Insights

Read all about the latest news and insights from our industry experts focusing on advancements, developments and cybersecurity.

Poor Business IT Support Is Common, But Complacency Makes It Stick
Featured Articles

Poor Business IT Support Is Common, But Complacency Makes It Stick

How bad does your IT support need to be until you do something about it? That’s a question I’ve often asked myself when I talk to new ...

Read More

Filter by

Cybersecurity

Backup & Recovery

featured image for post: Patching: A Window Into Serious Organisation Security
Cybersecurity

Apr 8, 2026

Patching: A Window Into Serious Organisation Security

A recent report found that more than

featured image for post: The Identity Attacks Hitting Entra ID Right Now
Cybersecurity

Mar 31, 2026

The Identity Attacks Hitting Entra ID Right Now

MFA still matters, but the biggest Entra ID attacks now happen after sign-in, so if you want to see how prompt fatigue, stolen tokens, and hijacked sessions are ...

featured image for post: AI Vulnerability Detection: Why Patching Remains Vital
Cybersecurity

Mar 11, 2026

AI Vulnerability Detection: Why Patching Remains Vital

In this blog post, we address real cases of vulnerability discovery with AI but also ...

featured image for post: M365 Security 2026: What to Monitor to Stop AI Phishing
Cybersecurity

Feb 2, 2026

M365 Security 2026: What to Monitor to Stop AI Phishing

AI has made phishing faster, more convincing, and harder to spot. This guide shows what to monitor in Microsoft 365 and Entra ID, so you can detect account takeovers ...

featured image for post: Combating AI Fraud with AI Security Tools
Cybersecurity

Dec 16, 2025

Combating AI Fraud with AI Security Tools

Understanding the Rise of AI-Powered Fraud The digital landscape is continuously evolving, and with it, the sophistication of cyberthreats. AI-powered fraud ...

featured image for post: Microsoft 365 Advanced Threat Protection: Defender and Purview
Cybersecurity

Dec 11, 2025

Microsoft 365 Advanced Threat Protection: Defender and Purview

In this blog post, we'll compare the two suites and give you some guidance which could be right for you. Contents

featured image for post: Advanced Threat Protection for SMBs
Cybersecurity

Dec 9, 2025

Advanced Threat Protection for SMBs

Discover how cloud-based advanced threat protection for Microsoft 365 is transforming cybersecurity in your industry, safeguarding sensitive operations and ...

featured image for post: BYOD Security Risks: Emails on Personal Phones
Cybersecurity

Nov 17, 2025

BYOD Security Risks: Emails on Personal Phones

Table of Contents The Hidden Risks of Unmanaged Devices

featured image for post: Zero Trust: What It Means, And Why You Need It Now in Microsoft 365
Cybersecurity

Nov 10, 2025

Zero Trust: What It Means, And Why You Need It Now in Microsoft 365

Table of Contents The Evolution of Cybersecurity

featured image for post: Microsoft 365 Cloud Backup is Your Responsibility
Cybersecurity
Backup & Recovery

Nov 5, 2025

Microsoft 365 Cloud Backup is Your Responsibility

Table of Contents Understanding Shared Responsibility in Microsoft 365

featured image for post: Patching Best Practices for Windows, M365 & Third-Party Software
Cybersecurity

Oct 28, 2025

Patching Best Practices for Windows, M365 & Third-Party Software

While out-of-date software is one of the most common vulnerabilities and organisations, how to patch effectively and efficiently is an art in itself. Table of ...

featured image for post: Secure Microsoft 365 Before a Cyber Breach Occurs
Cybersecurity

Sep 29, 2025

Secure Microsoft 365 Before a Cyber Breach Occurs

Table of Contents The Rising Tide of Cyber Breaches: A Look at the Numbers