<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.gtconsult.com/blogs/protection/feed" rel="self" type="application/rss+xml"/><title>GTconsult - Blog , Protection</title><description>GTconsult - Blog , Protection</description><link>https://www.gtconsult.com/blogs/protection</link><lastBuildDate>Tue, 31 Mar 2026 19:10:13 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[SharePoint CSP: Lessons Learned After Enforcement]]></title><link>https://www.gtconsult.com/blogs/post/sharepoint-csp-lessons-learned-after-enforcement</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/ff.png"/>CSP enforcement went live 1 March 2026. Here's what actually broke, what held up fine, and what every SharePoint environment can learn from the aftermath.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_Q6SZuOenRqiDkCfrsU0N4Q" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_NmnIylMfQPqheGXhzNLHMQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_L_ax5l0hR3yT5B--e0CSeA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_uUa3_U0GSC2E3hsu6cj1SA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span><span>1 March came and went. Here's what actually broke, what held up fine, and what everyone who was &quot;planning to deal with it later&quot; is dealing with right now.</span></span></p></div>
</div><div data-element-id="elm_YoFmLtA41Kja8z_ERT5vNQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_YoFmLtA41Kja8z_ERT5vNQ"] .zpimage-container figure img { width: 754px !important ; height: 424px !important ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/ff.png" size="custom" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_FlA9Xv0yH7eALNPgQEOKwQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span>Microsoft's SharePoint Online Content Security Policy enforcement went live on 1 March 2026. For teams that had prepared, audited their violations, refactored inline scripts, registered trusted sources: it was a non-event. For those who hadn't, it was a rough Monday morning. This post captures what we've seen in the aftermath: what broke, what didn't, and what the experience teaches us about managing security changes in a modern SharePoint environment.</span></span></p></div>
</div></div></div></div></div><div data-element-id="elm_4Uc-2ob9fuW9PZ5xgrWcSQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Q7luIxAdNeysCMZzJPxl0A" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_b5alVDLHoQH9iRjLnTBaAg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_CSMKF17qOBxt4w6xsSzWjQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong>What Actually Broke</strong></h3></div>
</div></div></div></div><div data-element-id="elm_5vbdPeSXnUrmXkJhoL_wwg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_SKEtigDZdosX7RqEGAx_vQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_zsDv8xZ2p_HFvEMhDx8Omw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_GUepag85OQ-ITOevYXbZYg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_GUepag85OQ-ITOevYXbZYg"].zpelem-text { border-style:solid; border-color:#E21D1D !important; border-block-start-width:3px; border-inline-end-width:0px; border-block-end-width:0px; border-inline-start-width:0px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span style="color:rgb(180, 45, 45);"><br/></span></p><p><span style="color:rgb(180, 45, 45);">Commonly Affected</span></p></div>
</div><div data-element-id="elm_5q7oWbhJPBnO9i3S7CJIhA" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_5q7oWbhJPBnO9i3S7CJIhA"] .zpimageheadingtext-container figure img { width: 52px !important ; height: 52px !important ; } } @media (max-width: 767px) { [data-element-id="elm_5q7oWbhJPBnO9i3S7CJIhA"] .zpimageheadingtext-container figure img { width:50px ; height:50px ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-left zpimage-mobile-align-left zpimage-size-custom zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium zpimage-text-seperate-line "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/23.png" width="50" height="50" loading="lazy" size="custom" data-lightbox="false"/></picture></span></figure><div class="zpimage-headingtext-container"><h4 class="zpimage-heading zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left" data-editor="true"><span>Inline Scripts in Content Editor Web Parts</span><br/>​</h4><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p><span><span>Classic content editor web parts with embedded JavaScript were one of the most common failure points. Many organisations had years-old scripts sitting in these parts that nobody had touched, and nobody realised were inline until they stopped working.</span></span></p></div>
</div></div></div></div><div data-element-id="elm_yPXKyKdYbIj-uxTXpO71gg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_7bCNpHgoS0Bn1euXrHX3XA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_7bCNpHgoS0Bn1euXrHX3XA"].zpelem-text { border-style:solid; border-color:#E21D1D !important; border-block-start-width:3px; border-inline-end-width:0px; border-block-end-width:0px; border-inline-start-width:0px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span style="color:rgb(180, 45, 45);"><br/></span></p><p><span style="color:rgb(180, 45, 45);">Commonly Affected</span></p></div>
</div><div data-element-id="elm_VsLjvQMP9aFZOSOjT2qZ2Q" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_VsLjvQMP9aFZOSOjT2qZ2Q"] .zpimageheadingtext-container figure img { width: 50px !important ; height: 50px !important ; } } @media (max-width: 767px) { [data-element-id="elm_VsLjvQMP9aFZOSOjT2qZ2Q"] .zpimageheadingtext-container figure img { width:50px ; height:50px ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-left zpimage-mobile-align-left zpimage-size-custom zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium zpimage-text-seperate-line "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/24.png" width="50" height="50" loading="lazy" size="custom" data-lightbox="false"/></picture></span></figure><div class="zpimage-headingtext-container"><h4 class="zpimage-heading zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left" data-editor="true"><span>Third-Party Integrations Using Dynamic Injection<br/></span></h4><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p><span><span>Analytics tools, chatbots, CRM connectors, and similar third-party solutions that inject scripts dynamically at runtime without pre-registration were blocked. Some vendors had updated their SharePoint integrations ahead of enforcement; others hadn't.</span></span></p></div>
</div></div></div></div><div data-element-id="elm_qInmHVpg5hqcmory-Of-yA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_kAdd6MxMSynBnsjmaJJZEw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_kAdd6MxMSynBnsjmaJJZEw"].zpelem-text { border-style:solid; border-color:#F1C40F !important; border-block-start-width:3px; border-inline-end-width:0px; border-block-end-width:0px; border-inline-start-width:0px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span style="color:rgb(180, 45, 45);"><br/></span></p><p><span style="color:rgb(241, 196, 15);">Partially Affected</span></p></div>
</div><div data-element-id="elm_mRRLIBsJvobvX52pk-4DEg" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_mRRLIBsJvobvX52pk-4DEg"] .zpimageheadingtext-container figure img { width: 47px !important ; height: 47px !important ; } } @media (max-width: 767px) { [data-element-id="elm_mRRLIBsJvobvX52pk-4DEg"] .zpimageheadingtext-container figure img { width:50px ; height:50px ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-left zpimage-mobile-align-left zpimage-size-custom zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium zpimage-text-seperate-line "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/25.png" width="50" height="50" loading="lazy" size="custom" data-lightbox="false"/></picture></span></figure><div class="zpimage-headingtext-container"><h4 class="zpimage-heading zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left" data-editor="true"><span>Custom SPFx Web Parts with Dynamic Loading<br/></span></h4><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p><span><span>Web parts using&nbsp; </span><code>SPComponentLoader.loadScript()</code><span>&nbsp;to pull in external libraries at runtime worked fine if those sources were pre-registered in Trusted Script Sources, and broke if they weren't. The split outcome here caught some teams off guard who assumed their SPFx solutions were automatically safe.</span></span></p></div>
</div></div></div></div></div><div data-element-id="elm_hV5ZFuicEXZdQjCvwHj7hw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_SLhKS1VIn_LnXlY2zK91Iw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_SEFA-LZ5-Gpb0wrHC537uw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_SEFA-LZ5-Gpb0wrHC537uw"] div.zpspacer { height:33px; } @media (max-width: 768px) { div[data-element-id="elm_SEFA-LZ5-Gpb0wrHC537uw"] div.zpspacer { height:calc(33px / 3); } } </style><div class="zpspacer " data-height="33"></div>
</div></div></div><div data-element-id="elm_avkD92zJNqVyFjTKCqzluQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_l3PJoMyQSrujx2V-pERbAw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_Xf6kvrjtppshCMGxzixi9g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Xf6kvrjtppshCMGxzixi9g"].zpelem-text { border-style:solid; border-color:#A6CE39 !important; border-block-start-width:3px; border-inline-end-width:0px; border-block-end-width:0px; border-inline-start-width:0px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span style="color:rgb(180, 45, 45);"><br/></span></p><p><span style="color:rgb(166, 206, 57);">Unaffected</span></p></div>
</div><div data-element-id="elm_micSr6onUofH0l6Xh_buSA" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_micSr6onUofH0l6Xh_buSA"] .zpimageheadingtext-container figure img { width: 52px !important ; height: 52px !important ; } } @media (max-width: 767px) { [data-element-id="elm_micSr6onUofH0l6Xh_buSA"] .zpimageheadingtext-container figure img { width:50px ; height:50px ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-left zpimage-mobile-align-left zpimage-size-custom zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium zpimage-text-seperate-line "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/26.png" width="50" height="50" loading="lazy" size="custom" data-lightbox="false"/></picture></span></figure><div class="zpimage-headingtext-container"><h4 class="zpimage-heading zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left" data-editor="true"><span>Standard SPFx Bundles via cdnBasePath or externals<br/></span></h4><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p><span><span>Solutions deployed through proper SPFx packaging, bundles referenced via&nbsp;<span style="background-color:rgb(0, 27, 76);color:rgb(166, 206, 57);font-family:&quot;Courier New&quot;, monospace;">&nbsp;</span></span><code style="background-color:rgb(0, 27, 76);color:rgb(166, 206, 57);font-family:&quot;Courier New&quot;, monospace;">cdnBasePath&nbsp;</code><span>&nbsp;or external libraries declared in&nbsp;<span style="background-color:rgb(0, 27, 76);color:rgb(166, 206, 57);font-family:&quot;Courier New&quot;, monospace;">&nbsp;</span></span><code style="background-color:rgb(0, 27, 76);color:rgb(166, 206, 57);font-family:&quot;Courier New&quot;, monospace;">config.json&nbsp;</code><span>, were automatically added to Trusted Script Sources on installation and were entirely unaffected by enforcement.</span></span></p></div>
</div></div></div></div><div data-element-id="elm_RWoaloQBiSIXdiArZcHRbQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_-_4Ze6htLK7-1apUCiyN-Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-_4Ze6htLK7-1apUCiyN-Q"].zpelem-text { border-style:solid; border-color:#A6CE39 !important; border-block-start-width:3px; border-inline-end-width:0px; border-block-end-width:0px; border-inline-start-width:0px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span style="color:rgb(180, 45, 45);"><br/></span></p><p><span style="color:rgb(166, 206, 57);">Unaffected</span></p></div>
</div><div data-element-id="elm_e3HEFndZRDUhMwa6Tc1YcQ" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_e3HEFndZRDUhMwa6Tc1YcQ"] .zpimageheadingtext-container figure img { width: 50px !important ; height: 50px !important ; } } @media (max-width: 767px) { [data-element-id="elm_e3HEFndZRDUhMwa6Tc1YcQ"] .zpimageheadingtext-container figure img { width:50px ; height:50px ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-left zpimage-mobile-align-left zpimage-size-custom zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium zpimage-text-seperate-line "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/27.png" width="50" height="50" loading="lazy" size="custom" data-lightbox="false"/></picture></span></figure><div class="zpimage-headingtext-container"><h4 class="zpimage-heading zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left" data-editor="true"><span>Classic SharePoint Pages</span><br/>​</h4><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p><span><span>CSP enforcement only applies to modern SharePoint pages. Organisations still running classic team sites or publishing sites were not affected, though the long-term trajectory of classic SharePoint remains what it is.</span></span></p></div>
</div></div></div></div></div><div data-element-id="elm_H0GKtjD1tr9ygt2yiS2PnQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_r9SiVr8xz1BIoDk5rpUHaw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_yOGUyNOtBU-b-qARTuOKkQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_yOGUyNOtBU-b-qARTuOKkQ"].zpelem-text { background-color:#ECF0F1; background-image:unset; border-style:solid; border-color:#A6CE39 !important; border-block-start-width:0px; border-inline-end-width:0px; border-block-end-width:0px; border-inline-start-width:5px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><p></p></blockquote><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span style="color:rgb(166, 206, 57);font-size:12px;"></span></blockquote><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div><span style="margin-bottom:6px;font-weight:700;color:rgb(166, 206, 57);"><br/></span></div><div><span style="margin-bottom:6px;font-weight:700;color:rgb(166, 206, 57);"></span></div></blockquote><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div>Still running classic SharePoint? CSP is one of many reasons the clock is ticking. Our Support Manager Barend Olivier walks through exactly what's at stake and how to move forward in our on-demand webinar, Migration &amp; Modernization: From Legacy to Modern.</div></blockquote><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span><span></span></span></blockquote><div><span><span><br/></span></span></div></div>
</div><div data-element-id="elm_x0sevVGayWLJKEfb_re6sQ" data-element-type="video" class="zpelement zpelem-video "><style type="text/css"> @media (max-width: 767px) { [data-element-id="elm_x0sevVGayWLJKEfb_re6sQ"].zpelem-video iframe.zpvideo{ width:560px !important; height:315px !important; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_x0sevVGayWLJKEfb_re6sQ"].zpelem-video iframe.zpvideo{ width:560px !important; height:315px !important; } } </style><div class="zpvideo-container zpiframe-align-center zpiframe-mobile-align-center zpiframe-tablet-align-center"><iframe class="zpvideo " width="560" height="315" src="https://www.youtube.com/embed/X3b2vhnFsPI?si=11oPQW0TvV7aJPv5" frameborder="0" allowfullscreen></iframe></div>
</div></div></div></div></div><div data-element-id="elm_wujIyeaIWe3HHGkdkbi7uA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Gy79vhUoZVk4Tvk9DoiKDw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_2lynVZF7SbwzbsK_ets-lQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_8tp7cp-NYNJRiECQ6P7FlA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong>The Common Thread in Failures</strong></h3></div>
<div data-element-id="elm_Fhxzjl2tFZYbCytcJt6sbA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p style="margin-bottom:20px;">Looking across the common failure patterns, there's a single theme:&nbsp;<strong>legacy script patterns that nobody had revisited in years</strong>. The solutions that broke were rarely recently built, they were older integrations, older web parts, scripts embedded when SharePoint was configured years ago and then forgotten.</p><p style="margin-bottom:20px;">CSP enforcement didn't create new problems; it surfaced old ones. That's actually the point. The report-only window from late 2025 through 28 February was designed exactly for this: a chance to audit before enforcement hit. Teams that used that window had nothing to worry about on 1 March. Teams that didn't are doing triage now.</p></div><p></p></div>
</div><div data-element-id="elm_SJMHmb6Sfh5sCO4bCl5HUw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong><span>The Fix Is Usually Simpler Than It Sounds</span></strong></h3></div>
<div data-element-id="elm_f2XQpFGAV_2w3sf4yeyngw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div>One of the more reassuring findings: for most organisations, the actual remediation work is not as complex as it sounds once you know what you're dealing with. The common fixes are:</div><div><br/></div></div><p></p><ul><li>Inline scripts: Extract into a&nbsp;<span style="background-color:rgb(0, 27, 76);color:rgb(166, 206, 57);font-family:&quot;Courier New&quot;, monospace;"> .js file </span>, host it somewhere trusted, update the reference. An afternoon of work in most cases.</li><li>Untrusted external sources: Add the domain to Trusted Script Sources in SharePoint Admin Center. A few minutes per source.</li><li>Third-party vendor tools: Contact the vendor. Most major vendors had CSP-compliant updates available before enforcement, it's usually a version upgrade.</li></ul><div><div></div><br/><div>The difficulty isn't the fix itself. It's the discovery: knowing which scripts exist, where they live, and what they load. That's why the Purview audit log is so valuable, run a search for &quot;Violated Content Security Policy&quot; to get the full map.</div></div></div>
</div><div data-element-id="elm_OL9VoIPz5uQOqdghTodhTw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong><span><span>What This Tells Us About Security Governance</span></span></strong></h3></div>
<div data-element-id="elm_5nmpUES4L_exdqK82aUJ7A" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_5nmpUES4L_exdqK82aUJ7A"] .zpimagetext-container figure img { width: 407px !important ; height: 271px !important ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/laptop-with-antivirus-shield-hologram-web-safety-2026-03-26-05-09-23-utc.jpg" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p></p><div><p style="margin-bottom:20px;">CSP enforcement is a useful lens on a broader question: how well do organisations actually know what JavaScript is running in their SharePoint environment? For many, the honest answer before 1 March was &quot;not very well.&quot; Scripts accumulate over years of SharePoint growth, solutions built by people who've left, integrations set up for projects long since finished, vendor tools added during evaluations that never quite got removed.</p><p style="margin-bottom:20px;">CSP enforcement forced an audit that should have been happening on an ongoing basis. The silver lining: teams that went through the remediation process now have a much cleaner, better-documented picture of their SharePoint script landscape than they did before.</p></div><p></p></div>
</div></div><div data-element-id="elm_7jeMlHaduwfau0u19N-Hcg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_7jeMlHaduwfau0u19N-Hcg"].zpelem-text { background-color:#ECF0F1; background-image:unset; border-style:solid; border-color:#A6CE39 !important; border-block-start-width:0px; border-inline-end-width:0px; border-block-end-width:0px; border-inline-start-width:5px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><p></p></blockquote><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span style="color:rgb(166, 206, 57);font-size:12px;"></span></blockquote><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div><span style="margin-bottom:6px;font-weight:700;color:rgb(166, 206, 57);"><br/></span></div><div><span style="margin-bottom:6px;font-weight:700;color:rgb(166, 206, 57);"></span></div></blockquote><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div><span style="margin-bottom:8px;font-weight:600;color:rgb(166, 206, 57);">If You're Still Cleaning Up</span></div></blockquote><div><div><br/></div></div><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span><span></span></span></blockquote><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span><span>Check your Purview audit log, work through violations methodically, and use&nbsp;<span style="background-color:rgb(0, 27, 76);color:rgb(166, 206, 57);font-family:&quot;Courier New&quot;, monospace;">&nbsp;</span></span><code style="background-color:rgb(0, 27, 76);color:rgb(166, 206, 57);font-family:&quot;Courier New&quot;, monospace;">?csp=enforce</code><span><span style="background-color:rgb(0, 27, 76);color:rgb(166, 206, 57);font-family:&quot;Courier New&quot;, monospace;">&nbsp;</span> on individual pages to verify fixes. If you're on the 90-day delay, enforcement hits&nbsp;</span><a href="https://www.claudeusercontent.com/?domain=claude.ai&amp;parentOrigin=https%3A%2F%2Fclaude.ai&amp;errorReportingMode=parent&amp;formattedSpreadsheets=true#">1 June 2026</a><span>. Use the time you have.</span></span></blockquote><div><span><span><br/></span></span></div></div>
</div><div data-element-id="elm_Vkih9OF3of4bUesSpw_vow" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Vkih9OF3of4bUesSpw_vow"].zpelem-text { background-color:#ECF0F1; background-image:unset; border-style:solid; border-color:#A6CE39 !important; border-block-start-width:0px; border-inline-end-width:0px; border-block-end-width:0px; border-inline-start-width:5px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><p></p></blockquote><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span style="color:rgb(166, 206, 57);font-size:12px;"></span></blockquote><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div><blockquote style="margin-left:40px;border:none;"><p></p></blockquote><blockquote style="margin-left:40px;border:none;"><span style="color:rgb(166, 206, 57);font-size:12px;"></span></blockquote><blockquote style="margin-left:40px;border:none;"><div><span style="margin-bottom:6px;font-weight:700;color:rgb(166, 206, 57);"><br/></span></div><div><span style="margin-bottom:6px;font-weight:700;color:rgb(166, 206, 57);"></span></div></blockquote><blockquote style="margin-left:40px;border:none;"><div><span style="margin-bottom:6px;font-weight:700;color:rgb(0, 27, 76);">Further Reading</span></div></blockquote><div><br/></div><blockquote style="margin-left:40px;border:none;"></blockquote><blockquote style="margin-left:40px;border:none;"><a href="https://www.gtconsult.com/blogs/post/sharepoint-csp-enforcement-is-live-%E2%80%94-here-s-what-to-do-if-your-scripts-are-broken" title="SharePoint CSP Enforcement Is Live — Here's What to Do If Your Scripts Are Broken" target="_blank" rel="">SharePoint CSP Enforcement Is Live — Here's What to Do If Your Scripts Are Broken</a></blockquote><blockquote style="margin-left:40px;border:none;"><a href="https://www.gtconsult.com/blogs/post/still-on-the-90-day-csp-delay-your-1-june-deadline-is-coming" title="Still on the 90-Day CSP Delay? Your 1 June Deadline Is Coming" target="_blank" rel="">Still on the 90-Day CSP Delay? Your 1 June Deadline Is Coming</a><a href="https://www.gtconsult.com/blogs/post/still-on-the-90-day-csp-delay-your-1-june-deadline-is-coming" title="Still on the 90-Day CSP Delay? Your 1 June Deadline Is Coming" target="_blank" rel=""><br/></a></blockquote><blockquote style="margin-left:40px;border:none;"><a href="https://learn.microsoft.com/en-us/sharepoint/dev/spfx/content-securty-policy-trusted-script-sources">Support for CSP in SharePoint Online, Microsoft Learn<br/></a><a href="https://techcommunity.microsoft.com/blog/spblog/sharepoint-online-content-security-policy-csp-enforcement-dates-and-guidance/4472662">SharePoint Online CSP: Enforcement Dates and Guidance, Microsoft Tech Community</a></blockquote><blockquote style="margin-left:40px;border:none;"><br/></blockquote><div><br/></div></div></blockquote></div>
</div></div></div></div></div><div data-element-id="elm_6hHgYCt7GskgrPKfG8eEeg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_5o9tyqS5DYa8Rs-lzUeMvg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_bMqOVNOWc8vB8_07M3LnoQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_FgEBQeenEgCcCZdqqZW0nw" data-element-type="box" class="zpelem-box zpelement zpbox-container zpdark-section zpdark-section-bg "><style type="text/css"> [data-element-id="elm_FgEBQeenEgCcCZdqqZW0nw"].zpelem-box{ background-color:#001B4C; background-image:unset; } </style><div data-element-id="elm_J3T9wRE7uIRA18o-Xl8dEg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-center zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong>Need our help?</strong><br/></h3></div>
<div data-element-id="elm_Wul5Nibzk63HvmqhW9GsWA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div style="text-align:center;margin-bottom:8px;"><div><p style="margin-bottom:28px;font-style:italic;"><span style="font-size:16px;">Chat to us and let's help you navigate this change.</span></p><span style="font-weight:700;"><a href="https://www.gtconsult.com/contact"></a></span></div></div><p></p></div>
</div><div data-element-id="elm_crCLYMwiUWYuNcQcqs795Q" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_crCLYMwiUWYuNcQcqs795Q"].zpelem-button{ margin-block-start:-5px; } </style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="https://outlook.office.com/bookwithme/user/6bd34779624c4a8ab5f3906f5e71baf7%40gtconsult.com/meetingtype/Cfseq1rTWEyZRk62iTNVAw2?anonymous&amp;ismsaljsauthenabled=true"><span class="zpbutton-content">Book a Free Consultation with Our Technical Account Manager, Trevin</span></a></div>
</div><div data-element-id="elm_jOXcQOq4phuaRlzAOuEquA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_jOXcQOq4phuaRlzAOuEquA"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_jOXcQOq4phuaRlzAOuEquA"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 31 Mar 2026 14:28:53 +0000</pubDate></item><item><title><![CDATA[Still on the 90-Day CSP Delay? Your 1 June Deadline Is Coming]]></title><link>https://www.gtconsult.com/blogs/post/still-on-the-90-day-csp-delay-your-1-june-deadline-is-coming</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/HH.png"/>Still on the 90-day CSP delay? Your SharePoint Online enforcement deadline is 1 June 2026. Here's your 8-week action plan to audit violations, fix scripts, and test before the window closes.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_eP5YOwKNSrqbahK8CEdiQA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_BzFHOmS6RROIhaqlaWh3nA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_nISarZm9R1Ckzb_WbfTitg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Ub5ABqLdR9-FylpHZrx5vQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span><span style="font-style:italic;">If your organisation opted into Microsoft's enforcement delay back in February, the window is closing. Here's everything you need to do before 1 June, and why the time to start is now, not May</span></span></p></div>
</div><div data-element-id="elm_dBxUcpgTjzwyeUr3DX8OBQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_dBxUcpgTjzwyeUr3DX8OBQ"] .zpimage-container figure img { width: 770px !important ; height: 433px !important ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/HH.png" size="custom" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div><div data-element-id="elm_WSrxBzjT5CfsxXqmDLge2g" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Y3FtJkZ_Fv454pKS6SQW6g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_vUw-S8Upiti5CapZN-fOmw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_TsSD7nEU3KBRCKf09eNBXA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p style="margin-bottom:20px;">When Microsoft announced SharePoint Online's Content Security Policy enforcement in early 2026, they included a lifeline for organisations that needed more time: a&nbsp;<code>Set-SPOTenant -DelayContentSecurityPolicyEnforcement $true</code>&nbsp;flag that pushed enforcement from 1 March to&nbsp;<span style="font-weight:600;">1 June 2026</span>. If your IT team enabled that flag, you bought yourself 90 days.</p><p style="margin-bottom:20px;">Those 90 days are now running out.</p><p style="margin-bottom:20px;">The purpose of the delay was to give organisations time to audit their environments, fix non-compliant scripts, and test changes, not to skip preparation entirely. If you haven't started yet, this post is your starting gun.</p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_fHwr4ShVkzQ1UONfXB6fTA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_rd-85g3wcjEDxqohf_55ow" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_ujtcD5FTjFye2mnVMw0dKQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_OVixK-nTcjZKFq0mEmfDvQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong>What Happens on 1 June</strong></h3></div>
<div data-element-id="elm_l_1rUXou8GqCdFk2Id9rag" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_l_1rUXou8GqCdFk2Id9rag"] .zpimagetext-container figure img { width: 511px !important ; height: 341px !important ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/wooden-block-calendar-with-date-may-1-on-the-yello-2026-03-24-06-29-57-utc.jpg" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p></p><div><div>On 1 June 2026, the enforcement delay expires automatically. There is no second delay option. After that date, CSP enforcement behaves exactly as it does for everyone else who went live 1 March:</div></div><p></p><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><ul><li>Inline JavaScript will be blocked on all modern SharePoint Online pages.</li><li>Scripts loaded from external sources not registered in your Trusted Script Sources list will be blocked.</li><li>Users will see broken web parts, missing functionality, and JavaScript errors with no visual warning that CSP is the cause.</li></ul></blockquote></blockquote><div><div><br/></div><div>The failure mode is silent from a user perspective: a web part just stops working. The only indication is in the browser console, which most end users will never open. That's why preparation before 1 June matters: there's no grace period, no warning message, and no automatic recovery.</div></div></div>
</div></div><div data-element-id="elm_vVTjvaYNjjqsl5c6BcpR7A" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong>Check Whether You're on the Delay</strong></h3></div>
<div data-element-id="elm_mAd6ToZty12QUOPb4HmZ-w" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span>If you're not certain whether your tenant enabled the delay, check it now via PowerShell:</span></span></p></div>
</div><div data-element-id="elm_ptso2aVAuT7leULuUlCsAQ" data-element-type="box" class="zpelem-box zpelement zpbox-container zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_ptso2aVAuT7leULuUlCsAQ"].zpelem-box{ margin-block-start:-2px; } </style><div data-element-id="elm_ABsc7FG80a-u9zKgcIbeww" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ABsc7FG80a-u9zKgcIbeww"].zpelem-text { background-color:#001B4C; background-image:unset; border-style:solid; border-color:#A6CE39 !important; border-block-start-width:0px; border-inline-end-width:0px; border-block-end-width:0px; border-inline-start-width:5px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><p></p><div><pre style="margin-bottom:28px;"><br/><span style="color:rgb(166, 206, 57);">Get-SPOTenant | Select-Object DelayContentSecurityPolicyEnforcement</span></pre></div><p></p></blockquote></div>
</div><div data-element-id="elm_ai5wS71Rr-Uk1ajQ9Vao8Q" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span>If the value returns&nbsp;</span><code>True</code><span>, enforcement is delayed until 1 June. If it returns&nbsp;</span><code>False</code><span>, enforcement was already live on 1 March. Check whether anything broke in your environment around that date.</span></span></p></div>
</div></div></div></div></div></div><div data-element-id="elm_Nenw7td7E8Vcp0PxI95Gsw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_HQa_EGP5Krt1Yt4ShdI_cg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_-8aKbiND671QXMe0HXcrHA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_WAWdnhdvchGT3E9a1_1mnA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong>Your Action Plan: The Next 8 Weeks</strong></h3></div>
</div></div></div></div><div data-element-id="elm_Ga_iE1bhXKzoEZZoJBSWwQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_7rAiNcPZj5hm5LhADvofqg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_xwE1mnwpbKDgLfgMRo9tXQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_9CpVZvT0zpcskTlmd9JK3w" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_9CpVZvT0zpcskTlmd9JK3w"] .zpimage-container figure img { width: 540px ; height: 303.75px ; } } @media (max-width: 767px) { [data-element-id="elm_9CpVZvT0zpcskTlmd9JK3w"] .zpimage-container figure img { width:415px ; height:277.36px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/wEEK%20-2-.png" width="415" height="277.36" loading="lazy" size="fit"/></picture></span></figure></div>
</div><div data-element-id="elm_CRVLL7qBZG0TooyXt6x6cA" data-element-type="box" class="zpelem-box zpelement zpbox-container zspadding-space-allside-thin zplight-section zplight-section-bg "><style type="text/css"></style><div data-element-id="elm_JExDJGFXV4mDlMT1Rarrow" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong>Week 1–2: Audit</strong><br/></h4></div>
<div data-element-id="elm_UUIBIka0XaVrHqODZmYf3g" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p style="margin-bottom:20px;">Before you can fix anything, you need to know what's broken. Two tools:</p><ul><li style="margin-bottom:8px;"><span style="font-weight:600;">Microsoft Purview:</span>&nbsp;Search the audit log for&nbsp;<span style="font-weight:600;">&quot;Violated Content Security Policy&quot;</span>. This returns a tenant-wide list of every page and script source that triggered a CSP violation during the report-only window. This is your master list.</li><li style="margin-bottom:8px;"><span style="font-weight:600;">Browser console +&nbsp;<code>?csp=enforce</code>:</span>&nbsp;Append&nbsp;<code>?csp=enforce</code>&nbsp;to any modern page URL to force enforcement mode. Open Developer Tools (F12) and check the Console tab for blocked script errors. Use this to verify specific pages.</li></ul></div><p></p></div>
</div><div data-element-id="elm_m-U_DY5d4GsZVr4IipHvNQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_m-U_DY5d4GsZVr4IipHvNQ"].zpelem-text { background-color:#ECF0F1; background-image:unset; border-style:solid; border-color:#A6CE39 !important; border-block-start-width:0px; border-inline-end-width:0px; border-block-end-width:0px; border-inline-start-width:5px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><p></p></blockquote><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span style="color:rgb(166, 206, 57);font-size:12px;"></span></blockquote><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div><span style="margin-bottom:6px;font-weight:700;color:rgb(166, 206, 57);"><br/></span></div><div><span style="margin-bottom:6px;font-weight:700;color:rgb(166, 206, 57);">Don't Skip the Audit</span></div></blockquote><div><div></div></div><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span><span>The most common mistake teams make is fixing the scripts they know about and missing the ones they don't. The Purview audit log is the only way to surface violations across your entire tenant, including pages and solutions built by people who may no longer be on the team.</span></span></blockquote><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><p></p></blockquote><div><span><span><br/></span></span></div></div>
</div></div></div><div data-element-id="elm_nvIe16gcvvdn4vklKVVPyA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_vw0JMV39bKdHMNf9RTNh7A" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_vw0JMV39bKdHMNf9RTNh7A"] .zpimage-container figure img { width: 540px ; height: 303.75px ; } } @media (max-width: 767px) { [data-element-id="elm_vw0JMV39bKdHMNf9RTNh7A"] .zpimage-container figure img { width:415px ; height:276.67px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/wEEK%20-3-.png" width="415" height="276.67" loading="lazy" size="fit"/></picture></span></figure></div>
