by CPI Staff | Apr 30, 2026 | Blog, Cloud Security, Cybersecurity, Entra ID, Essential 8, Microsoft 365, Microsoft 365 Security
Every Microsoft 365 tenant tells a story. Emails flowing, Teams meetings running, SharePoint humming along. From the outside, everything looks operational. But operational is not the same as secure — and the gap between those two things is where breaches happen. When...
by CPI Staff | Apr 30, 2026 | Blog, Cybersecurity, Microsoft 365, Microsoft 365 Security, Microsoft Intune
Most Australian organisations have invested in Microsoft 365 licences, security policies, and compliance controls. But there is a gap that regularly gets overlooked — and attackers know exactly where it is. Unmanaged devices. A personal laptop, a contractor’s...
by CPI Staff | Apr 29, 2026 | Blog, Cloud Security, Cybersecurity, Microsoft 365
When our team starts a Microsoft 365 security review, we focus on the areas that quickly tell us whether an environment is well controlled, loosely managed, or quietly carrying avoidable risk. For many Australian organisations, Microsoft 365 has become the centre of...
by CPI Staff | Apr 22, 2026 | Blog, Cybersecurity, Email Security, Essential 8, Microsoft 365 Security, Microsoft Teams
A new wave of social engineering attacks is targeting Australian organisations through a channel most IT teams still treat as safe: Microsoft Teams. Threat actors are impersonating internal IT helpdesk staff, reaching users via external Teams chats and federated...
by CPI Staff | Apr 22, 2026 | Blog, Cybersecurity, Essential 8, Microsoft 365 Security, Microsoft defender XDR, Microsoft Intune
For years, Australian IT leaders treated macOS as the “quiet corner” of the fleet. A handful of executives and designers on MacBooks, a sprinkle of engineers, and a general assumption that Apple’s built-in protections were enough. That assumption no...
by CPI Staff | Apr 22, 2026 | Azure, Azure Security, Blog, Cybersecurity, Software Supply Chain Security
In this blog post, The Vercel Breach Shows Why Third-Party Hosting Belongs in Your Next Azure Well-Architected Review, we look at why platforms like Vercel, Netlify, Cloudflare Pages, and Railway can no longer sit quietly outside the governance perimeter of an...