top of page
WELCOME TO
MVP | Solution Architect | M365 Security & Compliance User Group Co-organiser



Data Strategy Breakdown Series - Defender XDR and Intune (4)
In Part 4 of the Data Strategy Breakdown Series, we explore how Defender XDR and Intune in your data strategy can transform security operations. From EDR block mode and web filtering to App Protection Policies and compliance enforcement, this post offers actionable tips for real-world data protection. No fluff, just practical, expert-level guidance.
Jun 9, 20254 min read


Data Strategy Breakdown Series - Secure Collaboration (3)
In today’s hybrid work environment, secure collaboration is more crucial than ever. Over-sharing, under-securing, and mismanaging collaboration tools can quickly lead to data breaches and compromised security. This post provides top recommendations for securing Microsoft 365 collaboration features, helping your organization balance productivity with robust security controls. From restricting guest access to managing anonymous links, discover the essential settings that will r
May 28, 20254 min read


Data Strategy Breakdown Series - Basic Security Hygiene (2)
A rapid-fire guide to basic security hygiene in Microsoft 365. This no-fluff checklist covers MFA, legacy auth, admin protection, spoofing prevention, and more. Perfect for IT admins who want quick wins and tighter security.
May 7, 20255 min read
bottom of page