</div><div data-element-id="elm_o89jONOBSpPXYdro9h68fQ" data-element-type="box" class="zpelem-box zpelement zpbox-container zspadding-space-allside-thin zplight-section zplight-section-bg "><style type="text/css"></style><div data-element-id="elm_H0w7H_Wmc-xHEQoQKW8BxQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong>Week 3–5: Fix and Register</strong><br/></h4></div>
<div data-element-id="elm_tEqIHP1EyYN0f89vzKu96g" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p style="margin-bottom:20px;">Work through violations by type:</p><ul><li style="margin-bottom:8px;"><span style="font-weight:600;">Inline scripts:</span>&nbsp;Extract JavaScript into external&nbsp;<code>.js</code>&nbsp;files, host in a trusted location, update references. Register the hosting URL as a Trusted Script Source.</li><li style="margin-bottom:8px;"><span style="font-weight:600;">Dynamic external loads (<code>SPComponentLoader</code>):</span>&nbsp;Register each external URL manually in SharePoint Admin Center under Trusted Script Sources. The 300-entry limit applies across your entire tenant, audit before adding everything.</li><li style="margin-bottom:8px;"><span style="font-weight:600;">Third-party tools:</span>&nbsp;Contact vendors. Most major vendors have CSP-compliant versions of their SharePoint integrations available. This is a version upgrade, not a rebuild.</li></ul><div><br/></div></div><div><br/></div><div><br/></div><div><br/></div><div><br/></div><div><br/></div><p></p></div>
</div></div></div></div><div data-element-id="elm__SrALul_SN6XxXXX9tpaSA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_aMcZQjKYkpTJuZKQsJQhdA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_LK3DL-8pP0f-QWTwwF6YXg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_LK3DL-8pP0f-QWTwwF6YXg"] .zpimage-container figure img { width: 540px ; height: 303.75px ; } } @media (max-width: 767px) { [data-element-id="elm_LK3DL-8pP0f-QWTwwF6YXg"] .zpimage-container figure img { width:415px ; height:277.01px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/wEEK%20-4-.png" width="415" height="277.01" loading="lazy" size="fit"/></picture></span></figure></div>
</div><div data-element-id="elm_aKTAxtAEhpxDn2YIn2LS8w" data-element-type="box" class="zpelem-box zpelement zpbox-container zspadding-space-allside-thin zplight-section zplight-section-bg "><style type="text/css"></style><div data-element-id="elm_MHpk3z_P0pkO7dZzLX2g7A" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong>Week 6–7: Test in Enforce Mode</strong><br/></h4></div>
<div data-element-id="elm_BHd6_CX5Z4yAdsrVxeDNgg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span>Once fixes are in place, use&nbsp;</span><code>?csp=enforce</code><span>&nbsp;systematically across your critical pages to verify nothing is still breaking. Involve your end users or QA team, have them walk through their normal workflows on the pages they use most.</span></span></p><p><span><span><br/></span></span></p></div>
</div></div></div><div data-element-id="elm_oCKg2oL9zsxt1GsFB8C7oQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_oJIvZG5PmjREB-dLVrVtLA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_oJIvZG5PmjREB-dLVrVtLA"] .zpimage-container figure img { width: 540px ; height: 303.75px ; } } @media (max-width: 767px) { [data-element-id="elm_oJIvZG5PmjREB-dLVrVtLA"] .zpimage-container figure img { width:415px ; height:277.01px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/wEEK%20-1-.png" width="415" height="277.01" loading="lazy" size="fit"/></picture></span></figure></div>
</div><div data-element-id="elm_sGQrlkEllU0E84gm-b400w" data-element-type="box" class="zpelem-box zpelement zpbox-container zspadding-space-allside-thin zplight-section zplight-section-bg "><style type="text/css"></style><div data-element-id="elm_a0Mn5P6CGZ5ZFVFz7QyeqQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong>Week 8: Sign Off and Communicate</strong><br/></h4></div>
<div data-element-id="elm_FHAGcoWYx05RrdKlZwa_8A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span>Before 1 June, communicate the change to relevant stakeholders. If any web part behaviour has changed as a result of refactoring (however minor), users should know what to expect. Frame it as a security improvement, because it is.</span></span></p></div>
</div></div></div></div></div></div><div data-element-id="elm_eSMUyenMKXyRu81FMBkDEQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_TxXzevtdHCmJVnNT-UZf2g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_FLgNMnG6wZz9R8XpnEEr8w" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_5YSBZW8ob9dmYkadUBvwYg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong>The Risk of Waiting Until Late May</strong><br/></h3></div>
<div data-element-id="elm_QeWENosaztTQXcxdYg7Qfg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p style="margin-bottom:20px;">The pattern we've seen with 1 March enforcement is that the teams who struggled were the ones who started late. Trusted Script Source changes can take up to&nbsp;<span style="font-weight:600;">24 hours to propagate</span>&nbsp;across a tenant. If you're making changes on 30 May and something doesn't propagate in time, you have no margin for error.</p><p style="margin-bottom:20px;">Eight weeks sounds like plenty of time. In practice, the audit usually surfaces more than expected, vendor responses take longer than expected, and internal sign-off processes take time. Start now.</p></div><p></p></div>
</div><div data-element-id="elm_AVPOoxqcsMhuu8NExJ0hxQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_AVPOoxqcsMhuu8NExJ0hxQ"].zpelem-text { background-color:#ECF0F1; background-image:unset; border-style:solid; border-color:#A6CE39 !important; border-block-start-width:0px; border-inline-end-width:0px; border-block-end-width:0px; border-inline-start-width:5px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><p></p></blockquote><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span style="color:rgb(166, 206, 57);font-size:12px;"></span></blockquote><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div><span style="margin-bottom:6px;font-weight:700;color:rgb(166, 206, 57);"><br/></span></div><div><span style="margin-bottom:6px;font-weight:700;color:rgb(166, 206, 57);"></span></div></blockquote><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><div><span style="margin-bottom:6px;font-weight:700;color:rgb(0, 27, 76);">Further Reading</span></div></blockquote><div><div><br/></div></div><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span><span></span></span></blockquote><blockquote style="margin-left:40px;border:none;"><a href="https://www.gtconsult.com/blogs/post/sharepoint-csp-enforcement-is-live-%E2%80%94-here-s-what-to-do-if-your-scripts-are-broken" title="SharePoint CSP Enforcement Is Live — Here's What to Do If Your Scripts Are Broken" target="_blank" rel="">SharePoint CSP Enforcement Is Live — Here's What to Do If Your Scripts Are Broken</a></blockquote><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><span><a href="https://learn.microsoft.com/en-us/sharepoint/dev/spfx/content-securty-policy-trusted-script-sources">Support for CSP in SharePoint Online, Microsoft Learn<br/></a></span><span><a href="https://techcommunity.microsoft.com/blog/spblog/sharepoint-online-content-security-policy-csp-enforcement-dates-and-guidance/4472662">SharePoint Online CSP: Enforcement Dates and Guidance, Microsoft Tech Community</a></span></blockquote><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><br/></blockquote><div><span><span><br/></span></span></div></div>
</div></div></div></div></div><div data-element-id="elm_3ZbIXMp_bplALZzuFc1h1g" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Od3bzyBWoLtQccRrRMlQ3w" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_nh_UJO7sxasukwhsaPYSXQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_p_4CH1Hr4oUZ3mpXl5AC2w" data-element-type="box" class="zpelem-box zpelement zpbox-container zpdark-section zpdark-section-bg "><style type="text/css"> [data-element-id="elm_p_4CH1Hr4oUZ3mpXl5AC2w"].zpelem-box{ background-color:#001B4C; background-image:unset; } </style><div data-element-id="elm_75-2iHH7WrHRnwZ5HIRglg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-center zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong>Not sure where to start with CSP?</strong><br/></h3></div>
<div data-element-id="elm_rH2SMxg2QFsrgy3H52qg9A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div style="text-align:center;margin-bottom:8px;"><div><p style="margin-bottom:28px;font-style:italic;"><span style="font-size:16px;">Chat to us and let's help you navigate this change.</span></p><span style="font-weight:700;"><a href="https://www.gtconsult.com/contact"></a></span></div></div><p></p></div>
</div><div data-element-id="elm_8uXoyqeqm52XT5S4ty3lVg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_8uXoyqeqm52XT5S4ty3lVg"].zpelem-button{ margin-block-start:-5px; } </style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="https://outlook.office.com/bookwithme/user/6bd34779624c4a8ab5f3906f5e71baf7%40gtconsult.com/meetingtype/Cfseq1rTWEyZRk62iTNVAw2?anonymous&amp;ismsaljsauthenabled=true"><span class="zpbutton-content">Book a Free Consultation with Our Technical Account Manager, Trevin</span></a></div>
</div><div data-element-id="elm_tv732cnkGpC8RoJYpyb1BQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_tv732cnkGpC8RoJYpyb1BQ"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_tv732cnkGpC8RoJYpyb1BQ"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 31 Mar 2026 12:11:08 +0000</pubDate></item><item><title><![CDATA[SharePoint CSP Enforcement Is Live — Here's What to Do If Your Scripts Are Broken]]></title><link>https://www.gtconsult.com/blogs/post/sharepoint-csp-enforcement-is-live-—-here-s-what-to-do-if-your-scripts-are-broken</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/bROKEN sCRIPTS.png"/>SharePoint CSP enforcement broke your scripts? Learn how to diagnose CSP violations, fix inline JavaScript, and register trusted sources in SharePoint Online after the 1 March 2026 deadline.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_JlBbArKeROui0v2FXVIzqw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm__ySjZpf_Q5m2x5H2t8DhAg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_iTIyUCKNQo-NNv5r6KbnXQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_F5xiAV7PQhCYxliSTKGY7g" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span><span style="font-style:italic;">Microsoft flipped the switch on March 1. If your web parts or custom solutions are suddenly misbehaving, Content Security Policy enforcement is likely the culprit. Here's how to diagnose and fix it.</span></span></p></div>
</div><div data-element-id="elm_y84eyVjKieyYxHSZE9h2PA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_y84eyVjKieyYxHSZE9h2PA"] .zpimage-container figure img { width: 862px !important ; height: 484px !important ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Freak%20Out%20Panic%20GIF.gif" size="custom" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_0rvVra6YVcKDivZhYjlamg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p style="margin-bottom:20px;">On 1 March 2026, Microsoft moved SharePoint Online's Content Security Policy (CSP) from report-only mode into full enforcement. That means non-compliant scripts are no longer just being logged, they're being&nbsp;<span style="font-weight:600;">blocked</span>. If something in your environment stopped working around that date, there's a good chance CSP is the reason.</p><p style="margin-bottom:20px;">This post walks you through how to confirm CSP is the issue, understand what's being blocked and why, and fix it, without breaking anything else in the process.</p></div><p></p></div>
</div><div data-element-id="elm_hfrLBq5gAsxnSPWo9PJYUw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong>Step 1: Confirm CSP Is the Culprit</strong></h3></div>
<div data-element-id="elm_1CtLYqPP1JHlVvtqxqQY3g" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span>Before diving into fixes, verify that CSP enforcement is actually what's blocking your scripts. The fastest way is through the browser console.</span></span></p></div>
</div><div data-element-id="elm_w_MBbIMF6PltojDnl-7ngQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div></div><p></p><ol><li>Open the affected SharePoint page in your browser.</li><li>Press&nbsp;<span style="font-family:&quot;Courier New&quot;, monospace;background-color:rgb(0, 27, 76);color:rgb(166, 206, 57);"> F12&nbsp;</span> to open Developer Tools and navigate to the Console tab.</li><li>Look for errors beginning with&nbsp;&nbsp;<span style="font-family:&quot;Courier New&quot;, monospace;background-color:rgb(0, 27, 76);color:rgb(166, 206, 57);">Refused to execute script </span>&nbsp;or containing&nbsp;<span style="background-color:rgb(0, 27, 76);color:rgb(166, 206, 57);"><span style="font-family:&quot;Courier New&quot;, monospace;">Content-Security-Policy&nbsp;</span></span>.</li><li>Alternatively, append&nbsp;<span style="font-family:&quot;Courier New&quot;, monospace;background-color:rgb(0, 27, 76);color:rgb(166, 206, 57);"> ?csp=enforce </span>&nbsp;to the page URL to trigger enforcement mode explicitly and surface violations immediately.</li></ol></div>
</div><div data-element-id="elm_YGWgrTGmL6dhtuSfMdrI3Q" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span>If you're seeing CSP violation errors, you're in the right place. If not, the issue may be something else. Check network errors or JavaScript exceptions separately.</span></span></p></div>
</div></div></div></div></div><div data-element-id="elm__GHuxlVbA11FzHnzghrshg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_fKXU-l1bWvSlNefZg5cEcg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_KAy_qLw4wb0PbMWUTTIWVw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_ekM2Bw3eIr0FUiKtH2gWvA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong>Step 2: Identify What's Being Blocked</strong></h3></div>
<div data-element-id="elm_6GI90XA0XyMCPbAwRPO26g" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span>CSP violations in SharePoint Online generally fall into two categories:&nbsp;</span><span style="font-weight:600;">inline scripts</span><span>&nbsp;and&nbsp;</span><span style="font-weight:600;">untrusted external sources</span><span>.</span></span></p></div>
</div><div data-element-id="elm_dACnocdr5by5gpVhmC2p0w" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_dACnocdr5by5gpVhmC2p0w"] .zpimageheadingtext-container figure img { width: 313px !important ; height: 313px !important ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Looking%20Where%20Are%20You%20GIF%20by%20Pudgy%20Penguins.gif" data-src="/Blog%20Site/Looking%20Where%20Are%20You%20GIF%20by%20Pudgy%20Penguins.gif" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left" data-editor="true"><span>Inline Scripts<br/></span></h3><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p><span><span>Any JavaScript written directly into a page, web part, or solution using&nbsp;<span style="font-family:&quot;Courier New&quot;, monospace;background-color:rgb(0, 27, 76);color:rgb(166, 206, 57);">&nbsp;</span></span><code><span style="font-family:&quot;Courier New&quot;, monospace;background-color:rgb(0, 27, 76);color:rgb(166, 206, 57);">innerHTML&nbsp;</span>&nbsp;</code><span>,&nbsp;<span style="background-color:rgb(0, 27, 76);color:rgb(166, 206, 57);">&nbsp;</span></span><code><span style="background-color:rgb(0, 27, 76);color:rgb(166, 206, 57);"><span style="font-family:&quot;Courier New&quot;, monospace;">document.write()</span>&nbsp;</span>&nbsp;</code><span>, or script tags without a proper source reference will be blocked. Microsoft has confirmed that&nbsp;<span style="background-color:rgb(0, 27, 76);color:rgb(166, 206, 57);">&nbsp;</span></span><code style="background-color:rgb(0, 27, 76);color:rgb(166, 206, 57);">unsafe-inline&nbsp;</code><span>&nbsp;is not permitted and that nonce values will not be exposed, so there is no workaround here. These scripts must be refactored.</span></span></p><p><span><span><br/></span></span></p><p><span><span></span></span></p><div><h3></h3></div><div><h3 style="margin-bottom:10px;">Untrusted External Sources</h3><div><span><span>Scripts loaded from external URLs (CDNs, third-party services, custom hosted libraries) that haven't been added to your SharePoint tenant's Trusted Script Sources list will also be blocked. Note that standard SPFx bundles deployed via&nbsp;<span style="background-color:rgb(0, 27, 76);color:rgb(166, 206, 57);">&nbsp;</span></span><code style="background-color:rgb(0, 27, 76);color:rgb(166, 206, 57);">cdnBasePath</code><span><span style="background-color:rgb(0, 27, 76);color:rgb(166, 206, 57);">&nbsp;</span> or declared in&nbsp;<span style="background-color:rgb(0, 27, 76);color:rgb(166, 206, 57);">&nbsp;</span></span><code style="background-color:rgb(0, 27, 76);color:rgb(166, 206, 57);">externals</code><span><span style="background-color:rgb(0, 27, 76);color:rgb(166, 206, 57);">&nbsp;</span> in your config are auto-trusted, it's dynamic loading via&nbsp;<span style="background-color:rgb(0, 27, 76);color:rgb(166, 206, 57);">&nbsp;</span></span><code style="background-color:rgb(0, 27, 76);color:rgb(166, 206, 57);">SPComponentLoader.loadScript()&nbsp;</code><span>&nbsp;or ad-hoc external references that need manual registration.</span></span><br/></div></div><br/><p></p></div>
</div></div></div><div data-element-id="elm_mOWsCtUcNteYCYALP4q7Ug" data-element-type="box" class="zpelem-box zpelement zpbox-container zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_mOWsCtUcNteYCYALP4q7Ug"].zpelem-box{ background-color:#ECF0F1; background-image:unset; border-style:solid; border-color:#A6CE39 !important; border-block-start-width:0px; border-inline-end-width:0px; border-block-end-width:0px; border-inline-start-width:5px; } </style><div data-element-id="elm_DhcfJmdwiJuT4EhTQjRgxw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><p><span><span style="margin-bottom:6px;font-weight:600;">TENANT-WIDE AUDIT</span></span></p></blockquote></div>
</div><div data-element-id="elm_rnmNIJtk6eMEAoVd_rC16Q" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><p><span><span>Go to Microsoft Purview and search for&nbsp;</span><span style="margin-bottom:6px;font-weight:600;">&quot;<span style="color:rgb(166, 206, 57);">Violated Content Security Policy</span>&quot;&nbsp;</span><span>in the audit log. This gives you a full picture of which pages and scripts have triggered violations across your entire tenant, not just the one page you're looking at.</span></span></p><p><span><span><br/></span></span></p></blockquote></div>
</div></div></div></div></div></div><div data-element-id="elm_KEv-U4Ca6DQzMQczVw-bzA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1rV5-ALCygGG8HRBGFd3mw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_c6xc0TVoOPR00Qlu21Q8dw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_A3BGzOhe70IyTdddyuW5RQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong>Step 3: Fix Inline Scripts</strong></h3></div>
<div data-element-id="elm_meag7RQcmyEJuBLU1WRWSg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span>Inline scripts need to be moved into external&nbsp;<span style="background-color:rgb(0, 27, 76);color:rgb(166, 206, 57);">&nbsp;</span></span><code style="background-color:rgb(0, 27, 76);color:rgb(166, 206, 57);">.js&nbsp;</code><span>&nbsp;files and hosted in a trusted location. The typical path for SPFx solutions:</span></span></p></div>
</div><div data-element-id="elm_RCDcvwmmiQ0sFP2mC49-eA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div></div><p></p><ol><li>Extract the inline JavaScript into a standalone&nbsp;<span style="background-color:rgb(0, 27, 76);color:rgb(166, 206, 57);"> .js&nbsp;</span> file.</li><li>Deploy the file to a trusted location (e.g., SharePoint document library, Azure Blob Storage, your CDN).</li><li>Reference it as an external module within your SPFx solution rather than injecting it inline.</li><li>Register the script source as a Trusted Script Source (see Step 4).</li></ol></div>
</div><div data-element-id="elm_6m7EQfNHcwtUzTMpmkqK5A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span>For scripts embedded directly in classic-style page layouts or content editor web parts, the same logic applies, extract, host externally, reference externally.</span></span></p></div>
</div><div data-element-id="elm_dQYvqRaWOUiT6kZc49itQg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong><span>Step 4: Register Trusted Script Sources</span></strong></h3></div>
<div data-element-id="elm_dHKHl9I8fLTOXl8bjDybKA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span>For any external URL your solutions load scripts from, you need to add that domain to SharePoint's Trusted Script Sources list. This is done in the SharePoint Admin Center.</span></span></p></div>
</div><div data-element-id="elm_l93duRYcaUVRZCjfjHk_og" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_l93duRYcaUVRZCjfjHk_og"] .zpimagetext-container figure img { width: 23px !important ; height: 23px !important ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Copy%20of%20Copy%20of%20Secure%20score%20carousel%20-2-.png" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p></p><div><p>Go to&nbsp;<span style="font-weight:600;">SharePoint Admin Center → Advanced → Trusted Script Sources</span>&nbsp;(or use PowerShell).</p></div><p></p></div>
</div></div><div data-element-id="elm_49oMtvAnwwXxcxf97JUX5g" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_49oMtvAnwwXxcxf97JUX5g"] .zpimagetext-container figure img { width: 23px !important ; height: 23px !important ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Copy%20of%20Copy%20of%20Secure%20score%20carousel%20-3-.png" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p></p><p></p><div><p>Add the full domain or path of the external script source. Wildcards are limited, subdomains must be registered individually.</p></div><p></p><p></p></div>
</div></div><div data-element-id="elm_93me_ksQSOiaFweHBkG0IA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_93me_ksQSOiaFweHBkG0IA"] .zpimagetext-container figure img { width: 23px !important ; height: 23px !important ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Copy%20of%20Copy%20of%20Secure%20score%20carousel%20-4-.png" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p></p><div><p><span>Note the 300 entry limit across your tenant. Audit carefully before adding everything.</span></p></div><p></p></div>
</div></div><div data-element-id="elm_i69HLMIE0ni_943ZkBfKbA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_i69HLMIE0ni_943ZkBfKbA"] .zpimagetext-container figure img { width: 23px !important ; height: 23px !important ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Copy%20of%20Copy%20of%20Secure%20score%20carousel%20-5-.png" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p></p><div><p><span>Changes can take up to 24 hours to propagate across your tenant.</span></p></div><p></p></div>
</div></div><div data-element-id="elm_ctoXuMt9AxzU9reosTs0wQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span>Via PowerShell:</span></span></p></div>
</div><div data-element-id="elm_5U-4PfFgccroxGbhR6lGzA" data-element-type="box" class="zpelem-box zpelement zpbox-container zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_IBJtMmV_HN0vLFAWoXTxBw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_IBJtMmV_HN0vLFAWoXTxBw"].zpelem-text { background-color:#001B4C; background-image:unset; border-style:solid; border-color:#A6CE39 !important; border-block-start-width:1px; border-inline-end-width:1px; border-block-end-width:1px; border-inline-start-width:6px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><p></p><div><pre style="margin-bottom:28px;"><span style="font-family:&quot;Courier New&quot;, monospace;"><span style="color:rgb(166, 206, 57);"><br/>Add-SPOTenantCdnOrigin -CdnType Private -OriginUrl &quot;https://yourdomain.com/scripts&quot;</span></span></pre></div><p></p></blockquote></div>
</div></div></div></div></div></div><div data-element-id="elm_Yw9Ps3j5jzQnD7q-UgWTbw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_WU3YlmnNnTjKkyJU_dSD4Q" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_3cEfaDqcxWBriC9THUiCuQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_m8IK40gwtTPZskTD4IxrBg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong>Step 5: Coordinate With Third-Party Vendors</strong></h3></div>
<div data-element-id="elm_757iSwUXx5BmO6eeSeR8vA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p style="margin-bottom:20px;">If your SharePoint environment includes solutions from third-party vendors, analytics tools, chatbots, form builders, or similar, those vendors may need to update their products to be CSP-compliant. Reach out to them with the specific violation URLs from your Purview audit and ask for a compliance timeline.</p><p style="margin-bottom:20px;">In the meantime, you can temporarily register their script sources as trusted, but the long-term fix needs to come from their end if their solutions use inline scripting patterns.</p></div><p></p></div>
</div><div data-element-id="elm_6Ma8PrVKz7twPmSMo-JpZQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong><span>If You're Still on the 90-Day Delay</span></strong></h3></div>
<div data-element-id="elm_d0IEmWOdqxAck3bLuHJhwQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span>Some tenants enabled the 90-day enforcement delay using&nbsp;<span style="background-color:rgb(0, 27, 76);color:rgb(166, 206, 57);">&nbsp;</span></span><code><span style="background-color:rgb(0, 27, 76);color:rgb(166, 206, 57);">Set-SPOTenant -DelayContentSecurityPolicyEnforcement $true&nbsp;</span>&nbsp;</code><span>before 1 March. If that's you, your enforcement date is&nbsp;</span><span style="font-weight:600;">1 June 2026</span><span>, and it will arrive faster than you think. Use this guide now while you still have the buffer.</span></span></p></div>
</div><div data-element-id="elm_Z1i6hqjMX6RByjb63q0h7Q" data-element-type="box" class="zpelem-box zpelement zpbox-container zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_Z1i6hqjMX6RByjb63q0h7Q"].zpelem-box{ background-color:#ECF0F1; background-image:unset; border-style:solid; border-color:#A6CE39 !important; border-block-start-width:0px; border-inline-end-width:0px; border-block-end-width:0px; border-inline-start-width:5px; } </style><div data-element-id="elm_R3C5fVvgQJG5taBIzKKyrQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><p><span><span style="margin-bottom:6px;font-weight:600;">FURTHER READING</span></span></p></blockquote></div>
</div><div data-element-id="elm_nQzEhkS31J4tyfCb_RlvEA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><blockquote style="margin-left:40px;border:none;"><a href="https://www.gtconsult.com/blogs/post/still-on-the-90-day-csp-delay-your-1-june-deadline-is-coming" title="Still on the 90-Day CSP Delay? Your 1 June Deadline Is Coming" target="_blank" rel="">Still on the 90-Day CSP Delay? Your 1 June Deadline Is Coming</a></blockquote><blockquote style="margin-left:40px;border:none;"><p><a href="https://learn.microsoft.com/en-us/sharepoint/dev/spfx/content-securty-policy-trusted-script-sources">Support for CSP in SharePoint Online, Microsoft Learn</a></p><p><a href="https://techcommunity.microsoft.com/blog/spblog/sharepoint-online-content-security-policy-csp-enforcement-dates-and-guidance/4472662">SharePoint Online CSP: Enforcement Dates and Guidance, Microsoft Tech Community</a></p><p><br/></p></blockquote></blockquote></div>
</div></div></div></div></div></div><div data-element-id="elm_985slfZTR4k2ttRSbSmS5w" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_xzVCl9up0AagLZJdU3YuDA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_OPiyNqZOORX7qw_D4WaPfg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_xW6xLO2np-KPSjiRwKVaEQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Still dealing with broken scripts after CSP enforcement?</span></h3></div>
</div></div></div></div><div data-element-id="elm_m1WjnY7aKkk-kIQT-FIXEg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_lfVophjrGg8fwbIKQtky6w" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_aeLH76DFxhLwc7cGquF0rg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_-1ybMYiXbQSrXh1qhSgOIQ" data-element-type="box" class="zpelem-box zpelement zpbox-container zpdark-section zpdark-section-bg "><style type="text/css"> [data-element-id="elm_-1ybMYiXbQSrXh1qhSgOIQ"].zpelem-box{ background-color:#001B4C; background-image:unset; } </style><div data-element-id="elm_lR9Tn2hQXp3BPbLtMeeYhg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-center zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong>Not sure where to start with CSP?</strong><br/></h3></div>
<div data-element-id="elm_i4q2Vzh5RsiZyQhQrjv7XQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div style="text-align:center;margin-bottom:8px;"><div><p style="margin-bottom:28px;font-style:italic;"><span style="font-size:16px;">Chat to us and let's help you navigate this change.</span></p><span style="font-weight:700;"><a href="https://www.gtconsult.com/contact"></a></span></div></div><p></p></div>
</div><div data-element-id="elm__VFsH1zQMu4Icm-_Sw9O1A" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm__VFsH1zQMu4Icm-_Sw9O1A"].zpelem-button{ margin-block-start:-5px; } </style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="https://outlook.office.com/bookwithme/user/6bd34779624c4a8ab5f3906f5e71baf7%40gtconsult.com/meetingtype/Cfseq1rTWEyZRk62iTNVAw2?anonymous&amp;ismsaljsauthenabled=true"><span class="zpbutton-content">Book a Free Consultation with Our Technical Account Manager, Trevin</span></a></div>
</div><div data-element-id="elm_4Y45PwLDQLXa_hn4558z0A" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_4Y45PwLDQLXa_hn4558z0A"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_4Y45PwLDQLXa_hn4558z0A"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 30 Mar 2026 16:25:43 +0000</pubDate></item><item><title><![CDATA[If You Haven't Tested Your Security, You Don't Actually Know If It Works]]></title><link>https://www.gtconsult.com/blogs/post/if-you-haven-t-tested-your-security-you-don-t-actually-know-if-it-works</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/Pen Test Thumbnail.png"/>Most businesses have security in place. But when last did anyone test if it actually works? Discover why penetration testing is the difference between assuming you're secure and knowing you are.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_3D0Tmzb5T9Wa9Wqw-ExulQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Hq-NabZSRhOrQ2_D4C9aCQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content- " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_FF1Im4yzRrqxJKBfEV4UTA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_4nOShi1pN_RP5cweEmltTQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_4nOShi1pN_RP5cweEmltTQ"] .zpimage-container figure img { width: 286px !important ; height: 195px !important ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Fire%20Elmo%20GIF.gif" size="custom" data-lightbox="true"/></picture></span></figure></div>
</div></div><div data-element-id="elm_5s78W04vb82nVS26UAaSng" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_NuKHHutt3HtylAu63MvR5w" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p style="text-align:left;">Most businesses have some form of security in place. Firewalls. Antivirus. Maybe an MFA policy that someone set up a while back. And on paper, that feels like enough.</p><p style="text-align:left;">But here's the uncomfortable question: when last did anyone actually test whether it holds up?</p><p style="text-align:left;">Not a checklist. Not a vendor assurance. An actual, deliberate attempt to break through it, the way an attacker would.</p><p style="text-align:left;">Because there's a significant difference between having security and having security that works.</p></div>
<p></p></div></div></div></div></div></div><div data-element-id="elm_AfqoiiGUNXZCXhMeWvk6Ww" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_KoWbxoLmdRNRRxWxZeO8hQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_F7yw0W46bZO-2qm96S1qgQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_1fsOWuhQaHy-z_LFJQCvNQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>The gap most businesses don't see<br/></span></h2></div>
<div data-element-id="elm_jErWC9BF9UXo1DPM1hfYvA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div> Cyber threats aren't theoretical anymore. South Africa is consistently ranked among the most targeted countries on the continent for cyber attacks (and attackers aren't just going after the big corporates). SMEs are increasingly in the crosshairs precisely because they tend to have fewer defences. </div>
<br/><div> What makes this particularly tricky is that most vulnerabilities aren't obvious. They don't announce themselves. They sit quietly in your environment, in a misconfigured permission, an unpatched API, a login page that accepts inputs it shouldn't — waiting for someone who knows what to look for. </div>
<br/><div> And the reality is, the people building and maintaining your systems are focused on making things work. That's the job. Security is a different discipline entirely, and it requires a very different mindset — one that's actively looking for what can go wrong, not just what works. </div>
</div><p></p></div></div><div data-element-id="elm_h7_XPmOop1dAnXlul-p2PA" data-element-type="dividerText" class="zpelement zpelem-dividertext "><style type="text/css"></style><style></style><div class="zpdivider-container zpdivider-text zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid zpdivider-style-none "><div class="zpdivider-common">Most breaches don't happen because nobody checked whether the security they had was actually doing its job. businesses had no security. They happen because </div>
</div></div></div></div></div></div><div data-element-id="elm_9ItA4MuDtGsrecanMRMtZg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_qZUTDjG0DVI66Qli3NM6Nw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_AvVsSZFwptov-BJ1y_q4ew" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_qcuU8YSR2T9ehNBL1Ztgkg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>What a penetration test actually does<br/></span></h2></div>
<div data-element-id="elm_5Lod1Tr1_OzgFZsdGH1wdQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_5Lod1Tr1_OzgFZsdGH1wdQ"] .zpimagetext-container figure img { width: 450px !important ; height: 302px !important ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-original zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Magnify%20Rick%20Moranis%20GIF.gif" size="original" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p><span><span></span></span></p><div><p>A penetration test (done properly) is a controlled, authorised attempt to compromise your systems before a real attacker does.</p><p><br/></p><p>It's not a automated scan. It's not a report that lists every CVE in your environment and calls it a day. It's someone thinking the way an attacker thinks, probing for the paths that matter, and documenting exactly what they found, how they found it, and what the business impact actually is.</p><p><br/></p><p>The output isn't just a list of vulnerabilities. It's clarity. You walk away knowing:</p></div>
<p></p><p><span><span><br/></span></span></p><p><span><span>Where your real exposure is, not just theoretical risk</span><br/><span>What an attacker could realistically access or do</span><br/><span>Which fixes will have the biggest impact on actual security</span><br/><span>Whether your existing controls are doing what you think they're doing</span></span></p></div>
</div></div><div data-element-id="elm_V0gXKYsV4CDyOop0nwSGbw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>That last one matters more than people realise. It's not uncommon to find a control that's been in place for years, that everyone assumes is working, that a pen tester can walk straight through in under an hour.</span></p></div>
