to suspicious incidents as they occur as well as risky configurations in your Microsoft Office 365 tenant. Our affordable, automated and effortless cyber security monitoring and auditing services are designed by cybersecurity experts with many years of industry experience.

Octiga’s intelligent algorithm looks out for risks in real-time to provide you with instant notification and remediation solutions. Our product is fully cloud-based and simply requires an online sign in using your Microsoft 365 account. From there, you can use the following features to complete your security journey.

  • Prevent: This feature benefits anyone who is responsible for Office 365 security configuration and remediation. Octiga tailors the security configurations to fit an organisation’s unique usage and compliance needs. Its guided wizard ensures that each user is able to automate the configurations in a streamlined and hassle-free way. Octiga’s Office 365 multi-tenant administration scans your entire Office 365 instance, highlights issues and guides you through a series of best practices to achieve safe and secure operation. It addresses not just safe configuration but also safe user account access and management, sharing, and all the other potential weaknesses that may have escaped your attention.
  • Detect: Octiga acts as a watchdog for risks and threats, looking over suspicious user activity and configuration changes round the clock. Our intelligent algorithms, in conjunction with updated third-party security information, detects risks in real-time. It also alerts users at the right time and allows a timely remediation of incidents and breaches.
  • Recover: This feature works efficiently for those responsible for identifying incidents and breaches in your Office 365 tenant and for compiling an accurate incident audit. It is capable of fetching historical data for both new as well as existing tenants. It transfers full remediation control over to the users by offering them a single dashboard that has options for disabling user rules, access protocols and authorisation in a few simple clicks. It also offers an option for further fortification to prevent repeat compromise.

A Game Changer for Managed Office 365 Clients: