top of page
![07.png](https://static.wixstatic.com/media/941965_9a23325c7cc74e5db2707d91f6f9b6c7~mv2.png/v1/fill/w_531,h_356,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/941965_9a23325c7cc74e5db2707d91f6f9b6c7~mv2.png)
Security Blog
Search
![The Benefits of moving to a Microsoft 365 Business Premium licence](https://static.wixstatic.com/media/941965_df4f428cf3e1461b855175e04d72b412~mv2.png/v1/fill/w_940,h_411,fp_0.50_0.50,q_95,enc_auto/941965_df4f428cf3e1461b855175e04d72b412~mv2.webp)
Sep 12, 20243 min read
The Benefits of moving to a Microsoft 365 Business Premium licence
It’s not unusual for small or medium sized businesses to want to minimise software costs and purchase the bear minimum where possible. In...
28 views
![The Value of Hiring a Security Consultant](https://static.wixstatic.com/media/941965_8f8f9640988d422880231d3544245871~mv2.png/v1/fill/w_940,h_411,fp_0.50_0.50,q_95,enc_auto/941965_8f8f9640988d422880231d3544245871~mv2.webp)
Sep 9, 20245 min read
The Value of Hiring a Security Consultant
Question: Do you really care about Cyber Security within your business, or is it seen as more of a hinderance / compliance requirement?...
40 views
![Configuring Microsoft Defender for External Attack Surface Management (EASM)](https://static.wixstatic.com/media/941965_adb4bb78350549fa8b1cae194e72e7cd~mv2.png/v1/fill/w_940,h_411,fp_0.50_0.50,q_95,enc_auto/941965_adb4bb78350549fa8b1cae194e72e7cd~mv2.webp)
Sep 6, 20242 min read
Configuring Microsoft Defender for External Attack Surface Management (EASM)
Well let's start off first with what exactly is Microsoft Defender EASM? In a nutshell, it's a capability within the Azure Portal that...
313 views
![Reducing Risks for Small / Medium Sized Companies](https://static.wixstatic.com/media/941965_7b303aab3e764aabbb14fe9a9b2e9edb~mv2.png/v1/fill/w_940,h_411,fp_0.50_0.50,q_95,enc_auto/941965_7b303aab3e764aabbb14fe9a9b2e9edb~mv2.webp)
Aug 28, 20243 min read
Reducing Risks for Small / Medium Sized Companies
Quite rightly, the Microsoft Cloud platform is purchased by individuals and companies for specific tasks, such as communication,...
39 views
![Restricting FIDO2 Passkey Use to Specific Hardware Models in Microsoft Entra](https://static.wixstatic.com/media/941965_0366ab1864c5431b88558d64bd4240a1~mv2.png/v1/fill/w_940,h_411,fp_0.50_0.50,q_95,enc_auto/941965_0366ab1864c5431b88558d64bd4240a1~mv2.webp)
Aug 26, 20241 min read
Restricting FIDO2 Passkey Use to Specific Hardware Models in Microsoft Entra
If you didn't know, Microsoft offers the option to define the type of FIDO2 Passkey device that can be used for registration in your...
3 views
![So you're thinking of moving to MS Sentinel but don't know where to start](https://static.wixstatic.com/media/941965_ca57fd2edacc49a49d93146d23e568bd~mv2.png/v1/fill/w_940,h_411,fp_0.50_0.50,q_95,enc_auto/941965_ca57fd2edacc49a49d93146d23e568bd~mv2.webp)
Aug 14, 20242 min read
So you're thinking of moving to MS Sentinel but don't know where to start
The mere thought of moving to a dedicated SIEM solution can feel daunting for many businesses at the best of times, and let's be honest...
58 views
![The Race to going Passwordless](https://static.wixstatic.com/media/941965_708b87e9ad9a437da795693101fab8bf~mv2.png/v1/fill/w_940,h_411,fp_0.50_0.50,q_95,enc_auto/941965_708b87e9ad9a437da795693101fab8bf~mv2.webp)
Aug 5, 20242 min read
The Race to going Passwordless
In the ongoing battle against malicious attacks, security vendors are having to come up with stronger solutions to secure our online...
25 views
![Are Modern Security Controls overkill or not enough?](https://static.wixstatic.com/media/941965_89be261f352e4c1b80e1f7e986eccee2~mv2.png/v1/fill/w_940,h_411,fp_0.50_0.50,q_95,enc_auto/941965_89be261f352e4c1b80e1f7e986eccee2~mv2.webp)
Jul 23, 20244 min read
Are Modern Security Controls overkill or not enough?
Security breaches have almost become the norm in the media these days, where millions upon millions of company records are either lost or...