</div></div></div></div></div><div data-element-id="elm_EkVESAhlM7hptd0LjZy0ZQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Y7eeXaCjbn309i9SshO5AQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_3aAiKlF3XKm_r2TCYY90lA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_9LJtaSe5ncL1CnUqKyPn5Q" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>The business case for testing before something goes wrong<br/></span></h2></div>
<div data-element-id="elm_J_QzvuUZxhsrM3dRBmNjGw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>There's a version of this conversation that happens after an incident. After a breach. After data has been exfiltrated, or systems have been locked down by ransomware, or a client calls asking why their data appeared somewhere it shouldn't.</p><p><br/></p><p>That conversation is expensive. Remediation is expensive. Reputational damage is expensive. Regulatory exposure (especially under POPIA) can be very expensive.</p><p><br/></p><p>A penetration test, run proactively, finds the same problems before they become incidents. It's the difference between fixing a lock and explaining to your clients why their data is gone.</p><p><br/></p><p>We've seen it go both ways. Businesses that test regularly catch things early and fix them quietly. Businesses that don't, often find out the hard way — and at the worst possible time.</p></div>
<p></p></div></div><div data-element-id="elm_jPwF5Oy4cAu65U_gYI7cVw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span style="color:rgb(166, 206, 57);"><a href="https://www.gtconsult.com/blogs/post/case-study-how-proactive-security-testing-unlocked-enterprise-growth-for-lelapa-ai" title="Read about what happens when you are proactive." target="_blank" rel="">Read about what happens when you are proactive.</a></span></p></div>
</div></div></div></div></div><div data-element-id="elm_cfdasUg-yfPur6Usg6kIKQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Z6Y28T16096t2ZlNhMEIUA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_NsvBFQoB3Pbe3_cH3Z-r0g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_yb0lhy9smTvoEKOr0xGMNw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>How often should you be testing?<br/></span></h2></div>
<div data-element-id="elm_HxsrwalybHO6W4vd5p8NAA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_HxsrwalybHO6W4vd5p8NAA"] .zpimagetext-container figure img { width: 301px !important ; height: 301px !important ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Join%20Us%20Save%20The%20Date%20GIF%20by%20Similarweb.gif" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p></p><div><div> There's no universal answer, but a good rule of thumb: any time something significant changes in your environment, test it. New application deployed. Major infrastructure change. New cloud integration. After a security incident, even a minor one. </div>
<br/><div> Beyond that, most organisations benefit from at least an annual assessment, more frequently if you're in a regulated industry or handle sensitive data at scale. </div>
<br/><div> The point isn't to test for the sake of testing. It's to make sure that as your environment evolves, your security posture evolves with it. Because attackers aren't standing still, and neither are the techniques they use. </div>
</div><p></p></div></div></div><div data-element-id="elm_Fq2n_fgWRSt2fRcG82_noQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"></style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_JeFfODD4vsNC4LokXGrKpA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Find out where your exposure actually is, before someone else does.</span></h2></div>
<div data-element-id="elm_zPLWMAlUv9dLrtDyENZYbw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span>GT Consults offers penetration testing for web applications, internal networks, APIs, and cloud environments. We give you a clear picture of your real risk — and exactly what to do about it.</span></span></p></div>
</div><div data-element-id="elm_7hKyq0OpbSvPI5GQz5_jag" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="https://outlook.office.com/bookwithme/user/6bd34779624c4a8ab5f3906f5e71baf7%40gtconsult.com/meetingtype/Cfseq1rTWEyZRk62iTNVAw2?anonymous&amp;ismsaljsauthenabled=true" target="_blank" title="Book time with our technical account manager "><span class="zpbutton-content">Book a Pen Test Consultation</span></a></div>
</div><div data-element-id="elm_EIWpnOWwc9EKOIAftLg_fg" data-element-type="iframe" class="zpelement zpelem-iframe "><style type="text/css"></style><div class="zpiframe-container zpiframe-align-center"><iframe class="zpiframe " src="https://www.youtube.com/embed/e4YSke1x13o?si=FoKco4ey1ySSdg4R" width="560" height="315" align="center" allowfullscreen frameBorder="0" title="YouTube video player"></iframe></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 17 Mar 2026 10:52:00 +0000</pubDate></item><item><title><![CDATA[Configuration Drift ]]></title><link>https://www.gtconsult.com/blogs/post/configuration-drift</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/Configuration Drift Thumbnail.png"/>Configuration drift is the silent shift of your Microsoft 365 security settings away from best practices. Small changes accumulate, weakening security and creating compliance gaps. Secure Score helps you detect and correct these deviations so you can maintain a strong, consistent security posture.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_lZ3OQ04_S9GDB1wHhEkSjQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_dOm-HJM4Q32R0xiwDhMxzw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_5XCl6YOLR7e1brrNtU_7sQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_c1Jwq3-wQZqc_VhaiahxhA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span>The Hidden Challenge of Microsoft 365 Security</span></h2></div>
<div data-element-id="elm_TSme_DKKTVulY0k4ViWFVw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span>How security configurations gradually deviate from best practices—and how Secure Score helps you stay on track</span></p></div>
</div><div data-element-id="elm_RIcfLCua3-HpN6gDWCjK3g" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_RIcfLCua3-HpN6gDWCjK3g"] .zpimage-container figure img { width: 1110px ; height: 624.38px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Configuration%20Drift%20Thumbnail.png" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div><div data-element-id="elm_M2819wnmykUDMTi9fvuu2Q" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_b7ZLoAgK6yy9e1WnB17xWQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_aE1CqXNcLyduFI6YvSLQEQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_nwJn9VhwYG8oumiGjHitSg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>The Security Baseline That Quietly Changes</span></h2></div>
<div data-element-id="elm_iRpVnB8ja7KlIPchz48WxQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Six months ago, your Microsoft 365 security configuration looked solid. You enabled MFA for users, configured Conditional Access policies, and deployed DLP rules. Your Secure Score reflected strong security practices.</p><p><br/></p><p>Today, without any deliberate changes to weaken security, you notice gaps. Some users have Conditional Access exclusions that were meant to be temporary. DLP policies don't cover recently created SharePoint sites. Your Secure Score has dropped slightly, and the recommended actions list has grown.</p><p><br/></p><p>This is configuration drift—the gradual deviation of your security settings from their intended state. It doesn't announce itself with alerts or audit findings. Instead, small changes accumulate over time, creating gaps in your security posture that may only become apparent during audits or security assessments.</p></div><p></p></div>
</div><div data-element-id="elm_y5BVISEsxl-qOZfV-TdFYQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_y5BVISEsxl-qOZfV-TdFYQ"] div.zpspacer { height:5px; } @media (max-width: 768px) { div[data-element-id="elm_y5BVISEsxl-qOZfV-TdFYQ"] div.zpspacer { height:calc(5px / 3); } } </style><div class="zpspacer " data-height="5"></div>
</div></div></div></div></div><div data-element-id="elm_yY3jEHNRopu1SEwcdtAmeg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg zscustom-section-123 "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_VRDB856PZrF9sMsEs_OVMQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_hZY719kUqC0CJRsFHdUONw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-7 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_8CRz4rgo7f3DxTfjRzbmEA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Understanding Configuration Drift</span></h2></div>
<div data-element-id="elm_JxOl09gmM8_QAf0pbVeVhg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Configuration drift in Microsoft 365 occurs when settings unintentionally deviate from defined baselines, as the system's configuration diverges from its intended state.&nbsp;</p><p><br/></p><p>In practical terms:</p></div><p></p></div>
</div><div data-element-id="elm_LeLWslQnUmaU4HmcLZEbIQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><b style="color:rgb(0, 27, 76);">Security controls may weaken gradually</b>: MFA exclusions for &quot;temporary&quot; access become permanent, sharing settings get loosened for specific projects, or legacy authentication gets re-enabled for troubleshooting and never gets turned back off.</p><p><br/></p><p><b style="color:rgb(0, 27, 76);">Compliance gaps emerge</b>: Your actual tenant configuration no longer matches your documented policies, creating discrepancies that auditors will identify during assessments.</p></div><p></p></div>
</div></div><div data-element-id="elm_nEb1pYezWiIvDfW1lTxsfA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-5 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_nEb1pYezWiIvDfW1lTxsfA"].zpelem-col{ border-style:solid; border-color:rgba(0,0,0,0.14) !important; border-block-start-width:0px; border-inline-end-width:0px; border-block-end-width:0px; border-inline-start-width:1px; } </style><div data-element-id="elm_pRROyFCpY8wHrR8RAFGe7g" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_pRROyFCpY8wHrR8RAFGe7g"] .zpimage-container figure img { width: 342px !important ; height: 342px !important ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/image-gen%20-9-.png" size="custom" data-lightbox="true"/></picture></span></figure></div>
</div></div></div><div data-element-id="elm_r8gAFSOT2igQiXqAQhtzkw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_5mJmMCDxXTrEdNyyauwTeg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_d3qs7QWmSv3l0HodYbCs7A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><b style="color:rgb(0, 27, 76);">Visibility becomes challenging</b>: With different security configurations across Exchange, Teams, SharePoint, and OneDrive, it becomes difficult to maintain consistent protection levels across your environment.</p><p><br/></p><p>The challenge is that drift happens quietly. There's no notification saying &quot;Your security posture just changed.&quot; Changes accumulate until you discover—often during an audit or security review—that your environment no longer matches your documented security baseline.</p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_MYMCuUF0Zkq2icvGc_p3wg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_vykV5NW5e1w5S92Z1mGNPQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_qwE-pMbes5Uq8XoCeJXc0Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_NlTAXGFttBjkLyxce2KahA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Common Causes of Configuration Drift</span></h2></div>
<div data-element-id="elm_MwVwn8MameJ_3qjwKzr5GA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Configuration drift is going to happen—no matter what you do. It stems from normal business activities:</p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_sRlXYEpwDQAc0eixqKEDnQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_7y_8lq3OTDhuyyZsCnuEtw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_C9oUp1zhmAx4Lfc4O2r3YA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_z19jKOKbS-SZZ5-eQoC_sg" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-center zpicon-align-mobile-center zpicon-align-tablet-center "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 640 512" height="640" width="512" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path d="M624 208h-64v-64c0-8.8-7.2-16-16-16h-32c-8.8 0-16 7.2-16 16v64h-64c-8.8 0-16 7.2-16 16v32c0 8.8 7.2 16 16 16h64v64c0 8.8 7.2 16 16 16h32c8.8 0 16-7.2 16-16v-64h64c8.8 0 16-7.2 16-16v-32c0-8.8-7.2-16-16-16zm-400 48c70.7 0 128-57.3 128-128S294.7 0 224 0 96 57.3 96 128s57.3 128 128 128zm89.6 32h-16.7c-22.2 10.2-46.9 16-72.9 16s-50.6-5.8-72.9-16h-16.7C60.2 288 0 348.2 0 422.4V464c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48v-41.6c0-74.2-60.2-134.4-134.4-134.4z"></path></svg></span><h3 class="zpicon-heading " data-editor="true"><span>New User Onboarding:</span></h3><div class="zpicon-text-container " data-editor="true"><p><span>When employees join, they're added to groups and granted permissions. Sometimes these are temporary workarounds that nobody remembers to revoke. New users may not inherit security policies if policy scope wasn't updated to include them.</span></p></div>
</div></div></div><div data-element-id="elm_cUY3rG0pGZX9NJhcwbdVKA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_gdRYAinA0L3fWW1KNpScZw" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-center zpicon-align-mobile-center zpicon-align-tablet-center "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 24 24" height="24" width="24" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path fill-rule="evenodd" clip-rule="evenodd" d="M20.1702 3L20.1663 3.00453C21.7458 3.09084 23 4.39896 23 6V18C23 19.6569 21.6569 21 20 21H4C2.34315 21 1 19.6569 1 18V6C1 4.34315 2.34315 3 4 3H20.1702ZM10.4764 5H16.4764L13.089 9H7.08899L10.4764 5ZM5.08899 9L8.47644 5H4C3.44772 5 3 5.44772 3 6V9H5.08899ZM3 11V18C3 18.5523 3.44772 19 4 19H20C20.5523 19 21 18.5523 21 18V11H3ZM21 9V6C21 5.44771 20.5523 5 20 5H18.4764L15.089 9H21Z"></path></svg></span><h3 class="zpicon-heading " data-editor="true"><span>Application Deployments:</span></h3><div class="zpicon-text-container " data-editor="true"><p><span>New applications integrating with Microsoft 365 require permission grants and security exceptions. These grants may be broader than necessary and rarely get reviewed after initial deployment.</span></p></div>
</div></div></div><div data-element-id="elm_KmK6a6-gX6tgh1dY-A1doA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_TOC1yeyim3SwA8HH7l_hCg" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-center zpicon-align-mobile-center zpicon-align-tablet-center "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 24 24" height="24" width="24" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path d="M12.552 8C11.9997 8 11.552 8.44772 11.552 9C11.552 9.55228 11.9997 10 12.552 10H16.552C17.1043 10 17.552 9.55228 17.552 9C17.552 8.44772 17.1043 8 16.552 8H12.552Z" fill-opacity="0.5"></path><path d="M12.552 17C11.9997 17 11.552 17.4477 11.552 18C11.552 18.5523 11.9997 19 12.552 19H16.552C17.1043 19 17.552 18.5523 17.552 18C17.552 17.4477 17.1043 17 16.552 17H12.552Z" fill-opacity="0.5"></path><path d="M12.552 5C11.9997 5 11.552 5.44772 11.552 6C11.552 6.55228 11.9997 7 12.552 7H20.552C21.1043 7 21.552 6.55228 21.552 6C21.552 5.44772 21.1043 5 20.552 5H12.552Z" fill-opacity="0.8"></path><path d="M12.552 14C11.9997 14 11.552 14.4477 11.552 15C11.552 15.5523 11.9997 16 12.552 16H20.552C21.1043 16 21.552 15.5523 21.552 15C21.552 14.4477 21.1043 14 20.552 14H12.552Z" fill-opacity="0.8"></path><path d="M3.448 4.00208C2.89571 4.00208 2.448 4.44979 2.448 5.00208V10.0021C2.448 10.5544 2.89571 11.0021 3.448 11.0021H8.448C9.00028 11.0021 9.448 10.5544 9.448 10.0021V5.00208C9.448 4.44979 9.00028 4.00208 8.448 4.00208H3.448Z"></path><path d="M3.448 12.9979C2.89571 12.9979 2.448 13.4456 2.448 13.9979V18.9979C2.448 19.5502 2.89571 19.9979 3.448 19.9979H8.448C9.00028 19.9979 9.448 19.5502 9.448 18.9979V13.9979C9.448 13.4456 9.00028 12.9979 8.448 12.9979H3.448Z"></path></svg></span><h3 class="zpicon-heading " data-editor="true"><span>&quot;Temporary&quot; Exceptions:</span></h3><div class="zpicon-text-container " data-editor="true"><p><span>An executive needs urgent access from an unusual location. A project team needs external sharing for specific collaboration. A department needs modified DLP policies for a time-sensitive initiative. These exceptions are granted &quot;temporarily&quot;—and frequently forgotten.</span></p></div>
</div></div></div></div><div data-element-id="elm_sB12zPqwHCbtk6QX9wArsw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_v256zw-wHTSxHJA4nFIBTA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_sHw82WNQa_Z7ZFXn08Z1YQ" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-center zpicon-align-mobile-center zpicon-align-tablet-center "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 512 512" height="512" width="512" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path d="M448 0H64C28.7 0 0 28.7 0 64v288c0 35.3 28.7 64 64 64h96v84c0 7.1 5.8 12 12 12 2.4 0 4.9-.7 7.1-2.4L304 416h144c35.3 0 64-28.7 64-64V64c0-35.3-28.7-64-64-64zm16 352c0 8.8-7.2 16-16 16H288l-12.8 9.6L208 428v-60H64c-8.8 0-16-7.2-16-16V64c0-8.8 7.2-16 16-16h384c8.8 0 16 7.2 16 16v288z"></path></svg></span><h3 class="zpicon-heading " data-editor="true"><span>Help Desk Troubleshooting:</span></h3><div class="zpicon-text-container " data-editor="true"><p><span>When users report access issues, support teams troubleshoot by adjusting permissions, modifying group memberships, or creating policy exceptions. These changes solve immediate problems but may not align with security baselines.</span></p></div>
</div></div></div><div data-element-id="elm_w2rRLdNalsPNtYM_F8A1_A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_-enCWghC6IQN0ZVKM8Z1jA" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-center zpicon-align-mobile-center zpicon-align-tablet-center "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 512 512" height="512" width="512" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path d="M497.9 142.1l-46.1 46.1c-4.7 4.7-12.3 4.7-17 0l-111-111c-4.7-4.7-4.7-12.3 0-17l46.1-46.1c18.7-18.7 49.1-18.7 67.9 0l60.1 60.1c18.8 18.7 18.8 49.1 0 67.9zM284.2 99.8L21.6 362.4.4 483.9c-2.9 16.4 11.4 30.6 27.8 27.8l121.5-21.3 262.6-262.6c4.7-4.7 4.7-12.3 0-17l-111-111c-4.8-4.7-12.4-4.7-17.1 0zM124.1 339.9c-5.5-5.5-5.5-14.3 0-19.8l154-154c5.5-5.5 14.3-5.5 19.8 0s5.5 14.3 0 19.8l-154 154c-5.5 5.5-14.3 5.5-19.8 0zM88 424h48v36.3l-64.5 11.3-31.1-31.1L51.7 376H88v48z"></path></svg></span><h3 class="zpicon-heading " data-editor="true"><span>Administrative Changes:</span></h3><div class="zpicon-text-container " data-editor="true"><p><span>Different administrators have different approaches to security configuration. As teams change, new administrators implement security according to their experience, which may differ from the original baseline.</span></p></div>
</div></div></div><div data-element-id="elm_Ef5xKmRnNoyYOZOpZuqSLg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_HEc8YYyiVrQ2DngS_up5cg" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-center zpicon-align-mobile-center zpicon-align-tablet-center "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 512 512" height="512" width="512" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path d="M370.72 133.28C339.458 104.008 298.888 87.962 255.848 88c-77.458.068-144.328 53.178-162.791 126.85-1.344 5.363-6.122 9.15-11.651 9.15H24.103c-7.498 0-13.194-6.807-11.807-14.176C33.933 94.924 134.813 8 256 8c66.448 0 126.791 26.136 171.315 68.685L463.03 40.97C478.149 25.851 504 36.559 504 57.941V192c0 13.255-10.745 24-24 24H345.941c-21.382 0-32.09-25.851-16.971-40.971l41.75-41.749zM32 296h134.059c21.382 0 32.09 25.851 16.971 40.971l-41.75 41.75c31.262 29.273 71.835 45.319 114.876 45.28 77.418-.07 144.315-53.144 162.787-126.849 1.344-5.363 6.122-9.15 11.651-9.15h57.304c7.498 0 13.194 6.807 11.807 14.176C478.067 417.076 377.187 504 256 504c-66.448 0-126.791-26.136-171.315-68.685L48.97 471.03C33.851 486.149 8 475.441 8 454.059V320c0-13.255 10.745-24 24-24z"></path></svg></span><h3 class="zpicon-heading " data-editor="true"><span>Microsoft Platform Evolution:</span></h3><div class="zpicon-text-container " data-editor="true"><p><span>Microsoft continuously updates Microsoft 365, adding new features and changing defaults. New workloads, new sharing capabilities, new integration options—each potentially introducing configuration that doesn't match established security baselines.</span></p></div>
</div></div></div></div><div data-element-id="elm_GLMgs7bTTYK6iOKRLGBZjQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_1gghgSkEAA1UtHNlNVsg7w" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_c6NijOigCJvLDhK67yrybQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>None of these represent negligence. They're normal operations. But collectively, they create drift that can weaken security over time.</span></p></div>
</div></div></div></div></div><div data-element-id="elm_0Qny4cwNAC4GoKc-Mikn-A" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Z09KhX_IQIwb4BWfncdQ0g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_MJqcUktqDCeZPVSsDCUfdQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_mIf9mP72e05mdznqXKqRrQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Real-World Impact Examples</span></h2></div>
<div data-element-id="elm_fDDP0O4sIMLBElM477eToQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>Configuration drift creates tangible security and compliance risks:</span></p></div>
</div><div data-element-id="elm_owom71iKWhrEc4yNAbjMbw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><div><strong><span style="color:rgb(0, 27, 76);">The MFA Gap</span>:</strong> You implemented MFA organization-wide two years ago. Today, checking your Conditional Access policies reveals multiple exclusions—some for valid business reasons, many because someone granted temporary access that never got revoked. Each exception represents potential vulnerability.</div><p></p><div><div></div><br/><div><span style="font-weight:bold;"><span style="color:rgb(0, 27, 76);">The Sharing Sprawl</span>:</span> Your SharePoint security policies restrict external sharing to specific approved domains. But individual site owners have requested and received exceptions for their sites. Now you have inconsistent sharing policies across your environment, and tracking which sites allow unrestricted external sharing requires manual investigation.</div><br/><div></div></div><div><strong><span style="color:rgb(0, 27, 76);">The Policy Patchwork</span>:</strong> Your DLP policies were carefully designed to protect sensitive financial data. But various departments have requested modifications to avoid false positives impacting workflows. Now your DLP coverage has gaps, and you're not certain which channels have comprehensive protection.</div><div><br/></div><div><div><p><b style="color:rgb(0, 27, 76);">The Privilege Accumulation</b>: You follow the principle of least privilege for administrative access. But troubleshooting activities and temporary project requirements have resulted in more users with elevated privileges than your security framework permits, without a clear record of why each was granted.</p></div></div></div>
</div><div data-element-id="elm_sWA4SZ8yp9q8gvi5iAmrEg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Each scenario represents drift from intended security baselines. Individually, they seem manageable. Collectively, they represent systematic security degradation.</p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_Ra2WMNxruJyLcD18yxGSTA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_0zkvT1meMUvKUto6v0nBzQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_mdw5XIhc64FvssTK-rtDCg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_8XVmKieIp0U24x5zx8xbXg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Why Manual Drift Management Is Challenging</span></h2></div>
<div data-element-id="elm_ftiVySCrmSaXkBiksYOooQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>The instinctive response to configuration drift is increased vigilance: review configurations more frequently, document changes more carefully, audit security settings regularly.</p><p>Manual management is impossible at enterprise scale for fundamental reasons. Consider the scope:</p><ul><li>Hundreds or thousands of user accounts with individual settings and permissions</li><li>Dozens of security policies across multiple workloads</li><li>Thousands of SharePoint sites with individual permission configurations</li><li>Hundreds of applications with varying permission grants</li><li>Multiple administrators making legitimate changes daily</li><li>Over 5,000 specific manual configurations across Microsoft 365 services</li></ul></div><p></p></div>
</div><div data-element-id="elm_o5J77Edegsu8uFO-Wy110A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Manual review of this environment is:</p><p><br/></p><p><b style="color:rgb(0, 27, 76);">Time-consuming</b>: Comprehensive drift detection requires reviewing thousands of configuration points across multiple admin centers.</p><p><b style="color:rgb(0, 27, 76);">Error-prone</b>: Even diligent administrators miss subtle changes and can't catch all deviations across the entire environment.</p><p><b style="color:rgb(0, 27, 76);">Reactive</b>: You discover drift after it's already occurred and potentially created risk.</p><p><b style="color:rgb(0, 27, 76);">Unsustainable</b>: IT teams don't have capacity for continuous manual monitoring alongside their other responsibilities.</p><p><br/></p><p>Organizations relying on manual drift detection inevitably discover configuration gaps during audits or security assessments, when addressing them becomes more difficult and time-consuming.</p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_xbk2U3WVDpXCjOTkEP52ng" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_c-BVrN9O9fXU6FNYmSIHAA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_i55M9TqzdxNqqFKHUAoBpg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_9xtg3gKgCb-Rq6nEStJ9SA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>How Secure Score Detects Configuration Drift</span></h2></div>
<div data-element-id="elm_loJCZkta_eBJnQ8zdqPQLA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div>Microsoft Secure Score provides a centralized dashboard in the Microsoft Defender portal where organizations can monitor and work on the security of their Microsoft 365 identities, apps, and devices. It's specifically designed to address configuration drift.</div><br/><div>Secure Score evaluates your Microsoft 365 environment based on system configurations, user behaviors, and other security-related measurements, offering a score between 0 and 100. The higher the score, the better your security posture.</div></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_mLDXKIKZqTpmFdy7j_f4Og" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm__SohByQVSHubRztSlOz96w" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_50HfnqtN8lxkV_ENsrAfSw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_dbA2leKP5ZWoJEvdv8AnIw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>How Secure Score Identifies Drift</span></h2></div>
<div data-element-id="elm_2kwFySNsKVnSuNhy4Ea8dA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>When your configuration drifts from Microsoft's security best practices, Secure Score identifies the gap and provides specific guidance. If you see recommendations like:</p><ul><li>&quot;Enable MFA for all users&quot; (but you thought you already did)</li><li>&quot;Restrict external sharing&quot; (but policies have been modified)</li><li>&quot;Remove unused service principals&quot; (from that app integration months ago)</li></ul><p>These aren't just suggestions—they're indicators that your configuration has drifted from security best practices.</p><p>The History tab in Secure Score offers a weekly graph showing changes over time, making it easy to spot vulnerabilities and take immediate action. A declining Secure Score over time is a clear signal that configuration drift is degrading your security posture.</p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_7yM8FfA8mjPRgh8P3VQCuA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_FSvojlAGYjspCxkUjCVLkw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_zB5hI2lJpidEryqPQO7ecw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_W3oSlRFI5VNmlZw_fOjEsA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>What Secure Score Monitors</span></h2></div>
<div data-element-id="elm_iEKoAbh5M-nBz7_2o2_KuQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Secure Score is calculated based on the implementation of security controls across various Microsoft 365 services. Each control you implement contributes to your overall score. It tracks configuration across:</p><ul><li><b style="color:rgb(0, 27, 76);">Identity and access management</b>: MFA implementation, Conditional Access policies, privileged access controls</li><li><b style="color:rgb(0, 27, 76);">Data protection</b>: DLP policies, encryption settings, sharing configurations</li><li><b style="color:rgb(0, 27, 76);">Threat protection</b>: Anti-phishing policies, anti-malware settings, Safe Links and Safe Attachments</li><li><b style="color:rgb(0, 27, 76);">Device management</b>: Compliance policies, app protection policies</li><li><b style="color:rgb(0, 27, 76);">Infrastructure security</b>: Audit logging, threat policies, security defaults</li></ul><p>The score is continuously updated based on your configurations and user behaviors, so frequent checks ensure you are aware of new recommendations and potential risks.</p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_n9ufJTdydSSCS7vW28QdXQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_F-x8w_y9EhiqMsSjXTsXZg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_hfNmWFomry-bqUN_AT1p6w" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_T0JCAefJqiusOxGLtmOJ7A" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>The Implementation Challenge</span></h2></div>
<div data-element-id="elm_Y1lbLMbEu7CE2V0pwNaP8A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Secure Score provides visibility into configuration drift and identifies where your settings deviate from best practices. Configuration analyzer in Microsoft Defender for Office 365 provides drift analysis and allows you to track policy changes over time, specifically for threat policies.</p><p>However, visibility alone doesn't improve security. The challenge many organizations face is moving from Secure Score recommendations to systematic security improvement. You need to:</p><ol start="1"><li><b style="color:rgb(0, 27, 76);">Prioritize recommendations</b>: Focus on implementing recommendations with the highest score impact first, as these actions typically offer the most significant improvement in security.</li><li><b style="color:rgb(0, 27, 76);">Assess business impact</b>: Understand how configuration changes will affect user workflows and business operations before implementation.</li><li><b style="color:rgb(0, 27, 76);">Test changes safely</b>: Implement changes in a controlled way to avoid disrupting users or breaking critical business processes.</li><li><b style="color:rgb(0, 27, 76);">Document your baseline</b>: Establish clear documentation of your intended security configuration so you can monitor ongoing drift.</li><li><b style="color:rgb(0, 27, 76);">Maintain improvements</b>: Setting up Secure Score recommendations is just the beginning—monitoring changes is what truly matters. You need processes for maintaining your improved score over time.</li></ol><p>Relying solely on Secure Score recommendations is not ideal, as several other critical security practices are not part of the Secure Score but are equally essential. A comprehensive approach addresses both Secure Score recommendations and additional security practices specific to your organization.</p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_bQXHuNNot7uFjZlxkVyMoA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_S1j-aSXV5pYVA6b66tzUmw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_oBzOj_jECjg8CEaE5uW58Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_poLIKvj3D_GHaluWcip5Kw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>The Compliance Connection</span></h2></div>
<div data-element-id="elm_H3zEaCPF1bCy4fnoEJp1jA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Auditors increasingly recognize configuration drift as a fundamental security control weakness. If you can't demonstrate that your Microsoft 365 environment maintains its security baseline over time, you can't prove that your documented controls are actually implemented.</p><p><br/></p><p>This creates specific audit challenges:</p><p><b style="color:rgb(0, 27, 76);">Point-in-Time vs. Continuous Compliance</b>: Annual audits verify configuration at a specific moment. But compliance frameworks require continuous adherence to security controls. Configuration drift between audits represents compliance gaps that may not be detected until the next assessment cycle.</p><p><b style="color:rgb(0, 27, 76);">Documentation vs. Reality</b>: Your security policies document intended configurations. Auditors want evidence that actual configuration matches documentation. Configuration drift creates gaps between documented and actual security posture.</p><p><b style="color:rgb(0, 27, 76);">Change Management</b>: Compliance frameworks require documented change management processes. Configuration drift can represent undocumented or poorly documented changes that bypass formal processes, creating audit findings.</p><p><br/></p><p>For organizations managing POPIA, UK GDPR, ISO 27001, or industry-specific compliance requirements, configuration drift isn't just a security issue—it's a compliance risk that can result in audit findings and regulatory scrutiny.</p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_XAMEia2Ob2d3UGLQoXvCnw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_R7Y_fHvtGQkXr-fr7qkjGg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_xp9fndKX6D6Y5L6k4VUOhA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_UnLFoohTJiqTQ7IO_TUv_g" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Taking a Systematic Approach</span></h2></div>
<div data-element-id="elm_CPYsukEjQkRQ2zKFmsuL5A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Organizations that successfully manage configuration drift share common characteristics:</p><p><br/></p><p><b style="color:rgb(0, 27, 76);">They establish clear security baselines</b>: Documented intended security configuration across all Microsoft 365 workloads, aligned with business requirements and compliance obligations. Secure Score provides the framework, but you need to document which recommendations apply to your organization and why.</p><p><b style="color:rgb(0, 27, 76);">They implement regular monitoring</b>: Regular monitoring of your Microsoft Secure Score ensures you stay updated on your security posture, as the score is continuously updated based on your configurations and user behaviors. Frequent checks ensure awareness of new recommendations and potential risks.</p><p><b style="color:rgb(0, 27, 76);">They establish response processes</b>: Clear workflows for investigating detected drift, determining whether changes are authorized, and remediating problematic configurations. Not all configuration changes represent problematic drift—some are legitimate adaptations to business needs.</p><p><b style="color:rgb(0, 27, 76);">They maintain documentation</b>: Comprehensive records of configuration baselines, detected drift, and remediation actions provide compliance evidence and support audit preparation.</p><p><b style="color:rgb(0, 27, 76);">They review baselines regularly</b>: Periodic review of security baselines ensures they remain aligned with evolving business needs, threat landscape, and compliance requirements.</p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_gojtckK84oqJNVlqjw0_ZQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_PnuB1ZLeywNgHrdp8txWCw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_rKObMFcHqn_31r5H4bzPpg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_pY1t9WlPpCuRbLEwub0hqA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Assessing Your Current State</span></h2></div>
