<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.gtconsult.com/blogs/tag/Security/feed" rel="self" type="application/rss+xml"/><title>GTconsult - Blog #Security</title><description>GTconsult - Blog #Security</description><link>https://www.gtconsult.com/blogs/tag/Security</link><lastBuildDate>Wed, 01 Apr 2026 02:59:15 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[If You Haven't Tested Your Security, You Don't Actually Know If It Works]]></title><link>https://www.gtconsult.com/blogs/post/if-you-haven-t-tested-your-security-you-don-t-actually-know-if-it-works</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/Pen Test Thumbnail.png"/>Most businesses have security in place. But when last did anyone test if it actually works? Discover why penetration testing is the difference between assuming you're secure and knowing you are.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_3D0Tmzb5T9Wa9Wqw-ExulQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Hq-NabZSRhOrQ2_D4C9aCQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content- " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_FF1Im4yzRrqxJKBfEV4UTA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_4nOShi1pN_RP5cweEmltTQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_4nOShi1pN_RP5cweEmltTQ"] .zpimage-container figure img { width: 286px !important ; height: 195px !important ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Fire%20Elmo%20GIF.gif" size="custom" data-lightbox="true"/></picture></span></figure></div>
</div></div><div data-element-id="elm_5s78W04vb82nVS26UAaSng" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_NuKHHutt3HtylAu63MvR5w" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p style="text-align:left;">Most businesses have some form of security in place. Firewalls. Antivirus. Maybe an MFA policy that someone set up a while back. And on paper, that feels like enough.</p><p style="text-align:left;">But here's the uncomfortable question: when last did anyone actually test whether it holds up?</p><p style="text-align:left;">Not a checklist. Not a vendor assurance. An actual, deliberate attempt to break through it, the way an attacker would.</p><p style="text-align:left;">Because there's a significant difference between having security and having security that works.</p></div>
<p></p></div></div></div></div></div></div><div data-element-id="elm_AfqoiiGUNXZCXhMeWvk6Ww" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_KoWbxoLmdRNRRxWxZeO8hQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_F7yw0W46bZO-2qm96S1qgQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_1fsOWuhQaHy-z_LFJQCvNQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>The gap most businesses don't see<br/></span></h2></div>
<div data-element-id="elm_jErWC9BF9UXo1DPM1hfYvA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div> Cyber threats aren't theoretical anymore. South Africa is consistently ranked among the most targeted countries on the continent for cyber attacks (and attackers aren't just going after the big corporates). SMEs are increasingly in the crosshairs precisely because they tend to have fewer defences. </div>
<br/><div> What makes this particularly tricky is that most vulnerabilities aren't obvious. They don't announce themselves. They sit quietly in your environment, in a misconfigured permission, an unpatched API, a login page that accepts inputs it shouldn't — waiting for someone who knows what to look for. </div>
<br/><div> And the reality is, the people building and maintaining your systems are focused on making things work. That's the job. Security is a different discipline entirely, and it requires a very different mindset — one that's actively looking for what can go wrong, not just what works. </div>
</div><p></p></div></div><div data-element-id="elm_h7_XPmOop1dAnXlul-p2PA" data-element-type="dividerText" class="zpelement zpelem-dividertext "><style type="text/css"></style><style></style><div class="zpdivider-container zpdivider-text zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid zpdivider-style-none "><div class="zpdivider-common">Most breaches don't happen because nobody checked whether the security they had was actually doing its job. businesses had no security. They happen because </div>
</div></div></div></div></div></div><div data-element-id="elm_9ItA4MuDtGsrecanMRMtZg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_qZUTDjG0DVI66Qli3NM6Nw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_AvVsSZFwptov-BJ1y_q4ew" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_qcuU8YSR2T9ehNBL1Ztgkg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>What a penetration test actually does<br/></span></h2></div>
<div data-element-id="elm_5Lod1Tr1_OzgFZsdGH1wdQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_5Lod1Tr1_OzgFZsdGH1wdQ"] .zpimagetext-container figure img { width: 450px !important ; height: 302px !important ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-original zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Magnify%20Rick%20Moranis%20GIF.gif" size="original" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p><span><span></span></span></p><div><p>A penetration test (done properly) is a controlled, authorised attempt to compromise your systems before a real attacker does.</p><p><br/></p><p>It's not a automated scan. It's not a report that lists every CVE in your environment and calls it a day. It's someone thinking the way an attacker thinks, probing for the paths that matter, and documenting exactly what they found, how they found it, and what the business impact actually is.</p><p><br/></p><p>The output isn't just a list of vulnerabilities. It's clarity. You walk away knowing:</p></div>
<p></p><p><span><span><br/></span></span></p><p><span><span>Where your real exposure is, not just theoretical risk</span><br/><span>What an attacker could realistically access or do</span><br/><span>Which fixes will have the biggest impact on actual security</span><br/><span>Whether your existing controls are doing what you think they're doing</span></span></p></div>
</div></div><div data-element-id="elm_V0gXKYsV4CDyOop0nwSGbw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>That last one matters more than people realise. It's not uncommon to find a control that's been in place for years, that everyone assumes is working, that a pen tester can walk straight through in under an hour.</span></p></div>
</div></div></div></div></div><div data-element-id="elm_EkVESAhlM7hptd0LjZy0ZQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Y7eeXaCjbn309i9SshO5AQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_3aAiKlF3XKm_r2TCYY90lA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_9LJtaSe5ncL1CnUqKyPn5Q" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>The business case for testing before something goes wrong<br/></span></h2></div>
<div data-element-id="elm_J_QzvuUZxhsrM3dRBmNjGw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>There's a version of this conversation that happens after an incident. After a breach. After data has been exfiltrated, or systems have been locked down by ransomware, or a client calls asking why their data appeared somewhere it shouldn't.</p><p><br/></p><p>That conversation is expensive. Remediation is expensive. Reputational damage is expensive. Regulatory exposure (especially under POPIA) can be very expensive.</p><p><br/></p><p>A penetration test, run proactively, finds the same problems before they become incidents. It's the difference between fixing a lock and explaining to your clients why their data is gone.</p><p><br/></p><p>We've seen it go both ways. Businesses that test regularly catch things early and fix them quietly. Businesses that don't, often find out the hard way — and at the worst possible time.</p></div>
<p></p></div></div><div data-element-id="elm_jPwF5Oy4cAu65U_gYI7cVw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span style="color:rgb(166, 206, 57);"><a href="https://www.gtconsult.com/blogs/post/case-study-how-proactive-security-testing-unlocked-enterprise-growth-for-lelapa-ai" title="Read about what happens when you are proactive." target="_blank" rel="">Read about what happens when you are proactive.</a></span></p></div>
</div></div></div></div></div><div data-element-id="elm_cfdasUg-yfPur6Usg6kIKQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Z6Y28T16096t2ZlNhMEIUA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_NsvBFQoB3Pbe3_cH3Z-r0g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_yb0lhy9smTvoEKOr0xGMNw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>How often should you be testing?<br/></span></h2></div>
<div data-element-id="elm_HxsrwalybHO6W4vd5p8NAA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_HxsrwalybHO6W4vd5p8NAA"] .zpimagetext-container figure img { width: 301px !important ; height: 301px !important ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Join%20Us%20Save%20The%20Date%20GIF%20by%20Similarweb.gif" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p></p><div><div> There's no universal answer, but a good rule of thumb: any time something significant changes in your environment, test it. New application deployed. Major infrastructure change. New cloud integration. After a security incident, even a minor one. </div>
<br/><div> Beyond that, most organisations benefit from at least an annual assessment, more frequently if you're in a regulated industry or handle sensitive data at scale. </div>
<br/><div> The point isn't to test for the sake of testing. It's to make sure that as your environment evolves, your security posture evolves with it. Because attackers aren't standing still, and neither are the techniques they use. </div>
</div><p></p></div></div></div><div data-element-id="elm_Fq2n_fgWRSt2fRcG82_noQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"></style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_JeFfODD4vsNC4LokXGrKpA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Find out where your exposure actually is, before someone else does.</span></h2></div>
<div data-element-id="elm_zPLWMAlUv9dLrtDyENZYbw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span>GT Consults offers penetration testing for web applications, internal networks, APIs, and cloud environments. We give you a clear picture of your real risk — and exactly what to do about it.</span></span></p></div>
</div><div data-element-id="elm_7hKyq0OpbSvPI5GQz5_jag" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="https://outlook.office.com/bookwithme/user/6bd34779624c4a8ab5f3906f5e71baf7%40gtconsult.com/meetingtype/Cfseq1rTWEyZRk62iTNVAw2?anonymous&amp;ismsaljsauthenabled=true" target="_blank" title="Book time with our technical account manager "><span class="zpbutton-content">Book a Pen Test Consultation</span></a></div>
</div><div data-element-id="elm_EIWpnOWwc9EKOIAftLg_fg" data-element-type="iframe" class="zpelement zpelem-iframe "><style type="text/css"></style><div class="zpiframe-container zpiframe-align-center"><iframe class="zpiframe " src="https://www.youtube.com/embed/e4YSke1x13o?si=FoKco4ey1ySSdg4R" width="560" height="315" align="center" allowfullscreen frameBorder="0" title="YouTube video player"></iframe></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 17 Mar 2026 10:52:00 +0000</pubDate></item><item><title><![CDATA[SharePoint Online CSP Enforcement: What Admins Need to Do Before March 1, 2026]]></title><link>https://www.gtconsult.com/blogs/post/sharepoint-online-csp-enforcement-what-admins-need-to-do-before-march-1-2026</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/Sharepoint Online Blog Thumbnail.png"/>Microsoft is enforcing CSP in SharePoint Online on March 1, 2026. Non-compliant scripts will be blocked. Here's what's changing, what's at risk, and how to prepare your environment before enforcement goes live.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_-0L9C26FTlKM51UiBo7DSg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_tUpCwpCaT4-un0uBnOvT7w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_CZJzgAxlQHee6CTRLafcTw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_p1sUrsOHRvSNUAwVh2gqhA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span>Microsoft is rolling out Content Security Policy (CSP) enforcement for all SharePoint Online tenants on <strong>March 1, 2026</strong>. If you manage a SharePoint environment with custom scripts, SPFx solutions, or third-party integrations, this change could break things — and the clock is ticking.</span></p></div>
</div><div data-element-id="elm_VbhnqGDtwg7XhFqWvT8i_A" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_VbhnqGDtwg7XhFqWvT8i_A"] .zpimage-container figure img { width: 1107px !important ; height: 622px !important ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/gif%20-1-.gif" size="custom" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div><div data-element-id="elm_7oG9dzK0o94X5dWLpxUa0A" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_bcOM2sWpodbhEHuWP4orNw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_IF49qr9KNuPMqfsmJkJ-tA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_Ykm_1d-vxrx7ViPMHUkpqQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>Here's what's changing, what's at risk, and exactly how to prepare.</span></p></div>
</div><div data-element-id="elm_-ruYHv0-QtxywY1Vhi8uVg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong>What Is CSP and Why Does It Matter?</strong></h3></div>
<div data-element-id="elm_h1g4a5LpdddFnUNmbG2zwA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Content Security Policy is a browser-level security standard that controls which scripts a page is allowed to load and execute. It's one of the most effective defenses against cross-site scripting (XSS), clickjacking, and code injection attacks.</p><p><br/></p><p>Until now, SharePoint Online has been running CSP in <strong>report-only mode</strong> — logging violations without actually blocking anything. That changes on<strong> 1&nbsp;</strong><strong>March&nbsp;</strong>when enforcement goes live. After that date, any script that doesn't comply with the CSP rules will be blocked by the browser, potentially breaking custom web parts, third-party tools, and SPFx solutions.</p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_C63k03WpOjqVO-KUKNwxkw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_g0pv9bUQpe9eD8VKUIMWug" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_hZZcfOgi-lonw1YMQ9PFKQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_vmS35E3ueYLV4WJyCmFAeA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong>Key Dates</strong><br/></h3></div>
<div data-element-id="elm_CaOcyyuPQT4LsQjI9woSRA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div></div><p></p><ul><li><strong>Now through 28 February, 2026</strong> — Report-only mode. Violations are logged but scripts still run.</li><li><strong>March 1, 2026</strong> — CSP enforcement begins. Non-compliant scripts are blocked.</li><li><strong>June 1, 2026</strong> — Extended deadline if you opt in to the 90-day delay via PowerShell.</li></ul></div>
</div></div><div data-element-id="elm_woD8kHqdhAo3VxPYhuPPoQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_0M9J7230OjOGdiEO-jD6IA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_0M9J7230OjOGdiEO-jD6IA"] .zpimage-container figure img { width: 361px !important ; height: 255px !important ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Calendar%20Marked.png" size="custom" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div><div data-element-id="elm_WPWQAzI4y495fI6fleAG9A" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_H0HDD-OpjLnhxuitLMwuNw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_JK7e0zW1ZJYs-_Yna9iPPg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_qT3GAR7oYe67mpnzACjSJw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong>What Will Be Blocked?</strong></h3></div>
<div data-element-id="elm_Di8I5LhFM9_tC_LC2bXzuA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div>Not everything is affected. Here's a breakdown of the four common script patterns and their CSP impact:</div><br/></div><p></p><div><strong>1. SPFx bundles hosted in ClientSideAssets (default pattern)</strong></div><div><div>No action needed. These are trusted automatically.</div><br/><div><span style="font-weight:bold;">2. External CDN bundles via cdnBasePath</span></div><div>No action needed. SharePoint auto-adds the CDN domain to Trusted Script Sources when the app is installed.</div><br/><div><div><strong>3. External libraries loaded via the externals config</strong></div></div><div>No action needed. The CDN domain is auto-trusted.</div><br/><div><span style="font-weight:bold;">4. Dynamic script loading via SPComponentLoader.loadScript()</span></div><div>Action required. You must manually add the script source to the Trusted Script Sources list in SharePoint Admin Center.</div><br/><div><div><strong>5. Inline scripts (JavaScript in HTML, event handlers, innerHTML, document.write())</strong></div></div><div>These will be blocked outright. There is no nonce workaround — Microsoft has confirmed they will not expose nonce values. You must refactor inline scripts into external files and register them as trusted sources.</div></div></div>
</div></div></div></div></div><div data-element-id="elm_08S00E4fLYMYGIK5jqiYJw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Pkgs6i3YtJCS-RBX82DgRQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_7llz1067Kb24MC3Irs9gDg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_iKvunFPtTIQA7VVjoQ0lXg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><strong>How to Audit Your Environment</strong></span></h3></div>
<div data-element-id="elm_tcqtMGfCvuWnt1bp7517GQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><h3>Step 1: Check the Browser Console</h3><p>Open any SharePoint page that uses custom solutions, press F12 to open Dev Tools, and look for CSP violation messages in the Console tab. You'll see entries like:</p><ul><li>&quot;Loading the script '&lt;url&gt;' violates the following...&quot;</li><li>&quot;Executing inline script violates the following Content Security Policy directive...&quot;</li></ul><h3><br/></h3><h3>Step 2: Use Microsoft Purview</h3><p>For a tenant-wide view, go to Microsoft Purview (purview.microsoft.com) and create an audit report filtering for the activity <strong>&quot;Violated Content Security Policy.&quot;</strong> This gives you a comprehensive list of every page and script generating violations across your environment.</p><h3><br/></h3><h3>Step 3: Review the Directives</h3><p>Pay attention to both <strong>Directive 12 (script-src)</strong> and <strong>Directive 13 (style-src)</strong> violations. Both are relevant — Directive 13 applies to inline code constructs that will also be blocked under enforcement.</p><h2></h2></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_jI1zMBxqXW7ghCQ9w3sK7w" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_UDCX-2Z1yHvnK_M5JKOQEg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_N2DMcIrFDcPyv17bPdd03A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_Y8M6iJtWF5fh6FB8XuAisw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_Y8M6iJtWF5fh6FB8XuAisw"] .zpimage-container figure img { width: 576.28px !important ; height: 436px !important ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/seinfeld%20newman%20GIF%20-1-.gif" size="custom" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div><div data-element-id="elm_OKcwy2FZMEcuSW2v9PYwOA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_5ZgBdzFumTK_LxFaFc1fig" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_KJRv-IoImziWJ55OplsPyQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_titlKT_ErdkcuRHPTf7tYA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong>How to Fix It</strong></h3></div>
<div data-element-id="elm_j14_P2_LnqDl3HOy2ZbiMw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><h3>Add Trusted Script Sources</h3><p>Go to <strong>SharePoint Admin Center → Advanced → Script sources</strong> and add any external domains your solutions depend on. A few things to note:</p><ul><li>You can add up to 300 entries.</li><li>Overly broad wildcards like<span style="background-color:rgba(0, 27, 76, 0.15);"><code style="color:rgb(135, 34, 34);">*</code></span>or<span style="background-color:rgba(0, 27, 76, 0.15);color:rgb(135, 34, 34);"><code>*.domain</code></span>are not allowed.</li><li>Use targeted wildcards to consolidate where possible.</li><li>If a script loads from a CDN, you need to trust that specific CDN domain.</li></ul><div><br/></div>
<h3>Refactor Inline Scripts</h3><p>This is the big one. Any JavaScript embedded directly in HTML, event handlers, or injected via<span style="background-color:rgba(0, 27, 76, 0.15);"><code style="color:rgb(135, 34, 34);">innerHTML</code></span>or<span style="background-color:rgba(0, 27, 76, 0.15);"></span><code style="background-color:rgba(0, 27, 76, 0.15);color:rgb(135, 34, 34);">document.write()</code> must be moved into external<span style="background-color:rgba(0, 27, 76, 0.15);"><code style="color:rgb(135, 34, 34);">.js</code></span>files hosted at a trusted location. There's no shortcut here —<span style="background-color:rgba(0, 27, 76, 0.15);"><code style="color:rgb(135, 34, 34);">unsafe-inline</code></span>is not permitted, and Microsoft will not provide nonce values.</p><p><br/></p><h3>Validate Auto-Trusted Sources</h3><p>If you use<span style="background-color:rgba(0, 27, 76, 0.15);"><code style="color:rgb(135, 34, 34);">cdnBasePath</code></span>without a trailing slash, the auto-generated Trusted Script Sources entry may not match correctly. Double-check these entries manually after deploying your solutions.</p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_NSaiPi5kldMvoHjSX0iphw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_fG2I96K6zzt4lNDPPj-7wQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_46atisbu32ScxDX4ks24dA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_mZx3fAIVJCcvxfbzg5YxYQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong><span>Buying More Time</span></strong></h3></div>
<div data-element-id="elm_R2K5gyPL-1wfhe--LBJ6kA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>If your team isn't ready by 1 March, you can delay enforcement by 90 days using the SharePoint Online Management Shell:</span></p></div>
</div><div data-element-id="elm_eRuLatFYVRbMP68-q_Zhlg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><img src="/Wed%20Feb%2018%202026.png" alt=""/></span></p></div>
</div><div data-element-id="elm_sSY0prPm8UEgnwn563zvmQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>This pushes enforcement to June 1, 2026. It's a one-time delay — use it wisely and don't treat it as a permanent fix.</p><h2></h2></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_O1L1kyKQK73tTTlo3EfDXQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_lAQWlNPm4sKH8kaiH3v7Rg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_4MVwe2BqHyeNiuX-7a5NBQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_sYMWDch2NsN5KIat7H36IA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong>What About<span style="background-color:rgba(0, 27, 76, 0.15);color:rgb(135, 34, 34);"></span></strong><code><strong style="background-color:rgba(0, 27, 76, 0.15);color:rgb(135, 34, 34);">eval()</strong></code><strong>?</strong></h3></div>
<div data-element-id="elm_T-ejPLkKv-UXKt6nLDFk6w" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>Good news on this front: Microsoft's CSP implementation includes<span style="background-color:rgba(0, 27, 76, 0.15);color:rgb(135, 34, 34);"><code>unsafe-eval</code></span>in the<span style="background-color:rgba(0, 27, 76, 0.15);color:rgb(135, 34, 34);"><code>script-src</code></span>directive, so<span style="background-color:rgba(0, 27, 76, 0.15);color:rgb(135, 34, 34);"><code>eval()</code></span>calls in your scripts will continue to work. This was confirmed by the SharePoint team in the community discussion.</span></p></div>
</div></div></div></div></div><div data-element-id="elm_RHtr6GRGBmR3tFAIdRT6eg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_AzVbYYv8nqrGr3bBovUNZQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_NPxLXBf8SLYJcY4CHZa5lA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_-EfThyyfU4tUFTy7EHbHaQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong>Communicate With Your Users</strong></h3></div>
<div data-element-id="elm_HzWnkATNeGVhO5HeZXLjxg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Once enforcement begins, end users may see broken functionality or warning messages on pages that rely on non-compliant scripts. Get ahead of this with proactive communication:</p><ul><li>Explain that this is a security improvement, not a system failure.</li><li>Provide a clear path for users to report issues.</li><li>Coordinate with any third-party vendors whose solutions run in your SharePoint environment.</li></ul></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_dh2TSSJp2qhNc8NZtERHQw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_VYYlFfU3nYyewCQuxO0IpQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_lDqanQc3_Gj8daBkZLxiHA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_ZWs-TfjCA26R208c5fKc5w" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_ZWs-TfjCA26R208c5fKc5w"] .zpimageheadingtext-container figure img { width: 500px ; height: 281.00px ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-medium zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Chicago%20Pd%20Nbc%20GIF%20by%20One%20Chicago.gif" data-src="/Blog%20Site/Chicago%20Pd%20Nbc%20GIF%20by%20One%20Chicago.gif" size="medium" data-lightbox="true"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left" data-editor="true"><span><strong>Communicate With Your Users</strong></span></h3><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p>Once enforcement begins, end users may see broken functionality or warning messages on pages that rely on non-compliant scripts.&nbsp;</p><p><br/></p><p>Get ahead of this with proactive communication:</p><p><br/></p><li>​Explain that this is a security improvement, not a system failure.</li><ul><li>Provide a clear path for users to report issues. </li><li>Coordinate with any third-party vendors whose solutions run in your SharePoint environment.</li></ul><p><br/></p></div>
</div></div></div></div></div></div></div><div data-element-id="elm_3l1TsxwDj2JcLX65iyMcoQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_5QVIQ2sdjJLK7lYj1a0DNA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_2rGfj-MKZ4kDJ2q1W7QK-g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_JV9DaUbiwMhMlPuHwmt51w" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong>Bottom Line</strong></h3></div>
<div data-element-id="elm_AT68dZubYSHhDDEj24CT7A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>CSP enforcement is a welcome security improvement, but it requires hands-on preparation. The report-only window closes on February 28. Use the time you have to audit violations in Purview, fix inline scripts, register trusted sources, and communicate the change to your users. If you need more time, enable the 90-day delay — but start the work now.</span></p></div>
</div><div data-element-id="elm_RBLvefB5BMs5nShxZ9l-tg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h5
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong>Further reading:</strong></h5></div>
<div data-element-id="elm_yJb4seQ5TzGthdNCJ7D35Q" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><li><a href="https://learn.microsoft.com/en-us/sharepoint/dev/spfx/content-securty-policy-trusted-script-sources">Support for Content Security Policy (CSP) in SharePoint Online — Microsoft Learn</a></li><li><a href="https://techcommunity.microsoft.com/blog/spblog/sharepoint-online-content-security-policy-csp-enforcement-dates-and-guidance/4472662">SharePoint Online CSP: Enforcement Dates and Guidance — Microsoft Tech Community</a></li></div><p></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 18 Feb 2026 13:04:00 +0000</pubDate></item><item><title><![CDATA[Configuration Drift ]]></title><link>https://www.gtconsult.com/blogs/post/configuration-drift</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/Configuration Drift Thumbnail.png"/>Configuration drift is the silent shift of your Microsoft 365 security settings away from best practices. Small changes accumulate, weakening security and creating compliance gaps. Secure Score helps you detect and correct these deviations so you can maintain a strong, consistent security posture.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_lZ3OQ04_S9GDB1wHhEkSjQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_dOm-HJM4Q32R0xiwDhMxzw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_5XCl6YOLR7e1brrNtU_7sQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_c1Jwq3-wQZqc_VhaiahxhA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span>The Hidden Challenge of Microsoft 365 Security</span></h2></div>
<div data-element-id="elm_TSme_DKKTVulY0k4ViWFVw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span>How security configurations gradually deviate from best practices—and how Secure Score helps you stay on track</span></p></div>
</div><div data-element-id="elm_RIcfLCua3-HpN6gDWCjK3g" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_RIcfLCua3-HpN6gDWCjK3g"] .zpimage-container figure img { width: 1110px ; height: 624.38px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Configuration%20Drift%20Thumbnail.png" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div><div data-element-id="elm_M2819wnmykUDMTi9fvuu2Q" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_b7ZLoAgK6yy9e1WnB17xWQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_aE1CqXNcLyduFI6YvSLQEQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_nwJn9VhwYG8oumiGjHitSg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>The Security Baseline That Quietly Changes</span></h2></div>
<div data-element-id="elm_iRpVnB8ja7KlIPchz48WxQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Six months ago, your Microsoft 365 security configuration looked solid. You enabled MFA for users, configured Conditional Access policies, and deployed DLP rules. Your Secure Score reflected strong security practices.</p><p><br/></p><p>Today, without any deliberate changes to weaken security, you notice gaps. Some users have Conditional Access exclusions that were meant to be temporary. DLP policies don't cover recently created SharePoint sites. Your Secure Score has dropped slightly, and the recommended actions list has grown.</p><p><br/></p><p>This is configuration drift—the gradual deviation of your security settings from their intended state. It doesn't announce itself with alerts or audit findings. Instead, small changes accumulate over time, creating gaps in your security posture that may only become apparent during audits or security assessments.</p></div><p></p></div>
</div><div data-element-id="elm_y5BVISEsxl-qOZfV-TdFYQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_y5BVISEsxl-qOZfV-TdFYQ"] div.zpspacer { height:5px; } @media (max-width: 768px) { div[data-element-id="elm_y5BVISEsxl-qOZfV-TdFYQ"] div.zpspacer { height:calc(5px / 3); } } </style><div class="zpspacer " data-height="5"></div>
</div></div></div></div></div><div data-element-id="elm_yY3jEHNRopu1SEwcdtAmeg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg zscustom-section-123 "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_VRDB856PZrF9sMsEs_OVMQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_hZY719kUqC0CJRsFHdUONw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-7 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_8CRz4rgo7f3DxTfjRzbmEA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Understanding Configuration Drift</span></h2></div>
<div data-element-id="elm_JxOl09gmM8_QAf0pbVeVhg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Configuration drift in Microsoft 365 occurs when settings unintentionally deviate from defined baselines, as the system's configuration diverges from its intended state.&nbsp;</p><p><br/></p><p>In practical terms:</p></div><p></p></div>
</div><div data-element-id="elm_LeLWslQnUmaU4HmcLZEbIQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><b style="color:rgb(0, 27, 76);">Security controls may weaken gradually</b>: MFA exclusions for &quot;temporary&quot; access become permanent, sharing settings get loosened for specific projects, or legacy authentication gets re-enabled for troubleshooting and never gets turned back off.</p><p><br/></p><p><b style="color:rgb(0, 27, 76);">Compliance gaps emerge</b>: Your actual tenant configuration no longer matches your documented policies, creating discrepancies that auditors will identify during assessments.</p></div><p></p></div>
</div></div><div data-element-id="elm_nEb1pYezWiIvDfW1lTxsfA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-5 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_nEb1pYezWiIvDfW1lTxsfA"].zpelem-col{ border-style:solid; border-color:rgba(0,0,0,0.14) !important; border-block-start-width:0px; border-inline-end-width:0px; border-block-end-width:0px; border-inline-start-width:1px; } </style><div data-element-id="elm_pRROyFCpY8wHrR8RAFGe7g" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_pRROyFCpY8wHrR8RAFGe7g"] .zpimage-container figure img { width: 342px !important ; height: 342px !important ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/image-gen%20-9-.png" size="custom" data-lightbox="true"/></picture></span></figure></div>
</div></div></div><div data-element-id="elm_r8gAFSOT2igQiXqAQhtzkw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_5mJmMCDxXTrEdNyyauwTeg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_d3qs7QWmSv3l0HodYbCs7A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><b style="color:rgb(0, 27, 76);">Visibility becomes challenging</b>: With different security configurations across Exchange, Teams, SharePoint, and OneDrive, it becomes difficult to maintain consistent protection levels across your environment.</p><p><br/></p><p>The challenge is that drift happens quietly. There's no notification saying &quot;Your security posture just changed.&quot; Changes accumulate until you discover—often during an audit or security review—that your environment no longer matches your documented security baseline.</p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_MYMCuUF0Zkq2icvGc_p3wg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_vykV5NW5e1w5S92Z1mGNPQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_qwE-pMbes5Uq8XoCeJXc0Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_NlTAXGFttBjkLyxce2KahA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Common Causes of Configuration Drift</span></h2></div>
<div data-element-id="elm_MwVwn8MameJ_3qjwKzr5GA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Configuration drift is going to happen—no matter what you do. It stems from normal business activities:</p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_sRlXYEpwDQAc0eixqKEDnQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_7y_8lq3OTDhuyyZsCnuEtw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_C9oUp1zhmAx4Lfc4O2r3YA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_z19jKOKbS-SZZ5-eQoC_sg" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-center zpicon-align-mobile-center zpicon-align-tablet-center "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 640 512" height="640" width="512" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path d="M624 208h-64v-64c0-8.8-7.2-16-16-16h-32c-8.8 0-16 7.2-16 16v64h-64c-8.8 0-16 7.2-16 16v32c0 8.8 7.2 16 16 16h64v64c0 8.8 7.2 16 16 16h32c8.8 0 16-7.2 16-16v-64h64c8.8 0 16-7.2 16-16v-32c0-8.8-7.2-16-16-16zm-400 48c70.7 0 128-57.3 128-128S294.7 0 224 0 96 57.3 96 128s57.3 128 128 128zm89.6 32h-16.7c-22.2 10.2-46.9 16-72.9 16s-50.6-5.8-72.9-16h-16.7C60.2 288 0 348.2 0 422.4V464c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48v-41.6c0-74.2-60.2-134.4-134.4-134.4z"></path></svg></span><h3 class="zpicon-heading " data-editor="true"><span>New User Onboarding:</span></h3><div class="zpicon-text-container " data-editor="true"><p><span>When employees join, they're added to groups and granted permissions. Sometimes these are temporary workarounds that nobody remembers to revoke. New users may not inherit security policies if policy scope wasn't updated to include them.</span></p></div>
</div></div></div><div data-element-id="elm_cUY3rG0pGZX9NJhcwbdVKA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_gdRYAinA0L3fWW1KNpScZw" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-center zpicon-align-mobile-center zpicon-align-tablet-center "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 24 24" height="24" width="24" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path fill-rule="evenodd" clip-rule="evenodd" d="M20.1702 3L20.1663 3.00453C21.7458 3.09084 23 4.39896 23 6V18C23 19.6569 21.6569 21 20 21H4C2.34315 21 1 19.6569 1 18V6C1 4.34315 2.34315 3 4 3H20.1702ZM10.4764 5H16.4764L13.089 9H7.08899L10.4764 5ZM5.08899 9L8.47644 5H4C3.44772 5 3 5.44772 3 6V9H5.08899ZM3 11V18C3 18.5523 3.44772 19 4 19H20C20.5523 19 21 18.5523 21 18V11H3ZM21 9V6C21 5.44771 20.5523 5 20 5H18.4764L15.089 9H21Z"></path></svg></span><h3 class="zpicon-heading " data-editor="true"><span>Application Deployments:</span></h3><div class="zpicon-text-container " data-editor="true"><p><span>New applications integrating with Microsoft 365 require permission grants and security exceptions. These grants may be broader than necessary and rarely get reviewed after initial deployment.</span></p></div>
</div></div></div><div data-element-id="elm_KmK6a6-gX6tgh1dY-A1doA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_TOC1yeyim3SwA8HH7l_hCg" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-center zpicon-align-mobile-center zpicon-align-tablet-center "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 24 24" height="24" width="24" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path d="M12.552 8C11.9997 8 11.552 8.44772 11.552 9C11.552 9.55228 11.9997 10 12.552 10H16.552C17.1043 10 17.552 9.55228 17.552 9C17.552 8.44772 17.1043 8 16.552 8H12.552Z" fill-opacity="0.5"></path><path d="M12.552 17C11.9997 17 11.552 17.4477 11.552 18C11.552 18.5523 11.9997 19 12.552 19H16.552C17.1043 19 17.552 18.5523 17.552 18C17.552 17.4477 17.1043 17 16.552 17H12.552Z" fill-opacity="0.5"></path><path d="M12.552 5C11.9997 5 11.552 5.44772 11.552 6C11.552 6.55228 11.9997 7 12.552 7H20.552C21.1043 7 21.552 6.55228 21.552 6C21.552 5.44772 21.1043 5 20.552 5H12.552Z" fill-opacity="0.8"></path><path d="M12.552 14C11.9997 14 11.552 14.4477 11.552 15C11.552 15.5523 11.9997 16 12.552 16H20.552C21.1043 16 21.552 15.5523 21.552 15C21.552 14.4477 21.1043 14 20.552 14H12.552Z" fill-opacity="0.8"></path><path d="M3.448 4.00208C2.89571 4.00208 2.448 4.44979 2.448 5.00208V10.0021C2.448 10.5544 2.89571 11.0021 3.448 11.0021H8.448C9.00028 11.0021 9.448 10.5544 9.448 10.0021V5.00208C9.448 4.44979 9.00028 4.00208 8.448 4.00208H3.448Z"></path><path d="M3.448 12.9979C2.89571 12.9979 2.448 13.4456 2.448 13.9979V18.9979C2.448 19.5502 2.89571 19.9979 3.448 19.9979H8.448C9.00028 19.9979 9.448 19.5502 9.448 18.9979V13.9979C9.448 13.4456 9.00028 12.9979 8.448 12.9979H3.448Z"></path></svg></span><h3 class="zpicon-heading " data-editor="true"><span>&quot;Temporary&quot; Exceptions:</span></h3><div class="zpicon-text-container " data-editor="true"><p><span>An executive needs urgent access from an unusual location. A project team needs external sharing for specific collaboration. A department needs modified DLP policies for a time-sensitive initiative. These exceptions are granted &quot;temporarily&quot;—and frequently forgotten.</span></p></div>
</div></div></div></div><div data-element-id="elm_sB12zPqwHCbtk6QX9wArsw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_v256zw-wHTSxHJA4nFIBTA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_sHw82WNQa_Z7ZFXn08Z1YQ" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-center zpicon-align-mobile-center zpicon-align-tablet-center "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 512 512" height="512" width="512" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path d="M448 0H64C28.7 0 0 28.7 0 64v288c0 35.3 28.7 64 64 64h96v84c0 7.1 5.8 12 12 12 2.4 0 4.9-.7 7.1-2.4L304 416h144c35.3 0 64-28.7 64-64V64c0-35.3-28.7-64-64-64zm16 352c0 8.8-7.2 16-16 16H288l-12.8 9.6L208 428v-60H64c-8.8 0-16-7.2-16-16V64c0-8.8 7.2-16 16-16h384c8.8 0 16 7.2 16 16v288z"></path></svg></span><h3 class="zpicon-heading " data-editor="true"><span>Help Desk Troubleshooting:</span></h3><div class="zpicon-text-container " data-editor="true"><p><span>When users report access issues, support teams troubleshoot by adjusting permissions, modifying group memberships, or creating policy exceptions. These changes solve immediate problems but may not align with security baselines.</span></p></div>
</div></div></div><div data-element-id="elm_w2rRLdNalsPNtYM_F8A1_A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_-enCWghC6IQN0ZVKM8Z1jA" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-center zpicon-align-mobile-center zpicon-align-tablet-center "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 512 512" height="512" width="512" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path d="M497.9 142.1l-46.1 46.1c-4.7 4.7-12.3 4.7-17 0l-111-111c-4.7-4.7-4.7-12.3 0-17l46.1-46.1c18.7-18.7 49.1-18.7 67.9 0l60.1 60.1c18.8 18.7 18.8 49.1 0 67.9zM284.2 99.8L21.6 362.4.4 483.9c-2.9 16.4 11.4 30.6 27.8 27.8l121.5-21.3 262.6-262.6c4.7-4.7 4.7-12.3 0-17l-111-111c-4.8-4.7-12.4-4.7-17.1 0zM124.1 339.9c-5.5-5.5-5.5-14.3 0-19.8l154-154c5.5-5.5 14.3-5.5 19.8 0s5.5 14.3 0 19.8l-154 154c-5.5 5.5-14.3 5.5-19.8 0zM88 424h48v36.3l-64.5 11.3-31.1-31.1L51.7 376H88v48z"></path></svg></span><h3 class="zpicon-heading " data-editor="true"><span>Administrative Changes:</span></h3><div class="zpicon-text-container " data-editor="true"><p><span>Different administrators have different approaches to security configuration. As teams change, new administrators implement security according to their experience, which may differ from the original baseline.</span></p></div>
</div></div></div><div data-element-id="elm_Ef5xKmRnNoyYOZOpZuqSLg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_HEc8YYyiVrQ2DngS_up5cg" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-center zpicon-align-mobile-center zpicon-align-tablet-center "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 512 512" height="512" width="512" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path d="M370.72 133.28C339.458 104.008 298.888 87.962 255.848 88c-77.458.068-144.328 53.178-162.791 126.85-1.344 5.363-6.122 9.15-11.651 9.15H24.103c-7.498 0-13.194-6.807-11.807-14.176C33.933 94.924 134.813 8 256 8c66.448 0 126.791 26.136 171.315 68.685L463.03 40.97C478.149 25.851 504 36.559 504 57.941V192c0 13.255-10.745 24-24 24H345.941c-21.382 0-32.09-25.851-16.971-40.971l41.75-41.749zM32 296h134.059c21.382 0 32.09 25.851 16.971 40.971l-41.75 41.75c31.262 29.273 71.835 45.319 114.876 45.28 77.418-.07 144.315-53.144 162.787-126.849 1.344-5.363 6.122-9.15 11.651-9.15h57.304c7.498 0 13.194 6.807 11.807 14.176C478.067 417.076 377.187 504 256 504c-66.448 0-126.791-26.136-171.315-68.685L48.97 471.03C33.851 486.149 8 475.441 8 454.059V320c0-13.255 10.745-24 24-24z"></path></svg></span><h3 class="zpicon-heading " data-editor="true"><span>Microsoft Platform Evolution:</span></h3><div class="zpicon-text-container " data-editor="true"><p><span>Microsoft continuously updates Microsoft 365, adding new features and changing defaults. New workloads, new sharing capabilities, new integration options—each potentially introducing configuration that doesn't match established security baselines.</span></p></div>
</div></div></div></div><div data-element-id="elm_GLMgs7bTTYK6iOKRLGBZjQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_1gghgSkEAA1UtHNlNVsg7w" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_c6NijOigCJvLDhK67yrybQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>None of these represent negligence. They're normal operations. But collectively, they create drift that can weaken security over time.</span></p></div>
</div></div></div></div></div><div data-element-id="elm_0Qny4cwNAC4GoKc-Mikn-A" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Z09KhX_IQIwb4BWfncdQ0g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_MJqcUktqDCeZPVSsDCUfdQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_mIf9mP72e05mdznqXKqRrQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Real-World Impact Examples</span></h2></div>
<div data-element-id="elm_fDDP0O4sIMLBElM477eToQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>Configuration drift creates tangible security and compliance risks:</span></p></div>
</div><div data-element-id="elm_owom71iKWhrEc4yNAbjMbw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><div><strong><span style="color:rgb(0, 27, 76);">The MFA Gap</span>:</strong> You implemented MFA organization-wide two years ago. Today, checking your Conditional Access policies reveals multiple exclusions—some for valid business reasons, many because someone granted temporary access that never got revoked. Each exception represents potential vulnerability.</div><p></p><div><div></div><br/><div><span style="font-weight:bold;"><span style="color:rgb(0, 27, 76);">The Sharing Sprawl</span>:</span> Your SharePoint security policies restrict external sharing to specific approved domains. But individual site owners have requested and received exceptions for their sites. Now you have inconsistent sharing policies across your environment, and tracking which sites allow unrestricted external sharing requires manual investigation.</div><br/><div></div></div><div><strong><span style="color:rgb(0, 27, 76);">The Policy Patchwork</span>:</strong> Your DLP policies were carefully designed to protect sensitive financial data. But various departments have requested modifications to avoid false positives impacting workflows. Now your DLP coverage has gaps, and you're not certain which channels have comprehensive protection.</div><div><br/></div><div><div><p><b style="color:rgb(0, 27, 76);">The Privilege Accumulation</b>: You follow the principle of least privilege for administrative access. But troubleshooting activities and temporary project requirements have resulted in more users with elevated privileges than your security framework permits, without a clear record of why each was granted.</p></div></div></div>
</div><div data-element-id="elm_sWA4SZ8yp9q8gvi5iAmrEg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Each scenario represents drift from intended security baselines. Individually, they seem manageable. Collectively, they represent systematic security degradation.</p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_Ra2WMNxruJyLcD18yxGSTA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_0zkvT1meMUvKUto6v0nBzQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_mdw5XIhc64FvssTK-rtDCg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_8XVmKieIp0U24x5zx8xbXg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Why Manual Drift Management Is Challenging</span></h2></div>
<div data-element-id="elm_ftiVySCrmSaXkBiksYOooQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>The instinctive response to configuration drift is increased vigilance: review configurations more frequently, document changes more carefully, audit security settings regularly.</p><p>Manual management is impossible at enterprise scale for fundamental reasons. Consider the scope:</p><ul><li>Hundreds or thousands of user accounts with individual settings and permissions</li><li>Dozens of security policies across multiple workloads</li><li>Thousands of SharePoint sites with individual permission configurations</li><li>Hundreds of applications with varying permission grants</li><li>Multiple administrators making legitimate changes daily</li><li>Over 5,000 specific manual configurations across Microsoft 365 services</li></ul></div><p></p></div>
</div><div data-element-id="elm_o5J77Edegsu8uFO-Wy110A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Manual review of this environment is:</p><p><br/></p><p><b style="color:rgb(0, 27, 76);">Time-consuming</b>: Comprehensive drift detection requires reviewing thousands of configuration points across multiple admin centers.</p><p><b style="color:rgb(0, 27, 76);">Error-prone</b>: Even diligent administrators miss subtle changes and can't catch all deviations across the entire environment.</p><p><b style="color:rgb(0, 27, 76);">Reactive</b>: You discover drift after it's already occurred and potentially created risk.</p><p><b style="color:rgb(0, 27, 76);">Unsustainable</b>: IT teams don't have capacity for continuous manual monitoring alongside their other responsibilities.</p><p><br/></p><p>Organizations relying on manual drift detection inevitably discover configuration gaps during audits or security assessments, when addressing them becomes more difficult and time-consuming.</p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_xbk2U3WVDpXCjOTkEP52ng" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_c-BVrN9O9fXU6FNYmSIHAA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_i55M9TqzdxNqqFKHUAoBpg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_9xtg3gKgCb-Rq6nEStJ9SA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>How Secure Score Detects Configuration Drift</span></h2></div>
<div data-element-id="elm_loJCZkta_eBJnQ8zdqPQLA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div>Microsoft Secure Score provides a centralized dashboard in the Microsoft Defender portal where organizations can monitor and work on the security of their Microsoft 365 identities, apps, and devices. It's specifically designed to address configuration drift.</div><br/><div>Secure Score evaluates your Microsoft 365 environment based on system configurations, user behaviors, and other security-related measurements, offering a score between 0 and 100. The higher the score, the better your security posture.</div></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_mLDXKIKZqTpmFdy7j_f4Og" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm__SohByQVSHubRztSlOz96w" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_50HfnqtN8lxkV_ENsrAfSw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_dbA2leKP5ZWoJEvdv8AnIw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>How Secure Score Identifies Drift</span></h2></div>
<div data-element-id="elm_2kwFySNsKVnSuNhy4Ea8dA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>When your configuration drifts from Microsoft's security best practices, Secure Score identifies the gap and provides specific guidance. If you see recommendations like:</p><ul><li>&quot;Enable MFA for all users&quot; (but you thought you already did)</li><li>&quot;Restrict external sharing&quot; (but policies have been modified)</li><li>&quot;Remove unused service principals&quot; (from that app integration months ago)</li></ul><p>These aren't just suggestions—they're indicators that your configuration has drifted from security best practices.</p><p>The History tab in Secure Score offers a weekly graph showing changes over time, making it easy to spot vulnerabilities and take immediate action. A declining Secure Score over time is a clear signal that configuration drift is degrading your security posture.</p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_7yM8FfA8mjPRgh8P3VQCuA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_FSvojlAGYjspCxkUjCVLkw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_zB5hI2lJpidEryqPQO7ecw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_W3oSlRFI5VNmlZw_fOjEsA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>What Secure Score Monitors</span></h2></div>
<div data-element-id="elm_iEKoAbh5M-nBz7_2o2_KuQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Secure Score is calculated based on the implementation of security controls across various Microsoft 365 services. Each control you implement contributes to your overall score. It tracks configuration across:</p><ul><li><b style="color:rgb(0, 27, 76);">Identity and access management</b>: MFA implementation, Conditional Access policies, privileged access controls</li><li><b style="color:rgb(0, 27, 76);">Data protection</b>: DLP policies, encryption settings, sharing configurations</li><li><b style="color:rgb(0, 27, 76);">Threat protection</b>: Anti-phishing policies, anti-malware settings, Safe Links and Safe Attachments</li><li><b style="color:rgb(0, 27, 76);">Device management</b>: Compliance policies, app protection policies</li><li><b style="color:rgb(0, 27, 76);">Infrastructure security</b>: Audit logging, threat policies, security defaults</li></ul><p>The score is continuously updated based on your configurations and user behaviors, so frequent checks ensure you are aware of new recommendations and potential risks.</p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_n9ufJTdydSSCS7vW28QdXQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_F-x8w_y9EhiqMsSjXTsXZg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_hfNmWFomry-bqUN_AT1p6w" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_T0JCAefJqiusOxGLtmOJ7A" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>The Implementation Challenge</span></h2></div>
<div data-element-id="elm_Y1lbLMbEu7CE2V0pwNaP8A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Secure Score provides visibility into configuration drift and identifies where your settings deviate from best practices. Configuration analyzer in Microsoft Defender for Office 365 provides drift analysis and allows you to track policy changes over time, specifically for threat policies.</p><p>However, visibility alone doesn't improve security. The challenge many organizations face is moving from Secure Score recommendations to systematic security improvement. You need to:</p><ol start="1"><li><b style="color:rgb(0, 27, 76);">Prioritize recommendations</b>: Focus on implementing recommendations with the highest score impact first, as these actions typically offer the most significant improvement in security.</li><li><b style="color:rgb(0, 27, 76);">Assess business impact</b>: Understand how configuration changes will affect user workflows and business operations before implementation.</li><li><b style="color:rgb(0, 27, 76);">Test changes safely</b>: Implement changes in a controlled way to avoid disrupting users or breaking critical business processes.</li><li><b style="color:rgb(0, 27, 76);">Document your baseline</b>: Establish clear documentation of your intended security configuration so you can monitor ongoing drift.</li><li><b style="color:rgb(0, 27, 76);">Maintain improvements</b>: Setting up Secure Score recommendations is just the beginning—monitoring changes is what truly matters. You need processes for maintaining your improved score over time.</li></ol><p>Relying solely on Secure Score recommendations is not ideal, as several other critical security practices are not part of the Secure Score but are equally essential. A comprehensive approach addresses both Secure Score recommendations and additional security practices specific to your organization.</p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_bQXHuNNot7uFjZlxkVyMoA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_S1j-aSXV5pYVA6b66tzUmw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_oBzOj_jECjg8CEaE5uW58Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_poLIKvj3D_GHaluWcip5Kw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>The Compliance Connection</span></h2></div>
<div data-element-id="elm_H3zEaCPF1bCy4fnoEJp1jA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Auditors increasingly recognize configuration drift as a fundamental security control weakness. If you can't demonstrate that your Microsoft 365 environment maintains its security baseline over time, you can't prove that your documented controls are actually implemented.</p><p><br/></p><p>This creates specific audit challenges:</p><p><b style="color:rgb(0, 27, 76);">Point-in-Time vs. Continuous Compliance</b>: Annual audits verify configuration at a specific moment. But compliance frameworks require continuous adherence to security controls. Configuration drift between audits represents compliance gaps that may not be detected until the next assessment cycle.</p><p><b style="color:rgb(0, 27, 76);">Documentation vs. Reality</b>: Your security policies document intended configurations. Auditors want evidence that actual configuration matches documentation. Configuration drift creates gaps between documented and actual security posture.</p><p><b style="color:rgb(0, 27, 76);">Change Management</b>: Compliance frameworks require documented change management processes. Configuration drift can represent undocumented or poorly documented changes that bypass formal processes, creating audit findings.</p><p><br/></p><p>For organizations managing POPIA, UK GDPR, ISO 27001, or industry-specific compliance requirements, configuration drift isn't just a security issue—it's a compliance risk that can result in audit findings and regulatory scrutiny.</p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_XAMEia2Ob2d3UGLQoXvCnw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_R7Y_fHvtGQkXr-fr7qkjGg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_xp9fndKX6D6Y5L6k4VUOhA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_UnLFoohTJiqTQ7IO_TUv_g" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Taking a Systematic Approach</span></h2></div>
<div data-element-id="elm_CPYsukEjQkRQ2zKFmsuL5A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Organizations that successfully manage configuration drift share common characteristics:</p><p><br/></p><p><b style="color:rgb(0, 27, 76);">They establish clear security baselines</b>: Documented intended security configuration across all Microsoft 365 workloads, aligned with business requirements and compliance obligations. Secure Score provides the framework, but you need to document which recommendations apply to your organization and why.</p><p><b style="color:rgb(0, 27, 76);">They implement regular monitoring</b>: Regular monitoring of your Microsoft Secure Score ensures you stay updated on your security posture, as the score is continuously updated based on your configurations and user behaviors. Frequent checks ensure awareness of new recommendations and potential risks.</p><p><b style="color:rgb(0, 27, 76);">They establish response processes</b>: Clear workflows for investigating detected drift, determining whether changes are authorized, and remediating problematic configurations. Not all configuration changes represent problematic drift—some are legitimate adaptations to business needs.</p><p><b style="color:rgb(0, 27, 76);">They maintain documentation</b>: Comprehensive records of configuration baselines, detected drift, and remediation actions provide compliance evidence and support audit preparation.</p><p><b style="color:rgb(0, 27, 76);">They review baselines regularly</b>: Periodic review of security baselines ensures they remain aligned with evolving business needs, threat landscape, and compliance requirements.</p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_gojtckK84oqJNVlqjw0_ZQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_PnuB1ZLeywNgHrdp8txWCw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_rKObMFcHqn_31r5H4bzPpg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_pY1t9WlPpCuRbLEwub0hqA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Assessing Your Current State</span></h2></div>
<div data-element-id="elm_12KoHNwOAojc61growwSVA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Before implementing systematic drift management, assess where you stand:</p><p><br/></p><p>□ Can you list all accounts with Conditional Access exclusions and justify each one?</p><p>□ Do you know which SharePoint sites allow external sharing and to which domains?</p><p>□ Have you reviewed service principal permissions and app registrations in the last 90 days?</p><p>□ Can you identify all users with privileged administrative roles?</p><p>□ Do you have documented baselines for your Conditional Access policies?</p><p>□ When did you last review your current Secure Score and understand why it changed?</p><p><br/></p><p>If you answered &quot;no&quot; to multiple questions, you likely have configuration drift that hasn't been systematically addressed.</p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_JVSbWZmlVryTjUdhlPCi3g" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_h45T72zsbsJFASR7JZucOQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_dLEOOBvlpoxplmYUj4cHJg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_rnnb2p62vvMNMOAx-XFHwQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Moving Forward</span></h2></div>
<div data-element-id="elm_6oaQXs6Vcm4m-BE56QdPwg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div>Configuration drift will occur in dynamic Microsoft 365 environments. The question isn't whether it will happen, but whether you'll detect and address it systematically.</div><br/><div>Secure Score provides the visibility you need to identify when configurations drift from security best practices. The challenge is implementing those recommendations systematically without disrupting business operations—and then maintaining improvements over time as your environment continues to evolve.</div></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_XPjAB_wO7nZee5_GeN-w5A" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_DikYtDsIsdWiQw4v0Sr15w" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_V5TpJ9UPRZlNDtQvya7Lhw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_TGD6Qx6rWyozs7gXICmPBA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Ready to Turn Secure Score Into Actionable Security Improvements?</span></h2></div>
<div data-element-id="elm_-ZczdcQ97ITqU2rAxVUqUQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Many organizations get stuck between seeing their Secure Score and actually improving it. They know WHERE configuration has drifted, but struggle with HOW to remediate systematically.</p><p><br/></p><p>Our <b style="color:rgb(0, 27, 76);">Secure Score Implementation Guide</b> provides a step-by-step framework for systematically improving your Microsoft 365 security posture:</p><p>✓ Prioritization framework for Secure Score recommendations based on business impact</p><p>✓ Business impact assessment templates to evaluate changes before implementation</p><p>✓ Testing and rollback procedures for safe deployment</p><p>✓ Documentation templates for compliance evidence and audit preparation</p><p>✓ Maintenance workflows for sustaining security improvements over time</p></div><p></p></div>
</div><div data-element-id="elm_QBvohwuQknmAWmkZO7KeuQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="https://www.gtconsult.com/boost-your-office-365-secure-score-implementation-guide" target="_blank"><span class="zpbutton-content">Get The Implementation Guide</span></a></div>
</div><div data-element-id="elm_4xzSXwctVayxoX6bO_tdYg" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"></style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 14 Nov 2025 03:33:40 +0000</pubDate></item><item><title><![CDATA[The Five Most Common Vulnerabilities Uncovered During Penetration Testing ]]></title><link>https://www.gtconsult.com/blogs/post/the-five-most-common-vulnerabilities-uncovered-during-penetration-testing-real-life-lessons</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/CRITICAL VULNERABILITIES THUMBNAIL.png"/>Discover the five most common vulnerabilities from real 2023-2025 breaches. Learn how weak passwords bankrupted 23andMe and unpatched systems exposed 193M records—and how penetration testing prevents these devastating attacks.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_uJ3z3gRBSmSmvURjDSW3mQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_HKs2gz2KTlSmhFu2iKO2_w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_8-n6u601RPWAGdXGFIBnKQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_KQPkFfIFTgGhrXdNyq910g" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span>Real-Life Lessons</span></h2></div>
<div data-element-id="elm_88zBcHc0TaiAo3Gs11YSjg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><div><p style="margin-bottom:10.6667px;"><span>Now, more than ever, most organizations only discover their security weaknesses after an attack. But it does not have to be that way, a lot these attacks could have been prevented if organizations just had a proactive approach rather than a reactive one when it comes to their cybersecurity.&nbsp;</span></p></div>
<div><p style="margin-bottom:10.6667px;"><span>Penetration testing simulates real-world attacks to identify and help remediate security vulnerabilities before malicious actors can exploit them.</span></p></div>
</div><p></p></div></div><div data-element-id="elm_Nyzryuswbot45m5f24atgw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><b><span>The Uncomfortable Truth About Modern Cybersecurity</span></b></span></h2></div>
<div data-element-id="elm_eU25B0wsXhc0dzePoglOqw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><span>If you’re a security professional, and even if you aren’t actually, this question may have crossed your mind before:</span></p><p><span>&nbsp;</span></p><p><span style="font-style:italic;color:rgb(166, 206, 57);"><strong>**If Microsoft, Google, and healthcare giants with unlimited security budgets can be breached, what chance do we have?**</strong></span></p><p><span>&nbsp;</span></p><p><span>The answer might surprise you—and it starts with understanding that these breaches weren't the result of sophisticated attack chains or unknown zero-day exploits.</span></p><p><span>&nbsp;</span></p><p><span>They failed because of the same vulnerabilities we discovered in majority of penetration tests.</span></p></div><p></p></div>
</div><div data-element-id="elm_wHX25U9BHKr6rWkmEl1-bA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><b><span>Why This Matters to Your Organization</span></b><span>&nbsp;</span></span></h2></div>
<div data-element-id="elm_VjxvhII64Pgn2lwrozKLRQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><span>You might be thinking:&nbsp;</span></p><p><span><br/></span></p><p><span style="font-style:italic;color:rgb(166, 206, 57);"><strong>*&quot;We're not Microsoft. We're not a target for these attacks.&quot;*</strong></span></p><p><span>&nbsp;</span></p><p><span>That's precisely the mindset that creates vulnerability.</span></p><p><span>&nbsp;</span></p><p><span>The attacks that compromised Microsoft or any of the organizations in this blog weren't sophisticated. They were opportunistic. Attackers used password spraying—a technique so basic it's covered in entry-level security courses.</span></p><p><span><br/></span></p><p><span>Your organization doesn't need to be &quot;important enough&quot; to be targeted. You just need to be vulnerable enough to be profitable.</span></p><p><span><br/></span></p><p><span>Let's have a look at the five common vulnerabilities we've uncovered during penetration testing.</span></p><p><span>&nbsp;</span></p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_swwpEbiD9b9kRv574PwfjA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_MF-CrQAOWtnkLiwL6mLzOg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_LszLbRe4uqhpYpJcKYbozQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_cCPWvW4-aCiziCKkKpnl2g" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_cCPWvW4-aCiziCKkKpnl2g"] .zpimageheadingtext-container figure img { width: 500px ; height: 333.44px ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-medium zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/strong-and-weak-easy-password-concept-2025-02-21-00-00-34-utc.jpg" data-src="/Blog%20Site/strong-and-weak-easy-password-concept-2025-02-21-00-00-34-utc.jpg" size="medium" data-lightbox="true"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left" data-editor="true"><strong style="color:rgb(0, 27, 76);">1. Weak or Reused Passwords</strong></h3><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p></p><p><strong>23andMe (2023-2024)</strong>: In 2023, 23andMe experienced a credential stuffing attack that exposed genetic data of approximately 7 million customers—roughly half of the service's userbase. The breach had devastating consequences, with the biotech company filing for Chapter 11 bankruptcy in March 2025. The UK Information Commissioner's Office fined 23andMe £2.3 million for failing to implement mandatory multi-factor authentication and secure password requirements. This demonstrates the catastrophic business impact that credential-based attacks can have on organizations.</p><p><br/></p><p><span><strong>Snowflake Breaches (2024):</strong> The Snowflake breach in late 2024 exposed customer data where improperly secured accounts—some without multifactor authentication—were used to exfiltrate information. This breach affected multiple organizations using the platform and highlighted how weak authentication practices can have cascading effects across an entire ecosystem.</span><br/></p><p><span><br/></span></p><p><span></span></p><div><p><strong>The Scale of the Problem:</strong> In 2025, researchers discovered 16 billion exposed credentials from 30 different databases, primarily harvested by infostealer malware campaigns, representing the largest credential breach compilation recorded to date. Analysis of data leaks from 2024-2025 reveals that 94% of passwords are reused or duplicated, with only 6% being unique.</p><p>Weak or reused passwords are one of the easiest ways for attackers to gain unauthorized access. Despite widespread use of multi-factor authentication (MFA), poor password practices remain a primary entry point for attacks.</p></div><br/><p></p><p><span></span></p><div><p><strong>Prevention:</strong></p><ul><li>Enforce complex, unique passwords and implement MFA</li><li>Conduct regular password audits</li><li>Educate employees about password hygiene</li></ul><div><span><strong><br/></strong></span></div><div><span><strong>Pen Test Role:</strong> Pen testers use brute-force attacks, credential stuffing, and password spraying to uncover weak or reused passwords across systems.</span><br/></div></div><p></p></div>
</div></div></div></div></div></div></div><div data-element-id="elm_YHs4ovdUB14TNwZexIE1KA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_nM3WSnS_zhXI5ty4oFyazA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_HErHEM45O1qgRZV61i8iuA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_pQQWX2wwFnnQP-U_PV39xQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-size:24px;color:rgb(0, 27, 76);"><strong>2. Unpatched Systems &amp; Software</strong></span></h2></div>
<div data-element-id="elm_UX7pjrT-3QrFCu5VyfpvpQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><strong>Change Healthcare (2024):</strong> In February 2024, United Health-owned prescription processor Change Healthcare suffered a massive ransomware attack that cost the company $2.457 billion and exposed the private data of approximately 193 million individuals—making it the largest healthcare data breach ever reported. The ALPHV/BlackCat ransomware group exploited a Citrix remote access service that lacked multi-factor authentication. This breach disrupted healthcare services across the United States, affecting 94% of hospitals and preventing billions of dollars in claims processing.</span></p><p><span><br/></span></p><p><span></span></p><div><p><strong>MOVEit Transfer (2023):</strong> In May 2023, the CLOP ransomware gang exploited a zero-day SQL injection vulnerability (CVE-2023-34362) in Progress Software's MOVEit Transfer application. By the end of 2023, the attack had compromised more than 2,700 organizations and exposed approximately 93.3 million personal records, with total damages estimated at $12.15 billion. High-profile victims included British Airways, the BBC, Shell, the U.S. Department of Energy, and numerous universities. This breach highlighted the critical importance of rapid vulnerability patching and the devastating consequences of zero-day exploits.</p><p><br/></p><p><strong>AVTECH IP Cameras (2024):</strong> In August 2024, security researchers discovered an unpatched vulnerability in AVTECH IP cameras used in critical infrastructure was being exploited to spread Mirai malware, despite the vulnerability being known since 2019. This five-year delay in addressing a known vulnerability put essential services at risk.</p></div><p></p></div>
</div><div data-element-id="elm_jfKxukBsa3fdBF4ViATjAw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_jfKxukBsa3fdBF4ViATjAw"] .zpimagetext-container figure img { width: 500px ; height: 356.88px ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-medium zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/keys-to-deploy-and-patch-2025-10-13-10-07-42-utc.jpg" size="medium" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p><span>Outdated systems and unpatched software are among the most common vulnerabilities exploited by attackers. Missing security updates can allow attackers to leverage known vulnerabilities to compromise systems.</span></p><p><span><br/></span></p><p><span></span></p><div><p><strong>Prevention:</strong></p><ul><li>Maintain a robust patch management program</li><li>Conduct regular vulnerability scans</li><li>Prioritize patching critical systems</li></ul><p><strong><br/></strong></p><p><strong>Pen Test Role:</strong> Pen testers identify unpatched systems and attempt to exploit publicly known vulnerabilities (CVEs) to assess the potential impact.</p></div><br/><p></p></div>
</div></div></div></div></div></div><div data-element-id="elm_VXvtA4j7W9MVMkGbmcn8zw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_SoJwQ82Dr6ZrWWwyzcDZwQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_XF2F0hhpplR2gg0ePlbjWg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_SlJrOxZAypPFF91NfIHnJQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-size:24px;color:rgb(0, 27, 76);"><strong>3. Misconfigured Permissions &amp; Access Controls</strong></span></h2></div>
<div data-element-id="elm_5xMQdQebX6Gr86Grt8KvVw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><strong>Microsoft Breach (2024):</strong> In late 2023 (discovered January 2024), state-backed cyber espionage group Midnight Blizzard (also known as APT29, Nobelium, and CozyBear) gained access to Microsoft leadership and cybersecurity team emails. The attackers used password spraying attacks against a legacy test account that lacked multi-factor authentication and had elevated access. They then exploited a legacy OAuth application that granted full access to all mailboxes in the organization. Even one of the world's leading technology companies fell victim to misconfigured access controls and orphaned test accounts.</span></p></div>
</div><div data-element-id="elm_keLX2Wj9ocUXXEu4d-jnqA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><strong>Marks &amp; Spencer (2025):</strong> In May 2025, M&amp;S suffered a major cyberattack attributed to the &quot;Scattered Spider&quot; group deploying DragonForce ransomware, potentially linked to vulnerabilities in its IT outsourcing partner Tata Consultancy Services, with an expected £300 million profit loss. This breach demonstrates how misconfigurations in third-party relationships can have massive financial consequences.</span></p></div>
</div><div data-element-id="elm_BrS7AkcFfza4Vuq4-TD0yA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><strong>Western Alliance Bank (2025):</strong> Western Alliance Bank experienced a data breach in March 2025, stemming from exploitation of a zero-day vulnerability in a third-party secure file transfer tool provided by Cleo. The Clop ransomware group gained unauthorized access to approximately 22,000 customers' sensitive information, highlighting vulnerabilities in supply chain security.</span></p></div>
</div></div></div></div></div><div data-element-id="elm_3gVr-Be2hrQkMlsK06WgJg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZnqnRkvmZn1h7AjtZMSCkg" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_7Wkws9QEStbs3SeYAQXQwQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_7Wkws9QEStbs3SeYAQXQwQ"].zpelem-col{ margin-block-start:-164px; } </style><div data-element-id="elm_NhAMyyxJb524iAnkaX_fWA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_NhAMyyxJb524iAnkaX_fWA"].zpelem-text { margin-block-start:171px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span></span></p><div><p><strong>Prevention:</strong></p><ul><li>Enforce least-privilege access principles</li><li>Regularly review and audit permissions</li><li>Segment networks and sensitive data appropriately</li><li>Remove legacy and test accounts with elevated privileges</li></ul><p><strong><br/></strong></p><p><strong>Pen Test Role:</strong> Pen testers attempt privilege escalation, unauthorized access, and lateral movement to uncover misconfigurations.</p></div><p><span><br/></span></p><p><span><br/></span></p></div>
</div></div><div data-element-id="elm_eM9f85hggJ45zoOhr-u3NA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_0PrJZrGpfjVJj4r7gb70Ew" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_0PrJZrGpfjVJj4r7gb70Ew"] .zpimage-container figure img { width: 534px !important ; height: 339px !important ; } } @media (max-width: 767px) { [data-element-id="elm_0PrJZrGpfjVJj4r7gb70Ew"] .zpimage-container figure img { width:415px ; height:276.39px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Screenshot%202025-10-20%20150919.png" width="415" height="276.39" loading="lazy" size="custom"/></picture></span></figure></div>
</div></div></div></div></div><div data-element-id="elm_-GZ5iHujlFHvkHyglKYXng" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_JZBVUmwXys8bi4-eH4424g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_SA67up74noiBNTH5K3CodA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_tA36bCw4yeJqIlnMLM06Fw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-size:24px;color:rgb(0, 27, 76);"><strong>4. Insufficient Network Monitoring &amp; Logging</strong></span></h2></div>
<div data-element-id="elm_7SJrg3a0pMuKH-lFO4k4yQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><strong>Office of the Comptroller of the Currency (2025):</strong> In early 2025, the U.S. OCC identified suspicious interactions between a system administrative account and internal user mailboxes—activity that had gone undetected for months, raising concerns about the agency's visibility into its systems and the effectiveness of its logging practices. This breach at a federal financial regulator highlighted how even government agencies struggle with monitoring gaps.</p><p><br/></p><p><strong>AT&amp;T Breach (2022-2024):</strong> AT&amp;T confirmed a significant data breach involving unauthorized access to its Snowflake cloud storage environment. The breach occurred between May 1, 2022, and October 31, 2022, but wasn't detected until April 2024—a detection delay of nearly two years. The breach exposed over 86 million records, including Social Security Numbers. This prolonged detection window allowed attackers extensive time to access and potentially monetize sensitive customer data.</p><p>Without effective monitoring and logging, suspicious activity can go undetected, giving attackers more time to exploit vulnerabilities and exfiltrate data.</p></div><p></p></div>
</div><div data-element-id="elm_TSYZKIxBq06RfvT0EPudSA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><strong>Prevention:</strong></p><ul><li>Implement centralized logging and real-time monitoring solutions</li><li>Regularly analyze logs for anomalies</li><li>Set up automated alerts for suspicious activity</li><li>Establish baseline behavior to detect deviations</li></ul><p><strong><br/></strong></p><p><strong>Pen Test Role:</strong> Pen testers attempt to bypass detection and exfiltrate data to identify gaps in monitoring systems and incident response processes.</p></div><p></p></div>
</div><div data-element-id="elm_82n8Go8UnMobWIli9PqS9g" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-size:24px;color:rgb(0, 27, 76);"><strong>5. Human Error &amp; Social Engineering Vulnerabilities</strong></span></h2></div>
<div data-element-id="elm_s35FSM2BjhpANhWBhCwhGA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_s35FSM2BjhpANhWBhCwhGA"] .zpimage-container figure img { width: 1110px ; height: 459.26px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/pensive-doubtful-businessman-brainstorming-ideas-2025-02-18-02-35-46-utc.JPG" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_qwwrJ76KvnNj1w3HinRCng" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><strong>Coinbase (2025):</strong> In May 2025, Coinbase confirmed a breach when cybercriminals bribed overseas support staff to leak sensitive customer data, including names, birthdates, email addresses, and partial Social Security numbers. Attackers used this data to orchestrate highly targeted social engineering attacks against customers. This breach highlighted the vulnerability of outsourced operations and the human element in security, demonstrating that even financial incentives can compromise insider threats.</p><p><br/></p><p><strong>Google Salesforce Breach (2025):</strong> In August 2025, Google confirmed a data breach from a compromised Salesforce-hosted corporate database. The hacking group ShinyHunters gained access through social engineering by impersonating IT support staff and tricking a Google employee into approving a malicious application. Even at tech giants with sophisticated security teams and trained personnel, social engineering remains remarkably effective.</p><p><br/></p><p><strong>Workday Breach (2025):</strong> On August 18, 2025, Workday disclosed a data breach stemming from a social engineering campaign where threat actors impersonated HR or IT staff. They contacted employees by phone or text to trick them into granting access to a third-party CRM platform. This demonstrates the evolving sophistication of social engineering tactics and the importance of verification procedures for access requests.</p><p>Humans are often the weakest link in cybersecurity. Attackers use phishing, pretexting, impersonation, and other social engineering tactics to manipulate employees into granting access.</p></div><p></p></div>
</div><div data-element-id="elm_Rcv30wOoXGc3U4DlgVEnNA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><strong>Prevention:</strong></p><ul><li>Conduct ongoing security awareness training</li><li>Simulate phishing campaigns regularly</li><li>Implement multi-factor authentication and verify requests for sensitive actions</li><li>Establish clear protocols for verifying identity before granting access</li><li>Create a culture where employees feel comfortable questioning suspicious requests</li></ul><p><strong><br/></strong></p><p><strong>Pen Test Role:</strong> Pen testers simulate phishing attacks and social engineering scenarios to assess employee awareness and identify weak points in organizational security culture.</p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_55eupCmehmJZB7u8g3Wyxw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_icfhLNsVUAXd3grU_izZ3g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_bdveC3dLaCgF1liOFwQJog" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_MFeHPn3zwVAiRpcO4BOWtw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-size:24px;color:rgb(0, 27, 76);"><strong>Conclusion</strong></span></h2></div>
<div data-element-id="elm_png9rh5TOgppzwbsVA6hGQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>Penetration testing serves as a proactive approach to identifying and mitigating security vulnerabilities. By addressing these common weaknesses, organizations can significantly enhance their security posture. The breaches highlighted above demonstrate that no organization—regardless of size, industry, or technical sophistication—is immune to cyber attacks when fundamental security controls are not properly implemented and maintained.</span></p></div>
</div><div data-element-id="elm_n3e9qx_EEblhReZkq0oXfA" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"></style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div></div></div></div></div><div data-element-id="elm_JwnRr7WVo9656OyLMHE81A" data-element-type="section" class="zpsection zplight-section zplight-section-bg zscustom-section-145 "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_XflqE4kytax2YPuXh-KpMg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_Hh3etpQ3mU32ZhQSM5vEMg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_M2HwpZrIAYpyg9iR0Jtp_g" data-element-type="box" class="zpelem-box zpelement zpbox-container zsbox-spacing zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_M2HwpZrIAYpyg9iR0Jtp_g"].zpelem-box{ background-color:rgb(255, 255, 255); background-image:unset; margin-block-start:24px; } </style><div data-element-id="elm_89sFocecBJmMVD_fW0Dq8A" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_89sFocecBJmMVD_fW0Dq8A"] div.zpspacer { height:6px; } @media (max-width: 768px) { div[data-element-id="elm_89sFocecBJmMVD_fW0Dq8A"] div.zpspacer { height:calc(6px / 3); } } </style><div class="zpspacer " data-height="6"></div>
</div><div data-element-id="elm_-G9Zq8h74gIZYTgsm6l7XQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-G9Zq8h74gIZYTgsm6l7XQ"].zpelem-text { margin-block-start:-10px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>At GTconsult, we specialize in penetration testing services tailored to your organization's needs. Our team of experts utilizes the latest tools and methodologies to uncover vulnerabilities and provide actionable recommendations to fortify your defences.</p><p><br/></p><p>Don't wait for a breach to occur. Contact GTconsult today to schedule a penetration test and take the first step towards securing your organization's future.</p></div><p></p></div>
</div><div data-element-id="elm__Rq63HSz2DN0RSjD4-FMdg" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://www.gtconsult.com/protection" target="_blank" title="A Team Protection"><span class="zpbutton-content">Get a Penetration Test</span></a></div>
</div></div></div><div data-element-id="elm_IJZGal7aUaeVWT8KzEG-vg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zsorder-one zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_UnTFvVXZJD8LmNLs93BZrw" data-element-type="video" class="zpelement zpelem-video "><style type="text/css"> [data-element-id="elm_UnTFvVXZJD8LmNLs93BZrw"].zpelem-video{ margin-block-start:42px; } @media (max-width: 767px) { [data-element-id="elm_UnTFvVXZJD8LmNLs93BZrw"].zpelem-video iframe.zpvideo{ width:560px !important; height:315px !important; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_UnTFvVXZJD8LmNLs93BZrw"].zpelem-video iframe.zpvideo{ width:560px !important; height:315px !important; } } </style><div class="zpvideo-container zpiframe-align-left zpiframe-mobile-align-center zpiframe-tablet-align-center"><iframe class="zpvideo " width="560" height="304" src="https://www.youtube.com/embed/e4YSke1x13o?si=0gkyiijiHFyz0FoL" frameborder="0" allowfullscreen></iframe></div>
</div></div></div><div data-element-id="elm_UzyVib124nFr7V_sv9U7-Q" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_HAVbHCAfaLzb-qi_wX2dYw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_4AHqBA_-fHWv4zTn7J90KA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_4AHqBA_-fHWv4zTn7J90KA"] div.zpspacer { height:4px; } @media (max-width: 768px) { div[data-element-id="elm_4AHqBA_-fHWv4zTn7J90KA"] div.zpspacer { height:calc(4px / 3); } } </style><div class="zpspacer " data-height="4"></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 22 Oct 2025 13:25:44 +0000</pubDate></item><item><title><![CDATA[Why Your Microsoft Secure Score Isn't Improving (And What That Really Means for Your Business) ]]></title><link>https://www.gtconsult.com/blogs/post/why-your-microsoft-secure-score-isn-t-improving-and-what-that-really-means-for-your-business</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/Copy of Yellow And Red Unboxing And Review YouTube Thumbnail -1-.png"/>Learn why your Microsoft Secure Score is stuck and how to boost security and compliance in Microsoft 365 with practical solutions for IT leaders.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_aduHP00uQrWAabzM9HGCPA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_70PmAGJfSfayEIIKSS9GUA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_2AHPx1VARvOinnr5Uf4Ykw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Z0RjBqH1ShOEaVS5Wp-VDQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span>A critical analysis for IT leaders managing Microsoft 365 security</span></h2></div>
<div data-element-id="elm_SxaieD8jTTWoRk7gkoHsjA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span><span style="font-style:italic;"><span>Your Secure Score doesn't improve by accident. It improves through systematic, expert-driven security optimization. The question isn't whether your score should be higher—it's whether you have the capacity and expertise to get it there.</span></span></span></p></div>
</div><div data-element-id="elm_NPvfdP47qQN4GT9zF0gpVg" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"></style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div></div></div></div></div><div data-element-id="elm_TUS1kUNXBDFzafld7h7JDg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_N78J3BAz1e6S3OrGPWWVSA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_uy6kBBE5n5_wQfrz5LWyPg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_WiZ2lcMxww4pkrlP0Sg5Qw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_WiZ2lcMxww4pkrlP0Sg5Qw"] .zpimage-container figure img { width: 1110px ; height: 481.46px ; } } @media (max-width: 767px) { [data-element-id="elm_WiZ2lcMxww4pkrlP0Sg5Qw"] .zpimage-container figure img { width:753px ; height:351px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-roundcorner zpimage-space-none " src="/Blog%20Site/Copy%20of%20Sponsor%20Announcement%20Graphic.png" width="753" height="351" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_Czny59WAtVezvUn6NZFMlQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_Czny59WAtVezvUn6NZFMlQ"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_Czny59WAtVezvUn6NZFMlQ"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_lRGvD4ohxueIP4_KiZUgMw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_3Hcgx8TKvYF5qBmpyi7ujQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-3 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_RIUF4Y1moLPv5o0yxhupZw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong>The Dashboard That Never Changes&nbsp;</strong></h2></div>
</div><div data-element-id="elm_BqaISxuzGoGQcZ_jGsEy9Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-9 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_IM5mleMPGa9hr6xMgx45HQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h5
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><span>You log into the Microsoft Defender portal for the third month in a row. Your Secure Score sits stubbornly at 58%. The same recommendations stare back at you. Enable MFA for all users. Configure DLP policies. Block legacy authentication. You know what needs to be done, but somehow, nothing changes.&nbsp;</span></span><br/>​<br/><span><span>If this sounds familiar, you're not alone. Organizations worldwide are discovering that Microsoft Secure Score—while an excellent security measurement tool—reveals a gap that many teams struggle to close: the difference between knowing what to do and actually doing it.&nbsp;</span></span><br/>​<br/><span><span>The real question isn't whether you understand the recommendations. It's whether you have the capacity, expertise, and processes to implement them effectively across your entire Microsoft 365 environment.&nbsp;</span></span></h5></div>
<div data-element-id="elm_4hHbnNmLEYEq9Pi9lxlGlw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_4hHbnNmLEYEq9Pi9lxlGlw"] div.zpspacer { height:3px; } @media (max-width: 768px) { div[data-element-id="elm_4hHbnNmLEYEq9Pi9lxlGlw"] div.zpspacer { height:calc(3px / 3); } } </style><div class="zpspacer " data-height="3"></div>
</div></div></div></div></div></div></div><div data-element-id="elm_w7EpntQd5lRyNLsR9n-_DQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_b2jKK04z6R2WcM4XNAAFgA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_WbAGfMEXLVOD5pGJsjTsvg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_NR_4URS3CGUTAktJcOdkRA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-weight:800;">The Hidden Reality Behind Static Scores&nbsp;</span></h2></div>
<div data-element-id="elm_tE0y96LuXbM4jGCqPSsPeQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><p style="margin-bottom:10.6667px;"><span>Microsoft's 2025 Secure Score updates bring expanded coverage for Azure and Microsoft Defender, improved benchmarking, and easier compliance mapping to frameworks like NIST and ISO 27001. These enhancements make the score more comprehensive—and the recommendations more numerous.&nbsp;</span></p></div><div><p style="margin-bottom:10.6667px;"><span>For IT teams already stretched thin, this creates a paradox: better visibility into security gaps, but less time to address them.&nbsp;</span></p></div><div><p style="margin-bottom:10.6667px;"><span>Consider the typical scenario. Your organization has hundreds of improvement actions available. Some require significant resource commitments that turn into full-scale projects. Others demand specialized knowledge of Microsoft 365 security features that your team hasn't had time to develop. Many are locked behind higher-tier licensing that wasn't in this year's budget.&nbsp;</span></p></div><div><p style="margin-bottom:10.6667px;"><span>Meanwhile, threats don't wait for your next planning cycle. Microsoft mitigated 1.25 million DDoS attacks in 2024, representing a 4x increase compared with the previous year. The threat landscape is accelerating faster than most organizations can keep pace.&nbsp;</span></p></div></div><p></p></div>
</div><div data-element-id="elm_73DHP36_78XJU6CBbemXPw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-weight:800;">Why &quot;Just Following the Recommendations&quot; Doesn't Work</span></h2></div>
<div data-element-id="elm_ZNqJKmZBzqT0FhuIiDCUwA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><p style="margin-bottom:10.6667px;"><span>The Secure Score interface makes it seem straightforward: here's your score, here are recommendations, implement them, score goes up. Simple, right?&nbsp;</span></p></div><div><p style="margin-bottom:10.6667px;"><span>Except it's not. Each recommendation exists within a complex web of:&nbsp;</span></p></div></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_3_i5E2o4-04wgSz8_kKPIA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_gMd1H2VRc9WHycscKIh0nw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_PGLQD6C8PN1e4GNh59Kbpw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_pmTQsZvD79S4TgO3xwEs5Q" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-center zpicon-align-mobile-center zpicon-align-tablet-center "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 640 512" height="640" width="512" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path d="M624 416H381.54c-.74 19.81-14.71 32-32.74 32H288c-18.69 0-33.02-17.47-32.77-32H16c-8.8 0-16 7.2-16 16v16c0 35.2 28.8 64 64 64h512c35.2 0 64-28.8 64-64v-16c0-8.8-7.2-16-16-16zM576 48c0-26.4-21.6-48-48-48H112C85.6 0 64 21.6 64 48v336h512V48zm-64 272H128V64h384v256z"></path></svg></span><h3 class="zpicon-heading " data-editor="true"><span>Technical Dependencies:</span></h3><div class="zpicon-text-container " data-editor="true"><p></p><div><div><div><ul><li style="margin-left:24px;"><p style="text-align:left;">Some improvements require prerequisite configurations&nbsp;</p></li></ul></div><div><ul><li style="margin-left:24px;"><p style="text-align:left;">Changes in one area can impact functionality in another&nbsp;</p></li></ul></div></div><div><div><ul><li style="margin-left:24px;"><p style="text-align:left;">Integration with existing security tools must be maintained&nbsp;</p></li></ul></div><div><ul><li style="margin-left:24px;"><p style="text-align:left;">Legacy systems may not support recommended controls&nbsp;</p></li></ul></div><br/></div></div>
<p></p></div></div></div></div><div data-element-id="elm_ynlb5ASEWkrLOcOXkNBbEw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_cKAcEwMJ53ZfTOif-hZ1Cw" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-center zpicon-align-mobile-center zpicon-align-tablet-center "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 512 512" height="512" width="512" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path d="M332.8 320h38.4c6.4 0 12.8-6.4 12.8-12.8V172.8c0-6.4-6.4-12.8-12.8-12.8h-38.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h38.4c6.4 0 12.8-6.4 12.8-12.8V76.8c0-6.4-6.4-12.8-12.8-12.8h-38.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-288 0h38.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-38.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h38.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-38.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zM496 384H64V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-32c0-8.84-7.16-16-16-16z"></path></svg></span><h3 class="zpicon-heading " data-editor="true"><span>Business Considerations:<br/></span></h3><div class="zpicon-text-container " data-editor="true"><p></p><div><div><ul><li style="margin-left:24px;"><p style="text-align:left;">User experience impacts from security changes&nbsp;</p></li></ul></div><div><ul><li style="margin-left:24px;"><p style="text-align:left;">Departmental workflows that depend on current configurations&nbsp;</p></li></ul></div><div><ul><li style="margin-left:24px;"><p style="text-align:left;">Training requirements for new security features&nbsp;</p></li></ul></div><div style="text-align:left;"><br/></div><div><ul><li style="margin-left:24px;"><p style="text-align:left;">Change management across diverse user groups&nbsp;</p></li></ul></div></div>
<p></p></div></div></div></div><div data-element-id="elm_KaY7BOHlNbOI0uWBF87u1g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_HuYM-e_bb2t1vgZ3W8pQjw" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-center zpicon-align-mobile-center zpicon-align-tablet-center "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 640 512" height="640" width="512" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path d="M96 224c35.3 0 64-28.7 64-64s-28.7-64-64-64-64 28.7-64 64 28.7 64 64 64zm448 0c35.3 0 64-28.7 64-64s-28.7-64-64-64-64 28.7-64 64 28.7 64 64 64zm32 32h-64c-17.6 0-33.5 7.1-45.1 18.6 40.3 22.1 68.9 62 75.1 109.4h66c17.7 0 32-14.3 32-32v-32c0-35.3-28.7-64-64-64zm-256 0c61.9 0 112-50.1 112-112S381.9 32 320 32 208 82.1 208 144s50.1 112 112 112zm76.8 32h-8.3c-20.8 10-43.9 16-68.5 16s-47.6-6-68.5-16h-8.3C179.6 288 128 339.6 128 403.2V432c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48v-28.8c0-63.6-51.6-115.2-115.2-115.2zm-223.7-13.4C161.5 263.1 145.6 256 128 256H64c-35.3 0-64 28.7-64 64v32c0 17.7 14.3 32 32 32h65.9c6.3-47.4 34.9-87.3 75.2-109.4z"></path></svg></span><h3 class="zpicon-heading " data-editor="true"><span>Resource Realities:</span></h3><div class="zpicon-text-container " data-editor="true"><p></p><div><div><ul><li style="margin-left:24px;"><p style="text-align:left;">Limited security expertise in-house&nbsp;</p></li></ul></div><div><ul><li style="margin-left:24px;"><p style="text-align:left;">Competing priorities across IT projects&nbsp;</p></li></ul></div><div><ul><li style="margin-left:24px;"><p style="text-align:left;">Budget constraints for licensing upgrades&nbsp;</p></li></ul></div><div><ul><li style="margin-left:24px;"><p style="text-align:left;">Time pressure from day-to-day operations&nbsp;</p></li></ul></div></div>
<p></p></div></div></div></div></div><div data-element-id="elm_fKCBuQFDhu6-MbsgwdX6tg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_hHr37nJ-FENMemBZeG4zMA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_F0riJnjzty9eDzDqc2JIrQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>Admin accounts have access to everything—including the most sensitive data—yet properly securing these accounts requires coordinated effort across multiple teams and systems. Privileged access management remains one of the most challenging aspects of Microsoft 365 security configuration.&nbsp;</span></p></div>
</div></div></div><div data-element-id="elm_JFte0z1VqIQQnFGvopFHtg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_RYo92VzPPcNs1LqDam_jkQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_eZ-h8GtIt_qbDqpaMZWRdA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_eZ-h8GtIt_qbDqpaMZWRdA"] .zpimagetext-container figure img { width: 182px !important ; height: 182px !important ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Kyle%20circle.png" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p></p><div><p><br/></p><p><br/></p><p>&quot;As the resident security Analyst at GTconsult, this section hits closest to home as the competing priorities and time pressures that would arise before having the right tools for the job would mean endless days of burn out for myself and my team. With the right tools and knowledge, the security element is handled much more efficiently and free's up time to keep up with the day to day priorities.&quot;</p><div><br/></div></div><div><br/></div><p></p></div>
</div></div><div data-element-id="elm_gD2NTZ5Sk0y-Q1Vfmh0MJg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-weight:800;">The Compliance Connection You Can't Ignore</span></h2></div>
<div data-element-id="elm_CAVIJ31cYW7MXbPxD3L9ZA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><p style="margin-bottom:10.6667px;"><span>Here's what makes this more than just a security metrics problem: your Secure Score directly impacts compliance posture. The 2025 updates include easier mapping to compliance frameworks including NIST, ISO 27001, and industry-specific regulations.&nbsp;</span></p></div><div><p style="margin-bottom:10.6667px;"><span>If you're in a regulated industry—financial services, healthcare, government—your Secure Score isn't just an IT metric. It's evidence of your security control implementation. Auditors increasingly reference Microsoft's security recommendations in their assessments. A stagnant Secure Score can translate to audit findings, compliance gaps, and regulatory scrutiny.&nbsp;</span></p></div><div><p style="margin-bottom:10.6667px;"><span>For organizations managing POPIA compliance in South Africa, UK GDPR requirements, or multiple international frameworks, Microsoft 365 security configuration becomes a critical compliance control. The technical controls Microsoft recommends often align directly with regulatory requirements.&nbsp;</span></p></div><div><p style="margin-bottom:10.6667px;"><span>But here's the challenge: knowing that these configurations matter for compliance doesn't magically create the capacity to implement them.&nbsp;</span></p></div></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_oo4rchvvduFQ6zEpBCZQSg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_08uztE1mjE8StOy9NYoWiQ" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_DNVGl-z7lZ5_0QWt9Dd7xA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_xPFLoYrOcTWiPnfWYET0ZA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_xPFLoYrOcTWiPnfWYET0ZA"] .zpimage-container figure img { width: 511px !important ; height: 294px !important ; } } @media (max-width: 767px) { [data-element-id="elm_xPFLoYrOcTWiPnfWYET0ZA"] .zpimage-container figure img { width:415px ; height:283.04px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/score-on-dedicated-dashboardh.png" width="415" height="283.04" loading="lazy" size="custom"/></picture></span></figure></div>
</div></div><div data-element-id="elm__HyWsTBGAv7ikGFmraakBQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_aNQPILjbbEQYrQ9M8DlzbQ" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-left zpicon-align-mobile-left zpicon-align-tablet-left "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 640 512" height="640" width="512" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path d="M320 144c-53.02 0-96 50.14-96 112 0 61.85 42.98 112 96 112 53 0 96-50.13 96-112 0-61.86-42.98-112-96-112zm40 168c0 4.42-3.58 8-8 8h-64c-4.42 0-8-3.58-8-8v-16c0-4.42 3.58-8 8-8h16v-55.44l-.47.31a7.992 7.992 0 0 1-11.09-2.22l-8.88-13.31a7.992 7.992 0 0 1 2.22-11.09l15.33-10.22a23.99 23.99 0 0 1 13.31-4.03H328c4.42 0 8 3.58 8 8v88h16c4.42 0 8 3.58 8 8v16zM608 64H32C14.33 64 0 78.33 0 96v320c0 17.67 14.33 32 32 32h576c17.67 0 32-14.33 32-32V96c0-17.67-14.33-32-32-32zm-16 272c-35.35 0-64 28.65-64 64H112c0-35.35-28.65-64-64-64V176c35.35 0 64-28.65 64-64h416c0 35.35 28.65 64 64 64v160z"></path></svg></span><h2 class="zpicon-heading " data-editor="true"><span style="font-weight:800;">The Real Cost of Inaction</span></h2><div class="zpicon-text-container " data-editor="true"><p></p><div><div><p style="margin-bottom:10.6667px;"><span>Static Secure Scores aren't just embarrassing dashboard metrics. They represent real business risk:&nbsp;</span></p></div><div><p style="margin-bottom:10.6667px;"><span style="font-weight:bold;">Security Exposure:</span><span>&nbsp;</span></p></div><div><ul><li style="margin-left:24px;"><p><span>Unimplemented recommendations are known vulnerabilities&nbsp;</span></p></li></ul></div><div><ul><li style="margin-left:24px;"><p><span>Attackers increasingly target Microsoft 365 environments&nbsp;</span></p></li></ul></div><div><ul><li style="margin-left:24px;"><p><span>Each day of delayed implementation extends risk exposure&nbsp;</span></p></li></ul></div><div><ul><li style="margin-left:24px;"><p><span>Compromised accounts can lead to data breaches and ransomware&nbsp;</span></p></li></ul></div></div><p></p></div>
</div></div></div></div><div data-element-id="elm_2dOUp50F0t7SXCzPYF8ZjA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_EXWP1pD1YgewxBWEAw3aUw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_aMkFkKUmutFUJbCm5lgDSg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_aMkFkKUmutFUJbCm5lgDSg"] div.zpspacer { height:2px; } @media (max-width: 768px) { div[data-element-id="elm_aMkFkKUmutFUJbCm5lgDSg"] div.zpspacer { height:calc(2px / 3); } } </style><div class="zpspacer " data-height="2"></div>
</div></div></div><div data-element-id="elm_Dqblgi_dMn26hTIFomf6Ow" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_dUXr8jy1UqIR6fUFodosig" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_YnaghANkvNo-RWyb6bHIGQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><p style="margin-bottom:10.6667px;"><span style="font-weight:bold;">Compliance Risk:</span><span>&nbsp;</span></p></div><div><ul><li style="margin-left:24px;"><p><span>Audit findings from inadequate security controls&nbsp;</span></p></li></ul></div><div><ul><li style="margin-left:24px;"><p><span>Regulatory penalties for insufficient data protection&nbsp;</span></p></li></ul></div><div><ul><li style="margin-left:24px;"><p><span>Failed compliance certifications impacting business operations&nbsp;</span></p></li></ul></div><div><ul><li style="margin-left:24px;"><p><span>Customer trust erosion from security incidents&nbsp;</span></p></li></ul></div></div><p></p></div>
</div></div><div data-element-id="elm_4zXyef6Bm8EYyMWKkOpmlg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_M3HU3aksq8L9-7SMBSqG4A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><p style="margin-bottom:10.6667px;"><span style="font-weight:bold;">Operational Inefficiency:</span>&nbsp;</p></div><div><ul><li style="margin-left:24px;"><p>Security team time spent on repetitive manual tasks&nbsp;</p></li></ul></div><div><ul><li style="margin-left:24px;"><p>Lack of automated security policy enforcement&nbsp;</p></li></ul></div><div><ul><li style="margin-left:24px;"><p>Inconsistent security posture across the organization&nbsp;</p></li></ul></div><div><ul><li style="margin-left:24px;"><p>Reactive security management instead of proactive protection&nbsp;</p></li></ul></div></div><p></p></div>
</div></div><div data-element-id="elm_5SK_O0Kda8WEWPqc7WV9kw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_S1s7OjIg2PSCZIMiqJ6MEQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><div><p style="margin-bottom:10.6667px;"><span style="font-weight:bold;">Strategic Limitations:</span>&nbsp;</p></div><div><ul><li style="margin-left:24px;"><p>Inability to leverage advanced Microsoft 365 security features&nbsp;</p></li></ul></div><div><ul><li style="margin-left:24px;"><p>Missed opportunities for security automation&nbsp;</p></li></ul></div></div><div><div><ul><li style="margin-left:24px;"><p>Competitive disadvantage from inferior security posture&nbsp;</p></li></ul></div><div><ul><li style="margin-left:24px;"><p>Restricted business initiatives due to security concerns&nbsp;</p></li></ul></div><br/></div></div><p></p></div>
</div></div></div><div data-element-id="elm_p7920SqRI1msUNBHvvEu3w" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_Z-N_OanvTp6si6-LhKpAkg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_2dYUOsWvA8x6-ltyJ7G0AQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong><span style="font-weight:800;">What Actually Moves the Needle&nbsp;</span></strong></h2></div>
<div data-element-id="elm_LrRadZxyIpSxlNWrzZ2KYA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_LrRadZxyIpSxlNWrzZ2KYA"].zpelem-text { margin-block-start:15px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><p style="margin-bottom:10.6667px;"><span>Organizations that successfully improve their Secure Scores share common characteristics. They don't just understand the recommendations—they have systematic approaches to implementation.&nbsp;</span></p></div></div><p></p></div>
</div><div data-element-id="elm_JMh0_mcvCUqJ1h_6-16-ww" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_JMh0_mcvCUqJ1h_6-16-ww"] .zpimagetext-container figure img { width: 343px !important ; height: 456.85px !important ; } } [data-element-id="elm_JMh0_mcvCUqJ1h_6-16-ww"].zpelem-imagetext{ margin-block-start:5px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Youtube%20THumbnail%20Top%2010%20Amazing%20Facts%20Design.png" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p></p><div><div><p style="margin-bottom:10.6667px;"><span style="font-weight:bold;"><br/></span></p><p style="margin-bottom:10.6667px;"><span style="font-weight:bold;">They Prioritize Strategically:</span>&nbsp;Rather than attempting all recommendations simultaneously, they identify high-impact, low-effort changes first. Quick wins like disabling external calendar sharing, blocking third-party app registrations, and configuring Teams meeting lobby settings can improve scores by 12 points without additional licensing.&nbsp;</p></div><br/><div><p style="margin-bottom:10.6667px;"><span style="font-weight:bold;">They Automate Where Possible:</span>&nbsp;Manual security configuration across hundreds or thousands of users doesn't scale. Successful organizations leverage automation for policy deployment, security configuration management, and compliance monitoring.&nbsp;</p></div><br/><div><p style="margin-bottom:10.6667px;"><span style="font-weight:bold;">They Maintain Consistency:</span>&nbsp;Security improvements in one area of Microsoft 365 must be maintained as new users onboard, new applications deploy, and business requirements evolve. Consistent policy enforcement requires ongoing management, not one-time configuration.&nbsp;</p></div><br/><div><p style="margin-bottom:10.6667px;"><span style="font-weight:bold;">They Bridge Technical and Business Requirements:</span>&nbsp;Security improvements that break business workflows get rolled back or worked around. Effective implementation balances security requirements with operational needs, ensuring changes stick.&nbsp;</p></div></div><p></p></div>
</div></div><div data-element-id="elm_aXLikX5JTmRmXDx5w9nPcQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-weight:800;">The Path Forward</span></h2></div>
<div data-element-id="elm_yA_ncoWlLjKc3pbpDz5NQA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><p style="margin-bottom:10.6667px;"><span>Improving your Microsoft Secure Score isn't ultimately about the number on the dashboard. It's about systematically reducing your organization's risk exposure while maintaining operational efficiency and compliance requirements.&nbsp;</span></p></div><div><p style="margin-bottom:10.6667px;"><span>The challenge most organizations face isn't lack of intent or understanding. It's lack of capacity and specialized expertise to translate Microsoft's recommendations into effective, sustainable security improvements across complex Microsoft 365 environments.&nbsp;</span></p></div><div><p style="margin-bottom:10.6667px;"><span>Three critical questions determine whether your Secure Score will improve or remain static:&nbsp;</span></p></div><div><ol start="1"><li style="margin-left:24px;"><p><span style="font-weight:bold;">Do you have dedicated resources</span><span> focused on Microsoft 365 security optimization, or is it competing with dozens of other IT priorities?&nbsp;</span></p></li></ol></div><div><ol start="2"><li style="margin-left:24px;"><p><span style="font-weight:bold;"><span>Do you have specialized expertise</span></span><span> in Microsoft 365 security features, or is your team learning as they go while managing daily operations?&nbsp;</span></p></li></ol></div><div><ol start="3"><li style="margin-left:24px;"><p><span style="font-weight:bold;">Do you have systematic processes</span><span> for policy deployment, security monitoring, and ongoing compliance management across your Microsoft 365 environment?&nbsp;</span></p></li></ol></div><div><p style="margin-bottom:10.6667px;"><span><br/></span></p><p style="margin-bottom:10.6667px;"><span>If you answered &quot;no&quot; to any of these questions, you've identified why your Secure Score isn't improving—and what needs to change.&nbsp;</span></p></div></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_6t12iwTbrAOwujwu08dhQA" data-element-type="section" class="zpsection zplight-section zplight-section-bg zscustom-section-120 "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_-wIn5io973Yr3dySEN3OaA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_FYSA59OY95thXJhJg0dRag" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_i4UK90U8vTChWssyeOTtQQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_i4UK90U8vTChWssyeOTtQQ"] div.zpspacer { height:27px; } @media (max-width: 768px) { div[data-element-id="elm_i4UK90U8vTChWssyeOTtQQ"] div.zpspacer { height:calc(27px / 3); } } </style><div class="zpspacer " data-height="27"></div>
</div><div data-element-id="elm_fexhpTUnFjoiyTD7yUU_GQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-weight:800;">Taking Action&nbsp;</span></h2></div>
<div data-element-id="elm_G3S717GR61TNhFyAwtOgFw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_G3S717GR61TNhFyAwtOgFw"] div.zpspacer { height:18px; } @media (max-width: 768px) { div[data-element-id="elm_G3S717GR61TNhFyAwtOgFw"] div.zpspacer { height:calc(18px / 3); } } </style><div class="zpspacer " data-height="18"></div>
</div><div data-element-id="elm_Sg7ECgw49ZKb5DHaQ_NWgg" data-element-type="box" class="zpelem-box zpelement zpbox-container zsbox-spacing zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_Sg7ECgw49ZKb5DHaQ_NWgg"].zpelem-box{ background-color:rgb(255, 255, 255); background-image:unset; margin-block-start:-29px; } </style><div data-element-id="elm_G54eB47liVGL1pesgotUQw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_G54eB47liVGL1pesgotUQw"].zpelem-text { margin-block-start:-12px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><p style="margin-bottom:10.6667px;"><span>Organizations serious about improving their Microsoft 365 security posture recognize that wishful thinking won't change dashboard metrics. Sustainable improvement requires either significant internal capability development or partnership with specialists who focus exclusively on Microsoft 365 security optimization.&nbsp;</span></p></div><div><p style="margin-bottom:10.6667px;"><span style="font-weight:bold;">GTconsult's Secure Score Support</span><span> provides dedicated expertise for organizations that need systematic Microsoft 365 security improvement. Using an all-in-one Office 365 cybersecurity solution designed for regulated organizations and security-focused businesses, we automate compliance, boost your secure score, and simplify control management.&nbsp;</span></p></div><div><p style="margin-bottom:10.6667px;"><span>Rather than struggling with recommendations your team doesn't have capacity to implement, you gain access to specialists who focus exclusively on Microsoft 365 security optimization, compliance automation, and ongoing security posture management.&nbsp;</span></p></div></div><p></p></div>
</div></div></div><div data-element-id="elm_WuiUrV3ApcCy8GPfziUlog" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_eClGBhgwHujLKXYfDyY0zg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_eClGBhgwHujLKXYfDyY0zg"] .zpimage-container figure img { width: 511px !important ; height: 511px !important ; } } @media (max-width: 767px) { [data-element-id="elm_eClGBhgwHujLKXYfDyY0zg"] .zpimage-container figure img { width:415px ; height:480.37px ; } } [data-element-id="elm_eClGBhgwHujLKXYfDyY0zg"].zpelem-image { margin-block-start:58px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Inforcer/Copy%20of%20White%20Modern%20Myth%20And%20Fact%20Instagram%20Post.png" width="415" height="480.37" loading="lazy" size="custom" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_PvPbnE5DYIkmfmr8u1Cvqg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_PvPbnE5DYIkmfmr8u1Cvqg"].zpelem-button{ margin-block-start:-17px; } </style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="https://www.gtconsult.com/GTconsult-Secure-Score-Support" target="_blank" title="GTconsult Secure Score Support"><span class="zpbutton-content">Learn more about GTconsult Secure Score Support → </span></a></div>
</div></div></div><div data-element-id="elm_V1ERQHKitphZbVuKPXU89Q" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_1HCQl7sMq48ZoSlN9slL5A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_QDgo5LucMDB7QQm9lypi5w" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_QDgo5LucMDB7QQm9lypi5w"] div.zpspacer { height:10px; } @media (max-width: 768px) { div[data-element-id="elm_QDgo5LucMDB7QQm9lypi5w"] div.zpspacer { height:calc(10px / 3); } } </style><div class="zpspacer " data-height="10"></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 02 Oct 2025 14:40:52 +0000</pubDate></item><item><title><![CDATA[Critical SharePoint Zero-Day Under Mass Exploitation: The ToolShell Campaign and Why Expert Monitoring Saves Organizations ]]></title><link>https://www.gtconsult.com/blogs/post/critical-sharepoint-zero-day-under-mass-exploitation-the-toolshell-campaign-and-why-expert-monitorin</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/SharePoint Exploitation.png"/>A blog on a sophisticated zero-day exploit chain targeting Microsoft SharePoint servers has exploded into a global cybersecurity crisis. SharePoint Under Siege: ToolShell Mass Exploitation.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_pXAedqJoWQkdy1j5kq0StQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_DfonSJHyXSfYTiI20WUxZw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_ZpDIwxPIkdHcj8gEOsZzNA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_jb7tk6ai-6u3t3KM_RDWaw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_jb7tk6ai-6u3t3KM_RDWaw"] .zpimage-container figure img { width: 1110px ; height: 624.38px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/SharePoint%20Exploitation.png" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_lfS0NpoVrfH3YNO6OiyURA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span>A sophisticated zero-day exploit chain targeting Microsoft SharePoint servers has exploded into a global cybersecurity crisis. Eye Security's research team identified active, large-scale exploitation beginning on July 18, 2025, around 18:00 CET, with attackers compromising dozens of SharePoint servers worldwide within hours </span><a href="https://research.eye.security/sharepoint-under-siege/" target="_blank" rel="noreferrer noopener"><span>SharePoint Under Siege: ToolShell Mass Exploitation</span></a><span>. This isn't opportunistic malware—it's surgical exploitation that demonstrates why organizations need dedicated cybersecurity expertise.&nbsp;</span></span></p></div>
</div><div data-element-id="elm_7-M0iAADS_6rPJdcwwX1Zw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-left zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span>The ToolShell Exploit: From Proof-of-Concept to Global Weapon</span></h2></div>
</div></div></div></div><div data-element-id="elm_KMF9O4JEp29_ebJC56JwnQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_fbGgAn_e1TiZGMyrzTxYvg" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_Sm_89SCN-Wpmuasiuaq7YA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_p7tSaFy3ZJw8FGQuWFHVuQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_p7tSaFy3ZJw8FGQuWFHVuQ"] .zpimage-container figure img { width: 540px ; height: 303.75px ; } } @media (max-width: 767px) { [data-element-id="elm_p7tSaFy3ZJw8FGQuWFHVuQ"] .zpimage-container figure img { width:415px ; height:233.44px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/eBook%20Mockup%20for%20Coaches%20Facebook%20Post%20-Blog%20Banner-%20-2-.png" width="415" height="233.44" loading="lazy" size="fit"/></picture></span></figure></div>
</div></div><div data-element-id="elm_Lan9iFow8V7fikbqzAEhBw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_sr94NStEWiRWL-Dyob3rww" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>The ToolShell Exploit: From Proof-of-Concept to Global Weapon</span></h3></div>
<div data-element-id="elm_9V9hh-d3DWmP1L5m-4ZQkg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><div><p style="text-align:left;"><span>The attack chain, dubbed &quot;ToolShell,&quot; weaponizes a combination of CVE-2025-49706 and CVE-2025-49704, originally demonstrated at Pwn2Own Berlin 2025 </span><a href="https://research.eye.security/sharepoint-under-siege/" target="_blank" rel="noreferrer noopener"><span>SharePoint Under Siege: ToolShell Mass Exploitation</span></a><span>. What makes this particularly alarming is the speed of weaponization—from academic proof-of-concept to active global exploitation in just 72 hours </span><a href="https://research.eye.security/sharepoint-under-siege/" target="_blank" rel="noreferrer noopener"><span>SharePoint Under Siege: ToolShell Mass Exploitation</span></a><span>.&nbsp;</span></p><p style="text-align:left;"><span><br/></span></p></div><div><p style="text-align:left;"><span>The sophistication of this attack cannot be overstated. Rather than deploying typical web shells, attackers are using stealthy .aspx files designed specifically to extract cryptographic secrets from SharePoint servers, including ValidationKey and DecryptionKey configurations </span><a href="https://research.eye.security/sharepoint-under-siege/" target="_blank" rel="noreferrer noopener"><span>SharePoint Under Siege: ToolShell Mass Exploitation</span></a><span>. These stolen keys effectively turn any authenticated SharePoint request into a remote code execution opportunity.&nbsp;</span></p></div></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_qwDT2VVsJ30ODsSdY6MjiQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_k-Qz8IV5OKbM_e3yj0M7Tw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_vkd3vojFsRmJS6KZSk5HTw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_q-H4FrDXzqtEtqbPhm5kCw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Technical Deep Dive: How the Attack Works</span></h2></div>
<div data-element-id="elm_GZvFDJBZd_NEqR6Uz3O1Mg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><p><span>The exploit targets the /_layouts/15/ToolPane.aspx endpoint, allowing attackers to write files to the server without any authentication </span><a href="https://research.eye.security/sharepoint-under-siege/" target="_blank" rel="noreferrer noopener"><span>SharePoint Under Siege: ToolShell Mass Exploitation</span></a><span>. The malicious payload extracts the SharePoint server's MachineKey configuration through internal .NET methods, providing attackers with the cryptographic material needed to craft valid __VIEWSTATE payloads.&nbsp;</span></p><p><span><br/></span></p></div><div><p><span>This mirrors the design weakness from CVE-2021-28474, but now packaged into a modern zero-day chain with automatic shell deployment, full persistence, and zero authentication requirements </span><a href="https://research.eye.security/sharepoint-under-siege/" target="_blank" rel="noreferrer noopener"><span>SharePoint Under Siege: ToolShell Mass Exploitation</span></a><span>. The attack essentially turns SharePoint's trust in its own configuration into a weapon.&nbsp;</span></p></div></div><p></p></div>
</div><div data-element-id="elm_5hTkITmAt4PpmrxMLDAV2A" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_5hTkITmAt4PpmrxMLDAV2A"] div.zpspacer { height:24px; } @media (max-width: 768px) { div[data-element-id="elm_5hTkITmAt4PpmrxMLDAV2A"] div.zpspacer { height:calc(24px / 3); } } </style><div class="zpspacer " data-height="24"></div>
</div></div></div></div></div><div data-element-id="elm_qoFiPDNVu4NkbzPzj4vpZw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_FzFZi19zL-FWad54VtmQUA" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_HQ7bYSDw7HRFS035AA9kMQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_XbFfOfdIQQqZz3LT-dX1Mw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Global Scale of Compromise</span></h2></div>
<div data-element-id="elm_U2torQoevEu6mqmpaUv2Jg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>Recent Shodan search data reveals the massive scope of potential targets. With 4,548 total results globally, the geographic distribution shows concerning exposure levels:</span></p></div>
</div><div data-element-id="elm_XY-aZIazGVNuhxl5ZjJyWg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Top Countries by Exposure:</span></h3></div>
<div data-element-id="elm_ipj3iJnhskdGLf6dEzwTvA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div>•United States: 3,903 exposed SharePoint instances</div><br/><div>•United Kingdom: 566 exposed instances</div><br/><div>•South Africa: 78 exposed instances</div></div><p></p></div>
</div><div data-element-id="elm_dS5Azx1FO90PbG0f-39_qQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>These numbers represent just the publicly discoverable SharePoint servers—the actual attack surface is likely much larger when considering internal systems and those behind additional security layers</span></p></div>
</div></div><div data-element-id="elm_JpM-Mcxb0s3IrN643xVx_Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_N492JPL7z8O3KjoXvwI1Qw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_N492JPL7z8O3KjoXvwI1Qw"] .zpimage-container figure img { width: 250px !important ; height: 432px !important ; } } @media (max-width: 767px) { [data-element-id="elm_N492JPL7z8O3KjoXvwI1Qw"] .zpimage-container figure img { width:415px ; height:276.39px ; } } [data-element-id="elm_N492JPL7z8O3KjoXvwI1Qw"].zpelem-image { margin-block-start:28px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Areas%20Affected.png" width="415" height="276.39" loading="lazy" size="custom"/></picture></span></figure></div>
</div></div></div></div></div><div data-element-id="elm_NlHQk_UP59bNBQNErlXfdg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_HczgXcLJGataELeJ7PGivg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_kqvbfbRN6V1OGjylnROCew" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_0MFVXyUF0CZO2Yjb49F7uQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Active Exploitation Indicators</span></h2></div>
<div data-element-id="elm_Ey8bLI1Yg4EPgpGzD4dw2w" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><div><p><span>Eye Security has identified specific indicators of compromise from the active campaign </span><a href="https://research.eye.security/sharepoint-under-siege/" target="_blank" rel="noreferrer noopener"><span>SharePoint Under Siege: ToolShell Mass Exploitation</span></a><span>:&nbsp;</span></p></div><div><p><span style="font-weight:bold;">Attack Sources:</span><span>&nbsp;</span></p></div><div><ul><li style="margin-left:24px;"><p><span>First wave: 107.191.58.76 (US-based, July 18 around 18:06 CET)&nbsp;</span></p></li></ul></div></div><div><div><ul><li style="margin-left:24px;"><p><span>Second wave: 104.238.159.149 (US-based, July 19 around 07:28 CET)&nbsp;</span></p></li></ul></div><div><p><span style="font-weight:bold;">User Agent String:</span><span>&nbsp;</span></p></div><div><ul><li style="margin-left:24px;"><p><span>Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:120.0) Gecko/20100101 Firefox/120.0&nbsp;</span></p></li></ul></div><div><p><span style="font-weight:bold;">Exploit Path:</span><span>&nbsp;</span></p></div><div><ul><li style="margin-left:24px;"><p><span>/_layouts/15/ToolPane.aspx?DisplayMode=Edit&amp;a=/ToolPane.aspx&nbsp;</span></p></li></ul></div></div></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_kAq7s681tLjCrMlnzdxbrw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_-OgzqdsitjczBG1SahLReg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_OwYP0EyWylg8Fn0T_fM2oA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_hVZMu3i0X7HVvJpn0R_ONw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>GTconsult's Global Response Capability</span></h2></div>
<div data-element-id="elm_8nF96oa__cmFvQQa-KbXEg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>At GTconsult, our international presence across the UK, USA, and South Africa positions us uniquely to respond to global threats like the ToolShell campaign. Our distributed support teams provide:&nbsp;</span></p></div>
</div></div></div></div></div><div data-element-id="elm_mC2IuFSCZ4TYusKYIl8fqQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_v0GQnzqWuH4FwkU7noFX-Q" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_bJJmACjn2OskDIypaflNDQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-3 zpcol-sm-6 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_NoRs9u5bfpiux55cEYsNGg" data-element-type="icon" class="zpelement zpelem-icon "><style type="text/css"></style><div class="zpicon-container zpicon-align-center zpicon-align-mobile-center zpicon-align-tablet-center"><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 512 512" height="512" width="512" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path d="M505 442.7L405.3 343c-4.5-4.5-10.6-7-17-7H372c27.6-35.3 44-79.7 44-128C416 93.1 322.9 0 208 0S0 93.1 0 208s93.1 208 208 208c48.3 0 92.7-16.4 128-44v16.3c0 6.4 2.5 12.5 7 17l99.7 99.7c9.4 9.4 24.6 9.4 33.9 0l28.3-28.3c9.4-9.4 9.4-24.6.1-34zM208 336c-70.7 0-128-57.2-128-128 0-70.7 57.2-128 128-128 70.7 0 128 57.2 128 128 0 70.7-57.2 128-128 128z"></path></svg></span></div>
</div><div data-element-id="elm_UHJRCuDQ4Jju5mxDaD-LuA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span>24/7 Global Monitoring:</span></h3></div>
<div data-element-id="elm_osS5OLMeh5Nvsx0cO6t4CA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span>With operations spanning multiple time zones, our security specialists maintain continuous surveillance across all major geographic regions where SharePoint exposure is highest.&nbsp;</span></p></div>
</div></div><div data-element-id="elm_owk8EzCJJdbQ24jjs2TVEw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-3 zpcol-sm-6 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_Ym_Cq8yJgKayyBCjUodnbQ" data-element-type="icon" class="zpelement zpelem-icon "><style type="text/css"></style><div class="zpicon-container zpicon-align-center zpicon-align-mobile-center zpicon-align-tablet-center"><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 448 512" height="448" width="512" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path d="M383.9 308.3l23.9-62.6c4-10.5-3.7-21.7-15-21.7h-58.5c11-18.9 17.8-40.6 17.8-64v-.3c39.2-7.8 64-19.1 64-31.7 0-13.3-27.3-25.1-70.1-33-9.2-32.8-27-65.8-40.6-82.8-9.5-11.9-25.9-15.6-39.5-8.8l-27.6 13.8c-9 4.5-19.6 4.5-28.6 0L182.1 3.4c-13.6-6.8-30-3.1-39.5 8.8-13.5 17-31.4 50-40.6 82.8-42.7 7.9-70 19.7-70 33 0 12.6 24.8 23.9 64 31.7v.3c0 23.4 6.8 45.1 17.8 64H56.3c-11.5 0-19.2 11.7-14.7 22.3l25.8 60.2C27.3 329.8 0 372.7 0 422.4v44.8C0 491.9 20.1 512 44.8 512h358.4c24.7 0 44.8-20.1 44.8-44.8v-44.8c0-48.4-25.8-90.4-64.1-114.1zM176 480l-41.6-192 49.6 32 24 40-32 120zm96 0l-32-120 24-40 49.6-32L272 480zm41.7-298.5c-3.9 11.9-7 24.6-16.5 33.4-10.1 9.3-48 22.4-64-25-2.8-8.4-15.4-8.4-18.3 0-17 50.2-56 32.4-64 25-9.5-8.8-12.7-21.5-16.5-33.4-.8-2.5-6.3-5.7-6.3-5.8v-10.8c28.3 3.6 61 5.8 96 5.8s67.7-2.1 96-5.8v10.8c-.1.1-5.6 3.2-6.4 5.8z"></path></svg></span></div>
</div><div data-element-id="elm_Zqi04fopGrSa6sOZmp67eg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span>Regional Threat Intelligence:</span></h3></div>
<div data-element-id="elm__sGPbC3Ni3dc1rk_z2Jlvg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span>Our teams in London, US operations centers, and South African facilities collaborate to track regional attack patterns and share intelligence about emerging threats.&nbsp;</span></p></div>
</div></div><div data-element-id="elm_wnFABfv1wOnWUSS7qqlc_g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-3 zpcol-sm-6 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_GKtU1T81LupYSMEdsCd8VA" data-element-type="icon" class="zpelement zpelem-icon "><style type="text/css"></style><div class="zpicon-container zpicon-align-center zpicon-align-mobile-center zpicon-align-tablet-center"><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 512 512" height="512" width="512" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path d="M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm0 448c-110.5 0-200-89.5-200-200S145.5 56 256 56s200 89.5 200 200-89.5 200-200 200zm61.8-104.4l-84.9-61.7c-3.1-2.3-4.9-5.9-4.9-9.7V116c0-6.6 5.4-12 12-12h32c6.6 0 12 5.4 12 12v141.7l66.8 48.6c5.4 3.9 6.5 11.4 2.6 16.8L334.6 349c-3.9 5.3-11.4 6.5-16.8 2.6z"></path></svg></span></div>
</div><div data-element-id="elm_RCWMkwsz7kjT6fdod7_JZw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span>Rapid Response Coordination:</span></h3></div>
<div data-element-id="elm_H8bRCzzAXWgQDPZs0xRckw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span>When zero-day exploits like ToolShell emerge, our global infrastructure enables immediate protective measures across client environments, regardless of geographic location.&nbsp;</span></p></div>
</div></div><div data-element-id="elm_nhEUPCuLbhoAyRXzZzElkQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-3 zpcol-sm-6 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_A9qjZHXud53NwmDiaAQ-Og" data-element-type="icon" class="zpelement zpelem-icon "><style type="text/css"></style><div class="zpicon-container zpicon-align-center zpicon-align-mobile-center zpicon-align-tablet-center"><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 512 512" height="512" width="512" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path d="M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z"></path></svg></span></div>
</div><div data-element-id="elm_vGcMxZhJb5nnMea364pA_g" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span>Local Compliance Expertise:</span></h3></div>
<div data-element-id="elm_f0lLn79NhTWmJ2ZBj73hOg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span>Each region brings specialized knowledge of local regulatory requirements and industry standards, ensuring comprehensive protection that meets regional security mandates.&nbsp;</span></p></div>
</div></div></div></div></div><div data-element-id="elm_AhJkGJt4j2kcpPvKItiv7g" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_w1swy2caxaONUQb-psSm6g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_XcSRnQRkyKb1h0akTfEYfA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_U_GtaDC0V1P3YSU_ygPAIA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Why This Attack Succeeded—And How We Prevent It</span></h2></div>
<div data-element-id="elm_S1RNzjbDPc_pYPmPeJM8Lw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><p><span>Eye Security's initial detection came through CrowdStrike Falcon EDR deployment, which flagged suspicious process chains on a legacy SharePoint server </span><a href="https://research.eye.security/sharepoint-under-siege/" target="_blank" rel="noreferrer noopener"><span>SharePoint Under Siege: ToolShell Mass Exploitation</span></a><span>.&nbsp;</span></p><p><span><br/></span></p><p><span>This highlights several critical factors:&nbsp;</span></p><p><span><br/></span></p></div><div><p><span style="font-weight:bold;">Speed of Exploitation</span><span>: The attack was designed to evade detection and gain long-term access, with exploitation occurring within 72 hours of the public demonstration </span><a href="https://research.eye.security/sharepoint-under-siege/" target="_blank" rel="noreferrer noopener"><span>SharePoint Under Siege: ToolShell Mass Exploitation</span></a><span>.&nbsp;</span></p><p><span><br/></span></p></div><div><p><span style="font-weight:bold;">Sophistication of Payload</span><span>: Unlike typical web shells, the malicious .aspx files were specifically designed to extract cryptographic secrets rather than provide interactive command execution </span><a href="https://research.eye.security/sharepoint-under-siege/" target="_blank" rel="noreferrer noopener"><span>SharePoint Under Siege: ToolShell Mass Exploitation</span></a><span>, making detection more challenging.&nbsp;</span></p><p><span><br/></span></p></div><div><p><span style="font-weight:bold;">Scale of Campaign</span><span>: Eye Security scanned over 1,000 public-facing SharePoint environments and confirmed dozens of compromised servers using the exact same payload </span><a href="https://research.eye.security/sharepoint-under-siege/" target="_blank" rel="noreferrer noopener"><span>SharePoint Under Siege: ToolShell Mass Exploitation</span></a><span>.&nbsp;</span></p></div></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_sfUI3Jv6shHxknCcjUs4jw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_TUweq79gko07c4mTo9uELg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_Sm3hgQRqlmfhE1evadxihQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_z2rzZtY-aNxXZDVEri5EdQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>GTconsult's Proactive Defense Strategy</span></h2></div>
<div data-element-id="elm_4C_lLXiAuQnjc7XKb4p88g" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span>Our approach to threats like ToolShell demonstrates why reactive security fails in today's threat landscape:&nbsp;</span></span></p></div>
</div><div data-element-id="elm_JK6NwMJP0b0UUdZP9y-V1w" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_JK6NwMJP0b0UUdZP9y-V1w"] div.zpspacer { height:8px; } @media (max-width: 768px) { div[data-element-id="elm_JK6NwMJP0b0UUdZP9y-V1w"] div.zpspacer { height:calc(8px / 3); } } </style><div class="zpspacer " data-height="8"></div>
</div></div></div></div></div><div data-element-id="elm_CdfM_VpKGOcESPYqlRPJxA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_yksr_i5q1Gp_0CVvVw-z-g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_GoYLzc0BgTEj99s3-rRApA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-3 zpcol-sm-6 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_qfgXmAkXEEjbj98-K8wKgA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span><span>Predictive Threat Modeling:</span></span></h3></div>
<div data-element-id="elm_oFY8tGciKVocioQHF7zlqQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span><span>We maintain comprehensive asset inventories and vulnerability assessments, enabling rapid identification of systems at risk when new exploits emerge.&nbsp;</span></span></p></div>
</div></div><div data-element-id="elm_86LJIR3mThnrUFelitfzvA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-3 zpcol-sm-6 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_s9T-Y_IcEYHPS4n5eILlKA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span><span>Advanced EDR Integration:</span></span></h3></div>
<div data-element-id="elm_sjMMCLmq879yh9uzVSY4pg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span><span>Like the Eye Security detection that uncovered this campaign, our monitoring solutions include behavioral analysis that can identify zero-day exploitation patterns.&nbsp;</span></span></p></div>
</div></div><div data-element-id="elm_u9ZyhwRZoEI6jpSgWM4VQQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-3 zpcol-sm-6 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_jltch3QEcN2C_bArMKlynw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span><span>Rapid Patch Management:</span></span></h3></div>
<div data-element-id="elm_Rp5z6jESdtTqlbIVdhwGdA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span><span>Our teams coordinate immediate deployment of security updates across client environments, minimizing exposure windows during critical vulnerability periods.&nbsp;</span></span></p></div>
</div></div><div data-element-id="elm_rHVyT_oKOH2zNuAlS-PevA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-3 zpcol-sm-6 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_5OsrVRb63zW_4QH64eDyig" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span><span>Compromise Assessment:</span></span></h3></div>
<div data-element-id="elm_Vlr9EuARV4NqObnj5H78KA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span><span>When threats emerge, we conduct thorough sweeps to ensure no persistence mechanisms or additional compromises exist.</span></span></p></div>
</div></div></div><div data-element-id="elm_xPOABdtHA07BCUFVyj93BA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_AG1HiHfZyFN9bNn1dtcxHw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_cPAJsgxeyQJ2opfi9nDEPA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_cPAJsgxeyQJ2opfi9nDEPA"] div.zpspacer { height:11px; } @media (max-width: 768px) { div[data-element-id="elm_cPAJsgxeyQJ2opfi9nDEPA"] div.zpspacer { height:calc(11px / 3); } } </style><div class="zpspacer " data-height="11"></div>
</div></div></div></div></div><div data-element-id="elm_gJLXm0Ftp7oCxqPa-YXn2g" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_bPdE3iVdIjimOAptEYXTkA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_pqaWZyNjYsxsJ53NbAAmug" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_yZTnK_ZGuhgxfPc7ppY_EA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Immediate Action Items for Organizations</span></h2></div>
<div data-element-id="elm_oRnyRPsJ_g9XfAJsSkBAuA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><div><div><p><span>Given the active exploitation of this vulnerability, organizations must act immediately:&nbsp;</span></p></div><div><ol start="1"><li style="margin-left:24px;"><p><span style="font-weight:bold;">Deploy Microsoft's July 2025 Security Update</span><span> for all SharePoint installations&nbsp;</span></p></li></ol></div><div><ol start="2"><li style="margin-left:24px;"><p><span style="font-weight:bold;">Scan for Indicators of Compromise</span><span> in _layouts/15/ directories and HTTP access logs from July 18-19&nbsp;</span></p></li></ol></div><div><ol start="3"><li style="margin-left:24px;"><p><span style="font-weight:bold;">Rotate Credentials</span><span> for any systems that may have been exposed&nbsp;</span></p></li></ol></div><div><ol start="4"><li style="margin-left:24px;"><p><span style="font-weight:bold;">Implement Enhanced Monitoring</span><span> for SharePoint environments&nbsp;</span></p></li></ol></div></div></div>
</div></div></div></div></div><div data-element-id="elm_ivqqtPJb-x1FhfWcyp7GCA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_wHp9Up5kt0eYfG69vhyb0A" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_JrzipRRj-kcgZdhLUwuAdQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_spQu7HlBYZZW0XtXbQaKLw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>The Bottom Line</span></h2></div>
<div data-element-id="elm_0YpPVIy4pz9JPZCAsSHI6A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><p><span>The ToolShell campaign represents a new evolution in cyber threats—sophisticated, rapidly weaponized, and globally coordinated. With Eye Security discovering &quot;dozens of systems actively compromised&quot; in their initial scan </span><a href="https://research.eye.security/sharepoint-under-siege/" target="_blank" rel="noreferrer noopener"><span>SharePoint Under Siege: ToolShell Mass Exploitation</span></a><span>, this attack demonstrates that traditional reactive security approaches are insufficient.&nbsp;</span></p><p><span><br/></span></p></div><div><p><span>Organizations need proactive cybersecurity partners with global reach, advanced threat detection capabilities, and the expertise to respond to zero-day threats within hours, not days. GTconsult's presence across the UK, USA, and South Africa—the regions showing highest SharePoint exposure—positions us to provide exactly this level of protection.&nbsp;</span></p></div><div><p><span>Don't wait for threat actors to target your SharePoint environment. Our support teams are actively monitoring for ToolShell indicators and can immediately assess your organization's exposure. Contact GTconsult today for emergency SharePoint security assessments and ongoing protection against evolving cyber threats.&nbsp;</span></p></div><div><p><span><img alt="Shape" src="/Mon%20Jul%2021%202025-1.png">&nbsp;</span></p></div><div><p><span style="font-style:italic;"><span>For immediate assistance with SharePoint compromise assessment or emergency incident response across our UK, USA, and South African operations, contact our global support team at GTconsult.com.</span></span><span>&nbsp;</span></p></div></div><p></p></div>
</div><div data-element-id="elm_BMKzYuwPBYO39uQ8IBTCBw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://www.gtconsult.com/contact" target="_blank" title="Contact Us"><span class="zpbutton-content">Get Immediate Assistance</span></a></div>
</div><div data-element-id="elm_xjyt5C0IrVVCfyeoQAjz0w" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span style="font-weight:bold;">Reference</span>: Shodan search data current as of July 2025, showing global SharePoint server exposure across GTconsult service regions.&nbsp;</span></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 21 Jul 2025 10:34:42 +0000</pubDate></item><item><title><![CDATA[How to spot a 'Phishing' email and Keep Your Business Safe]]></title><link>https://www.gtconsult.com/blogs/post/how-to-spot-a-phishing-email</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/Black White Yellow Modern Simple How To Youtube Thumbnail.png"/>A blog on tell-tale signs of a phishing email using an email received by one of our team members as an example.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_I0SlJRa2T7a__5egIxeIug" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_tF4AhLKqQrOAQksVt62Psg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_r0gv9pXSSnmS3k2nyrYA3g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_I6IGXPWiT2ukNTl4Jh78vQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Watch Out: Think before you click</h2></div>
<div data-element-id="elm_woEIXYt3QXywcaw1VASFUw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span>Phishing attacks have become increasingly deceptive— if you're not careful, it's easy to fall for one. Some prey on our tendency to skim emails, rely on visual cues like familiar logos or jargon, or respond hastily to anything marked as urgent. They’re not always complex— many are simple, but just convincing enough to earn your trust if you’re not paying attention.</span></p></div>
</div><div data-element-id="elm_QWW5tV3mE2tS40ceQASCRA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_QWW5tV3mE2tS40ceQASCRA"] .zpimage-container figure img { width: 1110px ; height: 323.75px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Untitled-4i.png" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_5Qo3kHCgqTI3imZ0jyy2hg" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_5Qo3kHCgqTI3imZ0jyy2hg"].zpelem-divider{ margin-block-start:10px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_NBQqEwmLuoFyV0Hd9QZ1NA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_NBQqEwmLuoFyV0Hd9QZ1NA"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_NBQqEwmLuoFyV0Hd9QZ1NA"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div></div></div></div></div><div data-element-id="elm_z95QZlXn5KvfpiCrmzsQcA" data-element-type="section" class="zpsection zplight-section zplight-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_oExU6pP8eRXN9yPE4DE2xw" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"> [data-element-id="elm_oExU6pP8eRXN9yPE4DE2xw"].zprow{ margin-block-start:-22px; } </style><div data-element-id="elm_AiWjrXoB3Lik35olKI5Shw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_Fc0BW_suIx9Zc7Zp8SDApQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_Fc0BW_suIx9Zc7Zp8SDApQ"] .zpimage-container figure img { width: 298px !important ; height: 434.08px !important ; } } @media (max-width: 767px) { [data-element-id="elm_Fc0BW_suIx9Zc7Zp8SDApQ"] .zpimage-container figure img { width:458px ; height:655.00px ; } } [data-element-id="elm_Fc0BW_suIx9Zc7Zp8SDApQ"].zpelem-image { margin-block-start:0px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/1749470707541.png" width="458" height="655.00" loading="lazy" size="custom" data-lightbox="true"/></picture></span></figure></div>
</div></div><div data-element-id="elm_y2_jyyyWIHYVd91yhBuZjA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_HIYmq8X5QLw1WvLD5QjDXA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-weight:400;">Received something like this before?</span></h2></div>
<div data-element-id="elm_mJKZyGzEpOyWsZAJUwhDng" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div>Or maybe you've received a variation with subjects like:</div></div><p></p><ul><li>&quot;Your Zoom account is suspended&quot;</li><li>&quot;You missed a Zoom meeting&quot;</li><li>&quot;New Zoom message received&quot;</li></ul><div><div><br/></div><div>Whatever variation you have (or have not received), these kinds of emails can be so easy to click on if you are not paying attention.&nbsp;</div></div>
</div></div><div data-element-id="elm_QoeQlmLyo_Q5pobMdwdiKg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_QoeQlmLyo_Q5pobMdwdiKg"] div.zpspacer { height:7px; } @media (max-width: 768px) { div[data-element-id="elm_QoeQlmLyo_Q5pobMdwdiKg"] div.zpspacer { height:calc(7px / 3); } } </style><div class="zpspacer " data-height="7"></div>
</div></div></div></div></div><div data-element-id="elm_0MXa7S7rW341lcLNfDwl3w" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg zscustom-section-59 "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1N9PAhaa2NKf6j6OYLtg2g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_-vGtJQ6bHisES_PMAlRYQg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_OW9kkLqtJYi8R6OWDJJjyQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_OW9kkLqtJYi8R6OWDJJjyQ"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_OW9kkLqtJYi8R6OWDJJjyQ"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div></div></div></div></div><div data-element-id="elm_ELybx6pCYgGFaCsV-OIqSw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_gbhRR7P4So8XtZhwo6Y0Dg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_mOJOfckLCdaniTQdoFwAzA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_Jlj0v5UtlgBcPTdh6jBApg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div>To answer the question,' How do I know if an email is a phishing email or a scam?' Let's have a look at what's wrong with this email that was recently received by one of our team members:</div></div><p></p></div>
</div><div data-element-id="elm_ZSoSW0nBARnxhtuvOSr7VA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_ZSoSW0nBARnxhtuvOSr7VA"] .zpimage-container figure img { width: 1110px ; height: 582.75px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Sus%20Email.png" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div><div data-element-id="elm_rzcfMGRy4SnZUVVi8XWZ4w" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_65rQcY9J5JJSvN6S9sqbGw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_vQTF4gPrtiA1eLEP2jobRg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_AwLK0nlNGBolvkbBWHcY2w" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-weight:700;">Platform</span></h2></div>
<div data-element-id="elm_mxk_WhEIbJEEOGrQTzNP4w" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span>While this may not apply to all organizations, it's still something to consider. If your organization holds all internal meetings on a different platform (such as Teams). Receiving an email inviting you to a weekly meeting on Zoom might be an immediate red flag. Also, if you notice, it says 'accepted'- be careful not to click the link to find out what exactly you accepted.</span></span></p></div>
</div><div data-element-id="elm_tpvAkL3arfvgyacVug06Xg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_tpvAkL3arfvgyacVug06Xg"] .zpimage-container figure img { width: 500px ; height: 77.52px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-medium zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/1d.png" size="medium" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div><div data-element-id="elm_fOBnmG9I33qp8WBp-_juBw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_cPv5ya11_A6BYYierMvm6g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_noFQ9uGKNcaDfaIhSzQqDQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_AUZoh51KSqbj5AqU_LKECA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-weight:700;"><span><span style="font-weight:700;">Strange sender format</span></span></span></h2></div>
<div data-element-id="elm_hqfbOZhn3Xx_RiQEaLh_0g" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span></span></span></p><div><div>The format (O=EXCHANGELABS/OU=EXCHANGE...), is not how legit Zoom emails are structured.&nbsp;</div><br/><div>Zoom emails should come from @zoom.us or @zoom.com- not from an Exchange server's internal address format.</div></div><p></p></div>
</div><div data-element-id="elm_37oEEL9ya-D6OJ_yRwCjWQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_37oEEL9ya-D6OJ_yRwCjWQ"] .zpimage-container figure img { width: 500px ; height: 114.34px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-medium zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/2d.png" size="medium" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div><div data-element-id="elm_IDFkm7PS8qQVWCLqOBd4kw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_OiOmsaX1lI4XIL92TVSMfQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_FOnjYqdmmbQ_8YQneTEN7g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_rrehfmk9B5-q33CJtal_AA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-weight:700;"><span>The use of a legit logo to gain trust<br/></span></span></h2></div>
<div data-element-id="elm_BnPP4cDzcj6vSJSMMAtvcQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span></span></span></p><div><p style="margin-bottom:32px;">When you first click open the email, the first thing that draws your attention is the Zoom logo. It's familiar/recognizable, so if you're skimming through, you may let your guard down and miss all the other red flags.</p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_MnwiwMsfa-Kuc8-_amHlYQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_3_vKum-omFmXxJZdPkPHQQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_4L7c82um3MSqeFaIvaKioA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_fijc1iIbGFoMgUaoZYrBgg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-weight:700;"><span><span style="font-weight:700;"><span>Suspicious sender email<br/></span></span></span></span></h2></div>
<div data-element-id="elm_P7lo62SH53OyzcDjoD4T2w" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span></span></span></p><div><div></div><div><div>Always, always, always check the sender email, majority of the time, it's the dead give away that something is fishy...or, you know, phishy.</div><div>In this case, the email is not a Zoom domain. It looks like a personal or small org email, which is unusual for a Zoom system-generated message.</div></div><div></div></div><p></p></div>
</div><div data-element-id="elm_orXZ3mKcs5CcjEyOLqaR6w" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_orXZ3mKcs5CcjEyOLqaR6w"] .zpimage-container figure img { width: 408px ; height: 60.00px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-medium zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/3d.png" size="medium" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div><div data-element-id="elm_S5n4v0AWsKVO_E-I7w6X_A" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Pac9Kpg7klEUdk7ZQ-MgRg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_zzrG9dedrt6SDQUc3UWfuQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_s0X1b3EAOLQWKkZjKL2J6w" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-weight:700;"><span><span style="font-weight:700;"><span>Generic language<br/></span></span></span></span></h2></div>
<div data-element-id="elm_j5HZcmnbbIn7SlFiFp_BYA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span></span></span></p><div><div></div><div><div>No meeting title, organizer name, or details. Often, emails like this will also contain urgency without much context.&nbsp;</div><div><br/></div><div>Real Zoom invites usually include specifics like topic, time, and host name.</div></div><div></div></div><p></p></div>
