by CPI Staff | May 14, 2026 | Blog, Cybersecurity, Microsoft 365
Most phishing discussions still focus on user awareness. That matters, but it is not enough. The real issue for most Australian businesses is that phishing is no longer just a bad email with poor spelling. It is impersonation, credential theft, malicious links that...
by CPI Staff | May 13, 2026 | Blog, Cyber Security Strategy & Governance, Cybersecurity, Endpoint Security, Microsoft 365 Security, Microsoft defender XDR
Most breaches do not begin with a sudden, dramatic attack. They begin with a series of signals that were already visible — sitting in a security platform, waiting for someone to act on them. For Australian businesses running Microsoft 365, those signals are already...
by CPI Staff | May 9, 2026 | Blog, Cybersecurity, Essential 8, Microsoft 365 Security, Microsoft defender XDR
Most security incidents do not begin with a total lack of telemetry. They begin with a signal that was already there, sitting in a queue, waiting for someone to decide whether it mattered. That is the uncomfortable reality for many Microsoft 365 environments....
by CPI Staff | May 1, 2026 | Blog, Cloud Security, Cybersecurity, Entra ID, Essential 8, Microsoft 365, Microsoft 365 Security, Microsoft Intune, Microsoft Purview
When a business enables Multi-Factor Authentication and calls it “done,” they’ve taken one important step — but left the door wide open in a dozen other places. MFA blocks a significant portion of credential-based attacks. Microsoft’s own data...
by CPI Staff | Apr 30, 2026 | Blog, Cybersecurity, Endpoint Security, Microsoft Intune
Most organisations assume that once their devices are enrolled in Microsoft Intune, those devices are secure. That assumption is wrong — and it’s costing them. There is a default configuration in Intune that silently marks every device without a compliance...
by CPI Staff | Apr 30, 2026 | Blog, Cloud Security, Cyber Security Strategy & Governance, Cybersecurity, Entra ID, Essential 8, Microsoft 365, Microsoft 365 Security, Microsoft Intune, Microsoft Purview
Small businesses are not small targets. Threat actors know that organisations with fewer than 50 staff rarely have a dedicated security team. They know Microsoft 365 is the backbone of most Australian SMBs — email, files, Teams, identity. And they know most of those...