<div data-element-id="elm_12KoHNwOAojc61growwSVA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Before implementing systematic drift management, assess where you stand:</p><p><br/></p><p>□ Can you list all accounts with Conditional Access exclusions and justify each one?</p><p>□ Do you know which SharePoint sites allow external sharing and to which domains?</p><p>□ Have you reviewed service principal permissions and app registrations in the last 90 days?</p><p>□ Can you identify all users with privileged administrative roles?</p><p>□ Do you have documented baselines for your Conditional Access policies?</p><p>□ When did you last review your current Secure Score and understand why it changed?</p><p><br/></p><p>If you answered &quot;no&quot; to multiple questions, you likely have configuration drift that hasn't been systematically addressed.</p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_JVSbWZmlVryTjUdhlPCi3g" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_h45T72zsbsJFASR7JZucOQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_dLEOOBvlpoxplmYUj4cHJg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_rnnb2p62vvMNMOAx-XFHwQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Moving Forward</span></h2></div>
<div data-element-id="elm_6oaQXs6Vcm4m-BE56QdPwg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div>Configuration drift will occur in dynamic Microsoft 365 environments. The question isn't whether it will happen, but whether you'll detect and address it systematically.</div><br/><div>Secure Score provides the visibility you need to identify when configurations drift from security best practices. The challenge is implementing those recommendations systematically without disrupting business operations—and then maintaining improvements over time as your environment continues to evolve.</div></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_XPjAB_wO7nZee5_GeN-w5A" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_DikYtDsIsdWiQw4v0Sr15w" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_V5TpJ9UPRZlNDtQvya7Lhw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_TGD6Qx6rWyozs7gXICmPBA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Ready to Turn Secure Score Into Actionable Security Improvements?</span></h2></div>
<div data-element-id="elm_-ZczdcQ97ITqU2rAxVUqUQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Many organizations get stuck between seeing their Secure Score and actually improving it. They know WHERE configuration has drifted, but struggle with HOW to remediate systematically.</p><p><br/></p><p>Our <b style="color:rgb(0, 27, 76);">Secure Score Implementation Guide</b> provides a step-by-step framework for systematically improving your Microsoft 365 security posture:</p><p>✓ Prioritization framework for Secure Score recommendations based on business impact</p><p>✓ Business impact assessment templates to evaluate changes before implementation</p><p>✓ Testing and rollback procedures for safe deployment</p><p>✓ Documentation templates for compliance evidence and audit preparation</p><p>✓ Maintenance workflows for sustaining security improvements over time</p></div><p></p></div>
</div><div data-element-id="elm_QBvohwuQknmAWmkZO7KeuQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="https://www.gtconsult.com/boost-your-office-365-secure-score-implementation-guide" target="_blank"><span class="zpbutton-content">Get The Implementation Guide</span></a></div>
</div><div data-element-id="elm_4xzSXwctVayxoX6bO_tdYg" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"></style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 14 Nov 2025 03:33:40 +0000</pubDate></item><item><title><![CDATA[Case Study: How Proactive Security Testing Unlocked Enterprise Growth for Lelapa AI]]></title><link>https://www.gtconsult.com/blogs/post/case-study-how-proactive-security-testing-unlocked-enterprise-growth-for-lelapa-ai</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/Lelapa Case Study Thumbnail.png"/>Lelapa AI case study: How penetration testing and security certification removed platform uncertainty, met regulatory requirements, and enabled the company to pass cybersecurity compliance for 3 large enterprise clients.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_rXl1jDNnSwqQwIkTuNqsjw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_pzaIsu7mToG0b7H7-SqxrQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content- " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_frjj0KSVRW-yfQW_hhUe9Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_m8iqi9MvSO6L5XNJM9guEA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span>Turning Cybersecurity Compliance into a Competitive Advantage</span></h2></div>
<div data-element-id="elm_5NUU51R0QYitpRxIZxbG4w" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span><br/></span></p><p><span style="color:rgb(52, 73, 94);">Security certification isn't just about finding vulnerabilities—it's about building trust that enables business growth. Lelapa AI needed to remove uncertainty around user data safety and obtain regulatory certification to serve enterprise clients. A comprehensive two-week penetration testing engagement delivered both, becoming fundamental to passing cybersecurity compliance for three large enterprises.&nbsp;</span></p><p><span><br/></span></p></div>
</div><div data-element-id="elm_SofEsyT3yCsP4abOR3dwoQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_SofEsyT3yCsP4abOR3dwoQ"] .zpimage-container figure img { width: 1110px ; height: 624.38px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Lelapa%20Case%20Study%20Thumbnail.png" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_pfAxc724cYstwRS02-1GaA" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"></style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_bJ9fY4zAKdy7Y00PAzpUUw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong style="color:rgb(0, 27, 76);">Client Spotlight</strong></h2></div>
<div data-element-id="elm_cwqZ9OrDbSml3sdbonj-4Q" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><p style="margin-bottom:10.6667px;"><span style="font-weight:bold;">Jade Abbott, CTO of&nbsp;<a href="https://lelapa.ai/home/" title="Lelapa&nbsp;AI" target="_blank" rel="">Lelapa&nbsp;AI</a></span>, leads technology strategy at one of Africa's most innovative language AI companies.&nbsp;Lelapa&nbsp;AI builds&nbsp;cutting-edge&nbsp;transcription and translation solutions specifically designed for emerging markets, with a particular focus on Africa's diverse linguistic landscape.&nbsp;</p></div>
<div><p style="margin-bottom:10.6667px;"><span>As a fast-growing startup serving enterprise clients with&nbsp;highly sensitive&nbsp;data,&nbsp;Lelapa&nbsp;AI took a proactive approach to security—ensuring their platform could match their ambitious growth trajectory with robust protection.&nbsp;</span></p></div>
</div><p></p></div></div><div data-element-id="elm_1ii7ghNxbUV8ApEzNQpEtw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_1ii7ghNxbUV8ApEzNQpEtw"] .zpimage-container figure img { width: 500px ; height: 355.56px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-medium zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Purple%20and%20Black%20Elegant%20Business%20Pitch%20Deck%20Presentation%20Laptop%20Mockup%20Instagram%20Post.png" size="medium" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div><div data-element-id="elm_ABDP8mSpPnlg2pRVQlhUbg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_CXhGFAT1g5FWR4bE1iRhXg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_PA8xNYuNIJavgx_DM2DDKA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_dL94rCZW8HWyGOe5z-18MA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong style="color:rgb(0, 27, 76);">The Challenge: Enterprise Trust Requires Validated Security</strong></h2></div>
<div data-element-id="elm_MTiC-Y1tdtnJAVDr1OjwDQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p></p></div>
<p></p><p style="margin-bottom:10.6667px;">For&nbsp;Lelapa&nbsp;AI, securing enterprise trust was a strategic priority. Large enterprises were integrating their API to process highly protected data, and&nbsp;Lelapa&nbsp;AI was committed to providing the highest level of security assurance.&nbsp;</p><div><div></div>
<p></p><div><div></div><p></p><div><div></div><p></p><div><div></div><p></p><div><div></div>
<p></p><div><div></div><p></p><div><div></div><p></p><div><div></div><p></p><div><div></div>
<p></p><p style="text-align:center;margin-bottom:10.6667px;"><span style="font-size:20px;font-family:Raleway, sans-serif;color:rgb(166, 206, 57);"><span style="font-style:italic;">&quot;Large enterprises who use our API with highly protected data,&quot;</span>&nbsp;</span><span style="font-size:20px;font-family:Raleway, sans-serif;color:rgb(52, 73, 94);">Jade explains.</span><span style="font-size:20px;font-family:Raleway, sans-serif;color:rgb(166, 206, 57);">&nbsp;</span></p><p><span style="font-size:20px;font-family:Raleway, sans-serif;color:rgb(166, 206, 57);"></span></p><div><div><p style="text-align:center;margin-bottom:10.6667px;"><span style="font-family:Raleway, sans-serif;font-style:italic;color:rgb(166, 206, 57);"><span style="font-size:20px;">&quot;We needed a trusted team to assist us with penetration tests to ensure our system was air-tight and our clients' data was protected.&quot;</span>&nbsp;</span></p></div>
<div><p style="text-align:center;margin-bottom:10.6667px;"><span style="font-weight:bold;">The core challenge:</span>&nbsp;Enterprise clients demand rigorous proof of security before entrusting their sensitive data to any platform. Without independent, third-party validation, even the most secure systems face barriers to enterprise adoption.&nbsp;</p></div>
<div><p style="margin-bottom:10.6667px;">Lelapa&nbsp;AI's priorities were clear:&nbsp;</p></div>
<div><ul><li style="margin-left:24px;"><p><span style="font-weight:bold;">Validate their security posture</span>&nbsp;through comprehensive independent testing&nbsp;</p></li></ul></div>
<div><ul><li style="margin-left:24px;"><p><span style="font-weight:bold;">Meet stringent compliance requirements</span>&nbsp;that enterprise clients mandated&nbsp;</p></li></ul></div>
<div><ul><li style="margin-left:24px;"><p><span style="font-weight:bold;">Demonstrate commitment</span>&nbsp;to data protection and security excellence&nbsp;</p></li></ul></div>
<div><p style="margin-bottom:10.6667px;">For a growing startup, the solution needed to deliver enterprise-grade rigor while respecting both timeline and budget constraints.&nbsp;</p></div>
</div></div></div></div></div></div></div></div></div></div></div></div></div></div>
</div></div><div data-element-id="elm_Z1yzdIimsKYHQ-i88x-ocw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZSfi8GfjXSgzmE-z2gNMqA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_6OsQmYLkPZHrkSkzdhKS0w" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_zZQvzStIOmiOx1BiCS9RCw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong style="color:rgb(0, 27, 76);">Finding the Right Partner</strong><span></span></h2></div>
<div data-element-id="elm__brQpmBJl4KEsiYVoHiK6A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><p style="margin-bottom:10.6667px;"><span></span></p></div>
<div><p>After reaching out to other cybersecurity firms and seeking recommendations from the trusted ZATech Slack community, Lelapa AI found GTconsult.</p><p><br/></p><p style="text-align:center;"><span style="font-family:Raleway, sans-serif;font-size:20px;font-weight:300;"><span style="color:rgb(166, 206, 57);font-style:italic;"><strong>&quot;We decided GTConsult were the right fit as they came highly recommended, worked quickly and the pricing was well aligned with our startup budget,&quot;&nbsp;</strong></span><span style="color:rgb(52, 73, 94);">Jade notes.</span></span></p></div>
<div><p style="margin-bottom:10.6667px;"><span></span></p></div></div><p></p></div>
</div><div data-element-id="elm_25tSkDDc7-BMJoHKaw7mPg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_25tSkDDc7-BMJoHKaw7mPg"] .zpimage-container figure img { width: 1110px ; height: 466.20px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Partnership.gif" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div><div data-element-id="elm_uFyXipTTCN_HBoA1rlb2sA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_CN4VoSkshuneeEhwgQtSyg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_pSNO5uS7Bt4Uc3irF7xhAg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_MF5d_jQuddCFjBCyLKByHw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong style="color:rgb(0, 27, 76);">The Solution: Comprehensive Security Assessment and Certification</strong></h2></div>
<div data-element-id="elm_HRFbLYljr-rFH9mjwyyufg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>The engagement delivered in-depth penetration testing that combined automated and manual testing following the latest cybersecurity standards, designed to ensure there were no vulnerabilities that could lead to damage for Lelapa AI or their customers—and to provide the certification necessary for regulatory compliance.</span></p></div>
</div><div data-element-id="elm_xy0kP2PU9wcnLuTVRT3cDg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>The Process: Three-Phase Testing Over Two Weeks</span></h2></div>
<div data-element-id="elm_Y0TjBt6QxX2d-Hg10Xv73Q" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_Y0TjBt6QxX2d-Hg10Xv73Q"] div.zpspacer { height:8px; } @media (max-width: 768px) { div[data-element-id="elm_Y0TjBt6QxX2d-Hg10Xv73Q"] div.zpspacer { height:calc(8px / 3); } } </style><div class="zpspacer " data-height="8"></div>
</div></div></div></div></div><div data-element-id="elm_OVXkhjzFWsOm7CVZc-bkCw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg zscustom-section-139 "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_cQQGTC-9stn-b0hhzc2b2Q" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_uYQDIiHjvDkdB3OwiZG2Xg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zscolumn-spacing zpalign-self- zplight-section zplight-section-bg "><style type="text/css"></style><div data-element-id="elm_2h8NulGhkYFxEwnh9uMY7w" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_pI83Rcc5IzXmmFVKe2ymLQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_CP75LUg_hWfSibXAcKl6bw" data-element-type="box" class="zpelem-box zpelement zpbox-container zsbox-spacing zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_CP75LUg_hWfSibXAcKl6bw"].zpelem-box{ background-color:rgb(255, 255, 255); background-image:unset; } </style><div data-element-id="elm_UJorRtbMwPLtjcoBQS-rbQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Phase 1: External Threat Simulation</span></h3></div>
<div data-element-id="elm_CVE7AABbv_pfVuPUYYlQ6g" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>The engagement began with open-source intelligence gathering and black box testing. Acting as typical outside threat actors, the security team searched for information that could be used in hacking and phishing attempts, while testing the security of all publicly available infrastructure and web applications.</span></p></div>
</div></div></div><div data-element-id="elm_G-M8807Yh6YrGkyfQpFf6A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_O7rg51UqJ5QHIJaY5wzfAQ" data-element-type="box" class="zpelem-box zpelement zpbox-container zsbox-spacing zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_O7rg51UqJ5QHIJaY5wzfAQ"].zpelem-box{ background-color:rgb(255, 255, 255); background-image:unset; } </style><div data-element-id="elm_RygTBghSwnxXwUK1v_RKtA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Phase 2: Authenticated Assessment</span></h3></div>
<div data-element-id="elm_l6QJRajXKkJShmo1IkWLqg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>Testing progressed to an authenticated, focused assessment of the web application, associated APIs, and generative AI systems. This phase examined configurations and potential vulnerabilities from an insider perspective.</span></p><p><span><br/></span></p><p><span><br/></span></p></div>
</div></div></div><div data-element-id="elm_4gymBEeV1URDU5nnH-9y3w" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_OqWa3F6g0Z8udaTDZmbdjg" data-element-type="box" class="zpelem-box zpelement zpbox-container zsbox-spacing zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_OqWa3F6g0Z8udaTDZmbdjg"].zpelem-box{ background-color:rgb(255, 255, 255); background-image:unset; } </style><div data-element-id="elm_gvUYGyln15altYf-MpNFoQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Phase 3: Reporting and Certification</span></h3></div>
<div data-element-id="elm_vdpB2-vWockMVu4KxecTHw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>A detailed assessment report was prepared. Due to Lelapa AI's infrastructure and software design, no issues were identified and a certificate of security excellence was provided.</span></p><p><span><br/></span></p><p><span><br/></span></p><p><span><br/></span></p></div>
</div></div></div></div></div></div><div data-element-id="elm_ErrM0-EaYITIpOoPcKmJ5A" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_xo-FCgfFFGVR-Im51Fjc9Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_ipwiVYeKST52YLiRbFclRg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_ipwiVYeKST52YLiRbFclRg"] .zpimage-container figure img { width: 1110px ; height: 804.32px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Screenshot%202025-10-27%20144142.png" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div></div></div><div data-element-id="elm_-SVcxS935B69FcTO5XWb0g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_nwsbHp5xgXHKYhN2abp-Zw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_EB89Bysz9ues_cSbjCZibA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>The engagement utilized a mix of open-source and industry-standard tools, from automated vulnerability scanners to manual tests designed specifically for Lelapa AI's infrastructure and software combinations.</span></p></div>
</div><div data-element-id="elm_QyUu6QrswD66iSTp8IYvPg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><span>The Experience: Seamless and Efficient</span></span></h2></div>
<div data-element-id="elm_WbaKBuRh2iTgfsDfmxdk7A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p style="text-align:center;"><span style="font-family:Raleway, sans-serif;font-size:20px;font-weight:300;"><span style="color:rgb(166, 206, 57);font-style:italic;"><strong>&quot;The process was so straightforward, I barely remember it—and as a CTO of a startup, that's ideal,&quot;&nbsp;</strong></span><span style="color:rgb(52, 73, 94);">Jade recalls.</span></span></p><p style="text-align:center;"><span><br/></span></p><p style="text-align:center;"><br/></p><p></p><div><p><br/></p><p><strong><span style="font-weight:500;">From GTconsult's security team's perspective, the collaboration was equally smooth:</span></strong></p><p><strong><br/></strong></p><p style="text-align:center;"><strong style="font-family:Raleway, sans-serif;"><span style="font-size:20px;font-weight:300;color:rgb(166, 206, 57);font-style:italic;">&quot;Working with Lelapa AI was truly a dream. The friendly and professional staff were great to talk with. They knew exactly what they needed out of this exercise and worked closely together with us to knock it out, no time wasted.&quot; </span><span style="font-size:20px;font-weight:300;color:rgb(52, 73, 94);">Kyle Farr, Security Analyst at GTconsult</span></strong></p><p><strong>&nbsp;</strong></p><p>The engagement was characterized by clear communication, well-documented requirements from the start, and a collaborative approach.&nbsp;<span>For a startup CTO managing multiple priorities, this meant security validation could be completed without disrupting other business initiatives.</span></p><p><br/></p><p style="text-align:center;"><span style="font-family:Raleway, sans-serif;font-weight:300;"><span style="font-size:20px;"><span style="color:rgb(166, 206, 57);font-style:italic;">&quot;The main issue we usually face is that the internal infrastructure teams can see outside penetration testing in a bad light, something looking to make them look bad, but that is not the case at all with Lelapa AI's team. We are well aware that no one person can know everything and that is why we focus our expertise on security, to assist fill in the gaps and keep our clients safe.&quot;&nbsp;</span><strong style="text-align:center;"><span style="font-weight:300;color:rgb(52, 73, 94);">Kyle Farr, Security Analyst at GTconsult</span></strong></span></span></p></div>
<p><br/></p>The engagement was characterized by clear communication, well-documented requirements from the start, and a collaborative approach.&nbsp; <p></p></div>
<p></p></div></div></div></div></div></div><div data-element-id="elm_dnXxBw6nxiwCpjk_os2o-Q" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_t3psEv4BFZDiTnsSW0WvxA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_gBrGo8-GsmNXVFl_MOBf2g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_clLR3-VTPCcazzJ2IiLzvA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong style="color:rgb(0, 27, 76);">The Results: Certification, Compliance, and Enterprise Growth</strong></h2></div>
<div data-element-id="elm_ZhZCUL1KR5jGvRQKYT9JPQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>The certification and validation became fundamental enablers of business growth.</span></p></div>
</div><div data-element-id="elm_M0w3alMUuginweoQAa5Mqw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Immediate Outcomes</span></h2></div>
<div data-element-id="elm_z8GbTCr6MjrUMmFefiqVHw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span>✓&nbsp;</span>Certificate of security excellence obtained for regulatory compliance<br/> ✓ No vulnerabilities identified<br/> ✓ Regulatory requirements met<br/> ✓ Customer data safety confirmed</span></p></div>
</div><div data-element-id="elm_cPqDu0zRlKrvrUwZnfi2Uw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_cPqDu0zRlKrvrUwZnfi2Uw"] .zpimage-container figure img { width: 799px !important ; height: 462px !important ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/warriors%20state%20GIF.gif" size="custom" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_x1lcQobM_qIxJVyriUyO3A" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Business Impact</span></h2></div>
<div data-element-id="elm_YkEzW-AJPyjZiKOzmj4zfA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p style="text-align:center;"><span style="font-family:Raleway, sans-serif;font-size:20px;font-weight:300;color:rgb(166, 206, 57);"><strong style="font-style:italic;">&quot;We've been able to pass cybersecurity compliance of 3 large enterprises (and counting) which the pen test was a fundamental part of,&quot;</strong></span><span style="font-family:Raleway, sans-serif;font-size:20px;font-weight:300;color:rgb(52, 73, 94);">Jade reports.</span></p><p><br/></p><p>Three major enterprise clients were onboarded, with the penetration test playing a fundamental role in passing their cybersecurity compliance requirements.</p></div>
<p></p></div></div></div></div></div></div><div data-element-id="elm_DW0mSop26tvtD_HkLdx4fg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_yoeOIqOHOx-5mYiD26LKUA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_dU42XdpXgoZMYtrIPnVgzQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_IH9mEtID9VKM-mj-bgSctw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong style="color:rgb(0, 27, 76);">The Core Value: Trust Through Validation</strong></h2></div>
<div data-element-id="elm_8bkOD9ITtLAL4i_3i2Epzw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><div><p>When asked about the most valuable outcome, Jade's answer captured the essence:</p><p><br/></p><p style="text-align:center;"><strong style="font-family:Raleway, sans-serif;"><span style="font-size:20px;font-weight:300;font-style:italic;color:rgb(166, 206, 57);">&quot;Us and our clients now trust that our API is secure on our platform.&quot;</span></strong></p><p><strong><br/></strong></p><p>This trust operates at multiple levels:</p><p><br/></p><p></p><div><h3>Internal Confidence</h3><p>The Lelapa AI team builds and scales with assurance that their security foundation is solid, validated by external experts.</p><p><br/></p><h3>Client Confidence</h3><p>Enterprise clients onboard knowing their sensitive data is protected by a platform that has been rigorously tested and certified by independent security experts.</p><p><br/></p><h3>Regulatory Confidence</h3><p>With proper certification in hand, Lelapa AI can demonstrate compliance to regulatory bodies.</p></div>
<br/><p></p></div><p></p></div><p></p></div><p></p></div></div></div></div></div>
</div><div data-element-id="elm_ZPSU4M774bO0rUtQgdLDBg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_8-WbMhJ4_IZm54bldULsZQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_9iVZ01Hw9Qql2gK5-Inw6Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_AfohQWCznjCFPBrNCuXgrA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong style="color:rgb(0, 27, 76);">Why This Matters: Security Validation as a Strategic Lever</strong></h2></div>
<div data-element-id="elm_dPEUkO_TgChz4GdwvbHqGw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>Lelapa AI's experience demonstrates how proactive security validation and certification function as business enablers.</span></p></div>
</div><div data-element-id="elm_gpuKYZMJKGM4Fby4znC7_A" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>The Value of Penetration Testing</span></h2></div>
<div data-element-id="elm_wBqxJe-HrDEUtsnV6jKEsA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><strong>Regulatory Compliance</strong> Formal certification through penetration testing addresses regulatory requirements for operating in certain industries or serving enterprise clients.</p><p><br/></p><p><strong>Enterprise Requirements</strong> Enterprise deals often require security compliance and proper certification before contracts can be finalized.</p><p><br/></p><p><strong>Sales Documentation</strong> Having security certification ready provides documentation that enterprise procurement processes require.</p><p><br/></p><p><strong>Operational Confidence</strong> Comprehensive testing validates existing security measures and confirms platform safety.</p><p><br/></p><p><strong>Removing Uncertainty</strong> Proper security validation eliminates uncertainty about platform safety, allowing teams to focus on growth.</p></div><p></p></div>
</div><div data-element-id="elm_U4RFbL-9mU6xBIo3THURwA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_Vl6nNNIT4cnm4RIdd90ziw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zscolumn-spacing zpalign-self- zplight-section zplight-section-bg "><style type="text/css"> [data-element-id="elm_Vl6nNNIT4cnm4RIdd90ziw"].zpelem-col{ margin-block-start:21px; } </style><div data-element-id="elm_2cptznuOBEG0WdaCuIjfbg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"> [data-element-id="elm_2cptznuOBEG0WdaCuIjfbg"].zprow{ margin-block-start:18px; } </style><div data-element-id="elm_j_iz0IZkwf2lxdto79UB6g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_ZoMQLbcDFwmGyhFkmQEP7Q" data-element-type="box" class="zpelem-box zpelement zpbox-container zsbox-spacing zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_ZoMQLbcDFwmGyhFkmQEP7Q"].zpelem-box{ background-color:rgb(255, 255, 255); background-image:unset; } </style><div data-element-id="elm_SH842DpToUXsWcv41Cx_uw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><span>For CTOs and Technical Leaders</span></span></h3></div>
<div data-element-id="elm_JWq-NIDUQ7ECPGs29hIaAg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_JWq-NIDUQ7ECPGs29hIaAg"].zpelem-text { margin-block-start:14px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span></span></p><div></div><p></p><ul><li>External security testing provides validation and removes uncertainty</li><li>The right engagement requires minimal time investment from internal teams</li><li>Certification supports enterprise sales processes</li><li>A two-week engagement can address compliance requirements</li></ul><div><br/></div>
</div></div></div></div><div data-element-id="elm_0l5kBqdKlLqFpyvdEVBGGw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm__XMk9pz5aurIj66FvPKeCA" data-element-type="box" class="zpelem-box zpelement zpbox-container zsbox-spacing zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm__XMk9pz5aurIj66FvPKeCA"].zpelem-box{ background-color:rgb(255, 255, 255); background-image:unset; } </style><div data-element-id="elm_YyyIuEDvmKOLUmwJZaT3Xg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><span>For Growing Companies</span></span></h3></div>
<div data-element-id="elm_PiMOBsVcxVhGIh64ZA0w8w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_PiMOBsVcxVhGIh64ZA0w8w"].zpelem-text { margin-block-start:59px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><div><div><ul><li>Early security certification supports enterprise market entry</li><li>Compliance readiness addresses enterprise client requirements</li></ul><div><br/></div><div><br/></div><div><br/></div><div><br/></div>
<div><br/></div></div></div></div></div></div></div><div data-element-id="elm_tFKszluTv51qLWhrsdwwuw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_w5-vCIPzVM9lZgQmPwjhWA" data-element-type="box" class="zpelem-box zpelement zpbox-container zsbox-spacing zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_w5-vCIPzVM9lZgQmPwjhWA"].zpelem-box{ background-color:rgb(255, 255, 255); background-image:unset; } </style><div data-element-id="elm_s3G5BwG1mvUVLH1oTdG6Lg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><span>For Sales and Business Development</span></span></h3></div>
<div data-element-id="elm_dEQ81BCD_abIXmJMeh_aRg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><div><div><ul><li>Security certification provides documentation enterprise prospects require</li><li>Regulatory compliance documentation is necessary for many enterprise deals</li><li>Third-party certification supports enterprise sales processes</li></ul><div><br/></div></div></div><div><br/></div>
</div></div></div></div></div></div></div></div></div></div></div><div data-element-id="elm_5qTZ-Ae0yTAKwsdyXxWOIg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_zhRCkJUgReGTeGSQPv3nXQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_PlUGrgejpNJyBntQkB0l-g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_jVFFM00St45fFLCN5C_Waw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-center zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong style="color:rgb(166, 206, 57);">Side Quest: Learn how we conduct a penetration test</strong></h2></div>
<div data-element-id="elm_FoOoBs5fjDR4VxdvChVi8g" data-element-type="video" class="zpelement zpelem-video "><style type="text/css"> @media (max-width: 767px) { [data-element-id="elm_FoOoBs5fjDR4VxdvChVi8g"].zpelem-video iframe.zpvideo{ width:560px !important; height:315px !important; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_FoOoBs5fjDR4VxdvChVi8g"].zpelem-video iframe.zpvideo{ width:560px !important; height:315px !important; } } </style><div class="zpvideo-container zpiframe-align-center zpiframe-mobile-align-center zpiframe-tablet-align-center"><iframe class="zpvideo " width="560" height="315" src="https://www.youtube.com/embed/e4YSke1x13o?si=TaIlXdi1ChpEDzhV" frameborder="0" allowfullscreen></iframe></div>
</div><div data-element-id="elm_DWeP2bLwht_5TcRbU-Mdbw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong style="color:rgb(0, 27, 76);">The Bottom Line: Certification Supports Growth</strong></h2></div>
<div data-element-id="elm_sATENfUYJrbM3iPekcyAOw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Lelapa AI's approach to security testing and certification addressed regulatory compliance requirements and supported their enterprise client onboarding.</p><p><br/></p><p><strong>Three enterprise clients onboarded. Certification obtained. Regulatory requirements met.</strong></p><p><strong><br/></strong></p><p>The two-week engagement provided the certification that was a fundamental part of passing cybersecurity compliance for three large enterprises.</p><p>For technology companies serving enterprise clients: security validation and certification can address regulatory requirements and support enterprise sales processes.</p></div><p></p></div>
</div><div data-element-id="elm_NDW5gk-qJ4ouPSBPu02NSQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_NDW5gk-qJ4ouPSBPu02NSQ"].zpelem-divider{ margin-block-start:10px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div></div></div></div></div><div data-element-id="elm_AkQzUy5kO7zHa5pRoFbgKg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm__KQoLtlxQWF1N3sErmrSrw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_f1N-HbfZJSpOZe7bCxtFeg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_ibBb3IKas2AfFlRJHXYgRg" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_ibBb3IKas2AfFlRJHXYgRg"] .zpimageheadingtext-container figure img { width: 157.46px !important ; height: 37px !important ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/A-team%20protection%20logo.png" data-src="/Blog%20Site/A-team%20protection%20logo.png" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left" data-editor="true"><strong style="color:rgb(192, 57, 43);font-style:italic;">When was the last time you had your API score tested?</strong></h3><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p></p><div><p>If your API hasn’t been tested in a while, you might be relying more on luck than on performance. Unnoticed errors, broken endpoints, or security gaps can easily slip through and impact your users. Our QA team specializes in comprehensive API testing to help you catch issues early, improve system stability, and build user trust.</p><p><br/></p><p>Have a look at our A Team Security Services:</p></div>
<p></p></div></div></div></div><div data-element-id="elm_IiSnilx7SGcWfMI2FCpiEg" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"> [data-element-id="elm_IiSnilx7SGcWfMI2FCpiEg"] .zpbutton.zpbutton-type-primary{ background-color:#C0392B !important; } </style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="/protection" target="_blank"><span class="zpbutton-content">A Team Protection</span></a></div>
</div><div data-element-id="elm_Y9LUKbZInCSEOrQf7093vg" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"></style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_HW9ThXI-2MG49_VV985xKw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><em>Lelapa AI continues to grow across African markets, serving enterprise clients with validated security and regulatory compliance.</em></p><p><em><br/></em></p><p><strong>We're grateful to Jade Abbott and the Lelapa AI team for taking the time to share their experience and insights for this case study.</strong></p></div><p></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 27 Oct 2025 12:38:44 +0000</pubDate></item><item><title><![CDATA[The Five Most Common Vulnerabilities Uncovered During Penetration Testing ]]></title><link>https://www.gtconsult.com/blogs/post/the-five-most-common-vulnerabilities-uncovered-during-penetration-testing-real-life-lessons</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/CRITICAL VULNERABILITIES THUMBNAIL.png"/>Discover the five most common vulnerabilities from real 2023-2025 breaches. Learn how weak passwords bankrupted 23andMe and unpatched systems exposed 193M records—and how penetration testing prevents these devastating attacks.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_uJ3z3gRBSmSmvURjDSW3mQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_HKs2gz2KTlSmhFu2iKO2_w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_8-n6u601RPWAGdXGFIBnKQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_KQPkFfIFTgGhrXdNyq910g" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span>Real-Life Lessons</span></h2></div>
<div data-element-id="elm_88zBcHc0TaiAo3Gs11YSjg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><div><p style="margin-bottom:10.6667px;"><span>Now, more than ever, most organizations only discover their security weaknesses after an attack. But it does not have to be that way, a lot these attacks could have been prevented if organizations just had a proactive approach rather than a reactive one when it comes to their cybersecurity.&nbsp;</span></p></div>
<div><p style="margin-bottom:10.6667px;"><span>Penetration testing simulates real-world attacks to identify and help remediate security vulnerabilities before malicious actors can exploit them.</span></p></div>
