How not to waste your 90-day trial of Microsoft 365 E5
E5 is Microsoft 365’s premium licence tier. It provides access to all Microsoft’s best-in-class productivity apps, voice and analytical capabilities, but importantly it enables advanced Microsoft Defender security features, and the full spectrum of Microsoft compliance functionality, that many compliance
Do all roads on the zero-trust journey lead to an E5 licence?
The journey to zero trust security isn’t always a straightforward one. Many organisations are dealing with complex security landscapes including a mix of on-premises and cloud resources. These are almost inevitably secured by a variety of specialist third-party solutions, creating
5 ways to improve identity security in a hybrid environment
In our recent security article, 6 Critical Success Factors for Deploying Zero Trust, we outlined some of the challenges faced by organisations on their Zero Trust journey. Of these challenges, legacy systems are some of the trickiest to overcome. The
3 Retention benefits beyond compliance
Data retention is an essential part of every modern information protection strategy. Classifying sensitive data types, implementing policies to determine their handling, and deploying technology to enforce those policies is a process we all have to go through. Contrary to popular
Get a handle on privacy with Microsoft Priva
As a business taking part in the modern digital economy, you’re inevitably going to have to handle personal information at some point or another. Protecting this data – and the privacy of the data subject – is a substantial responsibility
6 Critical success factors for deploying Zero Trust
Our first article in this series introduced the “what” and “why” of Zero Trust. Today, we’re turning our attention to the preliminary stages of “how to”. Transitioning to Zero Trust isn’t like flipping a switch. It takes some pretty extensive groundwork
Zero Trust Security – how close are we?
The concept of “Zero Trust” was first coined by University of Stirling doctoral candidate, Stephen Paul Marsh, in 1994. It was 16 years later that Forrester Research analyst, John Kindervag, used the term “Zero Trust Model” to describe a stricter
Getting security right during tenant-to-tenant migrations
No two tenants are ever identical in their deployment of features, functionality and settings. A big part of tenant-to-tenant migration is reconciling these security and governance differences to create a robust, secure and compliant tenant at the end of the day. While
Office 365 vs Mimecast, Proofpoint & Forcepoint
5 questions you should ask when choosing your threat protection solution Not too long ago, we wrote an article on why we believe Microsoft’s Advanced Threat Protection is rendering equivalent 3rd-party solutions for Office 365 users obsolete. This opinion raised some fascinating
Microsoft’s answer to threat protection
Office 365 Advanced Threat Protection spells trouble for 3rd party solutions Email is notorious for being one the most common sources of malware and ransomware, and protecting against these cyber threats is a critical concern for most organisations. In the past, the