by CPI Staff | May 9, 2026 | Blog, Cybersecurity, Essential 8, Microsoft 365 Security, Microsoft defender XDR
Most security incidents do not begin with a total lack of telemetry. They begin with a signal that was already there, sitting in a queue, waiting for someone to decide whether it mattered. That is the uncomfortable reality for many Microsoft 365 environments....
by CPI Staff | May 1, 2026 | Blog, Cloud Security, Cybersecurity, Entra ID, Essential 8, Microsoft 365, Microsoft 365 Security, Microsoft Intune, Microsoft Purview
When a business enables Multi-Factor Authentication and calls it “done,” they’ve taken one important step — but left the door wide open in a dozen other places. MFA blocks a significant portion of credential-based attacks. Microsoft’s own data...
by CPI Staff | Apr 30, 2026 | Blog, Cloud Security, Cyber Security Strategy & Governance, Cybersecurity, Entra ID, Essential 8, Microsoft 365, Microsoft 365 Security, Microsoft Intune, Microsoft Purview
Small businesses are not small targets. Threat actors know that organisations with fewer than 50 staff rarely have a dedicated security team. They know Microsoft 365 is the backbone of most Australian SMBs — email, files, Teams, identity. And they know most of those...
by CPI Staff | Apr 30, 2026 | Blog, Cloud Security, Cybersecurity, Entra ID, Essential 8, Microsoft 365, Microsoft 365 Security
Every Microsoft 365 tenant tells a story. Emails flowing, Teams meetings running, SharePoint humming along. From the outside, everything looks operational. But operational is not the same as secure — and the gap between those two things is where breaches happen. When...
by CPI Staff | Apr 22, 2026 | Blog, Cybersecurity, Email Security, Essential 8, Microsoft 365 Security, Microsoft Teams
A new wave of social engineering attacks is targeting Australian organisations through a channel most IT teams still treat as safe: Microsoft Teams. Threat actors are impersonating internal IT helpdesk staff, reaching users via external Teams chats and federated...
by CPI Staff | Apr 22, 2026 | Blog, Cybersecurity, Essential 8, Microsoft 365 Security, Microsoft defender XDR, Microsoft Intune
For years, Australian IT leaders treated macOS as the “quiet corner” of the fleet. A handful of executives and designers on MacBooks, a sprinkle of engineers, and a general assumption that Apple’s built-in protections were enough. That assumption no...