</div><p></p></div></div><div data-element-id="elm_Nyzryuswbot45m5f24atgw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><b><span>The Uncomfortable Truth About Modern Cybersecurity</span></b></span></h2></div>
<div data-element-id="elm_eU25B0wsXhc0dzePoglOqw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><span>If you’re a security professional, and even if you aren’t actually, this question may have crossed your mind before:</span></p><p><span>&nbsp;</span></p><p><span style="font-style:italic;color:rgb(166, 206, 57);"><strong>**If Microsoft, Google, and healthcare giants with unlimited security budgets can be breached, what chance do we have?**</strong></span></p><p><span>&nbsp;</span></p><p><span>The answer might surprise you—and it starts with understanding that these breaches weren't the result of sophisticated attack chains or unknown zero-day exploits.</span></p><p><span>&nbsp;</span></p><p><span>They failed because of the same vulnerabilities we discovered in majority of penetration tests.</span></p></div><p></p></div>
</div><div data-element-id="elm_wHX25U9BHKr6rWkmEl1-bA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><b><span>Why This Matters to Your Organization</span></b><span>&nbsp;</span></span></h2></div>
<div data-element-id="elm_VjxvhII64Pgn2lwrozKLRQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><span>You might be thinking:&nbsp;</span></p><p><span><br/></span></p><p><span style="font-style:italic;color:rgb(166, 206, 57);"><strong>*&quot;We're not Microsoft. We're not a target for these attacks.&quot;*</strong></span></p><p><span>&nbsp;</span></p><p><span>That's precisely the mindset that creates vulnerability.</span></p><p><span>&nbsp;</span></p><p><span>The attacks that compromised Microsoft or any of the organizations in this blog weren't sophisticated. They were opportunistic. Attackers used password spraying—a technique so basic it's covered in entry-level security courses.</span></p><p><span><br/></span></p><p><span>Your organization doesn't need to be &quot;important enough&quot; to be targeted. You just need to be vulnerable enough to be profitable.</span></p><p><span><br/></span></p><p><span>Let's have a look at the five common vulnerabilities we've uncovered during penetration testing.</span></p><p><span>&nbsp;</span></p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_swwpEbiD9b9kRv574PwfjA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_MF-CrQAOWtnkLiwL6mLzOg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_LszLbRe4uqhpYpJcKYbozQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_cCPWvW4-aCiziCKkKpnl2g" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_cCPWvW4-aCiziCKkKpnl2g"] .zpimageheadingtext-container figure img { width: 500px ; height: 333.44px ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-medium zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/strong-and-weak-easy-password-concept-2025-02-21-00-00-34-utc.jpg" data-src="/Blog%20Site/strong-and-weak-easy-password-concept-2025-02-21-00-00-34-utc.jpg" size="medium" data-lightbox="true"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left" data-editor="true"><strong style="color:rgb(0, 27, 76);">1. Weak or Reused Passwords</strong></h3><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p></p><p><strong>23andMe (2023-2024)</strong>: In 2023, 23andMe experienced a credential stuffing attack that exposed genetic data of approximately 7 million customers—roughly half of the service's userbase. The breach had devastating consequences, with the biotech company filing for Chapter 11 bankruptcy in March 2025. The UK Information Commissioner's Office fined 23andMe £2.3 million for failing to implement mandatory multi-factor authentication and secure password requirements. This demonstrates the catastrophic business impact that credential-based attacks can have on organizations.</p><p><br/></p><p><span><strong>Snowflake Breaches (2024):</strong> The Snowflake breach in late 2024 exposed customer data where improperly secured accounts—some without multifactor authentication—were used to exfiltrate information. This breach affected multiple organizations using the platform and highlighted how weak authentication practices can have cascading effects across an entire ecosystem.</span><br/></p><p><span><br/></span></p><p><span></span></p><div><p><strong>The Scale of the Problem:</strong> In 2025, researchers discovered 16 billion exposed credentials from 30 different databases, primarily harvested by infostealer malware campaigns, representing the largest credential breach compilation recorded to date. Analysis of data leaks from 2024-2025 reveals that 94% of passwords are reused or duplicated, with only 6% being unique.</p><p>Weak or reused passwords are one of the easiest ways for attackers to gain unauthorized access. Despite widespread use of multi-factor authentication (MFA), poor password practices remain a primary entry point for attacks.</p></div><br/><p></p><p><span></span></p><div><p><strong>Prevention:</strong></p><ul><li>Enforce complex, unique passwords and implement MFA</li><li>Conduct regular password audits</li><li>Educate employees about password hygiene</li></ul><div><span><strong><br/></strong></span></div><div><span><strong>Pen Test Role:</strong> Pen testers use brute-force attacks, credential stuffing, and password spraying to uncover weak or reused passwords across systems.</span><br/></div></div><p></p></div>
</div></div></div></div></div></div></div><div data-element-id="elm_YHs4ovdUB14TNwZexIE1KA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_nM3WSnS_zhXI5ty4oFyazA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_HErHEM45O1qgRZV61i8iuA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_pQQWX2wwFnnQP-U_PV39xQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-size:24px;color:rgb(0, 27, 76);"><strong>2. Unpatched Systems &amp; Software</strong></span></h2></div>
<div data-element-id="elm_UX7pjrT-3QrFCu5VyfpvpQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><strong>Change Healthcare (2024):</strong> In February 2024, United Health-owned prescription processor Change Healthcare suffered a massive ransomware attack that cost the company $2.457 billion and exposed the private data of approximately 193 million individuals—making it the largest healthcare data breach ever reported. The ALPHV/BlackCat ransomware group exploited a Citrix remote access service that lacked multi-factor authentication. This breach disrupted healthcare services across the United States, affecting 94% of hospitals and preventing billions of dollars in claims processing.</span></p><p><span><br/></span></p><p><span></span></p><div><p><strong>MOVEit Transfer (2023):</strong> In May 2023, the CLOP ransomware gang exploited a zero-day SQL injection vulnerability (CVE-2023-34362) in Progress Software's MOVEit Transfer application. By the end of 2023, the attack had compromised more than 2,700 organizations and exposed approximately 93.3 million personal records, with total damages estimated at $12.15 billion. High-profile victims included British Airways, the BBC, Shell, the U.S. Department of Energy, and numerous universities. This breach highlighted the critical importance of rapid vulnerability patching and the devastating consequences of zero-day exploits.</p><p><br/></p><p><strong>AVTECH IP Cameras (2024):</strong> In August 2024, security researchers discovered an unpatched vulnerability in AVTECH IP cameras used in critical infrastructure was being exploited to spread Mirai malware, despite the vulnerability being known since 2019. This five-year delay in addressing a known vulnerability put essential services at risk.</p></div><p></p></div>
</div><div data-element-id="elm_jfKxukBsa3fdBF4ViATjAw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_jfKxukBsa3fdBF4ViATjAw"] .zpimagetext-container figure img { width: 500px ; height: 356.88px ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-medium zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/keys-to-deploy-and-patch-2025-10-13-10-07-42-utc.jpg" size="medium" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p><span>Outdated systems and unpatched software are among the most common vulnerabilities exploited by attackers. Missing security updates can allow attackers to leverage known vulnerabilities to compromise systems.</span></p><p><span><br/></span></p><p><span></span></p><div><p><strong>Prevention:</strong></p><ul><li>Maintain a robust patch management program</li><li>Conduct regular vulnerability scans</li><li>Prioritize patching critical systems</li></ul><p><strong><br/></strong></p><p><strong>Pen Test Role:</strong> Pen testers identify unpatched systems and attempt to exploit publicly known vulnerabilities (CVEs) to assess the potential impact.</p></div><br/><p></p></div>
</div></div></div></div></div></div><div data-element-id="elm_VXvtA4j7W9MVMkGbmcn8zw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_SoJwQ82Dr6ZrWWwyzcDZwQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_XF2F0hhpplR2gg0ePlbjWg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_SlJrOxZAypPFF91NfIHnJQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-size:24px;color:rgb(0, 27, 76);"><strong>3. Misconfigured Permissions &amp; Access Controls</strong></span></h2></div>
<div data-element-id="elm_5xMQdQebX6Gr86Grt8KvVw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><strong>Microsoft Breach (2024):</strong> In late 2023 (discovered January 2024), state-backed cyber espionage group Midnight Blizzard (also known as APT29, Nobelium, and CozyBear) gained access to Microsoft leadership and cybersecurity team emails. The attackers used password spraying attacks against a legacy test account that lacked multi-factor authentication and had elevated access. They then exploited a legacy OAuth application that granted full access to all mailboxes in the organization. Even one of the world's leading technology companies fell victim to misconfigured access controls and orphaned test accounts.</span></p></div>
</div><div data-element-id="elm_keLX2Wj9ocUXXEu4d-jnqA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><strong>Marks &amp; Spencer (2025):</strong> In May 2025, M&amp;S suffered a major cyberattack attributed to the &quot;Scattered Spider&quot; group deploying DragonForce ransomware, potentially linked to vulnerabilities in its IT outsourcing partner Tata Consultancy Services, with an expected £300 million profit loss. This breach demonstrates how misconfigurations in third-party relationships can have massive financial consequences.</span></p></div>
</div><div data-element-id="elm_BrS7AkcFfza4Vuq4-TD0yA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><strong>Western Alliance Bank (2025):</strong> Western Alliance Bank experienced a data breach in March 2025, stemming from exploitation of a zero-day vulnerability in a third-party secure file transfer tool provided by Cleo. The Clop ransomware group gained unauthorized access to approximately 22,000 customers' sensitive information, highlighting vulnerabilities in supply chain security.</span></p></div>
</div></div></div></div></div><div data-element-id="elm_3gVr-Be2hrQkMlsK06WgJg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZnqnRkvmZn1h7AjtZMSCkg" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_7Wkws9QEStbs3SeYAQXQwQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_7Wkws9QEStbs3SeYAQXQwQ"].zpelem-col{ margin-block-start:-164px; } </style><div data-element-id="elm_NhAMyyxJb524iAnkaX_fWA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_NhAMyyxJb524iAnkaX_fWA"].zpelem-text { margin-block-start:171px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span></span></p><div><p><strong>Prevention:</strong></p><ul><li>Enforce least-privilege access principles</li><li>Regularly review and audit permissions</li><li>Segment networks and sensitive data appropriately</li><li>Remove legacy and test accounts with elevated privileges</li></ul><p><strong><br/></strong></p><p><strong>Pen Test Role:</strong> Pen testers attempt privilege escalation, unauthorized access, and lateral movement to uncover misconfigurations.</p></div><p><span><br/></span></p><p><span><br/></span></p></div>
</div></div><div data-element-id="elm_eM9f85hggJ45zoOhr-u3NA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_0PrJZrGpfjVJj4r7gb70Ew" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_0PrJZrGpfjVJj4r7gb70Ew"] .zpimage-container figure img { width: 534px !important ; height: 339px !important ; } } @media (max-width: 767px) { [data-element-id="elm_0PrJZrGpfjVJj4r7gb70Ew"] .zpimage-container figure img { width:415px ; height:276.39px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Screenshot%202025-10-20%20150919.png" width="415" height="276.39" loading="lazy" size="custom"/></picture></span></figure></div>
</div></div></div></div></div><div data-element-id="elm_-GZ5iHujlFHvkHyglKYXng" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_JZBVUmwXys8bi4-eH4424g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_SA67up74noiBNTH5K3CodA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_tA36bCw4yeJqIlnMLM06Fw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-size:24px;color:rgb(0, 27, 76);"><strong>4. Insufficient Network Monitoring &amp; Logging</strong></span></h2></div>
<div data-element-id="elm_7SJrg3a0pMuKH-lFO4k4yQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><strong>Office of the Comptroller of the Currency (2025):</strong> In early 2025, the U.S. OCC identified suspicious interactions between a system administrative account and internal user mailboxes—activity that had gone undetected for months, raising concerns about the agency's visibility into its systems and the effectiveness of its logging practices. This breach at a federal financial regulator highlighted how even government agencies struggle with monitoring gaps.</p><p><br/></p><p><strong>AT&amp;T Breach (2022-2024):</strong> AT&amp;T confirmed a significant data breach involving unauthorized access to its Snowflake cloud storage environment. The breach occurred between May 1, 2022, and October 31, 2022, but wasn't detected until April 2024—a detection delay of nearly two years. The breach exposed over 86 million records, including Social Security Numbers. This prolonged detection window allowed attackers extensive time to access and potentially monetize sensitive customer data.</p><p>Without effective monitoring and logging, suspicious activity can go undetected, giving attackers more time to exploit vulnerabilities and exfiltrate data.</p></div><p></p></div>
</div><div data-element-id="elm_TSYZKIxBq06RfvT0EPudSA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><strong>Prevention:</strong></p><ul><li>Implement centralized logging and real-time monitoring solutions</li><li>Regularly analyze logs for anomalies</li><li>Set up automated alerts for suspicious activity</li><li>Establish baseline behavior to detect deviations</li></ul><p><strong><br/></strong></p><p><strong>Pen Test Role:</strong> Pen testers attempt to bypass detection and exfiltrate data to identify gaps in monitoring systems and incident response processes.</p></div><p></p></div>
</div><div data-element-id="elm_82n8Go8UnMobWIli9PqS9g" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-size:24px;color:rgb(0, 27, 76);"><strong>5. Human Error &amp; Social Engineering Vulnerabilities</strong></span></h2></div>
<div data-element-id="elm_s35FSM2BjhpANhWBhCwhGA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_s35FSM2BjhpANhWBhCwhGA"] .zpimage-container figure img { width: 1110px ; height: 459.26px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/pensive-doubtful-businessman-brainstorming-ideas-2025-02-18-02-35-46-utc.JPG" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_qwwrJ76KvnNj1w3HinRCng" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><strong>Coinbase (2025):</strong> In May 2025, Coinbase confirmed a breach when cybercriminals bribed overseas support staff to leak sensitive customer data, including names, birthdates, email addresses, and partial Social Security numbers. Attackers used this data to orchestrate highly targeted social engineering attacks against customers. This breach highlighted the vulnerability of outsourced operations and the human element in security, demonstrating that even financial incentives can compromise insider threats.</p><p><br/></p><p><strong>Google Salesforce Breach (2025):</strong> In August 2025, Google confirmed a data breach from a compromised Salesforce-hosted corporate database. The hacking group ShinyHunters gained access through social engineering by impersonating IT support staff and tricking a Google employee into approving a malicious application. Even at tech giants with sophisticated security teams and trained personnel, social engineering remains remarkably effective.</p><p><br/></p><p><strong>Workday Breach (2025):</strong> On August 18, 2025, Workday disclosed a data breach stemming from a social engineering campaign where threat actors impersonated HR or IT staff. They contacted employees by phone or text to trick them into granting access to a third-party CRM platform. This demonstrates the evolving sophistication of social engineering tactics and the importance of verification procedures for access requests.</p><p>Humans are often the weakest link in cybersecurity. Attackers use phishing, pretexting, impersonation, and other social engineering tactics to manipulate employees into granting access.</p></div><p></p></div>
</div><div data-element-id="elm_Rcv30wOoXGc3U4DlgVEnNA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><strong>Prevention:</strong></p><ul><li>Conduct ongoing security awareness training</li><li>Simulate phishing campaigns regularly</li><li>Implement multi-factor authentication and verify requests for sensitive actions</li><li>Establish clear protocols for verifying identity before granting access</li><li>Create a culture where employees feel comfortable questioning suspicious requests</li></ul><p><strong><br/></strong></p><p><strong>Pen Test Role:</strong> Pen testers simulate phishing attacks and social engineering scenarios to assess employee awareness and identify weak points in organizational security culture.</p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_55eupCmehmJZB7u8g3Wyxw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_icfhLNsVUAXd3grU_izZ3g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_bdveC3dLaCgF1liOFwQJog" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_MFeHPn3zwVAiRpcO4BOWtw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-size:24px;color:rgb(0, 27, 76);"><strong>Conclusion</strong></span></h2></div>
<div data-element-id="elm_png9rh5TOgppzwbsVA6hGQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>Penetration testing serves as a proactive approach to identifying and mitigating security vulnerabilities. By addressing these common weaknesses, organizations can significantly enhance their security posture. The breaches highlighted above demonstrate that no organization—regardless of size, industry, or technical sophistication—is immune to cyber attacks when fundamental security controls are not properly implemented and maintained.</span></p></div>
</div><div data-element-id="elm_n3e9qx_EEblhReZkq0oXfA" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"></style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div></div></div></div></div><div data-element-id="elm_JwnRr7WVo9656OyLMHE81A" data-element-type="section" class="zpsection zplight-section zplight-section-bg zscustom-section-145 "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_XflqE4kytax2YPuXh-KpMg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_Hh3etpQ3mU32ZhQSM5vEMg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_M2HwpZrIAYpyg9iR0Jtp_g" data-element-type="box" class="zpelem-box zpelement zpbox-container zsbox-spacing zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_M2HwpZrIAYpyg9iR0Jtp_g"].zpelem-box{ background-color:rgb(255, 255, 255); background-image:unset; margin-block-start:24px; } </style><div data-element-id="elm_89sFocecBJmMVD_fW0Dq8A" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_89sFocecBJmMVD_fW0Dq8A"] div.zpspacer { height:6px; } @media (max-width: 768px) { div[data-element-id="elm_89sFocecBJmMVD_fW0Dq8A"] div.zpspacer { height:calc(6px / 3); } } </style><div class="zpspacer " data-height="6"></div>
</div><div data-element-id="elm_-G9Zq8h74gIZYTgsm6l7XQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-G9Zq8h74gIZYTgsm6l7XQ"].zpelem-text { margin-block-start:-10px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>At GTconsult, we specialize in penetration testing services tailored to your organization's needs. Our team of experts utilizes the latest tools and methodologies to uncover vulnerabilities and provide actionable recommendations to fortify your defences.</p><p><br/></p><p>Don't wait for a breach to occur. Contact GTconsult today to schedule a penetration test and take the first step towards securing your organization's future.</p></div><p></p></div>
</div><div data-element-id="elm__Rq63HSz2DN0RSjD4-FMdg" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://www.gtconsult.com/protection" target="_blank" title="A Team Protection"><span class="zpbutton-content">Get a Penetration Test</span></a></div>
</div></div></div><div data-element-id="elm_IJZGal7aUaeVWT8KzEG-vg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zsorder-one zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_UnTFvVXZJD8LmNLs93BZrw" data-element-type="video" class="zpelement zpelem-video "><style type="text/css"> [data-element-id="elm_UnTFvVXZJD8LmNLs93BZrw"].zpelem-video{ margin-block-start:42px; } @media (max-width: 767px) { [data-element-id="elm_UnTFvVXZJD8LmNLs93BZrw"].zpelem-video iframe.zpvideo{ width:560px !important; height:315px !important; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_UnTFvVXZJD8LmNLs93BZrw"].zpelem-video iframe.zpvideo{ width:560px !important; height:315px !important; } } </style><div class="zpvideo-container zpiframe-align-left zpiframe-mobile-align-center zpiframe-tablet-align-center"><iframe class="zpvideo " width="560" height="304" src="https://www.youtube.com/embed/e4YSke1x13o?si=0gkyiijiHFyz0FoL" frameborder="0" allowfullscreen></iframe></div>
</div></div></div><div data-element-id="elm_UzyVib124nFr7V_sv9U7-Q" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_HAVbHCAfaLzb-qi_wX2dYw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_4AHqBA_-fHWv4zTn7J90KA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_4AHqBA_-fHWv4zTn7J90KA"] div.zpspacer { height:4px; } @media (max-width: 768px) { div[data-element-id="elm_4AHqBA_-fHWv4zTn7J90KA"] div.zpspacer { height:calc(4px / 3); } } </style><div class="zpspacer " data-height="4"></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 22 Oct 2025 13:25:44 +0000</pubDate></item><item><title><![CDATA[Why Your Microsoft Secure Score Isn't Improving (And What That Really Means for Your Business) ]]></title><link>https://www.gtconsult.com/blogs/post/why-your-microsoft-secure-score-isn-t-improving-and-what-that-really-means-for-your-business</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/Copy of Yellow And Red Unboxing And Review YouTube Thumbnail -1-.png"/>Learn why your Microsoft Secure Score is stuck and how to boost security and compliance in Microsoft 365 with practical solutions for IT leaders.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_aduHP00uQrWAabzM9HGCPA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_70PmAGJfSfayEIIKSS9GUA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_2AHPx1VARvOinnr5Uf4Ykw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Z0RjBqH1ShOEaVS5Wp-VDQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span>A critical analysis for IT leaders managing Microsoft 365 security</span></h2></div>
<div data-element-id="elm_SxaieD8jTTWoRk7gkoHsjA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span><span style="font-style:italic;"><span>Your Secure Score doesn't improve by accident. It improves through systematic, expert-driven security optimization. The question isn't whether your score should be higher—it's whether you have the capacity and expertise to get it there.</span></span></span></p></div>
</div><div data-element-id="elm_NPvfdP47qQN4GT9zF0gpVg" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"></style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div></div></div></div></div><div data-element-id="elm_TUS1kUNXBDFzafld7h7JDg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_N78J3BAz1e6S3OrGPWWVSA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_uy6kBBE5n5_wQfrz5LWyPg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_WiZ2lcMxww4pkrlP0Sg5Qw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_WiZ2lcMxww4pkrlP0Sg5Qw"] .zpimage-container figure img { width: 1110px ; height: 481.46px ; } } @media (max-width: 767px) { [data-element-id="elm_WiZ2lcMxww4pkrlP0Sg5Qw"] .zpimage-container figure img { width:753px ; height:351px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-roundcorner zpimage-space-none " src="/Blog%20Site/Copy%20of%20Sponsor%20Announcement%20Graphic.png" width="753" height="351" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_Czny59WAtVezvUn6NZFMlQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_Czny59WAtVezvUn6NZFMlQ"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_Czny59WAtVezvUn6NZFMlQ"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_lRGvD4ohxueIP4_KiZUgMw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_3Hcgx8TKvYF5qBmpyi7ujQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-3 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_RIUF4Y1moLPv5o0yxhupZw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong>The Dashboard That Never Changes&nbsp;</strong></h2></div>
</div><div data-element-id="elm_BqaISxuzGoGQcZ_jGsEy9Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-9 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_IM5mleMPGa9hr6xMgx45HQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h5
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><span>You log into the Microsoft Defender portal for the third month in a row. Your Secure Score sits stubbornly at 58%. The same recommendations stare back at you. Enable MFA for all users. Configure DLP policies. Block legacy authentication. You know what needs to be done, but somehow, nothing changes.&nbsp;</span></span><br/>​<br/><span><span>If this sounds familiar, you're not alone. Organizations worldwide are discovering that Microsoft Secure Score—while an excellent security measurement tool—reveals a gap that many teams struggle to close: the difference between knowing what to do and actually doing it.&nbsp;</span></span><br/>​<br/><span><span>The real question isn't whether you understand the recommendations. It's whether you have the capacity, expertise, and processes to implement them effectively across your entire Microsoft 365 environment.&nbsp;</span></span></h5></div>
<div data-element-id="elm_4hHbnNmLEYEq9Pi9lxlGlw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_4hHbnNmLEYEq9Pi9lxlGlw"] div.zpspacer { height:3px; } @media (max-width: 768px) { div[data-element-id="elm_4hHbnNmLEYEq9Pi9lxlGlw"] div.zpspacer { height:calc(3px / 3); } } </style><div class="zpspacer " data-height="3"></div>
</div></div></div></div></div></div></div><div data-element-id="elm_w7EpntQd5lRyNLsR9n-_DQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_b2jKK04z6R2WcM4XNAAFgA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_WbAGfMEXLVOD5pGJsjTsvg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_NR_4URS3CGUTAktJcOdkRA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-weight:800;">The Hidden Reality Behind Static Scores&nbsp;</span></h2></div>
<div data-element-id="elm_tE0y96LuXbM4jGCqPSsPeQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><p style="margin-bottom:10.6667px;"><span>Microsoft's 2025 Secure Score updates bring expanded coverage for Azure and Microsoft Defender, improved benchmarking, and easier compliance mapping to frameworks like NIST and ISO 27001. These enhancements make the score more comprehensive—and the recommendations more numerous.&nbsp;</span></p></div><div><p style="margin-bottom:10.6667px;"><span>For IT teams already stretched thin, this creates a paradox: better visibility into security gaps, but less time to address them.&nbsp;</span></p></div><div><p style="margin-bottom:10.6667px;"><span>Consider the typical scenario. Your organization has hundreds of improvement actions available. Some require significant resource commitments that turn into full-scale projects. Others demand specialized knowledge of Microsoft 365 security features that your team hasn't had time to develop. Many are locked behind higher-tier licensing that wasn't in this year's budget.&nbsp;</span></p></div><div><p style="margin-bottom:10.6667px;"><span>Meanwhile, threats don't wait for your next planning cycle. Microsoft mitigated 1.25 million DDoS attacks in 2024, representing a 4x increase compared with the previous year. The threat landscape is accelerating faster than most organizations can keep pace.&nbsp;</span></p></div></div><p></p></div>
</div><div data-element-id="elm_73DHP36_78XJU6CBbemXPw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-weight:800;">Why &quot;Just Following the Recommendations&quot; Doesn't Work</span></h2></div>
<div data-element-id="elm_ZNqJKmZBzqT0FhuIiDCUwA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><p style="margin-bottom:10.6667px;"><span>The Secure Score interface makes it seem straightforward: here's your score, here are recommendations, implement them, score goes up. Simple, right?&nbsp;</span></p></div><div><p style="margin-bottom:10.6667px;"><span>Except it's not. Each recommendation exists within a complex web of:&nbsp;</span></p></div></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_3_i5E2o4-04wgSz8_kKPIA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_gMd1H2VRc9WHycscKIh0nw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_PGLQD6C8PN1e4GNh59Kbpw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_pmTQsZvD79S4TgO3xwEs5Q" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-center zpicon-align-mobile-center zpicon-align-tablet-center "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 640 512" height="640" width="512" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path d="M624 416H381.54c-.74 19.81-14.71 32-32.74 32H288c-18.69 0-33.02-17.47-32.77-32H16c-8.8 0-16 7.2-16 16v16c0 35.2 28.8 64 64 64h512c35.2 0 64-28.8 64-64v-16c0-8.8-7.2-16-16-16zM576 48c0-26.4-21.6-48-48-48H112C85.6 0 64 21.6 64 48v336h512V48zm-64 272H128V64h384v256z"></path></svg></span><h3 class="zpicon-heading " data-editor="true"><span>Technical Dependencies:</span></h3><div class="zpicon-text-container " data-editor="true"><p></p><div><div><div><ul><li style="margin-left:24px;"><p style="text-align:left;">Some improvements require prerequisite configurations&nbsp;</p></li></ul></div><div><ul><li style="margin-left:24px;"><p style="text-align:left;">Changes in one area can impact functionality in another&nbsp;</p></li></ul></div></div><div><div><ul><li style="margin-left:24px;"><p style="text-align:left;">Integration with existing security tools must be maintained&nbsp;</p></li></ul></div><div><ul><li style="margin-left:24px;"><p style="text-align:left;">Legacy systems may not support recommended controls&nbsp;</p></li></ul></div><br/></div></div>
<p></p></div></div></div></div><div data-element-id="elm_ynlb5ASEWkrLOcOXkNBbEw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_cKAcEwMJ53ZfTOif-hZ1Cw" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-center zpicon-align-mobile-center zpicon-align-tablet-center "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 512 512" height="512" width="512" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path d="M332.8 320h38.4c6.4 0 12.8-6.4 12.8-12.8V172.8c0-6.4-6.4-12.8-12.8-12.8h-38.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h38.4c6.4 0 12.8-6.4 12.8-12.8V76.8c0-6.4-6.4-12.8-12.8-12.8h-38.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-288 0h38.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-38.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h38.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-38.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zM496 384H64V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-32c0-8.84-7.16-16-16-16z"></path></svg></span><h3 class="zpicon-heading " data-editor="true"><span>Business Considerations:<br/></span></h3><div class="zpicon-text-container " data-editor="true"><p></p><div><div><ul><li style="margin-left:24px;"><p style="text-align:left;">User experience impacts from security changes&nbsp;</p></li></ul></div><div><ul><li style="margin-left:24px;"><p style="text-align:left;">Departmental workflows that depend on current configurations&nbsp;</p></li></ul></div><div><ul><li style="margin-left:24px;"><p style="text-align:left;">Training requirements for new security features&nbsp;</p></li></ul></div><div style="text-align:left;"><br/></div><div><ul><li style="margin-left:24px;"><p style="text-align:left;">Change management across diverse user groups&nbsp;</p></li></ul></div></div>
<p></p></div></div></div></div><div data-element-id="elm_KaY7BOHlNbOI0uWBF87u1g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_HuYM-e_bb2t1vgZ3W8pQjw" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-center zpicon-align-mobile-center zpicon-align-tablet-center "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 640 512" height="640" width="512" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path d="M96 224c35.3 0 64-28.7 64-64s-28.7-64-64-64-64 28.7-64 64 28.7 64 64 64zm448 0c35.3 0 64-28.7 64-64s-28.7-64-64-64-64 28.7-64 64 28.7 64 64 64zm32 32h-64c-17.6 0-33.5 7.1-45.1 18.6 40.3 22.1 68.9 62 75.1 109.4h66c17.7 0 32-14.3 32-32v-32c0-35.3-28.7-64-64-64zm-256 0c61.9 0 112-50.1 112-112S381.9 32 320 32 208 82.1 208 144s50.1 112 112 112zm76.8 32h-8.3c-20.8 10-43.9 16-68.5 16s-47.6-6-68.5-16h-8.3C179.6 288 128 339.6 128 403.2V432c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48v-28.8c0-63.6-51.6-115.2-115.2-115.2zm-223.7-13.4C161.5 263.1 145.6 256 128 256H64c-35.3 0-64 28.7-64 64v32c0 17.7 14.3 32 32 32h65.9c6.3-47.4 34.9-87.3 75.2-109.4z"></path></svg></span><h3 class="zpicon-heading " data-editor="true"><span>Resource Realities:</span></h3><div class="zpicon-text-container " data-editor="true"><p></p><div><div><ul><li style="margin-left:24px;"><p style="text-align:left;">Limited security expertise in-house&nbsp;</p></li></ul></div><div><ul><li style="margin-left:24px;"><p style="text-align:left;">Competing priorities across IT projects&nbsp;</p></li></ul></div><div><ul><li style="margin-left:24px;"><p style="text-align:left;">Budget constraints for licensing upgrades&nbsp;</p></li></ul></div><div><ul><li style="margin-left:24px;"><p style="text-align:left;">Time pressure from day-to-day operations&nbsp;</p></li></ul></div></div>
<p></p></div></div></div></div></div><div data-element-id="elm_fKCBuQFDhu6-MbsgwdX6tg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_hHr37nJ-FENMemBZeG4zMA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_F0riJnjzty9eDzDqc2JIrQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>Admin accounts have access to everything—including the most sensitive data—yet properly securing these accounts requires coordinated effort across multiple teams and systems. Privileged access management remains one of the most challenging aspects of Microsoft 365 security configuration.&nbsp;</span></p></div>
</div></div></div><div data-element-id="elm_JFte0z1VqIQQnFGvopFHtg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_RYo92VzPPcNs1LqDam_jkQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_eZ-h8GtIt_qbDqpaMZWRdA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_eZ-h8GtIt_qbDqpaMZWRdA"] .zpimagetext-container figure img { width: 182px !important ; height: 182px !important ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Kyle%20circle.png" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p></p><div><p><br/></p><p><br/></p><p>&quot;As the resident security Analyst at GTconsult, this section hits closest to home as the competing priorities and time pressures that would arise before having the right tools for the job would mean endless days of burn out for myself and my team. With the right tools and knowledge, the security element is handled much more efficiently and free's up time to keep up with the day to day priorities.&quot;</p><div><br/></div></div><div><br/></div><p></p></div>
