Skip to main content
Billy Pickin
Written byBilly Pickin

A guide to Microsoft Teams templates and teams

Microsoft Teams can be an extremely valuable collaboration and communication tool, with a key feature being the ability to create a ‘team’.

Cyber Security Strategy

Five penetration testing myths

According to the NCSC, penetration testing is “a method for gaining assurance in the security of an IT system by attempting to breach some or all of that system's security, using the same tools…

Cyber report spotlight: DDoS-as-a-Service used in six-day DDoS attack

A July a Distributed Denial of Service (DDoS) attack on Microsoft which led to availability issues, was amplified, rather than prevented, by its DDoS protection.

Cyber report spotlight: Security firm accidently hires North Korean hacker

The security engineer a security firm recently hired within its internal AI team turned out to be a North Korean threat actor, who immediately began loading malware to his company-issued…

Christopher Rich
Written byChristopher Rich

Top five M365 Misconfigurations

We’ve completed countless Microsoft 365 security reviews for organisations of all sectors, sizes and locations, and there are five misconfigurations we see regularly.

​Cyber report spotlight: CrowdStrike update causes worldwide outages​ ​

A CrowdStrike update on 19th July caused major disruption to Windows devices across the world, with Airplanes grounded and critical services unavailable.​

Cyber report spotlight: 33 million Phone Numbers Stolen In Twilio Data Breach​

​A data breach of 33 million phone numbers associated with the 2FA app Authy, has raised concerns of follow-on phishing attacks.​

Headshot
Written byDan Morrison

Top Five E5 Security features you aren’t using

We see a lot of organisations move to M365 E5 for the extra security features, but they stop after Defender for Endpoint, Defender for 365, and the extra identity security in Entra ID. E5 comes…