</div><div data-element-id="elm_ioSV28xQC4whjxMb-rNeug" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_ioSV28xQC4whjxMb-rNeug"] .zpimage-container figure img { width: 500px ; height: 59.49px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-medium zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Image%20-36-.png" size="medium" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div><div data-element-id="elm_EEZTyi0WB4BY1vki22FyKQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_2MHNB6PCjLpvQExLHCuaCQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_JPuQ3yed2pWGL5RMD85vKQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_ThwNnlzX7QS6C9GUdIc_HA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-weight:700;"><span><span style="font-weight:700;"><span>File size</span></span></span></span></h2></div>
<div data-element-id="elm_AyvcfTnbH64C4X2z9e-wQA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span></span></span></p><div><div></div><div><div>This might not always be the case, but it's worth adding to the mix.&nbsp;</div><div><br/></div><div>Legitimate Zoom or Outlook meeting invites usually include metadata like date, time, location, meeting link, agenda, and possibly attachments or participant info. This often results in a file size larger than 1 KB.</div><br/><div>Attackers often use tiny files to avoid detection by email filters and to appear harmless to users.</div><br/><div>While .ics calendar invites can be legit, the file size is small (1KB) and may indicate that it is a malicious redirect link or a script meant to exploit vulnerabilities in calendar applications when opened or imported.</div><br/><div>Think before you click!</div></div><div></div></div><p></p></div>
</div><div data-element-id="elm_yAWhHg2zLPcTJqbqRdzIdA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_yAWhHg2zLPcTJqbqRdzIdA"] .zpimage-container figure img { width: 500px ; height: 139.31px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-medium zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/5d.png" size="medium" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div><div data-element-id="elm_oZ6NE6b8mD2bSExA-5viSA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_jjJg2_muMS1Ep1JKD0J6mw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_0x8yiK_pQ_JahMwX2oqOxQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_mKwzM1GaKPtKBKvlsWOEAQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-weight:700;"><span><span style="font-weight:700;"><span>Odd Time<br/></span></span></span></span></h2></div>
<div data-element-id="elm_piex1_oWK-bRo2PPq1wD3Q" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span></span></span></p><div><div></div><div><div>Though this one may not always be the case, coupled with the other clues, it becomes the cherry on top.</div><div><br/></div><div>Look out for emails coming in after business hours or on the weekends, timezone mismatches or mismatched time stamps.</div></div><div></div></div><p></p></div>
</div><div data-element-id="elm_yoFkrfMKG0e-jDb4bzVZ2Q" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_yoFkrfMKG0e-jDb4bzVZ2Q"] .zpimage-container figure img { width: 500px ; height: 86.96px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-medium zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/4d.png" size="medium" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div><div data-element-id="elm_hB0C3Nds2ZBxBSSSU093Wg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_mh-E6No6joSx1_7NJ1nblA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_p1D6uoZZ8nLt_pD5xVCaWg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_4--8OfChwM5yW30aj0osqA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-weight:700;"><span><span style="font-weight:700;"><span>Other red flags to look out for</span></span></span></span></h2></div>
<div data-element-id="elm_hBe9zSKwpjcacaEvlC9Q6g" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span></span></span></p><div><div></div><span>The red flags never end, but be on the lookout for poor grammar, punctuation, or formatting.</span><div></div></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_0zrddmsbMS6QdZ69RiyCTg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_n1EfdpeGpDunxS60_oeJ7g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_OarZnWz48i3euN-AujOOzQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_LyvjveTiy0t7iLTpF_pgVQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-weight:700;"><span><span style="font-weight:700;"><span>The takeaway?</span></span></span></span></h2></div>
<div data-element-id="elm_4UBVnPa2y5kSG8-i16p0oQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div>Pay Attention. Pay Attention. Pay Attention.</div><br/><div>The days of clicking on things without any consequences are long gone (were they ever there?)</div><br/><div>The logo might look legit. The meeting title might sound important. But if you don’t slow down to examine the details, you could end up compromising your organization.</div><br/><div><div><strong>Before you click, check:</strong></div></div><div><ul><li>Who sent it?</li><li>What are they asking?</li><li>Does this align with how your organization usually communicates?</li></ul></div><div><br/></div><div><div>When in doubt- <strong>don’t click</strong>. Verify through a different channel.&nbsp;</div></div></div></div>
</div><div data-element-id="elm_oUfN0w95NRKmX_tK7UWHVA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-weight:700;"><span><span style="font-weight:700;"><span>Want to check if your MS365 Environment is prepared for the just in case?</span></span></span></span></h2></div>
<div data-element-id="elm_1vd9HNFfWc4VVG0f4i5yww" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>We recommend getting a penetration test to ensure your organization is well-protected against potential vulnerabilities and&nbsp; attacks. A thorough assessment can uncover weaknesses before cybercriminals do, giving you the opportunity to strengthen your defences and train your team. Don't wait for a breach to take action!</span></p></div>
</div></div></div></div></div><div data-element-id="elm_4j7txhnwpmk-cre-ro5X-A" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_TDRlbm6xgEFDGiugbuC4Sg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_K9pw5g2tYeVjYaEXiEi1Nw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_YerYWnGIZjBetJo1X7-GYg" data-element-type="video" class="zpelement zpelem-video "><style type="text/css"> @media (max-width: 767px) { [data-element-id="elm_YerYWnGIZjBetJo1X7-GYg"].zpelem-video iframe.zpvideo{ width:560px !important; height:315px !important; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_YerYWnGIZjBetJo1X7-GYg"].zpelem-video iframe.zpvideo{ width:560px !important; height:315px !important; } } </style><div class="zpvideo-container zpiframe-align-center zpiframe-mobile-align-center zpiframe-tablet-align-center"><iframe class="zpvideo " width="560" height="315" src="https://www.youtube.com/embed/e4YSke1x13o?si=XjCgOkyOXbW4FzRJ" frameborder="0" allowfullscreen></iframe></div>
</div><div data-element-id="elm_ET45Le8yz73gvM9bxoZC1w" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_ET45Le8yz73gvM9bxoZC1w"].zpelem-button{ margin-block-start:41px; } </style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="/contact" target="_blank"><span class="zpbutton-content">Book a Consultation</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 11 Jun 2025 10:19:43 +0000</pubDate></item><item><title><![CDATA[Quick Action Protects Company Data After Phone Theft]]></title><link>https://www.gtconsult.com/blogs/post/quick-action-protects-company-data-after-phone-theft</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/Phone security blog.png"/>Smartphones play such a huge role in our lives- but what happens to your work data if it gets stolen, lost or compromised? In this blog, learn how GTconsult protected company information when a team member's iPhone was stolen and learn the essential steps to take if it happens to you.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_90yfd5ZcRFqM_yf6JnUkgQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_sTyD4menQM28rEScaUXkrQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_EGGkuRpAQQyP5bmoN5CukA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_JwquE2HkSsSXWKehdcaJTA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">A blog on the critical role of security on employee mobile devices</span></h2></div>
<div data-element-id="elm_-XakgccO7FFtNw2gPJZu5A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><div><div>Today, more than ever, employees rely on their smartphones to stay connected and productive. But with that convenience comes risk.</div></div></div></div>
</div><div data-element-id="elm_8_Lqe7vRz-8VcSqWAUPmwA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_8_Lqe7vRz-8VcSqWAUPmwA"] .zpimage-container figure img { width: 1110px ; height: 624.38px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Fixed.png" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div><div data-element-id="elm_itspJ6W1Px21zuICtQw0Og" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm__iLqYzTjGXFRCmUMQgAahA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_-O4b2kn-lRoSFt5S9pxEcw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_iQDTapJYtzM1USsG4JoYjw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;font-size:15px;">At GTconsult, a recent incident reinforced just how critical it is to have robust security measures in place. One of our team members experienced a frightening robbery in which their iPhone was stolen. While such situations are always distressing, we’re relieved that our company data remained fully protected- thanks to proactive security policies and swift response actions.</span></p></div>
</div></div></div></div></div><div data-element-id="elm_34_VN8HjQLefmg-SO96-uQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_-m_JmB3V1NWMGogVBeFK6g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_Se-Tp-IzSfxn1m00MO8Jog" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_SN3155fS6Z1XmT3YhMpQaQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><h3><span style="font-weight:700;">Strong Security Measures Made All the Difference</span></h3></div></h2></div>
<div data-element-id="elm_XLnWGo9dlgd5GFhpTasC6A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><div>Long before this incident, our company implemented strict security protocols to safeguard sensitive information. Every company device must meet compliance policies, including:</div></div></div></div>
</div></div></div></div></div><div data-element-id="elm_19fBrNMaoX5quycdfxRnhQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_EiAICGUA1MivyRfTHAIxgg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_jqm-Vu-rD-1hJTj83pEgwQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_kn-K9kubpS7LkpZJYisNqA" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-center "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 448 512" height="448" width="512" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path d="M400 256H152V152.9c0-39.6 31.7-72.5 71.3-72.9 40-.4 72.7 32.1 72.7 72v16c0 13.3 10.7 24 24 24h32c13.3 0 24-10.7 24-24v-16C376 68 307.5-.3 223.5 0 139.5.3 72 69.5 72 153.5V256H48c-26.5 0-48 21.5-48 48v160c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V304c0-26.5-21.5-48-48-48zM264 408c0 22.1-17.9 40-40 40s-40-17.9-40-40v-48c0-22.1 17.9-40 40-40s40 17.9 40 40v48z"></path></svg></span><h3 class="zpicon-heading " data-editor="true"><span style="color:inherit;">Mandatory Multi-Factor Authentication (MFA)</span></h3><div class="zpicon-text-container " data-editor="true"><p><span style="color:inherit;">Employees need to verify their identity before accessing company applications like Outlook, Teams, and SharePoint.</span></p></div>
</div></div></div><div data-element-id="elm_wEcHf55n8eas19Zj1BKdMg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_e8cJaVa5nvhLQzlqtYP98Q" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-center "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 320 512" height="320" width="512" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path d="M272 0H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h224c26.5 0 48-21.5 48-48V48c0-26.5-21.5-48-48-48zM160 480c-17.7 0-32-14.3-32-32s14.3-32 32-32 32 14.3 32 32-14.3 32-32 32zm112-108c0 6.6-5.4 12-12 12H60c-6.6 0-12-5.4-12-12V60c0-6.6 5.4-12 12-12h200c6.6 0 12 5.4 12 12v312z"></path></svg></span><h3 class="zpicon-heading " data-editor="true"><span style="color:inherit;">Mobile Device Management (MDM)</span></h3><div class="zpicon-text-container " data-editor="true"><p><span style="color:inherit;">Our IT team can remotely manage and secure corporate data on employee devices.</span></p></div>
</div></div></div><div data-element-id="elm_MhFEDoFNhV56xiOm9DUGkA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_td67GkriDD41VLiNYeIr4A" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-center "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 576 512" height="576" width="512" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path d="M528 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h480c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm0 400H48V80h480v352zM208 256c35.3 0 64-28.7 64-64s-28.7-64-64-64-64 28.7-64 64 28.7 64 64 64zm-89.6 128h179.2c12.4 0 22.4-8.6 22.4-19.2v-19.2c0-31.8-30.1-57.6-67.2-57.6-10.8 0-18.7 8-44.8 8-26.9 0-33.4-8-44.8-8-37.1 0-67.2 25.8-67.2 57.6v19.2c0 10.6 10 19.2 22.4 19.2zM360 320h112c4.4 0 8-3.6 8-8v-16c0-4.4-3.6-8-8-8H360c-4.4 0-8 3.6-8 8v16c0 4.4 3.6 8 8 8zm0-64h112c4.4 0 8-3.6 8-8v-16c0-4.4-3.6-8-8-8H360c-4.4 0-8 3.6-8 8v16c0 4.4 3.6 8 8 8zm0-64h112c4.4 0 8-3.6 8-8v-16c0-4.4-3.6-8-8-8H360c-4.4 0-8 3.6-8 8v16c0 4.4 3.6 8 8 8z"></path></svg></span><h3 class="zpicon-heading " data-editor="true"><span style="color:inherit;">Access Control with Microsoft Entra ID</span></h3><div class="zpicon-text-container " data-editor="true"><p><span style="color:inherit;">Formerly known as Azure AD, this system ensures only authorized users can access company resources.</span></p></div>
</div></div><div data-element-id="elm_eYFnwfFpSUAk-bHAXiZJrA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><p>[Learn more about transitioning to Microsoft Entra ID <a href="https://www.gtconsult.com/blogs/post/transitioning-from-azure-acs-to-microsoft-entra-id-what-you-need-to-know" title="Transitioning from Azure ACS to Microsoft Entra ID" target="_blank" rel=""><span style="font-weight:700;">here</span></a>.]</p></div>
</div></div></div><div data-element-id="elm_AFSzmD0m_dY-RbfTCHC3eQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_viIsixQQYzUl3yYvaZmA5Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_X_Y5XqG4Y4229Eem7szJ-Q" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">These layers of protection meant that even with the physical loss of a device, our company data remained secure.</span></p></div>
</div></div></div><div data-element-id="elm_b8uN8wKpNpFqlBrYhQ_mRQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_AmGESD1PKMiA-dWBIwbMCg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_2KJ7iv2e11BAHs00gfA0Jg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_2KJ7iv2e11BAHs00gfA0Jg"] div.zpspacer { height:11px; } @media (max-width: 768px) { div[data-element-id="elm_2KJ7iv2e11BAHs00gfA0Jg"] div.zpspacer { height:calc(11px / 3); } } </style><div class="zpspacer " data-height="11"></div>
</div></div></div></div></div><div data-element-id="elm_X3k0kUSvyRpxj5S7Q36vLg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_lFqNDZRhrTXA9sDR5648kw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_kAtLuYBM8QdmxSXuFy1hpg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_JD5R-j5H26Ovyg1ZDoQ2iA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><h3><span style="font-weight:700;">Rapid Response Prevented Unauthorized Access</span></h3></div></h2></div>
<div data-element-id="elm_qONvwm3vv4elaJLtbzds2w" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="font-size:16px;">As soon as the theft was reported, our IT team acted swiftly:</p><p style="font-size:16px;"><span style="color:inherit;font-size:15px;"><br/></span></p><ol><li><span style="color:inherit;"><span style="font-weight:700;">Immediate Sign-Out:</span></span><span style="color:inherit;">Using Microsoft Entra ID, all active sign-in sessions were revoked, cutting off any potential access.</span></li><li><span style="color:inherit;"><span style="font-weight:700;">Removal of Authentication Methods:</span></span><span style="color:inherit;">The Microsoft Authenticator app and associated phone number were unlinked from company accounts.</span></li><li><span style="color:inherit;"><span style="font-weight:700;">Remote Wipe:</span></span><span style="color:inherit;">Microsoft Intune was used to erase all company data and applications from the stolen device.</span></li><li><span style="color:inherit;"><span style="font-weight:700;">Secure Re-Authentication:</span></span><span style="color:inherit;">The affected employee had to complete a fresh MFA registration on their new device before regaining access to company systems.</span></li></ol><p style="font-size:16px;"><br/></p><p style="font-size:16px;">These quick actions ensured that no unauthorized person could exploit the stolen device to access sensitive information.</p><div><br/></div></div></div>
</div></div><div data-element-id="elm_WxfjM9385LFFjtC6EuBnUw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_WxfjM9385LFFjtC6EuBnUw"].zpelem-col{ background-color:rgba(0,0,0,0.07); background-image:unset; } </style><div data-element-id="elm_sKIojc1hnM-k1l8rgI0NtA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:rgb(166, 206, 57);font-weight:600;">You might also like:</span></h2></div>
<div data-element-id="elm_ZEuWiuJIg_Z-vY2FJlyLBA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_ZEuWiuJIg_Z-vY2FJlyLBA"] .zpimage-container figure img { width: 540px ; height: 303.75px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/a-guide-to-sharepoint-security-best-practices" target="_blank" title="A Guide to SharePoint Security Best Practices" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/SharePoint%20Security%20Best%20Practices%20Write%20up.jpg" size="fit"/></picture></a></figure></div>
</div><div data-element-id="elm_VwHfgQxoVlRAQUsPKw-qTg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;font-style:italic;">SharePoint Intranets serve as central hubs for document management, collaboration, and communication, making them critical assets that require robust security measures. This <a href="https://www.gtconsult.com/blogs/post/a-guide-to-sharepoint-security-best-practices" title="A Guide to SharePoint Security Best Practices" target="_blank" rel="">blog </a>post explores essential security best practices to fortify your SharePoint Intranet.</span></p><p><span style="color:inherit;"><br/></span></p></div>
</div></div></div></div></div><div data-element-id="elm_As-_rRXNGekdu_BIIOyf7A" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_s09bFkUaBUS2YnTyq0UGHA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_cFsmVI3O4ilvUTsiKNFsJQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_rHqtMZT9RbuncLqwMniQUg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><h3><div style="color:inherit;"></div></h3><h3><span style="font-weight:700;">Security Steps Matter – Even When They Seem Inconvenient</span></h3></div></h2></div>
<div data-element-id="elm_Zdsfh_OJgNWK0jGOTE8Pkg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="color:inherit;font-size:15px;">This incident serves as a real-world example of why our security practices- like MFA prompts and compliance checks- are essential. While they may feel like minor inconveniences in day-to-day operations, they act as crucial safeguards in critical moments. Our investment in Microsoft 365’s security ecosystem continues to protect both our employees and our organization.</span></p><div><br/></div></div></div>
</div></div></div></div></div><div data-element-id="elm_5zqTFSs86eaTPvupKMMWpQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_PQeVf697fs8jG752KlcZRw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_MF8fhFK0hgIMHMoqUfyR3A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_JT964kir-Rv3uoobfah4fg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><h3><div style="color:inherit;"></div></h3><h3><div style="color:inherit;"></div></h3><h3><span style="font-weight:700;">What to Do If You Experience a Similar Incident</span></h3></div></h2></div>
<div data-element-id="elm_MUAu654sBIKKINw6gUUDrg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-size:15px;">If your company device is lost or stolen, take immediate action:</span></p><p><span style="color:inherit;"><br/></span></p><ul><li><span style="color:inherit;">Report the incident to local law enforcement and provide details.</span></li><li><span style="color:inherit;">Notify your IT department as soon as possible so they can secure your accounts and device.</span></li><li><span style="color:inherit;">Follow security procedures for re-authentication and device replacement.</span></li></ul><p><span style="font-size:15px;"><br/></span></p><p><span style="font-size:15px;">Speed is key when it comes to preventing unauthorized access. By acting quickly and relying on your established security measures, you can keep your company data safe- even in worst-case scenarios.</span></p></div></div></div></div>
</div><div data-element-id="elm_st7mi7RBZ56Ssfvt-c6t2A" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"></style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_VRtJVV6Plo6MaRgQn3nhXQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>In conclusion, safeguarding your company data requires a holistic approach that encompasses user authentication, encryption, data loss prevention, auditing, backup procedures, and user education. By incorporating these security best practices into your security strategy, you can create a resilient and secure digital environment that protects your organization's valuable assets. Remember, proactive measures are key to staying ahead of potential threats in the ever-evolving landscape of cybersecurity.</p><p><br/></p><p>Need our help? From penetration testing to hiring a hacker to conduct a real-world attack (without the consequences of course), we have an expert team ready for action.</p></div></div>
</div><div data-element-id="elm_elj-iPqQXioXyJzd4Uvk1w" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="https://www.gtconsult.com/protection" target="_blank" title="A Team Protection"><span class="zpbutton-content">Protect Your SharePoint Data</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 11 Feb 2025 14:51:20 +0000</pubDate></item><item><title><![CDATA[A Guide to SharePoint Security Best Practices]]></title><link>https://www.gtconsult.com/blogs/post/a-guide-to-sharepoint-security-best-practices</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/SharePoint Security Best Practices Write up.jpg"/>A write up focusing on the best practices when it comes to SharePoint security.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_SsZrnnXWQjiAwjWBa2oqFA" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm_SsZrnnXWQjiAwjWBa2oqFA"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_OszD7tJyRH-yZoYS8eG17g" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- zpbackground-size-cover zpbackground-position-center-center zpbackground-repeat-all zpbackground-attachment-scroll " data-equal-column=""><style type="text/css"> [data-element-id="elm_OszD7tJyRH-yZoYS8eG17g"].zprow{ background-image:linear-gradient(to bottom, rgba(30,34,45,0.74), rgba(30,34,45,0.74)), url(/Blog%20Site/Cyber%20Security.jpg); border-radius:1px; } </style><div data-element-id="elm_0PddenaYREeEbwlCxS5bdw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_0PddenaYREeEbwlCxS5bdw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_2tmj_U8BQhOPF73b9dw0wQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_2tmj_U8BQhOPF73b9dw0wQ"].zpelem-heading { border-radius:1px; text-shadow:1px 1px 1px #000000; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:rgb(255, 255, 255);">Fortifying Your Intranet</span></h2></div>
<div data-element-id="elm_rdneNfkVT3uJBC9XlwVadA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_rdneNfkVT3uJBC9XlwVadA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:rgb(255, 255, 255);">In the dynamic landscape of modern workplaces, the integrity and security of your organization's data are non-negotiable. Nowhere is this more critical than in the heart of your digital operations: the SharePoint Intranet.</span><br></p></div>
</div><div data-element-id="elm_GXKnpTkfQSWabkD9AbFG2w" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_GXKnpTkfQSWabkD9AbFG2w"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"> [data-element-id="elm_GXKnpTkfQSWabkD9AbFG2w"] .zpbutton.zpbutton-type-primary:hover{ color: #FFFFFF !important; } </style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval zpbutton-outline " href="https://www.gtconsult.com/protection" target="_blank" title="A Team Protection"><span class="zpbutton-content">A Team Protection</span></a></div>
</div><div data-element-id="elm_vCztPkIkXBmqMLEBXo4osg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_vCztPkIkXBmqMLEBXo4osg"] div.zpspacer { height:14px; } @media (max-width: 768px) { div[data-element-id="elm_vCztPkIkXBmqMLEBXo4osg"] div.zpspacer { height:calc(14px / 3); } } </style><div class="zpspacer " data-height="14"></div>
</div></div></div></div></div><div data-element-id="elm_-1DR2GWiyQeG51r5T6hFyQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_-1DR2GWiyQeG51r5T6hFyQ"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_62P3aRIJogHMKKLflue_gQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_62P3aRIJogHMKKLflue_gQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_XeU4nNfiCoWJA8LczaN4Tw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_XeU4nNfiCoWJA8LczaN4Tw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_vnD5WV31g1zs4hqBS2ArsQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_vnD5WV31g1zs4hqBS2ArsQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>In the realm of modern workplaces, where digital collaboration and information sharing are paramount, ensuring the security of your organization's data is non-negotiable. SharePoint Intranets serve as central hubs for document management, collaboration, and communication, making them critical assets that require robust security measures. In this blog post, we'll explore essential security best practices to fortify your SharePoint Intranet.</p></div></div>
</div><div data-element-id="elm_yi17XDt1HUqP-mlLxwxZUg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_yi17XDt1HUqP-mlLxwxZUg"] div.zpspacer { height:6px; } @media (max-width: 768px) { div[data-element-id="elm_yi17XDt1HUqP-mlLxwxZUg"] div.zpspacer { height:calc(6px / 3); } } </style><div class="zpspacer " data-height="6"></div>
</div></div></div></div></div><div data-element-id="elm_1kEA0-El8ln2YsKwLldUwQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg zscustom-section-123 "><style type="text/css"> [data-element-id="elm_1kEA0-El8ln2YsKwLldUwQ"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_YDECHm82v930eVcBykILmQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"> [data-element-id="elm_YDECHm82v930eVcBykILmQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_FbV1I3sn3qN-0lgaqwT9AA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_FbV1I3sn3qN-0lgaqwT9AA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_xGdJYbHOt9jJE9_wrpSD6w" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div><p><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">1. User Authentication and Authorization Controls</span></p></div></h2></div>
<div data-element-id="elm_ssSXWMip39JE9q0MjGp6JQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>Begin by implementing strong user authentication mechanisms. User authentication and authorization controls are critical for ensuring that only authorized users have access to SharePoint resources.&nbsp;</p></div>
</div></div><div data-element-id="elm_KLnGE88nmAKgYyy9J9lxbQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-weight:700;">Key considerations include:</span></p><ul><li>Implementing strong authentication mechanisms, such as multi-factor authentication (MFA), to verify user identities and prevent unauthorized access.</li><li>Defining clear roles and permissions within SharePoint to restrict access to sensitive data and functionality based on user roles and responsibilities.</li><li>Regularly reviewing and updating user access privileges to ensure that access permissions align with users' current roles and requirements.</li></ul></div>
</div></div><div data-element-id="elm_EuSGslXsBD-MMRKjRDo6oQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_EuSGslXsBD-MMRKjRDo6oQ"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>Multi-factor authentication enhances user identity verification.</li><li>Granular permissions reduce the risk of unauthorized access.</li></ul></div></div>
</div><div data-element-id="elm_ftSnufxY9yDmfMpfPjDeig" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_ftSnufxY9yDmfMpfPjDeig"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div><p><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">2. SSL Encryption Data in Transit (only applies to On-Premises)</span></p></div></h2></div>
<div data-element-id="elm_QecZanllTI3uF9HZvhRCGw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p>Secure data in transit by implementing SSL encryption. This ensures that data exchanged between users and the SharePoint Intranet is encrypted, minimizing the risk of interception and ensuring that your sensitive information remains confidential. Obtain and install a valid SSL certificate to authenticate the server and establish a secure connection.&nbsp;</p></div></div>
</div></div></div><div data-element-id="elm_oJ6TYpqxxFivWajH1sfRMg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_oJ6TYpqxxFivWajH1sfRMg"].zpelem-col{ border-style:solid; border-color:rgba(0,0,0,0.2) !important; border-block-start-width:0px; border-inline-end-width:0px; border-block-end-width:0px; border-inline-start-width:2px; border-radius:1px; } </style><div data-element-id="elm_7HCTb-08jS1rR7BXJVCACg" data-element-type="box" class="zpelem-box zpelement zpbox-container zsbox-spacing zplight-section zplight-section-bg "><style type="text/css"> [data-element-id="elm_7HCTb-08jS1rR7BXJVCACg"].zpelem-box{ border-radius:1px; } </style><div data-element-id="elm_mPw86Oby4sRrw1caQaM1_g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_mPw86Oby4sRrw1caQaM1_g"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="font-weight:700;color:rgb(166, 206, 57);">Also Read:</span></h3></div>
<div data-element-id="elm_ohK9o8HQPp2c7PPQmBJV6Q" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_ohK9o8HQPp2c7PPQmBJV6Q"] .zpimage-container figure img { width: 193.7px !important ; height: 109px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_ohK9o8HQPp2c7PPQmBJV6Q"] .zpimage-container figure img { width:193.7px ; height:109px ; } } @media (max-width: 767px) { [data-element-id="elm_ohK9o8HQPp2c7PPQmBJV6Q"] .zpimage-container figure img { width:193.7px ; height:109px ; } } [data-element-id="elm_ohK9o8HQPp2c7PPQmBJV6Q"].zpelem-image { border-radius:1px; margin-block-start:6px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/let-s-talk-sharepoint-permissions" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Permissions%202.jpg" width="193.7" height="109" loading="lazy" size="custom"/></picture></a></figure></div>
</div><div data-element-id="elm_b2atEyGw1cnV_BQbJusTEw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_b2atEyGw1cnV_BQbJusTEw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;">Let's talk SharePoint Permissions</span><br></p></div>