</div></div><div data-element-id="elm_gD2NTZ5Sk0y-Q1Vfmh0MJg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-weight:800;">The Compliance Connection You Can't Ignore</span></h2></div>
<div data-element-id="elm_CAVIJ31cYW7MXbPxD3L9ZA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><p style="margin-bottom:10.6667px;"><span>Here's what makes this more than just a security metrics problem: your Secure Score directly impacts compliance posture. The 2025 updates include easier mapping to compliance frameworks including NIST, ISO 27001, and industry-specific regulations.&nbsp;</span></p></div><div><p style="margin-bottom:10.6667px;"><span>If you're in a regulated industry—financial services, healthcare, government—your Secure Score isn't just an IT metric. It's evidence of your security control implementation. Auditors increasingly reference Microsoft's security recommendations in their assessments. A stagnant Secure Score can translate to audit findings, compliance gaps, and regulatory scrutiny.&nbsp;</span></p></div><div><p style="margin-bottom:10.6667px;"><span>For organizations managing POPIA compliance in South Africa, UK GDPR requirements, or multiple international frameworks, Microsoft 365 security configuration becomes a critical compliance control. The technical controls Microsoft recommends often align directly with regulatory requirements.&nbsp;</span></p></div><div><p style="margin-bottom:10.6667px;"><span>But here's the challenge: knowing that these configurations matter for compliance doesn't magically create the capacity to implement them.&nbsp;</span></p></div></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_oo4rchvvduFQ6zEpBCZQSg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_08uztE1mjE8StOy9NYoWiQ" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_DNVGl-z7lZ5_0QWt9Dd7xA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_xPFLoYrOcTWiPnfWYET0ZA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_xPFLoYrOcTWiPnfWYET0ZA"] .zpimage-container figure img { width: 511px !important ; height: 294px !important ; } } @media (max-width: 767px) { [data-element-id="elm_xPFLoYrOcTWiPnfWYET0ZA"] .zpimage-container figure img { width:415px ; height:283.04px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/score-on-dedicated-dashboardh.png" width="415" height="283.04" loading="lazy" size="custom"/></picture></span></figure></div>
</div></div><div data-element-id="elm__HyWsTBGAv7ikGFmraakBQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_aNQPILjbbEQYrQ9M8DlzbQ" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-left zpicon-align-mobile-left zpicon-align-tablet-left "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 640 512" height="640" width="512" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path d="M320 144c-53.02 0-96 50.14-96 112 0 61.85 42.98 112 96 112 53 0 96-50.13 96-112 0-61.86-42.98-112-96-112zm40 168c0 4.42-3.58 8-8 8h-64c-4.42 0-8-3.58-8-8v-16c0-4.42 3.58-8 8-8h16v-55.44l-.47.31a7.992 7.992 0 0 1-11.09-2.22l-8.88-13.31a7.992 7.992 0 0 1 2.22-11.09l15.33-10.22a23.99 23.99 0 0 1 13.31-4.03H328c4.42 0 8 3.58 8 8v88h16c4.42 0 8 3.58 8 8v16zM608 64H32C14.33 64 0 78.33 0 96v320c0 17.67 14.33 32 32 32h576c17.67 0 32-14.33 32-32V96c0-17.67-14.33-32-32-32zm-16 272c-35.35 0-64 28.65-64 64H112c0-35.35-28.65-64-64-64V176c35.35 0 64-28.65 64-64h416c0 35.35 28.65 64 64 64v160z"></path></svg></span><h2 class="zpicon-heading " data-editor="true"><span style="font-weight:800;">The Real Cost of Inaction</span></h2><div class="zpicon-text-container " data-editor="true"><p></p><div><div><p style="margin-bottom:10.6667px;"><span>Static Secure Scores aren't just embarrassing dashboard metrics. They represent real business risk:&nbsp;</span></p></div><div><p style="margin-bottom:10.6667px;"><span style="font-weight:bold;">Security Exposure:</span><span>&nbsp;</span></p></div><div><ul><li style="margin-left:24px;"><p><span>Unimplemented recommendations are known vulnerabilities&nbsp;</span></p></li></ul></div><div><ul><li style="margin-left:24px;"><p><span>Attackers increasingly target Microsoft 365 environments&nbsp;</span></p></li></ul></div><div><ul><li style="margin-left:24px;"><p><span>Each day of delayed implementation extends risk exposure&nbsp;</span></p></li></ul></div><div><ul><li style="margin-left:24px;"><p><span>Compromised accounts can lead to data breaches and ransomware&nbsp;</span></p></li></ul></div></div><p></p></div>
</div></div></div></div><div data-element-id="elm_2dOUp50F0t7SXCzPYF8ZjA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_EXWP1pD1YgewxBWEAw3aUw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_aMkFkKUmutFUJbCm5lgDSg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_aMkFkKUmutFUJbCm5lgDSg"] div.zpspacer { height:2px; } @media (max-width: 768px) { div[data-element-id="elm_aMkFkKUmutFUJbCm5lgDSg"] div.zpspacer { height:calc(2px / 3); } } </style><div class="zpspacer " data-height="2"></div>
</div></div></div><div data-element-id="elm_Dqblgi_dMn26hTIFomf6Ow" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_dUXr8jy1UqIR6fUFodosig" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_YnaghANkvNo-RWyb6bHIGQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><p style="margin-bottom:10.6667px;"><span style="font-weight:bold;">Compliance Risk:</span><span>&nbsp;</span></p></div><div><ul><li style="margin-left:24px;"><p><span>Audit findings from inadequate security controls&nbsp;</span></p></li></ul></div><div><ul><li style="margin-left:24px;"><p><span>Regulatory penalties for insufficient data protection&nbsp;</span></p></li></ul></div><div><ul><li style="margin-left:24px;"><p><span>Failed compliance certifications impacting business operations&nbsp;</span></p></li></ul></div><div><ul><li style="margin-left:24px;"><p><span>Customer trust erosion from security incidents&nbsp;</span></p></li></ul></div></div><p></p></div>
</div></div><div data-element-id="elm_4zXyef6Bm8EYyMWKkOpmlg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_M3HU3aksq8L9-7SMBSqG4A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><p style="margin-bottom:10.6667px;"><span style="font-weight:bold;">Operational Inefficiency:</span>&nbsp;</p></div><div><ul><li style="margin-left:24px;"><p>Security team time spent on repetitive manual tasks&nbsp;</p></li></ul></div><div><ul><li style="margin-left:24px;"><p>Lack of automated security policy enforcement&nbsp;</p></li></ul></div><div><ul><li style="margin-left:24px;"><p>Inconsistent security posture across the organization&nbsp;</p></li></ul></div><div><ul><li style="margin-left:24px;"><p>Reactive security management instead of proactive protection&nbsp;</p></li></ul></div></div><p></p></div>
</div></div><div data-element-id="elm_5SK_O0Kda8WEWPqc7WV9kw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_S1s7OjIg2PSCZIMiqJ6MEQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><div><p style="margin-bottom:10.6667px;"><span style="font-weight:bold;">Strategic Limitations:</span>&nbsp;</p></div><div><ul><li style="margin-left:24px;"><p>Inability to leverage advanced Microsoft 365 security features&nbsp;</p></li></ul></div><div><ul><li style="margin-left:24px;"><p>Missed opportunities for security automation&nbsp;</p></li></ul></div></div><div><div><ul><li style="margin-left:24px;"><p>Competitive disadvantage from inferior security posture&nbsp;</p></li></ul></div><div><ul><li style="margin-left:24px;"><p>Restricted business initiatives due to security concerns&nbsp;</p></li></ul></div><br/></div></div><p></p></div>
</div></div></div><div data-element-id="elm_p7920SqRI1msUNBHvvEu3w" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_Z-N_OanvTp6si6-LhKpAkg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_2dYUOsWvA8x6-ltyJ7G0AQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong><span style="font-weight:800;">What Actually Moves the Needle&nbsp;</span></strong></h2></div>
<div data-element-id="elm_LrRadZxyIpSxlNWrzZ2KYA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_LrRadZxyIpSxlNWrzZ2KYA"].zpelem-text { margin-block-start:15px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><p style="margin-bottom:10.6667px;"><span>Organizations that successfully improve their Secure Scores share common characteristics. They don't just understand the recommendations—they have systematic approaches to implementation.&nbsp;</span></p></div></div><p></p></div>
</div><div data-element-id="elm_JMh0_mcvCUqJ1h_6-16-ww" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_JMh0_mcvCUqJ1h_6-16-ww"] .zpimagetext-container figure img { width: 343px !important ; height: 456.85px !important ; } } [data-element-id="elm_JMh0_mcvCUqJ1h_6-16-ww"].zpelem-imagetext{ margin-block-start:5px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Youtube%20THumbnail%20Top%2010%20Amazing%20Facts%20Design.png" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p></p><div><div><p style="margin-bottom:10.6667px;"><span style="font-weight:bold;"><br/></span></p><p style="margin-bottom:10.6667px;"><span style="font-weight:bold;">They Prioritize Strategically:</span>&nbsp;Rather than attempting all recommendations simultaneously, they identify high-impact, low-effort changes first. Quick wins like disabling external calendar sharing, blocking third-party app registrations, and configuring Teams meeting lobby settings can improve scores by 12 points without additional licensing.&nbsp;</p></div><br/><div><p style="margin-bottom:10.6667px;"><span style="font-weight:bold;">They Automate Where Possible:</span>&nbsp;Manual security configuration across hundreds or thousands of users doesn't scale. Successful organizations leverage automation for policy deployment, security configuration management, and compliance monitoring.&nbsp;</p></div><br/><div><p style="margin-bottom:10.6667px;"><span style="font-weight:bold;">They Maintain Consistency:</span>&nbsp;Security improvements in one area of Microsoft 365 must be maintained as new users onboard, new applications deploy, and business requirements evolve. Consistent policy enforcement requires ongoing management, not one-time configuration.&nbsp;</p></div><br/><div><p style="margin-bottom:10.6667px;"><span style="font-weight:bold;">They Bridge Technical and Business Requirements:</span>&nbsp;Security improvements that break business workflows get rolled back or worked around. Effective implementation balances security requirements with operational needs, ensuring changes stick.&nbsp;</p></div></div><p></p></div>
</div></div><div data-element-id="elm_aXLikX5JTmRmXDx5w9nPcQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-weight:800;">The Path Forward</span></h2></div>
<div data-element-id="elm_yA_ncoWlLjKc3pbpDz5NQA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><p style="margin-bottom:10.6667px;"><span>Improving your Microsoft Secure Score isn't ultimately about the number on the dashboard. It's about systematically reducing your organization's risk exposure while maintaining operational efficiency and compliance requirements.&nbsp;</span></p></div><div><p style="margin-bottom:10.6667px;"><span>The challenge most organizations face isn't lack of intent or understanding. It's lack of capacity and specialized expertise to translate Microsoft's recommendations into effective, sustainable security improvements across complex Microsoft 365 environments.&nbsp;</span></p></div><div><p style="margin-bottom:10.6667px;"><span>Three critical questions determine whether your Secure Score will improve or remain static:&nbsp;</span></p></div><div><ol start="1"><li style="margin-left:24px;"><p><span style="font-weight:bold;">Do you have dedicated resources</span><span> focused on Microsoft 365 security optimization, or is it competing with dozens of other IT priorities?&nbsp;</span></p></li></ol></div><div><ol start="2"><li style="margin-left:24px;"><p><span style="font-weight:bold;"><span>Do you have specialized expertise</span></span><span> in Microsoft 365 security features, or is your team learning as they go while managing daily operations?&nbsp;</span></p></li></ol></div><div><ol start="3"><li style="margin-left:24px;"><p><span style="font-weight:bold;">Do you have systematic processes</span><span> for policy deployment, security monitoring, and ongoing compliance management across your Microsoft 365 environment?&nbsp;</span></p></li></ol></div><div><p style="margin-bottom:10.6667px;"><span><br/></span></p><p style="margin-bottom:10.6667px;"><span>If you answered &quot;no&quot; to any of these questions, you've identified why your Secure Score isn't improving—and what needs to change.&nbsp;</span></p></div></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_6t12iwTbrAOwujwu08dhQA" data-element-type="section" class="zpsection zplight-section zplight-section-bg zscustom-section-120 "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_-wIn5io973Yr3dySEN3OaA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_FYSA59OY95thXJhJg0dRag" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_i4UK90U8vTChWssyeOTtQQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_i4UK90U8vTChWssyeOTtQQ"] div.zpspacer { height:27px; } @media (max-width: 768px) { div[data-element-id="elm_i4UK90U8vTChWssyeOTtQQ"] div.zpspacer { height:calc(27px / 3); } } </style><div class="zpspacer " data-height="27"></div>
</div><div data-element-id="elm_fexhpTUnFjoiyTD7yUU_GQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-weight:800;">Taking Action&nbsp;</span></h2></div>
<div data-element-id="elm_G3S717GR61TNhFyAwtOgFw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_G3S717GR61TNhFyAwtOgFw"] div.zpspacer { height:18px; } @media (max-width: 768px) { div[data-element-id="elm_G3S717GR61TNhFyAwtOgFw"] div.zpspacer { height:calc(18px / 3); } } </style><div class="zpspacer " data-height="18"></div>
</div><div data-element-id="elm_Sg7ECgw49ZKb5DHaQ_NWgg" data-element-type="box" class="zpelem-box zpelement zpbox-container zsbox-spacing zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_Sg7ECgw49ZKb5DHaQ_NWgg"].zpelem-box{ background-color:rgb(255, 255, 255); background-image:unset; margin-block-start:-29px; } </style><div data-element-id="elm_G54eB47liVGL1pesgotUQw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_G54eB47liVGL1pesgotUQw"].zpelem-text { margin-block-start:-12px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><p style="margin-bottom:10.6667px;"><span>Organizations serious about improving their Microsoft 365 security posture recognize that wishful thinking won't change dashboard metrics. Sustainable improvement requires either significant internal capability development or partnership with specialists who focus exclusively on Microsoft 365 security optimization.&nbsp;</span></p></div><div><p style="margin-bottom:10.6667px;"><span style="font-weight:bold;">GTconsult's Secure Score Support</span><span> provides dedicated expertise for organizations that need systematic Microsoft 365 security improvement. Using an all-in-one Office 365 cybersecurity solution designed for regulated organizations and security-focused businesses, we automate compliance, boost your secure score, and simplify control management.&nbsp;</span></p></div><div><p style="margin-bottom:10.6667px;"><span>Rather than struggling with recommendations your team doesn't have capacity to implement, you gain access to specialists who focus exclusively on Microsoft 365 security optimization, compliance automation, and ongoing security posture management.&nbsp;</span></p></div></div><p></p></div>
</div></div></div><div data-element-id="elm_WuiUrV3ApcCy8GPfziUlog" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_eClGBhgwHujLKXYfDyY0zg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_eClGBhgwHujLKXYfDyY0zg"] .zpimage-container figure img { width: 511px !important ; height: 511px !important ; } } @media (max-width: 767px) { [data-element-id="elm_eClGBhgwHujLKXYfDyY0zg"] .zpimage-container figure img { width:415px ; height:480.37px ; } } [data-element-id="elm_eClGBhgwHujLKXYfDyY0zg"].zpelem-image { margin-block-start:58px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Inforcer/Copy%20of%20White%20Modern%20Myth%20And%20Fact%20Instagram%20Post.png" width="415" height="480.37" loading="lazy" size="custom" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_PvPbnE5DYIkmfmr8u1Cvqg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_PvPbnE5DYIkmfmr8u1Cvqg"].zpelem-button{ margin-block-start:-17px; } </style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="https://www.gtconsult.com/GTconsult-Secure-Score-Support" target="_blank" title="GTconsult Secure Score Support"><span class="zpbutton-content">Learn more about GTconsult Secure Score Support → </span></a></div>
</div></div></div><div data-element-id="elm_V1ERQHKitphZbVuKPXU89Q" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_1HCQl7sMq48ZoSlN9slL5A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_QDgo5LucMDB7QQm9lypi5w" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_QDgo5LucMDB7QQm9lypi5w"] div.zpspacer { height:10px; } @media (max-width: 768px) { div[data-element-id="elm_QDgo5LucMDB7QQm9lypi5w"] div.zpspacer { height:calc(10px / 3); } } </style><div class="zpspacer " data-height="10"></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 02 Oct 2025 14:40:52 +0000</pubDate></item><item><title><![CDATA[A Guide to SharePoint Security Best Practices]]></title><link>https://www.gtconsult.com/blogs/post/a-guide-to-sharepoint-security-best-practices</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/SharePoint Security Best Practices Write up.jpg"/>A write up focusing on the best practices when it comes to SharePoint security.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_SsZrnnXWQjiAwjWBa2oqFA" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm_SsZrnnXWQjiAwjWBa2oqFA"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_OszD7tJyRH-yZoYS8eG17g" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- zpbackground-size-cover zpbackground-position-center-center zpbackground-repeat-all zpbackground-attachment-scroll " data-equal-column=""><style type="text/css"> [data-element-id="elm_OszD7tJyRH-yZoYS8eG17g"].zprow{ background-image:linear-gradient(to bottom, rgba(30,34,45,0.74), rgba(30,34,45,0.74)), url(/Blog%20Site/Cyber%20Security.jpg); border-radius:1px; } </style><div data-element-id="elm_0PddenaYREeEbwlCxS5bdw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_0PddenaYREeEbwlCxS5bdw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_2tmj_U8BQhOPF73b9dw0wQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_2tmj_U8BQhOPF73b9dw0wQ"].zpelem-heading { border-radius:1px; text-shadow:1px 1px 1px #000000; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:rgb(255, 255, 255);">Fortifying Your Intranet</span></h2></div>
<div data-element-id="elm_rdneNfkVT3uJBC9XlwVadA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_rdneNfkVT3uJBC9XlwVadA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:rgb(255, 255, 255);">In the dynamic landscape of modern workplaces, the integrity and security of your organization's data are non-negotiable. Nowhere is this more critical than in the heart of your digital operations: the SharePoint Intranet.</span><br></p></div>
</div><div data-element-id="elm_GXKnpTkfQSWabkD9AbFG2w" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_GXKnpTkfQSWabkD9AbFG2w"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"> [data-element-id="elm_GXKnpTkfQSWabkD9AbFG2w"] .zpbutton.zpbutton-type-primary:hover{ color: #FFFFFF !important; } </style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval zpbutton-outline " href="https://www.gtconsult.com/protection" target="_blank" title="A Team Protection"><span class="zpbutton-content">A Team Protection</span></a></div>
</div><div data-element-id="elm_vCztPkIkXBmqMLEBXo4osg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_vCztPkIkXBmqMLEBXo4osg"] div.zpspacer { height:14px; } @media (max-width: 768px) { div[data-element-id="elm_vCztPkIkXBmqMLEBXo4osg"] div.zpspacer { height:calc(14px / 3); } } </style><div class="zpspacer " data-height="14"></div>
</div></div></div></div></div><div data-element-id="elm_-1DR2GWiyQeG51r5T6hFyQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_-1DR2GWiyQeG51r5T6hFyQ"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_62P3aRIJogHMKKLflue_gQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_62P3aRIJogHMKKLflue_gQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_XeU4nNfiCoWJA8LczaN4Tw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_XeU4nNfiCoWJA8LczaN4Tw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_vnD5WV31g1zs4hqBS2ArsQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_vnD5WV31g1zs4hqBS2ArsQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>In the realm of modern workplaces, where digital collaboration and information sharing are paramount, ensuring the security of your organization's data is non-negotiable. SharePoint Intranets serve as central hubs for document management, collaboration, and communication, making them critical assets that require robust security measures. In this blog post, we'll explore essential security best practices to fortify your SharePoint Intranet.</p></div></div>
</div><div data-element-id="elm_yi17XDt1HUqP-mlLxwxZUg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_yi17XDt1HUqP-mlLxwxZUg"] div.zpspacer { height:6px; } @media (max-width: 768px) { div[data-element-id="elm_yi17XDt1HUqP-mlLxwxZUg"] div.zpspacer { height:calc(6px / 3); } } </style><div class="zpspacer " data-height="6"></div>
</div></div></div></div></div><div data-element-id="elm_1kEA0-El8ln2YsKwLldUwQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg zscustom-section-123 "><style type="text/css"> [data-element-id="elm_1kEA0-El8ln2YsKwLldUwQ"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_YDECHm82v930eVcBykILmQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"> [data-element-id="elm_YDECHm82v930eVcBykILmQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_FbV1I3sn3qN-0lgaqwT9AA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_FbV1I3sn3qN-0lgaqwT9AA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_xGdJYbHOt9jJE9_wrpSD6w" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div><p><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">1. User Authentication and Authorization Controls</span></p></div></h2></div>
<div data-element-id="elm_ssSXWMip39JE9q0MjGp6JQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>Begin by implementing strong user authentication mechanisms. User authentication and authorization controls are critical for ensuring that only authorized users have access to SharePoint resources.&nbsp;</p></div>
</div></div><div data-element-id="elm_KLnGE88nmAKgYyy9J9lxbQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-weight:700;">Key considerations include:</span></p><ul><li>Implementing strong authentication mechanisms, such as multi-factor authentication (MFA), to verify user identities and prevent unauthorized access.</li><li>Defining clear roles and permissions within SharePoint to restrict access to sensitive data and functionality based on user roles and responsibilities.</li><li>Regularly reviewing and updating user access privileges to ensure that access permissions align with users' current roles and requirements.</li></ul></div>
</div></div><div data-element-id="elm_EuSGslXsBD-MMRKjRDo6oQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_EuSGslXsBD-MMRKjRDo6oQ"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>Multi-factor authentication enhances user identity verification.</li><li>Granular permissions reduce the risk of unauthorized access.</li></ul></div></div>
</div><div data-element-id="elm_ftSnufxY9yDmfMpfPjDeig" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_ftSnufxY9yDmfMpfPjDeig"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div><p><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">2. SSL Encryption Data in Transit (only applies to On-Premises)</span></p></div></h2></div>
<div data-element-id="elm_QecZanllTI3uF9HZvhRCGw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p>Secure data in transit by implementing SSL encryption. This ensures that data exchanged between users and the SharePoint Intranet is encrypted, minimizing the risk of interception and ensuring that your sensitive information remains confidential. Obtain and install a valid SSL certificate to authenticate the server and establish a secure connection.&nbsp;</p></div></div>
</div></div></div><div data-element-id="elm_oJ6TYpqxxFivWajH1sfRMg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_oJ6TYpqxxFivWajH1sfRMg"].zpelem-col{ border-style:solid; border-color:rgba(0,0,0,0.2) !important; border-block-start-width:0px; border-inline-end-width:0px; border-block-end-width:0px; border-inline-start-width:2px; border-radius:1px; } </style><div data-element-id="elm_7HCTb-08jS1rR7BXJVCACg" data-element-type="box" class="zpelem-box zpelement zpbox-container zsbox-spacing zplight-section zplight-section-bg "><style type="text/css"> [data-element-id="elm_7HCTb-08jS1rR7BXJVCACg"].zpelem-box{ border-radius:1px; } </style><div data-element-id="elm_mPw86Oby4sRrw1caQaM1_g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_mPw86Oby4sRrw1caQaM1_g"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="font-weight:700;color:rgb(166, 206, 57);">Also Read:</span></h3></div>
<div data-element-id="elm_ohK9o8HQPp2c7PPQmBJV6Q" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_ohK9o8HQPp2c7PPQmBJV6Q"] .zpimage-container figure img { width: 193.7px !important ; height: 109px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_ohK9o8HQPp2c7PPQmBJV6Q"] .zpimage-container figure img { width:193.7px ; height:109px ; } } @media (max-width: 767px) { [data-element-id="elm_ohK9o8HQPp2c7PPQmBJV6Q"] .zpimage-container figure img { width:193.7px ; height:109px ; } } [data-element-id="elm_ohK9o8HQPp2c7PPQmBJV6Q"].zpelem-image { border-radius:1px; margin-block-start:6px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/let-s-talk-sharepoint-permissions" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Permissions%202.jpg" width="193.7" height="109" loading="lazy" size="custom"/></picture></a></figure></div>
</div><div data-element-id="elm_b2atEyGw1cnV_BQbJusTEw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_b2atEyGw1cnV_BQbJusTEw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;">Let's talk SharePoint Permissions</span><br></p></div>
</div><div data-element-id="elm_qKCcQHfMbDHOTIu3ARsEbA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_qKCcQHfMbDHOTIu3ARsEbA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval zpbutton-outline " href="https://www.gtconsult.com/blogs/post/let-s-talk-sharepoint-permissions" target="_blank"><span class="zpbutton-content">Read Me</span></a></div>
</div><div data-element-id="elm_fEhwwwJNhtp_S-SwC1ZTfg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_fEhwwwJNhtp_S-SwC1ZTfg"] .zpimage-container figure img { width: 184.28px !important ; height: 104px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_fEhwwwJNhtp_S-SwC1ZTfg"] .zpimage-container figure img { width:184.28px ; height:104px ; } } @media (max-width: 767px) { [data-element-id="elm_fEhwwwJNhtp_S-SwC1ZTfg"] .zpimage-container figure img { width:184.28px ; height:104px ; } } [data-element-id="elm_fEhwwwJNhtp_S-SwC1ZTfg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/kyles-take-the-recent-surge-in-sharepoint-malware-downloads" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Security%20write%20up%20thumbnail.jpg" width="184.28" height="104" loading="lazy" size="custom"/></picture></a></figure></div>
</div><div data-element-id="elm_E6MPT1tW2VroIFVuzcccVQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_E6MPT1tW2VroIFVuzcccVQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;">Kyle's Take: The recent surge in SharePoint Malware downloads</span><br></p></div>
</div><div data-element-id="elm_0KwGOtvwFDNvDCj-MQS4Ug" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_0KwGOtvwFDNvDCj-MQS4Ug"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval zpbutton-outline " href="https://www.gtconsult.com/blogs/post/kyles-take-the-recent-surge-in-sharepoint-malware-downloads" target="_blank"><span class="zpbutton-content">Read Me</span></a></div>
</div></div></div></div></div></div><div data-element-id="elm_U5rAhJ3iaA4nGGm4bhb73g" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg zscustom-section-123 "><style type="text/css"> [data-element-id="elm_U5rAhJ3iaA4nGGm4bhb73g"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_s-spPx4NaHeyPzjDZgSfzg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"> [data-element-id="elm_s-spPx4NaHeyPzjDZgSfzg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_8Bu5QuMPrC5SEzPuuEgr1A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_8Bu5QuMPrC5SEzPuuEgr1A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_BgrztguO06nuTlQclHkgGg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_BgrztguO06nuTlQclHkgGg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-weight:700;">Considerations include:</span></p><ul><li>Obtaining and installing a valid SSL certificate from a trusted certificate authority to authenticate the server's identity and establish a secure connection.</li><li>Enabling SSL encryption for all communications between users and the SharePoint environment, including web traffic, file transfers, and data synchronization.</li><li>Periodically renewing SSL certificates and configuring SSL/TLS settings to comply with industry standards and best practices.</li></ul></div></div>
</div><div data-element-id="elm_sXY5TfNmDxY2r9Pk2ekeRg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_sXY5TfNmDxY2r9Pk2ekeRg"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>SSL encryption safeguards data during transmission.</li><li>Valid SSL certificates verify the authenticity of the server.</li></ul></div></div>
</div></div></div></div></div><div data-element-id="elm_bSo-ggMrOmpDnJ1yAy7jog" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_bSo-ggMrOmpDnJ1yAy7jog"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_xgOLxeMkKGz95VrO3smdhg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_xgOLxeMkKGz95VrO3smdhg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_0omc7CpCALrpfa9WK8HjEw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_0omc7CpCALrpfa9WK8HjEw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_gnrJGBMZnZd0o1C0GKcSRw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_gnrJGBMZnZd0o1C0GKcSRw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">3. Regular security audits and monitoring</span><br></h2></div>
<div data-element-id="elm_MvjKhomz5yAN2rnK4Bp0Lg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_MvjKhomz5yAN2rnK4Bp0Lg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>Regular security audits and monitoring are essential for detecting and mitigating security risks within the SharePoint environment.</p></div></div>
</div><div data-element-id="elm_sf0MZs2t8Kt_KwzTdPLptA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_sf0MZs2t8Kt_KwzTdPLptA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-weight:700;">Considerations include:</span></p><ul><li>Conducting periodic security audits to assess the effectiveness of security controls, identify vulnerabilities, and ensure compliance with security policies and standards.</li><li>Implementing robust monitoring tools and solutions to track user activities, detect suspicious behavior, and alert administrators to potential security incidents.</li><li>Establishing incident response procedures to investigate and respond to security events identified through security audits and monitoring activities.</li></ul></div></div>
</div><div data-element-id="elm_L1qQNKoxXA5-Ewdab_RaZQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_L1qQNKoxXA5-Ewdab_RaZQ"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>Security audits identify and address vulnerabilities.</li><li>Monitoring tools enable real-time threat detection.</li></ul></div></div>
</div></div></div></div></div><div data-element-id="elm_OPn66VQQ7t67SW2iM-qd0w" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_OPn66VQQ7t67SW2iM-qd0w"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_iz9TEPUZFdfA0DACLTKyXg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_iz9TEPUZFdfA0DACLTKyXg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_ejiGdg4supFFfWbZScnadA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_ejiGdg4supFFfWbZScnadA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_6qwyJW8AXiECy5Xn1OO7MQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6qwyJW8AXiECy5Xn1OO7MQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p>Establish comprehensive backup and recovery procedures to safeguard against data loss due to unforeseen events.&nbsp;</p></div></div></div>
</div><div data-element-id="elm_hJ230GXgIv0aUcoIZeV1JA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_hJ230GXgIv0aUcoIZeV1JA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Best practices include:</span></p><ul><li>Establishing regular backup schedules to create copies of SharePoint data, configurations, and content databases.</li><li>Testing backup and recovery procedures to ensure data integrity and verify the ability to restore SharePoint environments to a functional state.</li><li>Storing backup copies securely in off-site locations or cloud storage services to protect against data loss due to disasters, hardware failures, or malicious attacks.</li></ul></div></div></div>
</div><div data-element-id="elm_pLuW-JNcToHVsqRPfBsJag" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_pLuW-JNcToHVsqRPfBsJag"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>Backup procedures protect against data loss.</li><li>Regular testing ensures the reliability of the recovery process.</li></ul></div></div></div>
</div><div data-element-id="elm_eeQnZeh00O6Gp4Xp4JBy-Q" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_eeQnZeh00O6Gp4Xp4JBy-Q"] div.zpspacer { height:10px; } @media (max-width: 768px) { div[data-element-id="elm_eeQnZeh00O6Gp4Xp4JBy-Q"] div.zpspacer { height:calc(10px / 3); } } </style><div class="zpspacer " data-height="10"></div>
</div></div></div></div></div><div data-element-id="elm_x9Ux0a111RejHOAhph8xMQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg zscustom-section-139 "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ihtl4vcaL3P2zHa10NKJJw" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-flex-start " data-equal-column=""><style type="text/css"> [data-element-id="elm_ihtl4vcaL3P2zHa10NKJJw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_p739uGkDRfUtWZ-ABDQBqQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_p739uGkDRfUtWZ-ABDQBqQ"].zpelem-col{ border-style:solid; border-color:rgba(0,0,0,0.2) !important; border-block-start-width:0px; border-inline-end-width:2px; border-block-end-width:0px; border-inline-start-width:0px; border-radius:1px; } </style><div data-element-id="elm_WLLBZAxTTn9HbC9zJQuVnw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_WLLBZAxTTn9HbC9zJQuVnw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="font-size:18px;font-weight:900;color:rgb(0, 27, 76);">Have you read our <a href="https://www.gtconsult.com/history-of-cyber-security-ebook" title="eBook" target="_blank" rel="">eBook</a>?</span><br></h2></div>
<div data-element-id="elm_kHgbnWw9bIBSyy4Ot7Vdwg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_kHgbnWw9bIBSyy4Ot7Vdwg"] .zpimage-container figure img { width: 200px ; height: 200.00px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_kHgbnWw9bIBSyy4Ot7Vdwg"] .zpimage-container figure img { width:200px ; height:200.00px ; } } @media (max-width: 767px) { [data-element-id="elm_kHgbnWw9bIBSyy4Ot7Vdwg"] .zpimage-container figure img { width:200px ; height:200.00px ; } } [data-element-id="elm_kHgbnWw9bIBSyy4Ot7Vdwg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/history-of-cyber-security-ebook" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Cover%20Square.jpg" width="200" height="200.00" loading="lazy" size="small"/></picture></a></figure></div>
</div></div><div data-element-id="elm_vrfXdrO5tauQMIPT43CkuQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_vrfXdrO5tauQMIPT43CkuQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_zwO1ZU6O4Xg-9UDAkTT34w" data-element-type="heading" class="zpelement zpelem-heading sub-heading "><style> [data-element-id="elm_zwO1ZU6O4Xg-9UDAkTT34w"].zpelem-heading { border-radius:1px; } </style><h5