8 views
![Defender for Servers - Staging your updates (be careful!)](https://static.wixstatic.com/media/941965_7d89c6a3d32d4dcab0265863926d9e0e~mv2.png/v1/fill/w_940,h_262,fp_0.50_0.50,q_95,enc_auto/941965_7d89c6a3d32d4dcab0265863926d9e0e~mv2.webp)
Jul 22, 20244 min read
Defender for Servers - Staging your updates (be careful!)
So you're considering deploying Microsoft Defender to your server estate, but you're concerned about controlling how often they update,...
17 views
![Buying the latest Next-Gen Security Product isn't a silver bullet solution](https://static.wixstatic.com/media/941965_ac5cccc9b0c04e0eb5dde1ea71375bf5~mv2.png/v1/fill/w_940,h_282,fp_0.50_0.50,q_95,enc_auto/941965_ac5cccc9b0c04e0eb5dde1ea71375bf5~mv2.webp)
Aug 19, 20232 min read
Buying the latest Next-Gen Security Product isn't a silver bullet solution
The IT industry has a constant stream of sales waffle and acronyms for the latest and greatest technology. Whether it's Next-gen...
82 views
![Configuring Azure PIM with Security Groups](https://static.wixstatic.com/media/941965_840ee83d8ba14f379e544c13d1dd428e~mv2.png/v1/fill/w_913,h_411,fp_0.50_0.50,q_95,enc_auto/941965_840ee83d8ba14f379e544c13d1dd428e~mv2.webp)
Aug 6, 20234 min read
Configuring Azure PIM with Security Groups
So firstly what is Azure PIM? Privileged Identity Management (PIM) is a service in Azure Active Directory (Azure AD) that enables you to...
1,109 views
![MS Defender for Endpoint Policy Tips #01 - Beware of this policy!](https://static.wixstatic.com/media/941965_48b466001b5b46108d6fb29e403e4983~mv2.png/v1/fill/w_940,h_411,fp_0.50_0.50,q_95,enc_auto/941965_48b466001b5b46108d6fb29e403e4983~mv2.webp)
Jul 15, 20234 min read
MS Defender for Endpoint Policy Tips #01 - Beware of this policy!
So you're rolling out Defender for Endpoint and you're really getting stuck in to the more complex policies under the hood with the...
547 views
![](https://static.wixstatic.com/media/941965_9c70138d346747f9901a2f94cb4d258a~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/941965_9c70138d346747f9901a2f94cb4d258a~mv2.webp)
![Defender for Identity Reporting](https://static.wixstatic.com/media/941965_9c70138d346747f9901a2f94cb4d258a~mv2.jpg/v1/fill/w_940,h_411,fp_0.50_0.50,q_90,enc_auto/941965_9c70138d346747f9901a2f94cb4d258a~mv2.webp)
Jul 8, 20231 min read
Defender for Identity Reporting
Microsoft have finally added improved reporting to the Defender for Identity capabilities, with the implementation of four new reports....
50 views
![](https://static.wixstatic.com/media/941965_9c70138d346747f9901a2f94cb4d258a~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/941965_9c70138d346747f9901a2f94cb4d258a~mv2.webp)
![Identity PowerToys](https://static.wixstatic.com/media/941965_9c70138d346747f9901a2f94cb4d258a~mv2.jpg/v1/fill/w_940,h_411,fp_0.50_0.50,q_90,enc_auto/941965_9c70138d346747f9901a2f94cb4d258a~mv2.webp)
Jul 8, 20232 min read
Identity PowerToys
Created by Merill Fernando, IdPowerToys provides a slick method to see all of your existing Conditional Access Policies in an easy to...
741 views
![](https://static.wixstatic.com/media/941965_9c70138d346747f9901a2f94cb4d258a~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/941965_9c70138d346747f9901a2f94cb4d258a~mv2.webp)
![Configuration Analyser for Microsoft 365](https://static.wixstatic.com/media/941965_9c70138d346747f9901a2f94cb4d258a~mv2.jpg/v1/fill/w_940,h_411,fp_0.50_0.50,q_90,enc_auto/941965_9c70138d346747f9901a2f94cb4d258a~mv2.webp)
May 15, 20231 min read
Configuration Analyser for Microsoft 365
Do you use Microsoft 365 for email, but aren't sure how to get the basic security controls sorted? Microsoft have you covered now with...
79 views
![Conditional Access Policies - Token Protection (currently in preview)](https://static.wixstatic.com/media/941965_73544e4fe6194811b79fedaeb3232816~mv2.png/v1/fill/w_940,h_411,fp_0.50_0.50,q_95,enc_auto/941965_73544e4fe6194811b79fedaeb3232816~mv2.webp)
Apr 2, 20232 min read
Conditional Access Policies - Token Protection (currently in preview)
Token protection helps to reduce an attack surface through binding a token to the device and preventing against "replay attacks" where a...