</div><div data-element-id="elm_qKCcQHfMbDHOTIu3ARsEbA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_qKCcQHfMbDHOTIu3ARsEbA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval zpbutton-outline " href="https://www.gtconsult.com/blogs/post/let-s-talk-sharepoint-permissions" target="_blank"><span class="zpbutton-content">Read Me</span></a></div>
</div><div data-element-id="elm_fEhwwwJNhtp_S-SwC1ZTfg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_fEhwwwJNhtp_S-SwC1ZTfg"] .zpimage-container figure img { width: 184.28px !important ; height: 104px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_fEhwwwJNhtp_S-SwC1ZTfg"] .zpimage-container figure img { width:184.28px ; height:104px ; } } @media (max-width: 767px) { [data-element-id="elm_fEhwwwJNhtp_S-SwC1ZTfg"] .zpimage-container figure img { width:184.28px ; height:104px ; } } [data-element-id="elm_fEhwwwJNhtp_S-SwC1ZTfg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/kyles-take-the-recent-surge-in-sharepoint-malware-downloads" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Security%20write%20up%20thumbnail.jpg" width="184.28" height="104" loading="lazy" size="custom"/></picture></a></figure></div>
</div><div data-element-id="elm_E6MPT1tW2VroIFVuzcccVQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_E6MPT1tW2VroIFVuzcccVQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;">Kyle's Take: The recent surge in SharePoint Malware downloads</span><br></p></div>
</div><div data-element-id="elm_0KwGOtvwFDNvDCj-MQS4Ug" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_0KwGOtvwFDNvDCj-MQS4Ug"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval zpbutton-outline " href="https://www.gtconsult.com/blogs/post/kyles-take-the-recent-surge-in-sharepoint-malware-downloads" target="_blank"><span class="zpbutton-content">Read Me</span></a></div>
</div></div></div></div></div></div><div data-element-id="elm_U5rAhJ3iaA4nGGm4bhb73g" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg zscustom-section-123 "><style type="text/css"> [data-element-id="elm_U5rAhJ3iaA4nGGm4bhb73g"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_s-spPx4NaHeyPzjDZgSfzg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"> [data-element-id="elm_s-spPx4NaHeyPzjDZgSfzg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_8Bu5QuMPrC5SEzPuuEgr1A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_8Bu5QuMPrC5SEzPuuEgr1A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_BgrztguO06nuTlQclHkgGg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_BgrztguO06nuTlQclHkgGg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-weight:700;">Considerations include:</span></p><ul><li>Obtaining and installing a valid SSL certificate from a trusted certificate authority to authenticate the server's identity and establish a secure connection.</li><li>Enabling SSL encryption for all communications between users and the SharePoint environment, including web traffic, file transfers, and data synchronization.</li><li>Periodically renewing SSL certificates and configuring SSL/TLS settings to comply with industry standards and best practices.</li></ul></div></div>
</div><div data-element-id="elm_sXY5TfNmDxY2r9Pk2ekeRg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_sXY5TfNmDxY2r9Pk2ekeRg"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>SSL encryption safeguards data during transmission.</li><li>Valid SSL certificates verify the authenticity of the server.</li></ul></div></div>
</div></div></div></div></div><div data-element-id="elm_bSo-ggMrOmpDnJ1yAy7jog" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_bSo-ggMrOmpDnJ1yAy7jog"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_xgOLxeMkKGz95VrO3smdhg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_xgOLxeMkKGz95VrO3smdhg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_0omc7CpCALrpfa9WK8HjEw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_0omc7CpCALrpfa9WK8HjEw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_gnrJGBMZnZd0o1C0GKcSRw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_gnrJGBMZnZd0o1C0GKcSRw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">3. Regular security audits and monitoring</span><br></h2></div>
<div data-element-id="elm_MvjKhomz5yAN2rnK4Bp0Lg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_MvjKhomz5yAN2rnK4Bp0Lg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>Regular security audits and monitoring are essential for detecting and mitigating security risks within the SharePoint environment.</p></div></div>
</div><div data-element-id="elm_sf0MZs2t8Kt_KwzTdPLptA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_sf0MZs2t8Kt_KwzTdPLptA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-weight:700;">Considerations include:</span></p><ul><li>Conducting periodic security audits to assess the effectiveness of security controls, identify vulnerabilities, and ensure compliance with security policies and standards.</li><li>Implementing robust monitoring tools and solutions to track user activities, detect suspicious behavior, and alert administrators to potential security incidents.</li><li>Establishing incident response procedures to investigate and respond to security events identified through security audits and monitoring activities.</li></ul></div></div>
</div><div data-element-id="elm_L1qQNKoxXA5-Ewdab_RaZQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_L1qQNKoxXA5-Ewdab_RaZQ"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>Security audits identify and address vulnerabilities.</li><li>Monitoring tools enable real-time threat detection.</li></ul></div></div>
</div></div></div></div></div><div data-element-id="elm_OPn66VQQ7t67SW2iM-qd0w" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_OPn66VQQ7t67SW2iM-qd0w"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_iz9TEPUZFdfA0DACLTKyXg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_iz9TEPUZFdfA0DACLTKyXg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_ejiGdg4supFFfWbZScnadA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_ejiGdg4supFFfWbZScnadA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_6qwyJW8AXiECy5Xn1OO7MQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6qwyJW8AXiECy5Xn1OO7MQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p>Establish comprehensive backup and recovery procedures to safeguard against data loss due to unforeseen events.&nbsp;</p></div></div></div>
</div><div data-element-id="elm_hJ230GXgIv0aUcoIZeV1JA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_hJ230GXgIv0aUcoIZeV1JA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Best practices include:</span></p><ul><li>Establishing regular backup schedules to create copies of SharePoint data, configurations, and content databases.</li><li>Testing backup and recovery procedures to ensure data integrity and verify the ability to restore SharePoint environments to a functional state.</li><li>Storing backup copies securely in off-site locations or cloud storage services to protect against data loss due to disasters, hardware failures, or malicious attacks.</li></ul></div></div></div>
</div><div data-element-id="elm_pLuW-JNcToHVsqRPfBsJag" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_pLuW-JNcToHVsqRPfBsJag"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>Backup procedures protect against data loss.</li><li>Regular testing ensures the reliability of the recovery process.</li></ul></div></div></div>
</div><div data-element-id="elm_eeQnZeh00O6Gp4Xp4JBy-Q" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_eeQnZeh00O6Gp4Xp4JBy-Q"] div.zpspacer { height:10px; } @media (max-width: 768px) { div[data-element-id="elm_eeQnZeh00O6Gp4Xp4JBy-Q"] div.zpspacer { height:calc(10px / 3); } } </style><div class="zpspacer " data-height="10"></div>
</div></div></div></div></div><div data-element-id="elm_x9Ux0a111RejHOAhph8xMQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg zscustom-section-139 "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ihtl4vcaL3P2zHa10NKJJw" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-flex-start " data-equal-column=""><style type="text/css"> [data-element-id="elm_ihtl4vcaL3P2zHa10NKJJw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_p739uGkDRfUtWZ-ABDQBqQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_p739uGkDRfUtWZ-ABDQBqQ"].zpelem-col{ border-style:solid; border-color:rgba(0,0,0,0.2) !important; border-block-start-width:0px; border-inline-end-width:2px; border-block-end-width:0px; border-inline-start-width:0px; border-radius:1px; } </style><div data-element-id="elm_WLLBZAxTTn9HbC9zJQuVnw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_WLLBZAxTTn9HbC9zJQuVnw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="font-size:18px;font-weight:900;color:rgb(0, 27, 76);">Have you read our <a href="https://www.gtconsult.com/history-of-cyber-security-ebook" title="eBook" target="_blank" rel="">eBook</a>?</span><br></h2></div>
<div data-element-id="elm_kHgbnWw9bIBSyy4Ot7Vdwg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_kHgbnWw9bIBSyy4Ot7Vdwg"] .zpimage-container figure img { width: 200px ; height: 200.00px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_kHgbnWw9bIBSyy4Ot7Vdwg"] .zpimage-container figure img { width:200px ; height:200.00px ; } } @media (max-width: 767px) { [data-element-id="elm_kHgbnWw9bIBSyy4Ot7Vdwg"] .zpimage-container figure img { width:200px ; height:200.00px ; } } [data-element-id="elm_kHgbnWw9bIBSyy4Ot7Vdwg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/history-of-cyber-security-ebook" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Cover%20Square.jpg" width="200" height="200.00" loading="lazy" size="small"/></picture></a></figure></div>
</div></div><div data-element-id="elm_vrfXdrO5tauQMIPT43CkuQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_vrfXdrO5tauQMIPT43CkuQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_zwO1ZU6O4Xg-9UDAkTT34w" data-element-type="heading" class="zpelement zpelem-heading sub-heading "><style> [data-element-id="elm_zwO1ZU6O4Xg-9UDAkTT34w"].zpelem-heading { border-radius:1px; } </style><h5
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div><h2><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">4. Back up and recovery procedures</span></h2></div></h5></div>
<div data-element-id="elm_7Q0HjRBdUIJZ61Pya10glA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_7Q0HjRBdUIJZ61Pya10glA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p>Establish comprehensive backup and recovery procedures to safeguard against data loss due to unforeseen events.&nbsp;</p></div></div></div>
</div><div data-element-id="elm_sHVT9lNqLe2qLC821rFQiA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_sHVT9lNqLe2qLC821rFQiA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Best practices include:</span></p><ul><li>Establishing regular backup schedules to create copies of SharePoint data, configurations, and content databases.</li><li>Testing backup and recovery procedures to ensure data integrity and verify the ability to restore SharePoint environments to a functional state.</li><li>Storing backup copies securely in off-site locations or cloud storage services to protect against data loss due to disasters, hardware failures, or malicious attacks.</li></ul></div></div></div>
</div></div></div><div data-element-id="elm_vKzDl-TR0ZNikSTOGuyLTw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_TihoWtynmRWXHpVZ3olVyw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_sLUOYw6D40wqyO3FVSxuPA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_sLUOYw6D40wqyO3FVSxuPA"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>Backup procedures protect against data loss.</li><li>Regular testing ensures the reliability of the recovery process.</li></ul></div></div></div>
</div></div></div></div></div><div data-element-id="elm_UOPaIOhUeSNzMSXqBtiznA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_UOPaIOhUeSNzMSXqBtiznA"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_uSe-g-3JFVbmbiwpWnkBqA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_uSe-g-3JFVbmbiwpWnkBqA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_kJ2AWKQ_pu1314NI41arog" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_kJ2AWKQ_pu1314NI41arog"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_W7atDZV-U7bFFu8DXSM7aQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_W7atDZV-U7bFFu8DXSM7aQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">5. Security awareness training for users</span><br></h2></div>
<div data-element-id="elm_5GA36hiL2MuZcsbjMylEqw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_5GA36hiL2MuZcsbjMylEqw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p>User awareness is an important piece of the puzzle. Educate users on security best practices through comprehensive awareness training programs. Foster a culture of security consciousness by informing users about potential threats, phishing attacks, and the importance of safeguarding sensitive information.</p></div></div></div>
</div><div data-element-id="elm_t2JLQ7iz1WU5uCIlSg5GZQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_t2JLQ7iz1WU5uCIlSg5GZQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Considerations include:</span></p><ul><li>Developing comprehensive security awareness training programs that cover topics such as phishing attacks, password security, and data handling practices.</li><li>Providing regular training sessions, workshops, and resources to reinforce security awareness and promote a culture of security within the organization.</li><li>Encouraging user participation and engagement in security awareness initiatives through interactive training modules, quizzes, and real-world examples of security incidents and their impact.</li></ul></div></div></div>
</div><div data-element-id="elm_YTOXXVufhfWBKB07WMB_nQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_YTOXXVufhfWBKB07WMB_nQ"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>User awareness is a critical component of overall security.</li><li>Training programs empower users to recognize and mitigate risks.</li></ul></div></div></div>
</div></div></div></div></div><div data-element-id="elm_sMsQus8GTTDAgAYjl3ZnWg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_sMsQus8GTTDAgAYjl3ZnWg"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_e5ymGxewDYiSBiXV131pNQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_e5ymGxewDYiSBiXV131pNQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_fx_dbjmv-_gUyn4sdT2h0g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_fx_dbjmv-_gUyn4sdT2h0g"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_SyKew3QsXA6eSffjUreURw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_SyKew3QsXA6eSffjUreURw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">6. Patch Management</span><br></h2></div>
<div data-element-id="elm_wmHrzlb8aPaRdIm_2G-sYg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_wmHrzlb8aPaRdIm_2G-sYg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p>Patch management is the process of planning, testing, deploying, and monitoring software updates, also known as patches, to address vulnerabilities, bugs, or security flaws in software applications and operating systems. It is an essential aspect of cybersecurity and IT infrastructure management aimed at keeping systems secure and up-to-date.</p><p><span style="color:inherit;"><span style="font-size:11pt;">Effective patch management is crucial for maintaining the security of your SharePoint environment.&nbsp;</span></span><br></p></div></div></div>
</div><div data-element-id="elm_0f0Y5tNZI0lw2NCmnvMVVA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_0f0Y5tNZI0lw2NCmnvMVVA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Consider the following steps:</span></p><ul><li>Regularly monitor for security patches and updates released by Microsoft for SharePoint and associated software components.</li><li>Establish a patch testing process to evaluate patches in a non-production environment before deployment to the production environment.</li><li>Implement a schedule for deploying patches during maintenance windows to minimize disruptions to users and business operations.</li><li>Maintain detailed documentation of patching activities, including patch versions, deployment dates, and any issues encountered during the patching process.</li></ul></div></div></div>
</div><div data-element-id="elm_h11DXPWnqC-Ta3KwT7AcLA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_h11DXPWnqC-Ta3KwT7AcLA"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>Regular patching helps address known vulnerabilities and reduce the risk of security breaches.</li><li><span style="font-size:11pt;">Testing patches in a controlled environment before deployment helps mitigate the risk of unintended consequences in the production environment.</span></li></ul></div></div></div>
</div><div data-element-id="elm_OHY1Ufkq8NfSj_3LQ71VpA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_OHY1Ufkq8NfSj_3LQ71VpA"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_OHY1Ufkq8NfSj_3LQ71VpA"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div></div></div></div></div><div data-element-id="elm_IuhSeHvfCo31_NApM2PRDw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_IuhSeHvfCo31_NApM2PRDw"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_uBdeooJjPgC3crqgZAXJDQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_uBdeooJjPgC3crqgZAXJDQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_e-k4W6ZRtzKgdZdzCrc7Dw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-5 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_e-k4W6ZRtzKgdZdzCrc7Dw"].zpelem-col{ background-color:rgba(52,73,94,0.2); background-image:unset; border-radius:1px; margin-block-start:5px; } </style><div data-element-id="elm_YrJGMPIBFLWS2vBGsOV0lw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_YrJGMPIBFLWS2vBGsOV0lw"].zpelem-heading { border-radius:1px; margin-block-start:4px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-size:20px;color:rgb(255, 255, 255);font-weight:700;">Learn more on our podcast: Ten Ton Potato</span><br></h2></div>
<div data-element-id="elm_bTCe07v8E53FvMmh7owPnA" data-element-type="video" class="zpelement zpelem-video "><style type="text/css"> [data-element-id="elm_bTCe07v8E53FvMmh7owPnA"].zpelem-video{ border-radius:1px; } </style><div class="zpvideo-container zpiframe-align-left zpiframe-mobile-align- zpiframe-tablet-align-"><iframe class="zpvideo " width="560" height="250" src="//www.youtube.com/embed/WRVatfwLeCM?enablejsapi=1" frameborder="0" allowfullscreen id=youtube-video-1 data-api=youtube></iframe></div>
</div><div data-element-id="elm_tcTSSvH-S_5g7R6-HQN0ng" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_tcTSSvH-S_5g7R6-HQN0ng"] .zpimagetext-container figure img { width: 32px !important ; height: 32px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_tcTSSvH-S_5g7R6-HQN0ng"] .zpimagetext-container figure img { width:32px ; height:32px ; } } @media (max-width: 767px) { [data-element-id="elm_tcTSSvH-S_5g7R6-HQN0ng"] .zpimagetext-container figure img { width:32px ; height:32px ; } } [data-element-id="elm_tcTSSvH-S_5g7R6-HQN0ng"].zpelem-imagetext .zpimage-text, [data-element-id="elm_tcTSSvH-S_5g7R6-HQN0ng"].zpelem-imagetext .zpimage-text :is(h1,h2,h3,h4,h5,h6){ text-shadow:1px 1px 1px #000000; } [data-element-id="elm_tcTSSvH-S_5g7R6-HQN0ng"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-center zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://podcasts.apple.com/za/podcast/ten-ton-potato-by-gtconsult/id1719258790?i=1000644363073" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/standard.png" width="32" height="32" loading="lazy" size="custom" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p style="text-align:center;"><span style="font-size:16px;color:rgb(255, 255, 255);">Listen on Apple Podcasts</span></p></div>
</div></div><div data-element-id="elm_GMhxaosSYxs-bzYKNdG8DA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_GMhxaosSYxs-bzYKNdG8DA"] .zpimagetext-container figure img { width: 33px !important ; height: 33px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_GMhxaosSYxs-bzYKNdG8DA"] .zpimagetext-container figure img { width:33px ; height:33px ; } } @media (max-width: 767px) { [data-element-id="elm_GMhxaosSYxs-bzYKNdG8DA"] .zpimagetext-container figure img { width:33px ; height:33px ; } } [data-element-id="elm_GMhxaosSYxs-bzYKNdG8DA"].zpelem-imagetext .zpimage-text, [data-element-id="elm_GMhxaosSYxs-bzYKNdG8DA"].zpelem-imagetext .zpimage-text :is(h1,h2,h3,h4,h5,h6){ text-shadow:1px 1px 1px #000000; } [data-element-id="elm_GMhxaosSYxs-bzYKNdG8DA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-center zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://open.spotify.com/episode/6XbO2MiJtcx3KW3hKOOvYA?si=_-qsW_-6ROSPSNlSDrqimw&amp;nd=1&amp;dlsi=04bd234f250c4329" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Spotify_logo_without_text.svg.png" width="33" height="33" loading="lazy" size="custom" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p style="text-align:center;"><span style="font-size:16px;color:rgb(255, 255, 255);">Listen on Spotify</span></p></div>
</div></div><div data-element-id="elm_rF4LMpF1vKBl8JUNon8xEA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_rF4LMpF1vKBl8JUNon8xEA"] div.zpspacer { height:0px; } @media (max-width: 768px) { div[data-element-id="elm_rF4LMpF1vKBl8JUNon8xEA"] div.zpspacer { height:calc(0px / 3); } } </style><div class="zpspacer " data-height="0"></div>
</div></div><div data-element-id="elm_hWjoIgCMbVhWPpsJbRHLmw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-7 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_hWjoIgCMbVhWPpsJbRHLmw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_03sTYsfavYljJCyVSQCn7Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_03sTYsfavYljJCyVSQCn7Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">7. Intrusion Detection and Prevention Systems (IDPS)</span><br></h2></div>
<div data-element-id="elm_u6ZhC2FcFI3dQkVa7EthHg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_u6ZhC2FcFI3dQkVa7EthHg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;"><span style="font-size:11pt;">Deploying intrusion detection and prevention systems (IDPS) can help monitor network traffic and detect potential security threats in real-time.</span></span><br></p></div>
</div><div data-element-id="elm_HHZeNQnfMZYL3FFnKCFwOA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_HHZeNQnfMZYL3FFnKCFwOA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-weight:700;">Consider the following strategies:</span></p><ul><li>Place IDPS sensors strategically throughout the network to monitor traffic entering and exiting SharePoint servers.</li><li>Configure IDPS rules and signatures to detect known attack patterns, anomalous behavior, and suspicious network activities.</li><li>Integrate IDPS with security information and event management (SIEM) systems for centralized logging, correlation, and analysis of security events.</li></ul></div></div>
</div><div data-element-id="elm_oBlD21lOvoL7wERZsofhyQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oBlD21lOvoL7wERZsofhyQ"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>IDPS solutions provide proactive threat detection and help organizations respond to security incidents in a timely manner.</li><li>Integration with SIEM systems enhances visibility and enables comprehensive analysis of security events across the SharePoint environment.</li></ul></div></div>
</div></div></div></div></div><div data-element-id="elm_Dl-_Y1yczcyW21UWSmwBxQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_Dl-_Y1yczcyW21UWSmwBxQ"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_NuqgWUMAh2KDIaqnZHA_lQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_NuqgWUMAh2KDIaqnZHA_lQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm__WJH6AFz45DLlAMd5JBGDA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm__WJH6AFz45DLlAMd5JBGDA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_aNGx42C8U8F35zp-BHkCKA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_aNGx42C8U8F35zp-BHkCKA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">8. Secure external Sharing</span><br></h2></div>
<div data-element-id="elm_Z32HCptWZ-yVBtg3gaxLCw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Z32HCptWZ-yVBtg3gaxLCw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="color:inherit;"><span style="font-size:11pt;">Implementing secure external sharing practices helps prevent unauthorized access to sensitive information shared with external users.</span></span><br></p></div></div></div>
</div><div data-element-id="elm_gXx8DericCxhcrZQYtw5KQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_gXx8DericCxhcrZQYtw5KQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Consider the following recommendations:</span></p><ul><li>Configure external sharing settings to restrict access to specific domains, email addresses, or groups.</li><li>Implement expiration dates and access controls for shared links to limit the lifespan and scope of external sharing.</li><li>Enforce authentication requirements, such as requiring external users to sign in with a Microsoft or third-party identity provider, to verify their identities and control access to shared content.</li></ul></div></div></div></div>
</div><div data-element-id="elm_pWqjDkw1r38IYtD6R44S2A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_pWqjDkw1r38IYtD6R44S2A"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><div><div><p><span style="font-weight:700;color:rgba(52, 73, 94, 0.7);">Key Takeaways:</span></p><ul><li><span style="color:rgba(52, 73, 94, 0.7);">Secure external sharing practices help organizations maintain control over shared content and protect sensitive information from unauthorized disclosure.</span></li><li><span style="color:rgba(52, 73, 94, 0.7);">Enforcing authentication requirements enhances security and ensures that only authorized external users can access shared resources.</span></li></ul></div>
</div></div></div></div></div></div></div></div><div data-element-id="elm_YpIcfe7RMBM9jmWhC5LT5g" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_YpIcfe7RMBM9jmWhC5LT5g"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_2XtFlVZpFvhDypojczGS9w" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_2XtFlVZpFvhDypojczGS9w"].zprow{ border-radius:1px; } </style><div data-element-id="elm_X-g7MbUmaRJILcfvqeRLeg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_X-g7MbUmaRJILcfvqeRLeg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_HphuCj2CCvDNBwXmTJdAyg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_HphuCj2CCvDNBwXmTJdAyg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">9. Network Segmentation</span><br></h2></div>
<div data-element-id="elm_oNy34yE1RazDfUVZ9qjc3w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oNy34yE1RazDfUVZ9qjc3w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><p>Network segmentation is the practice of dividing a computer network into smaller, isolated segments or subnetworks to improve security, performance, and manageability. By segmenting a network, organizations can control the flow of traffic, limit access to sensitive resources, and contain the impact of security breaches or unauthorized access attempts.</p></div></div></div></div>
</div><div data-element-id="elm_8m9-guyFfhjmTPFiDADBfQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_8m9-guyFfhjmTPFiDADBfQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">In the context of SharePoint security, consider:</span></p><ul><li>Segregating SharePoint servers into dedicated network segments or VLANs to isolate them from other parts of the network.</li><li>Implementing firewalls and access control lists (ACLs) to restrict traffic between network segments and enforce security policies.</li><li>Applying network segmentation principles to SharePoint farms, service applications, and databases to minimize the impact of security breaches or unauthorized access.</li></ul></div></div></div></div>
</div><div data-element-id="elm_PFEd2ng4-nSK1K9dXQ9JXg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_PFEd2ng4-nSK1K9dXQ9JXg"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>Network segmentation helps contain potential security breaches and reduce the impact of unauthorized access or malicious activities.</li><li>Segregation of SharePoint resources can help limit lateral movement and prevent the spread of security threats within the environment.</li></ul></div>
</div></div></div></div></div></div></div></div><div data-element-id="elm_iGRJpWbOKWMizltHB_n7dg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_iGRJpWbOKWMizltHB_n7dg"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_BdKyFDSOAePHxDAEupwe_g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_BdKyFDSOAePHxDAEupwe_g"].zprow{ border-radius:1px; } </style><div data-element-id="elm_AzZ50k5-UsGE-b0KCOzpiw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_AzZ50k5-UsGE-b0KCOzpiw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_DmHmmRt5aGL73siYLOmu_A" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_DmHmmRt5aGL73siYLOmu_A"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">10. Incident Response Plan</span><br></h2></div>
<div data-element-id="elm_3oBFtK4i842jRfpPRYNTUA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_3oBFtK4i842jRfpPRYNTUA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="color:inherit;"><span style="font-size:11pt;">Developing and maintaining an incident response plan helps organizations effectively detect, respond to, and recover from security incidents affecting SharePoint.</span></span><br></p></div></div></div>
</div><div data-element-id="elm_605rfgOcSOJu68ILGuVVhA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_605rfgOcSOJu68ILGuVVhA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Consider the following elements:</span></p><ul><li>Establish an incident response team with defined roles, responsibilities, and communication channels.</li><li>Document incident response procedures, including escalation paths, notification requirements, and evidence preservation protocols.</li><li>Conduct regular tabletop exercises and simulations to test the effectiveness of the incident response plan and identify areas for improvement.</li><li>Continuously review and update the incident response plan based on lessons learned from past incidents, changes in the threat landscape, and regulatory requirements.</li></ul></div></div></div></div>
</div><div data-element-id="elm_ouI5539HZzOl67FtY5A3TA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ouI5539HZzOl67FtY5A3TA"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>An incident response plan helps organizations minimize the impact of security incidents and restore normal operations in a timely manner.</li><li>Regular testing and refinement of the incident response plan ensure preparedness and readiness to respond effectively to security threats and incidents.</li></ul></div>
