top of page
All Posts


5 Essential Security Measures for Microsoft 365 You Shouldn't Ignore
5 Essential Security Measures for Microsoft 365 You Shouldn't Ignore

Kyle Cira
Jul 303 min read


Top 5 New Controls in the CIS Microsoft 365 Benchmark Version 6
The Center for Internet Security (CIS) recently released version 6 of the Microsoft 365 Security Benchmark, and with it comes several powerful new controls designed to strengthen cloud security and reduce modern threat risks.

Kyle Cira
2 days ago3 min read


Redeemer Cyber Deliverables Are Now Updated to the Latest CIS Microsoft 365 Benchmark v6!
The Center for Internet Security (CIS) recently released version 6 of the Microsoft 365 Security Benchmark on October 31, 2025, bringing new and updated recommendations that strengthen organizational cloud security.
Redeemer Cyber is proud to announce that all of our Microsoft 365 Security Assessment and Remediation deliverables are now fully aligned to CIS M365 v6—within just one day of its release.

Kyle Cira
Nov 52 min read


The Limitations of Microsoft 365 Cybersecurity Scanning Tools
Automated scanning tools are powerful—but they’re not perfect. Many organizations rely entirely on them to evaluate their Microsoft 365 security posture, only to discover later that “100% compliant” didn’t mean what they thought it did.
Here’s the reality: even the best Microsoft 365 cybersecurity scanning tools can only go so far.

Kyle Cira
Oct 222 min read


Assess, Remediate, and Maintain with Redeemer Cyber
Cybersecurity isn’t a one-and-done event — it’s a continuous process. That’s why Redeemer Cyber’s “The Works” Microsoft 365 Assurance Package is built around a simple but powerful principle: Assess. Remediate. Maintain.

Kyle Cira
Oct 82 min read


The Redeemer Cyber Advantage
In today’s threat landscape, every business is being told they need cybersecurity. Managed Service Providers (MSPs) offer to “take care of IT and security.” Managed Security Service Providers (MSSPs) sell 24×7 monitoring and alerts. Automated tools promise a quick scorecard that tells you how secure—or insecure—you are.
So why choose Redeemer Cyber instead? Because none of those approaches are designed to deliver what you actually need: non-invasive, expert-led and thorough

Kyle Cira
Oct 13 min read


Why SharePoint Needs to Be Secured on Day 1
SharePoint and OneDrive are powerful tools for collaboration, but they come with risks if left in their default state. Too often, organizations roll out Microsoft 365 and focus on productivity first—leaving security as an afterthought. Unfortunately, this creates a perfect window of opportunity for attackers.

Kyle Cira
Sep 242 min read


How Redeemer Cyber Helps Shape the CIS Microsoft 365 Benchmark
Over the years, our founder has submitted more than 60 accepted tickets to CIS—ranging from corrections and enhancements to refinements in control impacts and rationale.
This dedication earned him recognition as one of just 15 officially credited contributors to the CIS M365 Benchmark, trusted worldwide by businesses, governments, and non-profits.

Kyle Cira
Sep 182 min read


Top Ten Reasons to Consider Microsoft 365 E5
Cyber Budget When it comes to Microsoft 365 licensing, many organizations hesitate at the price tag of Microsoft 365 E5. But in practice,...

Kyle Cira
Sep 103 min read


Top 5 Microsoft 365 “Gotchas” I Wish I Knew Sooner
Microsoft 365 is a powerful platform, but it comes with quirks that can surprise even experienced administrators. Over the years, I’ve...

Kyle Cira
Sep 32 min read


Why Redeemer Cyber Standardized on the CIS Microsoft 365 Benchmark
We’ve standardized on the CIS Microsoft 365 Foundations Benchmark—the most trusted, comprehensive, and actionable security benchmark available for Microsoft 365.
Here’s why we not only use it—but contribute to it.

Kyle Cira
Aug 272 min read


8 Tangential Benefits of an Independent Expert-Led Security Assessment
Cyber Analyst at work When organizations think of a security assessment, the immediate value that comes to mind is identifying...

Kyle Cira
Aug 202 min read


Story Time: How User App Consent Crippled a Business (Yes, This Really Happened)
Cyber attacker sends Phishing email. Based on a True Story A user received a phishing email and—like many unsuspecting employees—clicked...

Kyle Cira
Aug 132 min read


Thoughtfully implementing MFA while balancing Risk and User Experience
Secure Shield Multi-Factor Authentication (MFA) is one of the most effective ways to prevent unauthorized access, and many organizations...

Kyle Cira
Aug 52 min read
bottom of page