94 views
![](https://static.wixstatic.com/media/941965_e25616df30a94bf1830dbb72185c481d~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/941965_e25616df30a94bf1830dbb72185c481d~mv2.webp)
![Implementing FIDO2 Security Keys support for Azure Privileged Accounts](https://static.wixstatic.com/media/941965_e25616df30a94bf1830dbb72185c481d~mv2.jpg/v1/fill/w_940,h_411,fp_0.50_0.50,q_90,enc_auto/941965_e25616df30a94bf1830dbb72185c481d~mv2.webp)
Apr 1, 20233 min read
Implementing FIDO2 Security Keys support for Azure Privileged Accounts
Ever heard of Yubikeys by Yubico? Well I'm a bit of a fan myself and have used them for a variety of online accounts for many years now....
97 views
![How to install the new Microsoft Teams Client](https://static.wixstatic.com/media/941965_380af188837f485492ee1a7b67afa4ce~mv2.png/v1/fill/w_940,h_411,fp_0.50_0.50,q_95,enc_auto/941965_380af188837f485492ee1a7b67afa4ce~mv2.webp)
Mar 28, 20231 min read
How to install the new Microsoft Teams Client
Microsoft have just released a brand new Teams client in public preview with a multitude of enhancements ranging from; - Improved...
43 views
![](https://static.wixstatic.com/media/941965_9c70138d346747f9901a2f94cb4d258a~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/941965_9c70138d346747f9901a2f94cb4d258a~mv2.webp)
![Secure your Azure Subscriptions - Part 1](https://static.wixstatic.com/media/941965_9c70138d346747f9901a2f94cb4d258a~mv2.jpg/v1/fill/w_940,h_411,fp_0.50_0.50,q_90,enc_auto/941965_9c70138d346747f9901a2f94cb4d258a~mv2.webp)
Mar 11, 20231 min read
Secure your Azure Subscriptions - Part 1
There are some simple steps you can do to add a little extra security to your Azure Subscriptions to protect against accidental or...
36 views
![Azure Conditional Access Policies - Force MFA for Admin Roles](https://static.wixstatic.com/media/941965_73544e4fe6194811b79fedaeb3232816~mv2.png/v1/fill/w_940,h_411,fp_0.50_0.50,q_95,enc_auto/941965_73544e4fe6194811b79fedaeb3232816~mv2.webp)
Feb 19, 20231 min read
Azure Conditional Access Policies - Force MFA for Admin Roles
If you don't have multi-factor authentication configured for your Administrator accounts, then you're leaving your Azure environment more...
75 views
![Azure Conditional Access Policies - Prevent logging on from specific countries](https://static.wixstatic.com/media/941965_8ca3a35ef806477485e405c9456833a4~mv2.png/v1/fill/w_940,h_411,fp_0.50_0.50,q_95,enc_auto/941965_8ca3a35ef806477485e405c9456833a4~mv2.webp)
Feb 4, 20232 min read
Azure Conditional Access Policies - Prevent logging on from specific countries
Disclaimer: CA Policies can cause significant impact to business if configured incorrectly, so please ensure you takes measures to...
99 views
![](https://static.wixstatic.com/media/941965_9c70138d346747f9901a2f94cb4d258a~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/941965_9c70138d346747f9901a2f94cb4d258a~mv2.webp)
![How do I set up an Azure Test Environment?](https://static.wixstatic.com/media/941965_9c70138d346747f9901a2f94cb4d258a~mv2.jpg/v1/fill/w_940,h_411,fp_0.50_0.50,q_90,enc_auto/941965_9c70138d346747f9901a2f94cb4d258a~mv2.webp)
Dec 28, 20222 min read
How do I set up an Azure Test Environment?
Here are two options for setting up an Azure Test environment Option 1: Setting up a basic Azure Account Go to the Azure website...
88 views
![Using Chat GPT for Powershell Scripting](https://static.wixstatic.com/media/941965_34b707cc54f34b67b3c1941c5a41a415~mv2.png/v1/fill/w_940,h_411,fp_0.50_0.50,q_95,enc_auto/941965_34b707cc54f34b67b3c1941c5a41a415~mv2.webp)
Dec 27, 20222 min read
Using Chat GPT for Powershell Scripting
What's Chat GPT? Chat GPT, or Generative Pre-training Transformer, is a powerful tool that can assist in writing PowerShell scripts....
107 views
![Building a Career in Cyber Security](https://static.wixstatic.com/media/941965_ac5cccc9b0c04e0eb5dde1ea71375bf5~mv2.png/v1/fill/w_940,h_282,fp_0.50_0.50,q_95,enc_auto/941965_ac5cccc9b0c04e0eb5dde1ea71375bf5~mv2.webp)
Dec 22, 20224 min read
Building a Career in Cyber Security
These days you apparently need five years’ experience in security before the age of 12 to even be considered an entry level position...
73 views
bottom of page