Justin Kirsch

Lock It Down: A Guide to Risk-Based Security with Microsoft Intune

9 min read

Lock It Down: Risk-Based Device Compliance with Microsoft Intune

In This Article Why Device Compliance Is a Board-Level Concern What Microsoft Intune Device Compliance Actually Does Building a Risk-Based Intune Policy: The Executive Playbook What Changed in 2026: Intune's Expanding Capabilities The Microsoft 365...

Read More
If Your Digital Bouncer Is Asleep, You’re in Trouble: 5 Conditional Access Rules You Need

9 min read

5 Conditional Access Rules Every Financial Institution Needs

In This Article What Conditional Access Does (And Why Defaults Fail) Rule 1: Block Legacy Authentication Protocols Rule 2: Require Managed and...

Read More
The Moat Is Gone: Why Identity Is Your New Fortress in Microsoft 365

9 min read

The Moat Is Gone: Why Identity Is Your New Security Perimeter in Microsoft 365

In This Article The Identity-Access-Endpoint Triad Why Identity Attacks Are Accelerating The Regulatory Mandate Zero Trust: The Framework Behind M365...

Read More
Stop Paying for

6 min read

Stop Paying for M365 Shelfware: License Downgrade Guide for Financial Institutions

You wouldn’t buy a Porsche just to drive three blocks to the grocery store at 15 miles per hour. Yet, that is exactly what thousands of businesses do...

Read More
Build Professional-Grade Microsoft 365 Infrastructure on Any Budget

6 min read

Build Professional-Grade M365 Infrastructure on Any Budget

Buying a gym membership doesn't make you fit. It just gives you access to the equipment. You still have to show up, get your blend of cardio and...

Read More
From Licenses to Leverage: Running Microsoft 365 as a Platform

7 min read

From Licenses to Leverage: Running M365 as a Platform for Financial Institutions

Imagine buying a top-of-the-line, professional-grade gym membership. You have access to Olympic-sized pools, personal trainers, state-of-the-art...

Read More

6 min read

Why Credit Unions Can't Afford Cheap Microsoft 365 Licenses

In the first year after NCUA's 72-hour cyber incident reporting rule took effect, credit unions reported 1,072 incidents. A single ransomware event...

Read More
Zero Trust Device Security BYOD Gap

8 min read

Zero Trust Fails Without Device Security: Closing the BYOD Gap

In This Article The Confidence Gap: Why Secure Scores Mislead How BYOD Breaks Zero Trust at the Device Layer The Scale of the BYOD Problem in...

Read More

7 min read

Your Security Score Is High, But Your Business Is Still at Risk

What You'll Learn Your Scorecard Isn't Your Security Personal Devices Are the Unmanaged Back Door A Security Gap Is a Business Problem Cyber...

Read More