top of page
WELCOME TO
MVP | Solution Architect | M365 Security & Compliance User Group Co-organiser



Data Strategy Breakdown Series - Defence in depth & Zero Trust (1)
In this first post, we explore how to create a strong data security foundation using defence in depth and Zero Trust strategies. With identity now acting as the new perimeter, it's more critical than ever to secure every layer—from users and devices to data and applications. Backed by real client examples, this post unpacks why labels alone aren’t enough, and how a proactive, prioritised approach can better protect your business from both external and insider threats.
Apr 30, 20255 min read


Modern data security challenges: defence in depth approach
When we talk about data security, we’re essentially talking about cybersecurity at large - because data is what the bad actors are ultimately after. Whether it's for extortion or financial gain, your data is their endgame. This is why we need to rethink our approach to security perimeters. In many organisations, there's still a legacy mindset focused on the network edge, but in today's landscape, the real perimeter is your users, devices, and identities.
Apr 23, 20254 min read


Why Microsoft Purview projects fail before they even begin - and how to stop that from happening
Microsoft Purview isn’t just another tool you switch on and walk away from. It’s a full-on transformation.
Apr 9, 20253 min read
bottom of page