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div><h2><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">4. Back up and recovery procedures</span></h2></div></h5></div>
<div data-element-id="elm_7Q0HjRBdUIJZ61Pya10glA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_7Q0HjRBdUIJZ61Pya10glA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p>Establish comprehensive backup and recovery procedures to safeguard against data loss due to unforeseen events.&nbsp;</p></div></div></div>
</div><div data-element-id="elm_sHVT9lNqLe2qLC821rFQiA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_sHVT9lNqLe2qLC821rFQiA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Best practices include:</span></p><ul><li>Establishing regular backup schedules to create copies of SharePoint data, configurations, and content databases.</li><li>Testing backup and recovery procedures to ensure data integrity and verify the ability to restore SharePoint environments to a functional state.</li><li>Storing backup copies securely in off-site locations or cloud storage services to protect against data loss due to disasters, hardware failures, or malicious attacks.</li></ul></div></div></div>
</div></div></div><div data-element-id="elm_vKzDl-TR0ZNikSTOGuyLTw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_TihoWtynmRWXHpVZ3olVyw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_sLUOYw6D40wqyO3FVSxuPA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_sLUOYw6D40wqyO3FVSxuPA"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>Backup procedures protect against data loss.</li><li>Regular testing ensures the reliability of the recovery process.</li></ul></div></div></div>
</div></div></div></div></div><div data-element-id="elm_UOPaIOhUeSNzMSXqBtiznA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_UOPaIOhUeSNzMSXqBtiznA"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_uSe-g-3JFVbmbiwpWnkBqA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_uSe-g-3JFVbmbiwpWnkBqA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_kJ2AWKQ_pu1314NI41arog" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_kJ2AWKQ_pu1314NI41arog"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_W7atDZV-U7bFFu8DXSM7aQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_W7atDZV-U7bFFu8DXSM7aQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">5. Security awareness training for users</span><br></h2></div>
<div data-element-id="elm_5GA36hiL2MuZcsbjMylEqw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_5GA36hiL2MuZcsbjMylEqw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p>User awareness is an important piece of the puzzle. Educate users on security best practices through comprehensive awareness training programs. Foster a culture of security consciousness by informing users about potential threats, phishing attacks, and the importance of safeguarding sensitive information.</p></div></div></div>
</div><div data-element-id="elm_t2JLQ7iz1WU5uCIlSg5GZQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_t2JLQ7iz1WU5uCIlSg5GZQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Considerations include:</span></p><ul><li>Developing comprehensive security awareness training programs that cover topics such as phishing attacks, password security, and data handling practices.</li><li>Providing regular training sessions, workshops, and resources to reinforce security awareness and promote a culture of security within the organization.</li><li>Encouraging user participation and engagement in security awareness initiatives through interactive training modules, quizzes, and real-world examples of security incidents and their impact.</li></ul></div></div></div>
</div><div data-element-id="elm_YTOXXVufhfWBKB07WMB_nQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_YTOXXVufhfWBKB07WMB_nQ"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>User awareness is a critical component of overall security.</li><li>Training programs empower users to recognize and mitigate risks.</li></ul></div></div></div>
</div></div></div></div></div><div data-element-id="elm_sMsQus8GTTDAgAYjl3ZnWg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_sMsQus8GTTDAgAYjl3ZnWg"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_e5ymGxewDYiSBiXV131pNQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_e5ymGxewDYiSBiXV131pNQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_fx_dbjmv-_gUyn4sdT2h0g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_fx_dbjmv-_gUyn4sdT2h0g"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_SyKew3QsXA6eSffjUreURw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_SyKew3QsXA6eSffjUreURw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">6. Patch Management</span><br></h2></div>
<div data-element-id="elm_wmHrzlb8aPaRdIm_2G-sYg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_wmHrzlb8aPaRdIm_2G-sYg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p>Patch management is the process of planning, testing, deploying, and monitoring software updates, also known as patches, to address vulnerabilities, bugs, or security flaws in software applications and operating systems. It is an essential aspect of cybersecurity and IT infrastructure management aimed at keeping systems secure and up-to-date.</p><p><span style="color:inherit;"><span style="font-size:11pt;">Effective patch management is crucial for maintaining the security of your SharePoint environment.&nbsp;</span></span><br></p></div></div></div>
</div><div data-element-id="elm_0f0Y5tNZI0lw2NCmnvMVVA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_0f0Y5tNZI0lw2NCmnvMVVA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Consider the following steps:</span></p><ul><li>Regularly monitor for security patches and updates released by Microsoft for SharePoint and associated software components.</li><li>Establish a patch testing process to evaluate patches in a non-production environment before deployment to the production environment.</li><li>Implement a schedule for deploying patches during maintenance windows to minimize disruptions to users and business operations.</li><li>Maintain detailed documentation of patching activities, including patch versions, deployment dates, and any issues encountered during the patching process.</li></ul></div></div></div>
</div><div data-element-id="elm_h11DXPWnqC-Ta3KwT7AcLA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_h11DXPWnqC-Ta3KwT7AcLA"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>Regular patching helps address known vulnerabilities and reduce the risk of security breaches.</li><li><span style="font-size:11pt;">Testing patches in a controlled environment before deployment helps mitigate the risk of unintended consequences in the production environment.</span></li></ul></div></div></div>
</div><div data-element-id="elm_OHY1Ufkq8NfSj_3LQ71VpA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_OHY1Ufkq8NfSj_3LQ71VpA"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_OHY1Ufkq8NfSj_3LQ71VpA"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div></div></div></div></div><div data-element-id="elm_IuhSeHvfCo31_NApM2PRDw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_IuhSeHvfCo31_NApM2PRDw"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_uBdeooJjPgC3crqgZAXJDQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_uBdeooJjPgC3crqgZAXJDQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_e-k4W6ZRtzKgdZdzCrc7Dw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-5 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_e-k4W6ZRtzKgdZdzCrc7Dw"].zpelem-col{ background-color:rgba(52,73,94,0.2); background-image:unset; border-radius:1px; margin-block-start:5px; } </style><div data-element-id="elm_YrJGMPIBFLWS2vBGsOV0lw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_YrJGMPIBFLWS2vBGsOV0lw"].zpelem-heading { border-radius:1px; margin-block-start:4px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-size:20px;color:rgb(255, 255, 255);font-weight:700;">Learn more on our podcast: Ten Ton Potato</span><br></h2></div>
<div data-element-id="elm_bTCe07v8E53FvMmh7owPnA" data-element-type="video" class="zpelement zpelem-video "><style type="text/css"> [data-element-id="elm_bTCe07v8E53FvMmh7owPnA"].zpelem-video{ border-radius:1px; } </style><div class="zpvideo-container zpiframe-align-left zpiframe-mobile-align- zpiframe-tablet-align-"><iframe class="zpvideo " width="560" height="250" src="//www.youtube.com/embed/WRVatfwLeCM?enablejsapi=1" frameborder="0" allowfullscreen id=youtube-video-1 data-api=youtube></iframe></div>
</div><div data-element-id="elm_tcTSSvH-S_5g7R6-HQN0ng" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_tcTSSvH-S_5g7R6-HQN0ng"] .zpimagetext-container figure img { width: 32px !important ; height: 32px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_tcTSSvH-S_5g7R6-HQN0ng"] .zpimagetext-container figure img { width:32px ; height:32px ; } } @media (max-width: 767px) { [data-element-id="elm_tcTSSvH-S_5g7R6-HQN0ng"] .zpimagetext-container figure img { width:32px ; height:32px ; } } [data-element-id="elm_tcTSSvH-S_5g7R6-HQN0ng"].zpelem-imagetext .zpimage-text, [data-element-id="elm_tcTSSvH-S_5g7R6-HQN0ng"].zpelem-imagetext .zpimage-text :is(h1,h2,h3,h4,h5,h6){ text-shadow:1px 1px 1px #000000; } [data-element-id="elm_tcTSSvH-S_5g7R6-HQN0ng"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-center zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://podcasts.apple.com/za/podcast/ten-ton-potato-by-gtconsult/id1719258790?i=1000644363073" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/standard.png" width="32" height="32" loading="lazy" size="custom" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p style="text-align:center;"><span style="font-size:16px;color:rgb(255, 255, 255);">Listen on Apple Podcasts</span></p></div>
</div></div><div data-element-id="elm_GMhxaosSYxs-bzYKNdG8DA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_GMhxaosSYxs-bzYKNdG8DA"] .zpimagetext-container figure img { width: 33px !important ; height: 33px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_GMhxaosSYxs-bzYKNdG8DA"] .zpimagetext-container figure img { width:33px ; height:33px ; } } @media (max-width: 767px) { [data-element-id="elm_GMhxaosSYxs-bzYKNdG8DA"] .zpimagetext-container figure img { width:33px ; height:33px ; } } [data-element-id="elm_GMhxaosSYxs-bzYKNdG8DA"].zpelem-imagetext .zpimage-text, [data-element-id="elm_GMhxaosSYxs-bzYKNdG8DA"].zpelem-imagetext .zpimage-text :is(h1,h2,h3,h4,h5,h6){ text-shadow:1px 1px 1px #000000; } [data-element-id="elm_GMhxaosSYxs-bzYKNdG8DA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-center zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://open.spotify.com/episode/6XbO2MiJtcx3KW3hKOOvYA?si=_-qsW_-6ROSPSNlSDrqimw&amp;nd=1&amp;dlsi=04bd234f250c4329" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Spotify_logo_without_text.svg.png" width="33" height="33" loading="lazy" size="custom" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p style="text-align:center;"><span style="font-size:16px;color:rgb(255, 255, 255);">Listen on Spotify</span></p></div>
</div></div><div data-element-id="elm_rF4LMpF1vKBl8JUNon8xEA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_rF4LMpF1vKBl8JUNon8xEA"] div.zpspacer { height:0px; } @media (max-width: 768px) { div[data-element-id="elm_rF4LMpF1vKBl8JUNon8xEA"] div.zpspacer { height:calc(0px / 3); } } </style><div class="zpspacer " data-height="0"></div>
</div></div><div data-element-id="elm_hWjoIgCMbVhWPpsJbRHLmw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-7 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_hWjoIgCMbVhWPpsJbRHLmw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_03sTYsfavYljJCyVSQCn7Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_03sTYsfavYljJCyVSQCn7Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">7. Intrusion Detection and Prevention Systems (IDPS)</span><br></h2></div>
<div data-element-id="elm_u6ZhC2FcFI3dQkVa7EthHg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_u6ZhC2FcFI3dQkVa7EthHg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;"><span style="font-size:11pt;">Deploying intrusion detection and prevention systems (IDPS) can help monitor network traffic and detect potential security threats in real-time.</span></span><br></p></div>
</div><div data-element-id="elm_HHZeNQnfMZYL3FFnKCFwOA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_HHZeNQnfMZYL3FFnKCFwOA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-weight:700;">Consider the following strategies:</span></p><ul><li>Place IDPS sensors strategically throughout the network to monitor traffic entering and exiting SharePoint servers.</li><li>Configure IDPS rules and signatures to detect known attack patterns, anomalous behavior, and suspicious network activities.</li><li>Integrate IDPS with security information and event management (SIEM) systems for centralized logging, correlation, and analysis of security events.</li></ul></div></div>
</div><div data-element-id="elm_oBlD21lOvoL7wERZsofhyQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oBlD21lOvoL7wERZsofhyQ"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>IDPS solutions provide proactive threat detection and help organizations respond to security incidents in a timely manner.</li><li>Integration with SIEM systems enhances visibility and enables comprehensive analysis of security events across the SharePoint environment.</li></ul></div></div>
</div></div></div></div></div><div data-element-id="elm_Dl-_Y1yczcyW21UWSmwBxQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_Dl-_Y1yczcyW21UWSmwBxQ"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_NuqgWUMAh2KDIaqnZHA_lQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_NuqgWUMAh2KDIaqnZHA_lQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm__WJH6AFz45DLlAMd5JBGDA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm__WJH6AFz45DLlAMd5JBGDA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_aNGx42C8U8F35zp-BHkCKA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_aNGx42C8U8F35zp-BHkCKA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">8. Secure external Sharing</span><br></h2></div>
<div data-element-id="elm_Z32HCptWZ-yVBtg3gaxLCw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Z32HCptWZ-yVBtg3gaxLCw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="color:inherit;"><span style="font-size:11pt;">Implementing secure external sharing practices helps prevent unauthorized access to sensitive information shared with external users.</span></span><br></p></div></div></div>
</div><div data-element-id="elm_gXx8DericCxhcrZQYtw5KQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_gXx8DericCxhcrZQYtw5KQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Consider the following recommendations:</span></p><ul><li>Configure external sharing settings to restrict access to specific domains, email addresses, or groups.</li><li>Implement expiration dates and access controls for shared links to limit the lifespan and scope of external sharing.</li><li>Enforce authentication requirements, such as requiring external users to sign in with a Microsoft or third-party identity provider, to verify their identities and control access to shared content.</li></ul></div></div></div></div>
</div><div data-element-id="elm_pWqjDkw1r38IYtD6R44S2A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_pWqjDkw1r38IYtD6R44S2A"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><div><div><p><span style="font-weight:700;color:rgba(52, 73, 94, 0.7);">Key Takeaways:</span></p><ul><li><span style="color:rgba(52, 73, 94, 0.7);">Secure external sharing practices help organizations maintain control over shared content and protect sensitive information from unauthorized disclosure.</span></li><li><span style="color:rgba(52, 73, 94, 0.7);">Enforcing authentication requirements enhances security and ensures that only authorized external users can access shared resources.</span></li></ul></div>
</div></div></div></div></div></div></div></div><div data-element-id="elm_YpIcfe7RMBM9jmWhC5LT5g" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_YpIcfe7RMBM9jmWhC5LT5g"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_2XtFlVZpFvhDypojczGS9w" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_2XtFlVZpFvhDypojczGS9w"].zprow{ border-radius:1px; } </style><div data-element-id="elm_X-g7MbUmaRJILcfvqeRLeg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_X-g7MbUmaRJILcfvqeRLeg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_HphuCj2CCvDNBwXmTJdAyg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_HphuCj2CCvDNBwXmTJdAyg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">9. Network Segmentation</span><br></h2></div>
<div data-element-id="elm_oNy34yE1RazDfUVZ9qjc3w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oNy34yE1RazDfUVZ9qjc3w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><p>Network segmentation is the practice of dividing a computer network into smaller, isolated segments or subnetworks to improve security, performance, and manageability. By segmenting a network, organizations can control the flow of traffic, limit access to sensitive resources, and contain the impact of security breaches or unauthorized access attempts.</p></div></div></div></div>
</div><div data-element-id="elm_8m9-guyFfhjmTPFiDADBfQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_8m9-guyFfhjmTPFiDADBfQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">In the context of SharePoint security, consider:</span></p><ul><li>Segregating SharePoint servers into dedicated network segments or VLANs to isolate them from other parts of the network.</li><li>Implementing firewalls and access control lists (ACLs) to restrict traffic between network segments and enforce security policies.</li><li>Applying network segmentation principles to SharePoint farms, service applications, and databases to minimize the impact of security breaches or unauthorized access.</li></ul></div></div></div></div>
</div><div data-element-id="elm_PFEd2ng4-nSK1K9dXQ9JXg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_PFEd2ng4-nSK1K9dXQ9JXg"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>Network segmentation helps contain potential security breaches and reduce the impact of unauthorized access or malicious activities.</li><li>Segregation of SharePoint resources can help limit lateral movement and prevent the spread of security threats within the environment.</li></ul></div>
</div></div></div></div></div></div></div></div><div data-element-id="elm_iGRJpWbOKWMizltHB_n7dg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_iGRJpWbOKWMizltHB_n7dg"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_BdKyFDSOAePHxDAEupwe_g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_BdKyFDSOAePHxDAEupwe_g"].zprow{ border-radius:1px; } </style><div data-element-id="elm_AzZ50k5-UsGE-b0KCOzpiw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_AzZ50k5-UsGE-b0KCOzpiw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_DmHmmRt5aGL73siYLOmu_A" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_DmHmmRt5aGL73siYLOmu_A"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">10. Incident Response Plan</span><br></h2></div>
<div data-element-id="elm_3oBFtK4i842jRfpPRYNTUA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_3oBFtK4i842jRfpPRYNTUA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="color:inherit;"><span style="font-size:11pt;">Developing and maintaining an incident response plan helps organizations effectively detect, respond to, and recover from security incidents affecting SharePoint.</span></span><br></p></div></div></div>
</div><div data-element-id="elm_605rfgOcSOJu68ILGuVVhA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_605rfgOcSOJu68ILGuVVhA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Consider the following elements:</span></p><ul><li>Establish an incident response team with defined roles, responsibilities, and communication channels.</li><li>Document incident response procedures, including escalation paths, notification requirements, and evidence preservation protocols.</li><li>Conduct regular tabletop exercises and simulations to test the effectiveness of the incident response plan and identify areas for improvement.</li><li>Continuously review and update the incident response plan based on lessons learned from past incidents, changes in the threat landscape, and regulatory requirements.</li></ul></div></div></div></div>
</div><div data-element-id="elm_ouI5539HZzOl67FtY5A3TA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ouI5539HZzOl67FtY5A3TA"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>An incident response plan helps organizations minimize the impact of security incidents and restore normal operations in a timely manner.</li><li>Regular testing and refinement of the incident response plan ensure preparedness and readiness to respond effectively to security threats and incidents.</li></ul></div>
</div></div></div></div></div></div></div></div><div data-element-id="elm_wiD-zFybyQxO-PuYVsso6g" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_wiD-zFybyQxO-PuYVsso6g"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_7Q5fBM_BQWihQ025SfYf2g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_7Q5fBM_BQWihQ025SfYf2g"].zprow{ border-radius:1px; } </style><div data-element-id="elm_xLasTE9Jqi53teBr4CoEig" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_xLasTE9Jqi53teBr4CoEig"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_XuJteKjAyghzKXtkVYO-UQ" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_XuJteKjAyghzKXtkVYO-UQ"] .zpimageheadingtext-container figure img { width: 137px !important ; height: 150.2px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_XuJteKjAyghzKXtkVYO-UQ"] .zpimageheadingtext-container figure img { width:137px ; height:150.2px ; } } @media (max-width: 767px) { [data-element-id="elm_XuJteKjAyghzKXtkVYO-UQ"] .zpimageheadingtext-container figure img { width:137px ; height:150.2px ; } } [data-element-id="elm_XuJteKjAyghzKXtkVYO-UQ"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/GT_icon_gr-1.png" data-src="/Blog%20Site/GT_icon_gr-1.png" width="137" height="150.2" loading="lazy" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true">Conclusion</h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><p><span style="color:inherit;">In conclusion, safeguarding your SharePoint Intranet requires a holistic approach that encompasses user authentication, encryption, data loss prevention, auditing, backup procedures, and user education. By incorporating these security best practices into your Intranet management strategy, you can create a resilient and secure digital environment that protects your organization's valuable assets. Remember, proactive measures are key to staying ahead of potential threats in the ever-evolving landscape of cybersecurity.</span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">Looking to fortify your SharePoint Intranet and bolster your organization's security defenses? Partner with GTconsult, a Microsoft Solutions Partner for Modern Work, and leverage A Team Protection for expert guidance and tailored solutions. Safeguard your valuable assets with our comprehensive security services. Let GTconsult be your trusted ally in navigating the complex landscape of SharePoint security. Contact us today to discuss your security needs and take proactive steps towards a resilient and secure digital environment.</span><span style="color:inherit;"><br></span></p></div></div>
</div></div></div><div data-element-id="elm_TAibQxMDBCWCgnaGl-zEMA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_TAibQxMDBCWCgnaGl-zEMA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="https://www.gtconsult.com/contact" target="_blank"><span class="zpbutton-content">I need GTconsult!</span></a></div>
</div><div data-element-id="elm_ma9DncK53uSGwm8XnXo6cA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_ma9DncK53uSGwm8XnXo6cA"] div.zpspacer { height:14px; } @media (max-width: 768px) { div[data-element-id="elm_ma9DncK53uSGwm8XnXo6cA"] div.zpspacer { height:calc(14px / 3); } } </style><div class="zpspacer " data-height="14"></div>
</div></div></div></div></div><div data-element-id="elm_hNxrNWWz_mr5gRqH20Xguw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg zpbackground-size-cover zpbackground-position-center-center zpbackground-repeat-all zpbackground-attachment-scroll " style="background-image:linear-gradient(to bottom, rgba(30, 34, 45, 0.8), rgba(30, 34, 45, 0.8)), url(https://static.zohocdn.com/sites/stock-images/images/zpstock-image-08.jpg);"><style type="text/css"> [data-element-id="elm_hNxrNWWz_mr5gRqH20Xguw"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_sIKsiAUtKkQLfIF2AjTPLA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_sIKsiAUtKkQLfIF2AjTPLA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_B_aiW12DuHPKcQbj8oEtrQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_B_aiW12DuHPKcQbj8oEtrQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_Rl9gbYg6XQfRZ25Ib7K55A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Rl9gbYg6XQfRZ25Ib7K55A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="text-align:center;"><span style="font-size:28px;font-weight:700;color:rgb(255, 255, 255);font-family:&quot;Noto Sans&quot;, sans-serif;">Keep Reading</span></p><p style="text-align:center;"><span style="font-weight:400;color:rgb(255, 255, 255);font-family:Nunito;">Check out our other blogs below:</span><br></p></div>
</div><div class="zpelement zpelem-carousel " data-element-id="elm_o6ZNTEATP6vjerleehZQdg" data-element-type="carousel" data-currentslide-index="0" data-transition="slide_left" data-slider-interval="5000" data-zs-autoslide="true" data-zs-slidepause-option="false" data-zs-slider="min-height-el: zpcarousel-content-container;arrow-cont: zpcarousel-arrows-container; active-controller: zpcarousel-controller-active; controller-cont: zpcarousel-controller-container; controller: zpcarousel-controller; right-arrow: zpcarousel-arrow-right; left-arrow: zpcarousel-arrow-left;active-slide:zpcarousel-content-active; slide: zpcarousel-content; slides-cont: zpcarousel-content-container;content-cont : zpcarousel-content-inner; background: false;slide-pause-btn:zpcarousel-pause-btn;slide-play-btn:zpcarousel-play-btn;"><div class="zpcarousel-container zpcarousel-style-01"><style></style><div class="zpcarousel-content-container"><div class="zpelement zpcarousel-content " data-element-type="carouselslide" data-element-id="elm_hOTLftfs755aUD5Bn9cFOA" data-slide-name="Slide 1"><div class="zpcarousel-content-inner"><div data-element-id="elm_bip4VbkFNza41hqIpGkTnA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_bip4VbkFNza41hqIpGkTnA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_x1BGrjYsPhYS8KYZ79_H9Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_x1BGrjYsPhYS8KYZ79_H9Q"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_S_4vaGooCvpb4RMFsWsABQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_S_4vaGooCvpb4RMFsWsABQ"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_S_4vaGooCvpb4RMFsWsABQ"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_S_4vaGooCvpb4RMFsWsABQ"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_S_4vaGooCvpb4RMFsWsABQ"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/kyles-take-the-recent-surge-in-sharepoint-malware-downloads" target="_blank" title="Kyle's take" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Security%20write%20up%20thumbnail.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">Kyle's Take: The recent surge in SharePoint Malware downloads</span></p></div>
</div></div></div><div data-element-id="elm_MsqyVhfg--AQrwbyzl0CRQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_MsqyVhfg--AQrwbyzl0CRQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_uW9SbxNRw8x4_UIVloRscA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_uW9SbxNRw8x4_UIVloRscA"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_uW9SbxNRw8x4_UIVloRscA"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_uW9SbxNRw8x4_UIVloRscA"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_uW9SbxNRw8x4_UIVloRscA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/creating-a-knowledge-base-in-sharepoint-your-complete-guide" target="_blank" title="Creating a knowledge base in SharePoint" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Knowledge%20base.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">Creating a knowledge base in SharePoint</span></p></div>
</div></div></div><div data-element-id="elm_Q-hf1DaElEMqubDgDmPlow" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_Q-hf1DaElEMqubDgDmPlow"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_lUj5flEzQQRL3KStx4isqg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_lUj5flEzQQRL3KStx4isqg"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_lUj5flEzQQRL3KStx4isqg"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_lUj5flEzQQRL3KStx4isqg"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_lUj5flEzQQRL3KStx4isqg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/let-s-talk-sharepoint-permissions" target="_blank" title="SharePoint Permissions" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Permissions%202.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">Let's talk SharePoint permissions</span><br></p></div>
</div></div></div></div></div></div><div class="zpelement zpcarousel-content " data-element-type="carouselslide" data-element-id="elm_9aM0Zrf0c1ROVCNi0bB2xg" data-slide-name="Slide 2"><div class="zpcarousel-content-inner"><div data-element-id="elm_WFeIiXndEL_eDNMj9lmVRw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_WFeIiXndEL_eDNMj9lmVRw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_jRAMosBEPIBd7PKI3iVVPg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_jRAMosBEPIBd7PKI3iVVPg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_ZcvDtdabosHAN0e4FPwwVg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_ZcvDtdabosHAN0e4FPwwVg"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_ZcvDtdabosHAN0e4FPwwVg"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_ZcvDtdabosHAN0e4FPwwVg"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_ZcvDtdabosHAN0e4FPwwVg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/micro-moments-macro-impact" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Chair%20Write%20Up.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;"><a href="https://www.gtconsult.com/blogs/post/micro-moments-macro-impact" title="Micro-moments, Macro-impact&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;" target="_blank" rel="" style="color:rgb(255, 255, 255);">Micro-moments, Macro-impact</a><a href="https://www.gtconsult.com/blogs/post/micro-moments-macro-impact" title="Micro-moments, Macro-impact&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;" target="_blank" rel=""><span style="color:rgb(255, 255, 255);">&nbsp;</span><span style="color:inherit;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></a><span style="color:inherit;">&nbsp; &nbsp; &nbsp; &nbsp;</span></span><br></p></div>
</div></div></div><div data-element-id="elm_kkKCWsuuUe65nh0HMXxvpg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_kkKCWsuuUe65nh0HMXxvpg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_zYL8S3e6lQXhE8105axshw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_zYL8S3e6lQXhE8105axshw"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_zYL8S3e6lQXhE8105axshw"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_zYL8S3e6lQXhE8105axshw"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_zYL8S3e6lQXhE8105axshw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/Expert-Insights-Why-and-How-to-Migrate-to-SharePoint-SE" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Migration%20Write%20Up%20Thumbnail%202.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">Expert insights: Why and how to migrate to SharePoint SE</span></p></div>
</div></div></div><div data-element-id="elm_p8G4Cy9APFZix_i6rCmcdw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_p8G4Cy9APFZix_i6rCmcdw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_4QsZD4n7xhMqkFSxdXtrSQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_4QsZD4n7xhMqkFSxdXtrSQ"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_4QsZD4n7xhMqkFSxdXtrSQ"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_4QsZD4n7xhMqkFSxdXtrSQ"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_4QsZD4n7xhMqkFSxdXtrSQ"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/powerapps-in-sharepoint" target="_blank" title="PowerApps" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Power%20Apps.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">PowerApps in SharePoint</span><br></p></div>
</div></div></div></div></div></div><div class="zpelement zpcarousel-content " data-element-type="carouselslide" data-element-id="elm_azJ7G-NY3n-mwrXtH5f4nQ" data-slide-name="Slide 3"><div class="zpcarousel-content-inner"><div data-element-id="elm_RIlW_Yv5Bp9iaIHDgDCFfw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_RIlW_Yv5Bp9iaIHDgDCFfw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_feQV2UdRRbOfXyoHfSMyqA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_feQV2UdRRbOfXyoHfSMyqA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_DwficQ1ays7UkzX60PLQdA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_DwficQ1ays7UkzX60PLQdA"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_DwficQ1ays7UkzX60PLQdA"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_DwficQ1ays7UkzX60PLQdA"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_DwficQ1ays7UkzX60PLQdA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/gtconsult-your-trusted-microsoft-solutions-partner-for-modern-work" target="_blank" title="Microsoft Partner" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Microsft%20Partner%20Thumbnail.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">GTconsult: Your trusted Microsoft<a href="https://www.gtconsult.com/blogs/post/gtconsult-your-trusted-microsoft-solutions-partner-for-modern-work" title="Microsoft partner" target="_blank" rel=""></a> Solutions Partner for Modern Work&nbsp;</span><br></p></div>
</div></div></div><div data-element-id="elm_21bjcSkuTocbCs1l7gplMg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_21bjcSkuTocbCs1l7gplMg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_oWiro0EGkoR95bkfXIPkpg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_oWiro0EGkoR95bkfXIPkpg"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_oWiro0EGkoR95bkfXIPkpg"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_oWiro0EGkoR95bkfXIPkpg"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_oWiro0EGkoR95bkfXIPkpg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/sharepoint-migration-checklist" target="_blank" title="Migration Check list" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Checklist%2016%20by%209.png" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><p><span style="font-size:20px;color:rgb(255, 255, 255);">SharePoint Migration Checklist<a href="https://www.gtconsult.com/sharepoint-migration-checklist" title="Migration Check list" target="_blank" rel=""></a></span><br></p><div style="color:inherit;"><span style="font-size:20px;"><br></span></div></div></div>
</div></div></div><div data-element-id="elm_nDK6PSFVPnRcVCLgTT8Heg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_nDK6PSFVPnRcVCLgTT8Heg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_vkg0CbfV4_Cl_Ltm7EgtjQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_vkg0CbfV4_Cl_Ltm7EgtjQ"] .zpimagetext-container figure img { width: 307px ; height: 172.57px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_vkg0CbfV4_Cl_Ltm7EgtjQ"] .zpimagetext-container figure img { width:723px ; height:406.40px ; } } @media (max-width: 767px) { [data-element-id="elm_vkg0CbfV4_Cl_Ltm7EgtjQ"] .zpimagetext-container figure img { width:415px ; height:233.27px ; } } [data-element-id="elm_vkg0CbfV4_Cl_Ltm7EgtjQ"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/cci-case-study" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/CCI%20Case%20Study.png" width="415" height="233.27" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">CCI Case Study</span><br></p><p><span style="color:inherit;"><span style="font-size:20px;"><br></span></span></p></div>
