Uncategorized

Blog categorized as Uncategorized

The Secure Score Improvement Trap (And How to Avoid It) 
Most IT teams chase high-point Secure Score recommendations without strategy, leading to wasted effort and declining scores. Learn why "quick wins" fail, how to prioritize based on actual risk instead of points, and build sustainable improvements that stick—avoiding the trap of configuration drift.
05.02.26 08:45 PM - Comment(s)
“Blocked by Policy”: The Day Defender Turned on Me
Microsoft Defender may quarantine internal emails with blocked SHA256 file hashes, overriding allow lists. To avoid communication issues, regularly review and update Defender’s file hash policies in the Tenant Allow/Block List.
15.09.25 11:18 AM - Comment(s)
The AI Revolution is Here: How GTconsult is Leading the Charge (Not Following the Hype)

After decades in the tech industry- from scaring customers into filling up at my mom’s petrol station to navigating cruise ship bars, and eventually building GTconsult into a trusted Microsoft Gold Partner- I’ve witnessed countless “revolutionary” technologies come and go. But let me be crystal clea...

28.08.25 06:02 AM - Comment(s)
Critical SharePoint Zero-Day Under Mass Exploitation: The ToolShell Campaign and Why Expert Monitoring Saves Organizations 
A blog on a sophisticated zero-day exploit chain targeting Microsoft SharePoint servers has exploded into a global cybersecurity crisis. SharePoint Under Siege: ToolShell Mass Exploitation.
21.07.25 10:34 AM - Comment(s)
How to spot a 'Phishing' email and Keep Your Business Safe
A blog on tell-tale signs of a phishing email using an email received by one of our team members as an example.
11.06.25 10:19 AM - Comment(s)

Tags