CPI Consulting
  • About
  • Blog
  • BI-Weekly Insights
  • Microsoft Intune & Essential Eight Security
  • AI
  • Microsoft Foundry
  • Fractional CTO
Select Page
5 Signs Your Current IT Provider Isn’t Keeping Up in 2026

5 Signs Your Current IT Provider Isn’t Keeping Up in 2026

by CPI Staff | Feb 23, 2026 | Blog, Microsoft 365, Microsoft Intune

In this blog post 5 Signs Your Current IT Provider Isn’t Keeping Up in 2026 we will look at the warning signs that your IT partner is quietly falling behind—and what that means for cost, security, productivity, and compliance. If you’ve found yourself thinking, “We’re...
The Real Security Risk in AI Coding Agents for Claude Code Users

The Real Security Risk in AI Coding Agents for Claude Code Users

by CPI Staff | Feb 20, 2026 | AI Agents, Blog, Claude

In this blog post The Real Security Risk in AI Coding Agents for Claude Code Users we will walk through what actually went wrong in February’s prompt-injection fallout, why it matters to Claude Code users, and what practical controls reduce risk without banning AI...
How Claude Sonnet 4.6 Changes Claude Code Workflows for Mid‑Market Teams

How Claude Sonnet 4.6 Changes Claude Code Workflows for Mid‑Market Teams

by CPI Staff | Feb 20, 2026 | AI, Blog, Claude, Claude Sonnet

In this blog post How Claude Sonnet 4.6 Changes Claude Code Workflows for Mid‑Market Teams we will walk through what’s changed, why it matters, and how to adapt your day-to-day engineering workflows without turning your team into “prompt engineers.” If you’ve been...
Why Claude Code Is Suddenly on Every CIO’s Radar in 2026

Why Claude Code Is Suddenly on Every CIO’s Radar in 2026

by CPI Staff | Feb 20, 2026 | Blog, Claude Code

In this blog post Why Claude Code Is Suddenly on Every CIO’s Radar in 2026 we will explain what Claude Code is, why it’s getting so much attention right now, and the practical next steps to adopt it safely and profitably. Why Claude Code Is Suddenly on Every CIO’s...
OpenAI Frontier launch explained for business and technical leaders

OpenAI Frontier launch explained for business and technical leaders

by CPI Staff | Feb 20, 2026 | Blog, OpenAI

In this blog post OpenAI Frontier launch explained for business and technical leaders we will break down what OpenAI just released, why it matters, and how to assess whether it’s relevant for your organisation right now. If you’re a CIO, CTO, IT manager, or product...
OpenClaw Is Exploding in Popularity and It’s a Security Nightmare

OpenClaw Is Exploding in Popularity and It’s a Security Nightmare

by CPI Staff | Feb 20, 2026 | Blog, OpenClaw

In this blog post OpenClaw Is Exploding in Popularity and It’s a Security Nightmare we will walk through what OpenClaw actually is, why it’s spreading so fast, and why the same features that make it powerful can also make it dangerous in real-world business...
« Older Entries
Next Entries »

Recent Posts

  • Why Microsoft 365 Security Is More Than Just Turning on MFA
  • The Intune Policy Gap That Leaves Company Devices Exposed
  • How We Would Secure a Small Business Microsoft 365 Environment in 5 Days
  • The Microsoft 365 Tenant Looked Fine Until We Checked the Security Defaults
  • The Hidden Risk of Unmanaged Devices Accessing Microsoft 365
  • The First 10 Things We Check in a Microsoft 365 Security Review
  • Windows 365 and Intune Advanced Endpoint Management Give Australian IT Teams a Single Device Control Plane
  • Windows 365 and Intune Advanced Endpoint Management Give Australian IT Teams a Single Device Control Plane
  • INC Ransom’s Active Campaign Across Australia Shows Why Essential 8 ML2 Is No Longer Optional
  • Microsoft Teams Helpdesk Impersonation Attacks Are Rising. Here’s What Australian IT Teams Should Change This Week

Categories

Subscribe

Top Posts

How to Add a Registry Key to Windows 11 Using Microsoft Intune
Updating Microsoft Edge Using Intune
How to Turn Off Windows Hello in Microsoft Intune
Sync SharePoint Site Libraries with Microsoft Intune
How to Deploy a Wiz Outpost to Microsoft Azure
Setting Google Chrome as the Default Browser with Microsoft Intune
Whitelist USB Devices on Windows Using Intune
Create a Custom Extension Attribute Entra ID
Maximizing Security: When to Use Wiz Outpost with Azure
Block Copy Paste from iOS Business Apps with Intune