

Data Strategy Breakdown Series - Defender XDR and Intune (4)
In Part 4 of the Data Strategy Breakdown Series, we explore how Defender XDR and Intune in your data strategy can transform security operations. From EDR block mode and web filtering to App Protection Policies and compliance enforcement, this post offers actionable tips for real-world data protection. No fluff, just practical, expert-level guidance.
19 hours ago4 min read
134 views
0 comments


Data Strategy Breakdown Series - Secure Collaboration (3)
In today’s hybrid work environment, secure collaboration is more crucial than ever. Over-sharing, under-securing, and mismanaging collaboration tools can quickly lead to data breaches and compromised security. This post provides top recommendations for securing Microsoft 365 collaboration features, helping your organization balance productivity with robust security controls. From restricting guest access to managing anonymous links, discover the essential settings that will r
May 284 min read
322 views
0 comments


Data Strategy Breakdown Series - Basic Security Hygiene (2)
A rapid-fire guide to basic security hygiene in Microsoft 365. This no-fluff checklist covers MFA, legacy auth, admin protection, spoofing prevention, and more. Perfect for IT admins who want quick wins and tighter security.
May 75 min read
893 views
0 comments


Data Strategy Breakdown Series - Defence in depth & Zero Trust (1)
In this first post, we explore how to create a strong data security foundation using defence in depth and Zero Trust strategies. With identity now acting as the new perimeter, it's more critical than ever to secure every layer—from users and devices to data and applications. Backed by real client examples, this post unpacks why labels alone aren’t enough, and how a proactive, prioritised approach can better protect your business from both external and insider threats.
Apr 305 min read
323 views
0 comments


Modern data security challenges: defence in depth approach
When we talk about data security, we’re essentially talking about cybersecurity at large - because data is what the bad actors are ultimately after. Whether it's for extortion or financial gain, your data is their endgame. This is why we need to rethink our approach to security perimeters. In many organisations, there's still a legacy mindset focused on the network edge, but in today's landscape, the real perimeter is your users, devices, and identities.
Apr 234 min read
431 views
0 comments


Why Microsoft Purview projects fail before they even begin - and how to stop that from happening
Microsoft Purview isn’t just another tool you switch on and walk away from. It’s a full-on transformation.
Apr 93 min read
1,301 views
0 comments


Another day, another Purview solution: Data Security Investigations
You know that saying "another day, another dollar"? Pretty sure when the songwriters came up with that, they weren’t talking about...
Mar 283 min read
276 views
0 comments