Uncategorized

Blog categorized as Uncategorized

“Blocked by Policy”: The Day Defender Turned on Me
Microsoft Defender may quarantine internal emails with blocked SHA256 file hashes, overriding allow lists. To avoid communication issues, regularly review and update Defender’s file hash policies in the Tenant Allow/Block List.
15.09.25 11:18 AM - Comment(s)
The AI Revolution is Here: How GTconsult is Leading the Charge (Not Following the Hype)

After decades in the tech industry- from scaring customers into filling up at my mom’s petrol station to navigating cruise ship bars, and eventually building GTconsult into a trusted Microsoft Gold Partner- I’ve witnessed countless “revolutionary” technologies come and go. But let me be crystal clea...

28.08.25 06:02 AM - Comment(s)
Critical SharePoint Zero-Day Under Mass Exploitation: The ToolShell Campaign and Why Expert Monitoring Saves Organizations 
A blog on a sophisticated zero-day exploit chain targeting Microsoft SharePoint servers has exploded into a global cybersecurity crisis. SharePoint Under Siege: ToolShell Mass Exploitation.
21.07.25 10:34 AM - Comment(s)
How to spot a 'Phishing' email and Keep Your Business Safe
A blog on tell-tale signs of a phishing email using an email received by one of our team members as an example.
11.06.25 10:19 AM - Comment(s)
Late Nights, Busy Weekends, & a Lot of Learning
A write up about our, Support Engineer's, recent exam pass. She passed the SC-900 exam.
15.05.25 09:21 AM - Comment(s)

Tags