</div></div></div></div></div></div></div><div class="zpcarousel-arrows-container zpcarousel-arrow-type-01" data-arrow-style="2"><div class="zpcarousel-arrow-left" tabindex="0" role="button" aria-label="Previous"><svg aria-hidden="true" viewBox="0 0 32 32" xmlns="http://www.w3.org/2000/svg" class="svg-icon-18px"><path d="M0,16c0,0.3,0.1,0.5,0.3,0.7l9.9,10c0.4,0.4,1,0.4,1.4,0c0.4-0.4,0.4-1,0-1.4L3.4,17H31 c0.6,0,1-0.5,1-1s-0.4-1-1-1H3.4l8.2-8.3c0.4-0.4,0.4-1,0-1.4c-0.4-0.4-1-0.4-1.4,0l-9.9,10C0.1,15.5,0,15.7,0,16z"></path></svg></div>
<div class="zpcarousel-arrow-right" tabindex="0" role="button" aria-label="Next"><svg aria-hidden="true" viewBox="0 0 32 32" xmlns="http://www.w3.org/2000/svg" class="svg-icon-18px"><path id="arrow-right-style2-Arrow_Forward" d="M32,16c0-0.3-0.1-0.5-0.3-0.7l-9.9-10c-0.4-0.4-1-0.4-1.4,0c-0.4,0.4-0.4,1,0,1.4 l8.2,8.3H1c-0.6,0-1,0.5-1,1s0.4,1,1,1h27.6l-8.2,8.3c-0.4,0.4-0.4,1,0,1.4c0.4,0.4,1,0.4,1.4,0l9.9-10C31.9,16.5,32,16.3,32,16z"></path></svg></div>
</div><div class="zpcarousel-controller-container zpcarousel-controller-type-01"><svg class="zpcarousel-pause-btn" tabindex="0" role="button" aria-label="Pause" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 14 14"><path d="M3.85.53C3.6.5 3.34.5 3.07.5 1.68.5.95 1.09.95 2.18V12c.03.74.56 1.32 1.44 1.44.53.07 1.11.07 1.64 0 .9-.13 1.42-.72 1.42-1.5V2.07c0-.09 0-.18-.03-.28-.1-.66-.75-1.17-1.59-1.26h.01ZM11.43.53C11.18.5 10.92.5 10.65.5c-1.39 0-2.12.59-2.12 1.68V12c.03.74.56 1.32 1.44 1.44.53.07 1.11.07 1.64 0 .9-.13 1.42-.72 1.42-1.5V2.07c0-.09 0-.18-.03-.28-.1-.66-.75-1.17-1.59-1.26h.01Z"/></svg><svg class="zpcarousel-play-btn" tabindex="0" role="button" aria-label="Play" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 14 14"><path d="M.59 7.02C.57 5.33.57 3.63.51 1.94.45.63 1.72-.17 2.9.45c3.2 1.68 6.42 3.32 9.64 4.96.59.3.95.76.96 1.43 0 .66-.34 1.11-.91 1.43-3.18 1.75-6.35 3.5-9.52 5.25-1.2.66-2.39-.04-2.41-1.41C.63 10.42.61 8.72.59 7.03Z"/></svg><div class="zpcarousel-controller zpcarousel-controller-active" data-slide-index="0"></div>
<div class="zpcarousel-controller " data-slide-index="1"></div><div class="zpcarousel-controller " data-slide-index="2"></div>
</div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 13 Feb 2024 13:25:29 +0000</pubDate></item><item><title><![CDATA[Kyle's Take: The recent surge in SharePoint Malware downloads]]></title><link>https://www.gtconsult.com/blogs/post/kyles-take-the-recent-surge-in-sharepoint-malware-downloads</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/Security write up thumbnail.jpg"/>Explore DarkGate Malware: Learn about its impact on SharePoint, causes, prevention, and safeguarding your digital assets. Stay protected from this digital threat. #DarkGateMalware #SharePointSecurity]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_TzuCWzp3SoqHwt0bb9tZwA" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm_TzuCWzp3SoqHwt0bb9tZwA"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_c4mr7JEvScCUyfp_X9JRLA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- zpbackground-size-cover zpbackground-position-center-center zpbackground-repeat-all zpbackground-attachment-scroll " data-equal-column=""><style type="text/css"> [data-element-id="elm_c4mr7JEvScCUyfp_X9JRLA"].zprow{ background-image: url(/Blog%20Site/hacker-jacket-with-hood-with-laptop-sits-table.jpg); border-radius:1px; } </style><div data-element-id="elm_a9-Y2nGRSKCmQAofiNe7vA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_a9-Y2nGRSKCmQAofiNe7vA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_z_9PhqrxR2eltES0bWV7Mw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_z_9PhqrxR2eltES0bWV7Mw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:rgb(255, 255, 255);">What the hack is going on?!</span><br></h2></div>
<div data-element-id="elm_ef0ZnwyFSl-XACvOZ09aoA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ef0ZnwyFSl-XACvOZ09aoA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:rgb(255, 255, 255);"><span style="font-size:16px;">A comprehensive write-up on the recent surge in DarkGate Malware – a menacing digital threat that has sent shockwaves through the tech world.&nbsp;</span><br></span></p><p><span style="font-size:16px;color:rgb(255, 255, 255);">This blog focuses on the malware campaign that has targeted SharePoint, the cause, prevention and cure for such an attack and the measures to take in order to safeguard your digital assets and sensitive information against this pervasive menace.</span><br></p></div>
</div></div></div></div></div><div data-element-id="elm_q21YbQxy7gREeamVrmfBKg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_q21YbQxy7gREeamVrmfBKg"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_OWe6FAxC6G320Bg2qTrN5A" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_OWe6FAxC6G320Bg2qTrN5A"].zprow{ border-radius:1px; } </style><div data-element-id="elm_4lyGr3msP-KUERkLLR8jZg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_4lyGr3msP-KUERkLLR8jZg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_Umjud1z0sk3ckGci1siyXw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Umjud1z0sk3ckGci1siyXw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-size:11pt;">If you've been keeping an eye on the ever-churning tech rumour mill, you might have come across the unsettling news of a surge in malware downloads linked to a cunning DarkGate malware campaign. This devious scheme tricks victims into unwittingly downloading and opening a malicious LNK file, thereby setting off a chain of infection that culminates in the deployment of the dreaded DarkGate payload.</span></p><p><span style="font-size:11pt;">&nbsp;</span></p><p><span style="font-size:11pt;">But this isn't just another rumour – unfortunately, it's a harsh reality that has ensnared numerous individuals and organizations.&nbsp;</span><span style="font-size:14.6667px;color:inherit;">In recent months, malware downloads in SharePoint have doubled.</span></p></div></div>
</div><div data-element-id="elm_dWlaw_SLiO8wa3aDne5O-A" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_dWlaw_SLiO8wa3aDne5O-A"] .zpimagetext-container figure img { width: 500px !important ; height: 334px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_dWlaw_SLiO8wa3aDne5O-A"] .zpimagetext-container figure img { width:500px ; height:334px ; } } @media (max-width: 767px) { [data-element-id="elm_dWlaw_SLiO8wa3aDne5O-A"] .zpimagetext-container figure img { width:500px ; height:334px ; } } [data-element-id="elm_dWlaw_SLiO8wa3aDne5O-A"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/asian-hacker-black-hood-with-matrix-background.jpg" width="500" height="334" loading="lazy" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><p><span style="color:inherit;font-size:11pt;">Attackers employ a covert strategy by harnessing the widespread popularity of cloud applications to distribute malicious content. Leveraging cloud apps for malware delivery not only enables attackers to elude security controls reliant on domain block lists and URL filtering but also evades inspection of cloud-based traffic.</span><br></p><p><span style="font-size:11pt;">To maximize their success in targeting enterprise users, attackers tend to exploit cloud apps already deeply integrated into corporate environments. Microsoft OneDrive, a leading enterprise cloud app, has consistently occupied the top spot for hosting the highest number of cloud malware downloads for over six months.</span></p><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p><p><span style="font-size:11pt;">In September, malware downloads from SharePoint surged significantly due to the DarkGate malware campaign, propelling SharePoint to the second position for hosting the highest number of cloud malware downloads.</span></p><p><span style="color:inherit;font-size:11pt;"><br></span></p><p><span style="color:inherit;font-size:11pt;">So, what does this all mean for us?</span></p><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p><p><span style="font-size:11pt;">We recently had a chat with Kyle, our in-house security analyst and resident ethical hacker, to delve into the nitty-gritty of this threat. In this discussion, we aim to shed light on why this happened, how you can shield yourself from it, and chart a path forward.</span></p></div></div>
</div></div><div data-element-id="elm_lF1SKa3NCCF3fqgnzQNuRg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_lF1SKa3NCCF3fqgnzQNuRg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><b><span style="font-size:11pt;color:rgb(255, 255, 255);background-color:rgb(199, 0, 0);">What is the cause?</span></b><br></p><p><span style="color:inherit;"><b><span style="font-size:11pt;"><br></span></b></span></p><div style="color:inherit;"><p><span style="font-size:11pt;">It's just an unusual way of delivering ransomware. These hackers are always trying to find new and exciting ways of getting their horrible, dangerous software in people’s environments. Ever since the rise of work from home, a lot more companies are jumping onto SharePoint as a collaboration platform because of everybody working from home. It's bred the perfect environment for hackers to take advantage. They are taking advantage of the fact that there are a lot of new SharePoint users who aren't as experienced and haven't set up heavy security measures.</span></p><p><span style="font-size:11pt;">&nbsp;</span></p><p><span style="font-size:11pt;">So, the issue here is not SharePoint itself, but rather the knowledge on how to keep your platform safe.</span></p></div></div>
</div><div data-element-id="elm_fgf6K1vWsngWV5BGsGS_lA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_fgf6K1vWsngWV5BGsGS_lA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p><b><span style="font-size:11pt;background-color:rgb(199, 0, 0);color:rgb(255, 255, 255);">What would you say to people who are doubting the safety SharePoint as a collaboration tool?</span></b></p><p style="color:inherit;"><span style="font-size:11pt;">&nbsp;</span></p><p style="color:inherit;"><span style="font-size:11pt;">SharePoint is a phenomenal tool and when you set it up correctly, it can be incredibly secure. It's just about knowing how to set it up correctly. Just make sure you do the correct research going into it or get the advice of people who have a great deal of experience with SharePoint, like us (GTconsult).</span></p></div></div>
</div><div data-element-id="elm_iX_i7mpkabsOurD5f9oGMQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_iX_i7mpkabsOurD5f9oGMQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p><b><span style="font-size:11pt;color:rgb(255, 255, 255);background-color:rgb(199, 0, 0);">How can A Team Protection by GTconsult assist clients in keeping their platform secure?</span></b></p><p style="color:inherit;"><span style="font-size:11pt;">&nbsp;</span></p><p style="color:inherit;"><span style="font-size:11pt;">Microsoft has given us many ways of improving the security for Office 365 and SharePoint, but it very daunting, there are hundreds and thousands of different configurations, policies and alerts that can set up. For an inexperienced staff member to try and find all the right things and all the best practices and put them in place, it's hard.</span></p><p style="color:inherit;"><span style="font-size:11pt;">&nbsp;</span></p><p style="color:inherit;"><span style="font-size:11pt;">A lot of companies just don’t have the resources or the skills to get it done.</span></p><p style="color:inherit;"><span style="font-size:11pt;">&nbsp;</span></p><p style="color:inherit;"><span style="font-size:11pt;">This is where A Team Protection comes in. We do an overview of your current secure score, go through the list of recommendations that Microsoft gives and work together with you to find the easiest way of implementing changes without causing a problem with user experience.</span></p></div></div>
</div><div data-element-id="elm_50CMAOSW-Wjx5ltDpHS0wA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_50CMAOSW-Wjx5ltDpHS0wA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"> [data-element-id="elm_50CMAOSW-Wjx5ltDpHS0wA"] .zpbutton.zpbutton-type-primary{ background-color:#C70000 !important; } </style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://www.gtconsult.com/protection"><span class="zpbutton-content">A Team Protection</span></a></div>
</div></div></div></div></div><div data-element-id="elm_2OnI8KjsME6uzJLBcYmXkQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_2OnI8KjsME6uzJLBcYmXkQ"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_mM-f_OGv4XK1K94XInvBtA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_mM-f_OGv4XK1K94XInvBtA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_qTFHpVdIMPwYlSq2bgAuiQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_qTFHpVdIMPwYlSq2bgAuiQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_cFuiVAtuDveOxTk7tjTuUA" data-element-type="video" class="zpelement zpelem-video "><style type="text/css"> [data-element-id="elm_cFuiVAtuDveOxTk7tjTuUA"].zpelem-video{ border-radius:1px; } </style><div class="zpvideo-container zpiframe-align-center zpiframe-mobile-align- zpiframe-tablet-align-"><iframe class="zpvideo " width="560" height="315" src="//www.youtube.com/embed/e4YSke1x13o?enablejsapi=1" frameborder="0" allowfullscreen id=youtube-video-2 data-api=youtube></iframe></div>
</div><div data-element-id="elm_GkGB-sc6bLn3YSaiDoIOzQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_GkGB-sc6bLn3YSaiDoIOzQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p><b><span style="font-size:11pt;color:rgb(255, 255, 255);background-color:rgb(199, 0, 0);">When is the best time to do this?</span></b></p><p style="color:inherit;"><b><span style="font-size:11pt;"><br></span></b></p><div style="color:inherit;"><p><span style="font-size:11pt;">The best time is always now! The sooner, the better. The longer you leave it, the longer you're at risk. Bigger companies are at bigger risk compared to smaller ones. The risk still exists but it’s less than for a company with say, 500 employees.</span></p><p><span style="font-size:11pt;">&nbsp;</span></p><p><span style="font-size:11pt;">The attack surface area is far greater and their value as a bigger company makes them a more exciting target for rogue individuals who are looking to make some money.</span></p><p><span style="font-size:11pt;">&nbsp;</span></p><p><span style="font-size:11pt;">So, the best time is as soon as possible.</span></p></div></div></div>
</div><div data-element-id="elm_CPzhlxxYgqx7D1ThRAThtw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_CPzhlxxYgqx7D1ThRAThtw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p><b><span style="font-size:11pt;color:rgb(255, 255, 255);background-color:rgb(199, 0, 0);">What are the next steps for those who have already fallen victim to the malware?</span></b></p><p style="color:inherit;"><span style="font-size:11pt;">&nbsp;</span></p><p style="color:inherit;"><span style="font-size:11pt;">Organizations who have been victims of this already are on the radar and have been ear marked as a company with weaker security and maybe they've been labelled as an easy target.</span></p><p style="color:inherit;"><span style="font-size:11pt;">&nbsp;</span></p><p style="color:inherit;"><span style="font-size:11pt;">If it happens once, there's a higher likelihood that you will become a victim of this type of thing again- unless your security is improved.</span></p></div></div>
</div><div data-element-id="elm_8vtUSh4I480xK2JtDnaJHg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_8vtUSh4I480xK2JtDnaJHg"] .zpimagetext-container figure img { width: 210.5px !important ; height: 140px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_8vtUSh4I480xK2JtDnaJHg"] .zpimagetext-container figure img { width:210.5px ; height:140px ; } } @media (max-width: 767px) { [data-element-id="elm_8vtUSh4I480xK2JtDnaJHg"] .zpimagetext-container figure img { width:210.5px ; height:140px ; } } [data-element-id="elm_8vtUSh4I480xK2JtDnaJHg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/cyber-security-concept-login-user-identification-i1698680313341.jpeg" width="210.5" height="140" loading="lazy" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><p><b><span style="font-size:11pt;color:rgb(255, 255, 255);background-color:rgb(199, 0, 0);">Do you have any other comments on SharePoint Security?</span></b></p><p style="color:inherit;"><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p><p style="color:inherit;"><span style="font-size:11pt;">Don't always rely on one layer of security because no security solution is ever 100% effective. In the case that someone manages to find a way around to first layer of security, it's great to have a reputable antivirus or endpoint security solution on your work computers to make sure that even if a dodgy malware does come through, it gets caught on the operating system level and is cleaned up.</span></p><p style="color:inherit;"><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div></div>
</div></div><div data-element-id="elm_UU_pFrnr3OMJs9al8mHU9g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_UU_pFrnr3OMJs9al8mHU9g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-size:11pt;">And there you have it – a comprehensive response from our expert analyst on the ongoing threat landscape. It's clear that you shouldn't take any chances; don't become the next victim. Instead, reach out to an organization that possesses extensive knowledge in securing platforms like SharePoint. Reach out to GTconsult. With our expertise, we'll proactively assess your security measures before cybercriminals have a chance. Let us fortify your defences before they get the chance to strike. Your data's safety is paramount, and we're here to ensure it.</span></p><p><span style="font-size:11pt;">&nbsp;</span></p><p><span style="font-size:11pt;">Let us hack you before you get hacked!</span></p></div></div>
</div><div data-element-id="elm_27VQuLrv2JedrL9dJM2kUA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_27VQuLrv2JedrL9dJM2kUA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"> [data-element-id="elm_27VQuLrv2JedrL9dJM2kUA"] .zpbutton.zpbutton-type-primary{ background-color:#C70000 !important; } </style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://www.gtconsult.com/contact" target="_blank"><span class="zpbutton-content">Hack me, Baby!</span></a></div>
</div><div data-element-id="elm_hfOz-Hs8JrKoeKNebkUbkw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_hfOz-Hs8JrKoeKNebkUbkw"] .zpimagetext-container figure img { width: 147px !important ; height: 147px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_hfOz-Hs8JrKoeKNebkUbkw"] .zpimagetext-container figure img { width:147px ; height:147px ; } } @media (max-width: 767px) { [data-element-id="elm_hfOz-Hs8JrKoeKNebkUbkw"] .zpimagetext-container figure img { width:147px ; height:147px ; } } [data-element-id="elm_hfOz-Hs8JrKoeKNebkUbkw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Kyle%20Circle.png" width="147" height="147" loading="lazy" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-weight:700;">Insights provided by: Kyle Farr</span></p><p><br></p><p><span style="color:inherit;"><span style="font-size:14px;">Kyle is an experienced Guru with a demonstrated history of working in the information technology and services industry. He is skilled in Untangle, BMC Remedy, Remote Desktop, Management, all versions of Windows, and Kali Linux. He is currently focused on penetration testing. He is a strong engineering professional with a BSc focused in Computer Science from University of South Africa</span></span><br></p></div>
</div></div></div></div></div></div><div data-element-id="elm_n_sJrPZal0EGhoTlXS-l6g" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg zpbackground-size-cover zpbackground-position-center-center zpbackground-repeat-all zpbackground-attachment-scroll " style="background-image:linear-gradient(to bottom, rgba(30, 34, 45, 0.8), rgba(30, 34, 45, 0.8)), url(https://static.zohocdn.com/sites/stock-images/images/zpstock-image-08.jpg);"><style type="text/css"> [data-element-id="elm_n_sJrPZal0EGhoTlXS-l6g"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZwHOtMTi1JUOy_WkGe1zFw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_ZwHOtMTi1JUOy_WkGe1zFw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_g4GxDM5Afee2GnHXrKUPKw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_g4GxDM5Afee2GnHXrKUPKw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_FTMG8yDoX2O-fR-f0vrLvA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_FTMG8yDoX2O-fR-f0vrLvA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="text-align:center;"><span style="font-size:28px;font-weight:700;color:rgb(255, 255, 255);font-family:&quot;Noto Sans&quot;, sans-serif;">Keep Reading</span></p><p style="text-align:center;"><span style="font-weight:400;color:rgb(255, 255, 255);font-family:Nunito;">Check out our other content below:</span><br></p></div>
</div><div class="zpelement zpelem-carousel " data-element-id="elm_5hZU_rm3J5vi8Vu9ZASavw" data-element-type="carousel" data-currentslide-index="0" data-transition="slide_left" data-slider-interval="5000" data-zs-autoslide="true" data-zs-slidepause-option="false" data-zs-slider="min-height-el: zpcarousel-content-container;arrow-cont: zpcarousel-arrows-container; active-controller: zpcarousel-controller-active; controller-cont: zpcarousel-controller-container; controller: zpcarousel-controller; right-arrow: zpcarousel-arrow-right; left-arrow: zpcarousel-arrow-left;active-slide:zpcarousel-content-active; slide: zpcarousel-content; slides-cont: zpcarousel-content-container;content-cont : zpcarousel-content-inner; background: false;slide-pause-btn:zpcarousel-pause-btn;slide-play-btn:zpcarousel-play-btn;"><div class="zpcarousel-container zpcarousel-style-01"><style></style><div class="zpcarousel-content-container"><div class="zpelement zpcarousel-content " data-element-type="carouselslide" data-element-id="elm_r58-oscTOzRJ7WN_Oc74Lw" data-slide-name="Slide 1"><div class="zpcarousel-content-inner"><div data-element-id="elm_VoDHgNrepXJ5UlVK0N1AdQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_VoDHgNrepXJ5UlVK0N1AdQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_KVAku_uhV4nzjHE8UJZ0YQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_KVAku_uhV4nzjHE8UJZ0YQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_bYhbfVpF3TAN4Np8xIzdXA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_bYhbfVpF3TAN4Np8xIzdXA"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_bYhbfVpF3TAN4Np8xIzdXA"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_bYhbfVpF3TAN4Np8xIzdXA"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_bYhbfVpF3TAN4Np8xIzdXA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-roundcorner zpimage-space-none " src="/Blog%20Site/Microsft%20Partner%20Thumbnail.jpg" width="415" height="233.44" size="fit" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><h1 style="text-align:center;line-height:1;"><span style="color:rgb(255, 255, 255);font-size:20px;">GTconsult: Your Modern Work Partner</span></h1></div></div>
</div></div><div data-element-id="elm_VUGPlz1pFKHPY-_RjEjwNQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_VUGPlz1pFKHPY-_RjEjwNQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://www.gtconsult.com/blogs/post/gtconsult-your-trusted-microsoft-solutions-partner-for-modern-work" target="_blank"><span class="zpbutton-content">Read Me</span></a></div>
</div></div><div data-element-id="elm_-1gRxM8AQ2p4dCnU19M3cw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_-1gRxM8AQ2p4dCnU19M3cw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_Ywbq0Ecexw--soovORW3MQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_Ywbq0Ecexw--soovORW3MQ"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_Ywbq0Ecexw--soovORW3MQ"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_Ywbq0Ecexw--soovORW3MQ"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_Ywbq0Ecexw--soovORW3MQ"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-roundcorner zpimage-space-none " src="/Blog%20Site/Power%20Apps.jpg" width="415" height="233.44" size="fit" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><h2 style="line-height:1;"><span style="font-size:20px;color:rgb(255, 255, 255);">Power Apps in SharePoint</span></h2><div><span style="font-size:20px;color:rgb(255, 255, 255);"><br></span></div></div>
</div></div><div data-element-id="elm_fCNpsHp0-JFNj4QgNNPwOA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_fCNpsHp0-JFNj4QgNNPwOA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://www.gtconsult.com/blogs/post/powerapps-in-sharepoint" target="_blank"><span class="zpbutton-content">Read Me</span></a></div>
</div></div><div data-element-id="elm_9vvXsyPdYNmGYJZzsvmRYw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_9vvXsyPdYNmGYJZzsvmRYw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_l2TEweAr8h6Img0akQD0Qw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_l2TEweAr8h6Img0akQD0Qw"] .zpimagetext-container figure img { width: 308.68px ; height: 173px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_l2TEweAr8h6Img0akQD0Qw"] .zpimagetext-container figure img { width:308.68px ; height:173px ; } } @media (max-width: 767px) { [data-element-id="elm_l2TEweAr8h6Img0akQD0Qw"] .zpimagetext-container figure img { width:308.68px ; height:173px ; } } [data-element-id="elm_l2TEweAr8h6Img0akQD0Qw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-roundcorner zpimage-space-none " src="/Blog%20Site/Teams%20thumbnail.jpg" width="308.68" height="173" size="fit" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><h1 style="text-align:center;line-height:1;"><span style="color:rgb(255, 255, 255);font-size:20px;">Critical Vulnerability Discovered in Microsoft Teams</span></h1></div>
</div></div><div data-element-id="elm_LLBdh2PxzN-qFG9CyGFnQA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_LLBdh2PxzN-qFG9CyGFnQA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://www.gtconsult.com/blogs/post/critical-vulnerability-discovered-in-microsoft-teams-puts-organizations-at-risk" target="_blank"><span class="zpbutton-content">Read Me</span></a></div>
</div></div></div></div></div><div class="zpelement zpcarousel-content " data-element-type="carouselslide" data-element-id="elm_8p0huL3zSac8I1BMD8utwQ" data-slide-name="Slide 2"><div class="zpcarousel-content-inner"><div data-element-id="elm_Li2MxnvTWmjMWt8yyb5xcg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_Li2MxnvTWmjMWt8yyb5xcg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_xY961In-OZUl7p_lc_ArZw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_xY961In-OZUl7p_lc_ArZw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_jkpLJa-4ksoQbyWloEjogQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_jkpLJa-4ksoQbyWloEjogQ"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_jkpLJa-4ksoQbyWloEjogQ"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_jkpLJa-4ksoQbyWloEjogQ"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_jkpLJa-4ksoQbyWloEjogQ"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-roundcorner zpimage-space-none " src="/Blog%20Site/SharePoint%20Write%20Up%20Thumbnail.jpg" width="415" height="233.44" size="fit" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;"><span style="color:rgb(255, 255, 255);">SharePoint Online: The Upgrade Your Business Needs</span><span style="color:inherit;">&nbsp;&nbsp;</span></span><br></p></div>
</div></div><div data-element-id="elm_dBu2ViUXwGbzoygw6MPMbw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_dBu2ViUXwGbzoygw6MPMbw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://www.gtconsult.com/blogs/post/sharepoint-online-the-upgrade-your-business-needs" target="_blank"><span class="zpbutton-content">Read Me</span></a></div>
</div></div><div data-element-id="elm_PeNOYwTqu9NWu9LTD_Rb6w" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_PeNOYwTqu9NWu9LTD_Rb6w"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_cnS_DZrYCdHfjG0FGJP1tw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_cnS_DZrYCdHfjG0FGJP1tw"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_cnS_DZrYCdHfjG0FGJP1tw"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_cnS_DZrYCdHfjG0FGJP1tw"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_cnS_DZrYCdHfjG0FGJP1tw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-roundcorner zpimage-space-none " src="/Blog%20Site/What%20is%20sharepoint%20Thumbnail.jpg" width="415" height="233.44" size="fit" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">What is SharePoint?</span><br></p><p><span style="color:inherit;"><span style="font-size:20px;"><br></span></span></p></div>
</div></div><div data-element-id="elm_UJ-LoFNMVStPweqhiMTlJw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_UJ-LoFNMVStPweqhiMTlJw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://www.gtconsult.com/blogs/post/what-is-sharepoint" target="_blank"><span class="zpbutton-content">Read Me</span></a></div>
</div></div><div data-element-id="elm_nqb3S0P0cFksa3ZKal1hYA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_nqb3S0P0cFksa3ZKal1hYA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_jAygemQpy3wZPP7MEQBolA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_jAygemQpy3wZPP7MEQBolA"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_jAygemQpy3wZPP7MEQBolA"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_jAygemQpy3wZPP7MEQBolA"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_jAygemQpy3wZPP7MEQBolA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-roundcorner zpimage-space-none " src="/Blog%20Site/Migration.png" width="415" height="233.44" size="fit" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">Migrate SharePoint with GTconsult’s A Team</span><br></p></div>
</div></div><div data-element-id="elm_s6vVbUwlWUWTD93KWKNYSw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_s6vVbUwlWUWTD93KWKNYSw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://www.gtconsult.com/sharepoint-migration" target="_blank"><span class="zpbutton-content">Read Me</span></a></div>
</div></div></div></div></div><div class="zpelement zpcarousel-content " data-element-type="carouselslide" data-element-id="elm_Xri_HVxUHJAy6f3427hKbA" data-slide-name="Slide 3"><div class="zpcarousel-content-inner"><div data-element-id="elm_XAQOXVAAu4n6NJmQ7aogdA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_XAQOXVAAu4n6NJmQ7aogdA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_Ayuho2TEYKbMd7di29CYGg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_Ayuho2TEYKbMd7di29CYGg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_TfKLGsgQc2ceF3u5P-BkJQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_TfKLGsgQc2ceF3u5P-BkJQ"] .zpimagetext-container figure img { width: 980px ; height: 551.25px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_TfKLGsgQc2ceF3u5P-BkJQ"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_TfKLGsgQc2ceF3u5P-BkJQ"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_TfKLGsgQc2ceF3u5P-BkJQ"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-roundcorner zpimage-space-none " src="/Blog%20Site/6%20EASY%20STEPS.png" width="415" height="233.44" size="fit" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">6 Easy Steps for an Office 365 Tenant to Tenant Migration</span><br></p></div>
</div></div><div data-element-id="elm_Ml5I4wq1mLCuDSI8sAeKIw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_Ml5I4wq1mLCuDSI8sAeKIw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://www.gtconsult.com/6-easy-steps-for-a-office-365-tenant-to-tenant-migration" target="_blank"><span class="zpbutton-content">Read Me</span></a></div>
</div></div><div data-element-id="elm_u3HDwD11sEwM7FcVqoUFRQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_u3HDwD11sEwM7FcVqoUFRQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_r3tUU97Q0RM2XJ-h2snpIg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_r3tUU97Q0RM2XJ-h2snpIg"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_r3tUU97Q0RM2XJ-h2snpIg"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_r3tUU97Q0RM2XJ-h2snpIg"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_r3tUU97Q0RM2XJ-h2snpIg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-roundcorner zpimage-space-none " src="/Blog%20Site/Checklist%2016%20by%209.png" width="415" height="233.44" size="fit" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><p><span style="font-size:20px;color:rgb(255, 255, 255);">SharePoint Migration Checklist</span><br></p><div style="color:inherit;"><span style="font-size:20px;"><br></span></div></div></div>
</div></div><div data-element-id="elm_k7t9dOVN3C-pb7K4iN-jyw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_k7t9dOVN3C-pb7K4iN-jyw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://www.gtconsult.com/sharepoint-migration-checklist" target="_blank"><span class="zpbutton-content">Read Me</span></a></div>
</div></div><div data-element-id="elm_NzFB-4RgTVzlEBgNHKQjQw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_NzFB-4RgTVzlEBgNHKQjQw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_37EK6MC1YZkOXVZ7vYD3xw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_37EK6MC1YZkOXVZ7vYD3xw"] .zpimagetext-container figure img { width: 307px ; height: 172.57px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_37EK6MC1YZkOXVZ7vYD3xw"] .zpimagetext-container figure img { width:723px ; height:406.40px ; } } @media (max-width: 767px) { [data-element-id="elm_37EK6MC1YZkOXVZ7vYD3xw"] .zpimagetext-container figure img { width:415px ; height:233.27px ; } } [data-element-id="elm_37EK6MC1YZkOXVZ7vYD3xw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-roundcorner zpimage-space-none " src="/Blog%20Site/CCI%20Case%20Study.png" width="415" height="233.27" size="fit" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">CCI Case Study</span><br></p><p><span style="color:inherit;"><span style="font-size:20px;"><br></span></span></p></div>
</div></div><div data-element-id="elm_adYWkrlKwN_4-NUtx0780Q" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_adYWkrlKwN_4-NUtx0780Q"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://www.gtconsult.com/blogs/post/cci-case-study" target="_blank"><span class="zpbutton-content">Read Me</span></a></div>
</div></div></div></div></div></div><div class="zpcarousel-arrows-container zpcarousel-arrow-type-01" data-arrow-style="2"><div class="zpcarousel-arrow-left" tabindex="0" role="button" aria-label="Previous"><svg aria-hidden="true" viewBox="0 0 32 32" xmlns="http://www.w3.org/2000/svg" class="svg-icon-18px"><path d="M0,16c0,0.3,0.1,0.5,0.3,0.7l9.9,10c0.4,0.4,1,0.4,1.4,0c0.4-0.4,0.4-1,0-1.4L3.4,17H31 c0.6,0,1-0.5,1-1s-0.4-1-1-1H3.4l8.2-8.3c0.4-0.4,0.4-1,0-1.4c-0.4-0.4-1-0.4-1.4,0l-9.9,10C0.1,15.5,0,15.7,0,16z"></path></svg></div>
<div class="zpcarousel-arrow-right" tabindex="0" role="button" aria-label="Next"><svg aria-hidden="true" viewBox="0 0 32 32" xmlns="http://www.w3.org/2000/svg" class="svg-icon-18px"><path id="arrow-right-style2-Arrow_Forward" d="M32,16c0-0.3-0.1-0.5-0.3-0.7l-9.9-10c-0.4-0.4-1-0.4-1.4,0c-0.4,0.4-0.4,1,0,1.4 l8.2,8.3H1c-0.6,0-1,0.5-1,1s0.4,1,1,1h27.6l-8.2,8.3c-0.4,0.4-0.4,1,0,1.4c0.4,0.4,1,0.4,1.4,0l9.9-10C31.9,16.5,32,16.3,32,16z"></path></svg></div>
</div><div class="zpcarousel-controller-container zpcarousel-controller-type-01"><svg class="zpcarousel-pause-btn" tabindex="0" role="button" aria-label="Pause" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 14 14"><path d="M3.85.53C3.6.5 3.34.5 3.07.5 1.68.5.95 1.09.95 2.18V12c.03.74.56 1.32 1.44 1.44.53.07 1.11.07 1.64 0 .9-.13 1.42-.72 1.42-1.5V2.07c0-.09 0-.18-.03-.28-.1-.66-.75-1.17-1.59-1.26h.01ZM11.43.53C11.18.5 10.92.5 10.65.5c-1.39 0-2.12.59-2.12 1.68V12c.03.74.56 1.32 1.44 1.44.53.07 1.11.07 1.64 0 .9-.13 1.42-.72 1.42-1.5V2.07c0-.09 0-.18-.03-.28-.1-.66-.75-1.17-1.59-1.26h.01Z"/></svg><svg class="zpcarousel-play-btn" tabindex="0" role="button" aria-label="Play" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 14 14"><path d="M.59 7.02C.57 5.33.57 3.63.51 1.94.45.63 1.72-.17 2.9.45c3.2 1.68 6.42 3.32 9.64 4.96.59.3.95.76.96 1.43 0 .66-.34 1.11-.91 1.43-3.18 1.75-6.35 3.5-9.52 5.25-1.2.66-2.39-.04-2.41-1.41C.63 10.42.61 8.72.59 7.03Z"/></svg><div class="zpcarousel-controller zpcarousel-controller-active" data-slide-index="0"></div>
<div class="zpcarousel-controller " data-slide-index="1"></div><div class="zpcarousel-controller " data-slide-index="2"></div>
</div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 31 Oct 2023 06:54:10 +0000</pubDate></item></channel></rss>