Follow

Ingram Micro have published a 7 step guide to the impossible task of securing M365...

I'm so over it that I can't even muster a response like my 1 step guide to securing M365...

Step 1: Don't use M365.

Sign in to participate in the conversation
Mastodon - NZOSS

The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!