</div></div></div></div></div></div></div></div><div data-element-id="elm_wiD-zFybyQxO-PuYVsso6g" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_wiD-zFybyQxO-PuYVsso6g"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_7Q5fBM_BQWihQ025SfYf2g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_7Q5fBM_BQWihQ025SfYf2g"].zprow{ border-radius:1px; } </style><div data-element-id="elm_xLasTE9Jqi53teBr4CoEig" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_xLasTE9Jqi53teBr4CoEig"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_XuJteKjAyghzKXtkVYO-UQ" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_XuJteKjAyghzKXtkVYO-UQ"] .zpimageheadingtext-container figure img { width: 137px !important ; height: 150.2px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_XuJteKjAyghzKXtkVYO-UQ"] .zpimageheadingtext-container figure img { width:137px ; height:150.2px ; } } @media (max-width: 767px) { [data-element-id="elm_XuJteKjAyghzKXtkVYO-UQ"] .zpimageheadingtext-container figure img { width:137px ; height:150.2px ; } } [data-element-id="elm_XuJteKjAyghzKXtkVYO-UQ"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/GT_icon_gr-1.png" data-src="/Blog%20Site/GT_icon_gr-1.png" width="137" height="150.2" loading="lazy" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true">Conclusion</h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><p><span style="color:inherit;">In conclusion, safeguarding your SharePoint Intranet requires a holistic approach that encompasses user authentication, encryption, data loss prevention, auditing, backup procedures, and user education. By incorporating these security best practices into your Intranet management strategy, you can create a resilient and secure digital environment that protects your organization's valuable assets. Remember, proactive measures are key to staying ahead of potential threats in the ever-evolving landscape of cybersecurity.</span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">Looking to fortify your SharePoint Intranet and bolster your organization's security defenses? Partner with GTconsult, a Microsoft Solutions Partner for Modern Work, and leverage A Team Protection for expert guidance and tailored solutions. Safeguard your valuable assets with our comprehensive security services. Let GTconsult be your trusted ally in navigating the complex landscape of SharePoint security. Contact us today to discuss your security needs and take proactive steps towards a resilient and secure digital environment.</span><span style="color:inherit;"><br></span></p></div></div>
</div></div></div><div data-element-id="elm_TAibQxMDBCWCgnaGl-zEMA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_TAibQxMDBCWCgnaGl-zEMA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="https://www.gtconsult.com/contact" target="_blank"><span class="zpbutton-content">I need GTconsult!</span></a></div>
</div><div data-element-id="elm_ma9DncK53uSGwm8XnXo6cA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_ma9DncK53uSGwm8XnXo6cA"] div.zpspacer { height:14px; } @media (max-width: 768px) { div[data-element-id="elm_ma9DncK53uSGwm8XnXo6cA"] div.zpspacer { height:calc(14px / 3); } } </style><div class="zpspacer " data-height="14"></div>
</div></div></div></div></div><div data-element-id="elm_hNxrNWWz_mr5gRqH20Xguw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg zpbackground-size-cover zpbackground-position-center-center zpbackground-repeat-all zpbackground-attachment-scroll " style="background-image:linear-gradient(to bottom, rgba(30, 34, 45, 0.8), rgba(30, 34, 45, 0.8)), url(https://static.zohocdn.com/sites/stock-images/images/zpstock-image-08.jpg);"><style type="text/css"> [data-element-id="elm_hNxrNWWz_mr5gRqH20Xguw"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_sIKsiAUtKkQLfIF2AjTPLA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_sIKsiAUtKkQLfIF2AjTPLA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_B_aiW12DuHPKcQbj8oEtrQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_B_aiW12DuHPKcQbj8oEtrQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_Rl9gbYg6XQfRZ25Ib7K55A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Rl9gbYg6XQfRZ25Ib7K55A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="text-align:center;"><span style="font-size:28px;font-weight:700;color:rgb(255, 255, 255);font-family:&quot;Noto Sans&quot;, sans-serif;">Keep Reading</span></p><p style="text-align:center;"><span style="font-weight:400;color:rgb(255, 255, 255);font-family:Nunito;">Check out our other blogs below:</span><br></p></div>
</div><div class="zpelement zpelem-carousel " data-element-id="elm_o6ZNTEATP6vjerleehZQdg" data-element-type="carousel" data-currentslide-index="0" data-transition="slide_left" data-slider-interval="5000" data-zs-autoslide="true" data-zs-slidepause-option="false" data-zs-slider="min-height-el: zpcarousel-content-container;arrow-cont: zpcarousel-arrows-container; active-controller: zpcarousel-controller-active; controller-cont: zpcarousel-controller-container; controller: zpcarousel-controller; right-arrow: zpcarousel-arrow-right; left-arrow: zpcarousel-arrow-left;active-slide:zpcarousel-content-active; slide: zpcarousel-content; slides-cont: zpcarousel-content-container;content-cont : zpcarousel-content-inner; background: false;slide-pause-btn:zpcarousel-pause-btn;slide-play-btn:zpcarousel-play-btn;"><div class="zpcarousel-container zpcarousel-style-01"><style></style><div class="zpcarousel-content-container"><div class="zpelement zpcarousel-content " data-element-type="carouselslide" data-element-id="elm_hOTLftfs755aUD5Bn9cFOA" data-slide-name="Slide 1"><div class="zpcarousel-content-inner"><div data-element-id="elm_bip4VbkFNza41hqIpGkTnA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_bip4VbkFNza41hqIpGkTnA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_x1BGrjYsPhYS8KYZ79_H9Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_x1BGrjYsPhYS8KYZ79_H9Q"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_S_4vaGooCvpb4RMFsWsABQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_S_4vaGooCvpb4RMFsWsABQ"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_S_4vaGooCvpb4RMFsWsABQ"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_S_4vaGooCvpb4RMFsWsABQ"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_S_4vaGooCvpb4RMFsWsABQ"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/kyles-take-the-recent-surge-in-sharepoint-malware-downloads" target="_blank" title="Kyle's take" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Security%20write%20up%20thumbnail.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">Kyle's Take: The recent surge in SharePoint Malware downloads</span></p></div>
</div></div></div><div data-element-id="elm_MsqyVhfg--AQrwbyzl0CRQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_MsqyVhfg--AQrwbyzl0CRQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_uW9SbxNRw8x4_UIVloRscA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_uW9SbxNRw8x4_UIVloRscA"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_uW9SbxNRw8x4_UIVloRscA"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_uW9SbxNRw8x4_UIVloRscA"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_uW9SbxNRw8x4_UIVloRscA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/creating-a-knowledge-base-in-sharepoint-your-complete-guide" target="_blank" title="Creating a knowledge base in SharePoint" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Knowledge%20base.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">Creating a knowledge base in SharePoint</span></p></div>
</div></div></div><div data-element-id="elm_Q-hf1DaElEMqubDgDmPlow" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_Q-hf1DaElEMqubDgDmPlow"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_lUj5flEzQQRL3KStx4isqg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_lUj5flEzQQRL3KStx4isqg"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_lUj5flEzQQRL3KStx4isqg"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_lUj5flEzQQRL3KStx4isqg"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_lUj5flEzQQRL3KStx4isqg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/let-s-talk-sharepoint-permissions" target="_blank" title="SharePoint Permissions" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Permissions%202.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">Let's talk SharePoint permissions</span><br></p></div>
</div></div></div></div></div></div><div class="zpelement zpcarousel-content " data-element-type="carouselslide" data-element-id="elm_9aM0Zrf0c1ROVCNi0bB2xg" data-slide-name="Slide 2"><div class="zpcarousel-content-inner"><div data-element-id="elm_WFeIiXndEL_eDNMj9lmVRw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_WFeIiXndEL_eDNMj9lmVRw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_jRAMosBEPIBd7PKI3iVVPg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_jRAMosBEPIBd7PKI3iVVPg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_ZcvDtdabosHAN0e4FPwwVg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_ZcvDtdabosHAN0e4FPwwVg"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_ZcvDtdabosHAN0e4FPwwVg"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_ZcvDtdabosHAN0e4FPwwVg"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_ZcvDtdabosHAN0e4FPwwVg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/micro-moments-macro-impact" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Chair%20Write%20Up.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;"><a href="https://www.gtconsult.com/blogs/post/micro-moments-macro-impact" title="Micro-moments, Macro-impact&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;" target="_blank" rel="" style="color:rgb(255, 255, 255);">Micro-moments, Macro-impact</a><a href="https://www.gtconsult.com/blogs/post/micro-moments-macro-impact" title="Micro-moments, Macro-impact&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;" target="_blank" rel=""><span style="color:rgb(255, 255, 255);">&nbsp;</span><span style="color:inherit;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></a><span style="color:inherit;">&nbsp; &nbsp; &nbsp; &nbsp;</span></span><br></p></div>
</div></div></div><div data-element-id="elm_kkKCWsuuUe65nh0HMXxvpg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_kkKCWsuuUe65nh0HMXxvpg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_zYL8S3e6lQXhE8105axshw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_zYL8S3e6lQXhE8105axshw"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_zYL8S3e6lQXhE8105axshw"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_zYL8S3e6lQXhE8105axshw"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_zYL8S3e6lQXhE8105axshw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/Expert-Insights-Why-and-How-to-Migrate-to-SharePoint-SE" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Migration%20Write%20Up%20Thumbnail%202.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">Expert insights: Why and how to migrate to SharePoint SE</span></p></div>
</div></div></div><div data-element-id="elm_p8G4Cy9APFZix_i6rCmcdw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_p8G4Cy9APFZix_i6rCmcdw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_4QsZD4n7xhMqkFSxdXtrSQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_4QsZD4n7xhMqkFSxdXtrSQ"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_4QsZD4n7xhMqkFSxdXtrSQ"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_4QsZD4n7xhMqkFSxdXtrSQ"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_4QsZD4n7xhMqkFSxdXtrSQ"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/powerapps-in-sharepoint" target="_blank" title="PowerApps" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Power%20Apps.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">PowerApps in SharePoint</span><br></p></div>
</div></div></div></div></div></div><div class="zpelement zpcarousel-content " data-element-type="carouselslide" data-element-id="elm_azJ7G-NY3n-mwrXtH5f4nQ" data-slide-name="Slide 3"><div class="zpcarousel-content-inner"><div data-element-id="elm_RIlW_Yv5Bp9iaIHDgDCFfw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_RIlW_Yv5Bp9iaIHDgDCFfw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_feQV2UdRRbOfXyoHfSMyqA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_feQV2UdRRbOfXyoHfSMyqA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_DwficQ1ays7UkzX60PLQdA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_DwficQ1ays7UkzX60PLQdA"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_DwficQ1ays7UkzX60PLQdA"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_DwficQ1ays7UkzX60PLQdA"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_DwficQ1ays7UkzX60PLQdA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/gtconsult-your-trusted-microsoft-solutions-partner-for-modern-work" target="_blank" title="Microsoft Partner" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Microsft%20Partner%20Thumbnail.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">GTconsult: Your trusted Microsoft<a href="https://www.gtconsult.com/blogs/post/gtconsult-your-trusted-microsoft-solutions-partner-for-modern-work" title="Microsoft partner" target="_blank" rel=""></a> Solutions Partner for Modern Work&nbsp;</span><br></p></div>
</div></div></div><div data-element-id="elm_21bjcSkuTocbCs1l7gplMg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_21bjcSkuTocbCs1l7gplMg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_oWiro0EGkoR95bkfXIPkpg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_oWiro0EGkoR95bkfXIPkpg"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_oWiro0EGkoR95bkfXIPkpg"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_oWiro0EGkoR95bkfXIPkpg"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_oWiro0EGkoR95bkfXIPkpg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/sharepoint-migration-checklist" target="_blank" title="Migration Check list" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Checklist%2016%20by%209.png" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><p><span style="font-size:20px;color:rgb(255, 255, 255);">SharePoint Migration Checklist<a href="https://www.gtconsult.com/sharepoint-migration-checklist" title="Migration Check list" target="_blank" rel=""></a></span><br></p><div style="color:inherit;"><span style="font-size:20px;"><br></span></div></div></div>
</div></div></div><div data-element-id="elm_nDK6PSFVPnRcVCLgTT8Heg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_nDK6PSFVPnRcVCLgTT8Heg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_vkg0CbfV4_Cl_Ltm7EgtjQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_vkg0CbfV4_Cl_Ltm7EgtjQ"] .zpimagetext-container figure img { width: 307px ; height: 172.57px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_vkg0CbfV4_Cl_Ltm7EgtjQ"] .zpimagetext-container figure img { width:723px ; height:406.40px ; } } @media (max-width: 767px) { [data-element-id="elm_vkg0CbfV4_Cl_Ltm7EgtjQ"] .zpimagetext-container figure img { width:415px ; height:233.27px ; } } [data-element-id="elm_vkg0CbfV4_Cl_Ltm7EgtjQ"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/cci-case-study" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/CCI%20Case%20Study.png" width="415" height="233.27" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">CCI Case Study</span><br></p><p><span style="color:inherit;"><span style="font-size:20px;"><br></span></span></p></div>
</div></div></div></div></div></div></div><div class="zpcarousel-arrows-container zpcarousel-arrow-type-01" data-arrow-style="2"><div class="zpcarousel-arrow-left" tabindex="0" role="button" aria-label="Previous"><svg aria-hidden="true" viewBox="0 0 32 32" xmlns="http://www.w3.org/2000/svg" class="svg-icon-18px"><path d="M0,16c0,0.3,0.1,0.5,0.3,0.7l9.9,10c0.4,0.4,1,0.4,1.4,0c0.4-0.4,0.4-1,0-1.4L3.4,17H31 c0.6,0,1-0.5,1-1s-0.4-1-1-1H3.4l8.2-8.3c0.4-0.4,0.4-1,0-1.4c-0.4-0.4-1-0.4-1.4,0l-9.9,10C0.1,15.5,0,15.7,0,16z"></path></svg></div>
<div class="zpcarousel-arrow-right" tabindex="0" role="button" aria-label="Next"><svg aria-hidden="true" viewBox="0 0 32 32" xmlns="http://www.w3.org/2000/svg" class="svg-icon-18px"><path id="arrow-right-style2-Arrow_Forward" d="M32,16c0-0.3-0.1-0.5-0.3-0.7l-9.9-10c-0.4-0.4-1-0.4-1.4,0c-0.4,0.4-0.4,1,0,1.4 l8.2,8.3H1c-0.6,0-1,0.5-1,1s0.4,1,1,1h27.6l-8.2,8.3c-0.4,0.4-0.4,1,0,1.4c0.4,0.4,1,0.4,1.4,0l9.9-10C31.9,16.5,32,16.3,32,16z"></path></svg></div>
</div><div class="zpcarousel-controller-container zpcarousel-controller-type-01"><svg class="zpcarousel-pause-btn" tabindex="0" role="button" aria-label="Pause" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 14 14"><path d="M3.85.53C3.6.5 3.34.5 3.07.5 1.68.5.95 1.09.95 2.18V12c.03.74.56 1.32 1.44 1.44.53.07 1.11.07 1.64 0 .9-.13 1.42-.72 1.42-1.5V2.07c0-.09 0-.18-.03-.28-.1-.66-.75-1.17-1.59-1.26h.01ZM11.43.53C11.18.5 10.92.5 10.65.5c-1.39 0-2.12.59-2.12 1.68V12c.03.74.56 1.32 1.44 1.44.53.07 1.11.07 1.64 0 .9-.13 1.42-.72 1.42-1.5V2.07c0-.09 0-.18-.03-.28-.1-.66-.75-1.17-1.59-1.26h.01Z"/></svg><svg class="zpcarousel-play-btn" tabindex="0" role="button" aria-label="Play" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 14 14"><path d="M.59 7.02C.57 5.33.57 3.63.51 1.94.45.63 1.72-.17 2.9.45c3.2 1.68 6.42 3.32 9.64 4.96.59.3.95.76.96 1.43 0 .66-.34 1.11-.91 1.43-3.18 1.75-6.35 3.5-9.52 5.25-1.2.66-2.39-.04-2.41-1.41C.63 10.42.61 8.72.59 7.03Z"/></svg><div class="zpcarousel-controller zpcarousel-controller-active" data-slide-index="0"></div>
<div class="zpcarousel-controller " data-slide-index="1"></div><div class="zpcarousel-controller " data-slide-index="2"></div>
</div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 13 Feb 2024 13:25:29 +0000</pubDate></item><item><title><![CDATA[Let's Talk SharePoint Permissions]]></title><link>https://www.gtconsult.com/blogs/post/let-s-talk-sharepoint-permissions</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/Permissions 2.jpg"/>A write up highlighting SharePoint Permissions. Their levels and best practices.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_s32Kj6seR-6lEHqd3AokYw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_HBBAnBN4Q3qvdTWlh7VVCQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_AHlE6aJ0RDeIy9NyWoSFww" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdark-section zpdark-section-bg zpbackground-size-cover zpbackground-position-center-center zpbackground-repeat-all zpbackground-attachment-scroll "><style type="text/css"> [data-element-id="elm_AHlE6aJ0RDeIy9NyWoSFww"].zpelem-col{ background-image:linear-gradient(to bottom, rgba(30,34,45,0.8), rgba(30,34,45,0.8)), url(https://static.zohocdn.com/sites/stock-images/images/zpstock-image-08.jpg); border-radius:1px; } </style><div data-element-id="elm_WqD6SfGaRyKg3Khn60e7xg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_WqD6SfGaRyKg3Khn60e7xg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Things to consider when it comes to SharePoint Permissions</span></h2></div>
<div data-element-id="elm_8IZO-0qURMyHpMWCaVJptA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_8IZO-0qURMyHpMWCaVJptA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;">When it comes to your sharepoint environment, access control is an important piece to the puzzle.&nbsp;</span><span style="color:inherit;">Our blog dives into the nitty-gritty of SharePoint permissions, looking at the secrets to keeping your data safe and sound. Learn the ropes of permission levels, avoid the chaos of universal access, and get the lowdown on best practices. Let's master the art of control together!&nbsp;</span><br></p></div>
</div></div></div></div></div><div data-element-id="elm_-DOMy1kTby4oaB-3US3EJw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_-DOMy1kTby4oaB-3US3EJw"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_U6jL4IuL6kGDzwTGQmAl7Q" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_U6jL4IuL6kGDzwTGQmAl7Q"].zprow{ border-radius:1px; } </style><div data-element-id="elm_XWUrCmzx03UvYHGcyDNGSQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_XWUrCmzx03UvYHGcyDNGSQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_f-wJynKbYCCggCqI9NPG-w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_f-wJynKbYCCggCqI9NPG-w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div>A big factor that people often consider when setting up their SharePoint intranet/environment is access. Access control plays a critical role in both maintaining data integrity and ensuring that company information is kept safe and only dealt with by relevant parties.</div></div><p>&nbsp;</p><p>This is why SharePoint Permissions play a crucial role in access control. Before we look at best practices, let’s look at the default permissions.</p></div></div>
</div><div data-element-id="elm_DKbUgkq5TGz817DxMVpiAw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_DKbUgkq5TGz817DxMVpiAw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-weight:800;color:rgb(0, 27, 76);">Default Permission levels:</span><br></h2></div>
<div data-element-id="elm_egZ-hIr7bbyWjHX4CTe8JA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_egZ-hIr7bbyWjHX4CTe8JA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>In SharePoint, permission levels define what actions users can perform within a site, library, or list. Each permission level has a set of permissions associated with it.</p><p>&nbsp;</p><p>Default permission levels offer a convenient and efficient way to assign standard permission levels to individual users or groups. You have the flexibility to modify any of the default permission levels, with the exception of <i>Full Control</i> and <i>Limited Access</i>. These two levels are elaborated further in the accompanying table.</p><p><br></p><div style="color:inherit;"><p>Let’s look at a break down of these permissions in the table below:</p></div></div></div>
</div><div data-element-id="elm_1fEbg6Bm6e5enrva0LN_LQ" data-element-type="table" class="zpelement zpelem-table "><style type="text/css"> [data-element-id="elm_1fEbg6Bm6e5enrva0LN_LQ"].zpelem-table{ background-color:#001b4c; background-image:unset; border-radius:1px; } [data-element-id="elm_1fEbg6Bm6e5enrva0LN_LQ"] .zptable{ width:100% !important; } </style><div class="zptable zptable-align-left zptable-header- zptable-header-none zptable-cell-outline-on zptable-outline-on zptable-style- " data-width="100" data-editor="true"><table><tbody><tr><td style="text-align:center;width:19.9099%;"><span style="color:rgb(166, 206, 57);font-size:16px;font-weight:700;">Permission level </span></td><td style="text-align:center;width:79.009%;"><span style="color:rgb(166, 206, 57);font-size:16px;"> <span style="font-weight:700;">Details</span></span></td></tr><tr><td style="width:19.9099%;"><span style="color:rgb(255, 255, 255);"> <span style="font-size:11pt;">Full control</span></span></td><td style="width:79.009%;"><span style="color:rgb(255, 255, 255);"> <span style="font-size:13px;font-family:Raleway, sans-serif;font-weight:100;">Contains all available SharePoint permissions. By default, this permission level is assigned to the Owners group. It can't be customized or deleted.</span></span></td></tr><tr><td style="width:19.9099%;"><span style="color:rgb(255, 255, 255);"> <span style="font-size:11pt;">Design</span></span></td><td style="width:79.009%;"><span style="color:rgb(255, 255, 255);"> <span style="font-family:Raleway, sans-serif;font-weight:100;"><span style="font-size:13px;">Create lists and document libraries, edit pages and apply themes, borders, and style sheets on the site. There is no SharePoint group that is assigned this permission level automatically.</span></span></span></td></tr><tr><td style="width:19.9099%;"><span style="color:rgb(255, 255, 255);"> <span style="font-size:11pt;">Edit</span></span></td><td style="width:79.009%;"><span style="color:rgb(255, 255, 255);"> <span style="font-size:13px;font-family:Raleway, sans-serif;font-weight:100;">Add, edit, and delete lists; view, add, update, and delete list items and documents. By default, this permission level is assigned to the Members group.</span></span></td></tr><tr><td style="width:19.9099%;"><span style="color:rgb(255, 255, 255);"> <span style="font-size:11pt;">Contribute</span></span></td><td style="width:79.009%;"><span style="color:rgb(255, 255, 255);"> <span style="font-family:Raleway, sans-serif;font-size:13px;font-weight:100;">View, add, update, and delete list items and documents.</span></span></td></tr><tr><td style="width:19.9099%;"><span style="color:rgb(255, 255, 255);"> <span style="font-size:11pt;">Read</span></span></td><td style="width:79.009%;"><span style="color:rgb(255, 255, 255);"> <span style="font-size:13px;font-family:Raleway, sans-serif;font-weight:100;">View pages and items in existing lists and document libraries and download documents.</span></span></td></tr><tr><td style="width:19.9099%;"><span style="color:rgb(255, 255, 255);"> <span style="font-size:11pt;">Limited Access</span></span></td><td style="width:79.009%;"><span style="color:rgb(255, 255, 255);"> <span style="font-size:13px;font-family:Raleway, sans-serif;font-weight:100;">Enables a user or group to browse to a site page or library to access a specific content item when they do not have permissions to open or edit any other items in the site or library. This level is automatically assigned by SharePoint when you provide access to one specific item. You cannot assign Limited Access permissions directly to a user or group yourself. Instead, when you assign edit or open permissions to the single item, SharePoint automatically assigns Limited Access to other required locations, such as the site or library in which the single item is located. This allows SharePoint to render the user interface correctly and show the user some context around their location in the site. Limited Access does not grant any additional permissions to the user, so they can't see or access any other content.</span></span></td></tr><tr><td style="width:19.9099%;"><span style="color:rgb(255, 255, 255);"> <span style="font-size:11pt;">Web-only Limited Access</span></span></td><td style="width:79.009%;"><span style="color:rgb(255, 255, 255);"> <span style="font-size:13px;font-family:Raleway, sans-serif;font-weight:100;">Web-Only Limited access is a variant of the ‘Limited Access’ permission level which enables users’ access to the web object only.</span></span></td></tr><tr><td style="width:19.9099%;"><span style="color:rgb(255, 255, 255);"> <span style="font-size:11pt;">Approve</span></span></td><td style="width:79.009%;"><span style="color:rgb(255, 255, 255);font-family:Raleway, sans-serif;"> <span style="font-size:10.5pt;"><span style="font-size:13px;font-weight:100;">Edit and approve pages, list items, and documents. By default, the&nbsp;</span><em><span style="font-size:13px;font-weight:100;">Approvers</span></em><span style="font-size:13px;"><span style="font-weight:100;">&nbsp;group has this permission.</span></span></span></span></td></tr><tr><td style="width:19.9099%;"><span style="color:rgb(255, 255, 255);"> <span style="font-size:11pt;">Manage Hierarchy</span></span></td><td style="width:79.009%;"><span style="color:rgb(255, 255, 255);font-family:Raleway, sans-serif;font-size:13px;font-weight:100;">Create sites and edit pages, list items, and documents. By default, this permission level is assigned to the Hierarchy Managers group. </span></td></tr><tr><td style="width:19.9099%;"><span style="color:rgb(255, 255, 255);"> <span style="font-size:11pt;">Restricted Read</span></span></td><td style="width:79.009%;"><span style="color:rgb(255, 255, 255);font-family:Raleway, sans-serif;"> <span style="font-size:13px;font-weight:100;">View pages and documents, but not historical versions or user permissions.</span></span></td></tr><tr><td style="width:19.9099%;" class="zp-selected-cell"><span style="color:rgb(255, 255, 255);"> <span style="font-size:13px;font-weight:400;">View Only</span></span></td><td style="width:79.009%;"><span style="color:rgb(255, 255, 255);font-family:Raleway, sans-serif;"> </span><span style="font-size:10.5pt;"><span style="color:rgb(255, 255, 255);font-family:Raleway, sans-serif;"><span style="font-size:13px;">View pages, items, and documents. Any document that has a server-side file handler can be vie</span><span style="font-size:13px;">wed in the browser but not downloaded. File types that do not have a server-side file handler (cannot be opened in the browser), such as video files and .png files, can still be downloade</span></span><span style="color:rgba(206, 221, 243, 0.15);"><span style="font-family:Raleway, sans-serif;"><span style="font-size:13px;"><span>d</span></span></span>.</span></span></td></tr></tbody></table></div>
</div><div data-element-id="elm_hp8q-N2HhFuOkaDFZjJxYw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_hp8q-N2HhFuOkaDFZjJxYw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Learn More:&nbsp;<a href="https://learn.microsoft.com/en-us/sharepoint/understanding-permission-levels">https://learn.microsoft.com/en-us/sharepoint/understanding-permission-levels</a></p></div>
</div><div data-element-id="elm_kn1fdbACu51Wl1oZxuQRdA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_kn1fdbACu51Wl1oZxuQRdA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-weight:800;">SharePoint Permissions Best Practices</span><br></h2></div>
<div data-element-id="elm_rvnfzsQ97nOmFsBKwPWViA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_rvnfzsQ97nOmFsBKwPWViA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">When it comes to SharePoint Administration, managing permissions effectively is key to ensuring data security and streamlining collaborations. Let’s have a look at best practices for SharePoint Permissions to ensure a secure and efficient environment for your organization.</span><br></p></div>
</div></div></div></div></div><div data-element-id="elm_cSYqDVgUfsJqXY-dpOKMkw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_cSYqDVgUfsJqXY-dpOKMkw"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_00T1HiyqlXVDIjq20YODrw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_p_IcpL9ElYRKV4Kh4VsUGQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_iD-IdXzbdpivbv2jG0Yu9w" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_iD-IdXzbdpivbv2jG0Yu9w"] .zpimage-container figure img { width: 350px ; height: 233.41px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_iD-IdXzbdpivbv2jG0Yu9w"] .zpimage-container figure img { width:723px ; height:482.15px ; } } @media (max-width: 767px) { [data-element-id="elm_iD-IdXzbdpivbv2jG0Yu9w"] .zpimage-container figure img { width:415px ; height:276.75px ; } } [data-element-id="elm_iD-IdXzbdpivbv2jG0Yu9w"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/abstract-networking-concept-still-life-arrangement.jpg" width="415" height="276.75" loading="lazy" size="fit"/></picture></span></figure></div>
</div><div data-element-id="elm_5mPX1g_nKDOxbfcUZm_xcA" data-element-type="box" class="zpelem-box zpelement zpbox-container zspadding-space-allside-thin zplight-section zplight-section-bg "><style type="text/css"></style><div data-element-id="elm_fmzPwoFfvUJFbsqB_biePQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_fmzPwoFfvUJFbsqB_biePQ"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">1. <span style="color:inherit;">Understand SharePoint Groups and Roles</span></h4></div>
<div data-element-id="elm_yEHyEV5mlxAN-teT0svjmg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_yEHyEV5mlxAN-teT0svjmg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>SharePoint provides <a href="https://learn.microsoft.com/en-us/sharepoint/default-sharepoint-groups" title="Default SharePoint Groups" target="_blank" rel="">pred</a><a href="https://learn.microsoft.com/en-us/sharepoint/default-sharepoint-groups" title="Default SharePoint Groups" target="_blank" rel="">efined groups and roles</a> that simplify permission management. Familiarize yourself with these groups, such as Owners, Members, and Visitors, and roles like Read, Contribute, and Full Control. Leverage these built-in structures to assign permissions at various levels.</p></div>
</div></div></div></div><div data-element-id="elm_0y_sZtGX4rTpSR8_qOyH2g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm__rFLoedyxbyA71iSwld83Q" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm__rFLoedyxbyA71iSwld83Q"] .zpimage-container figure img { width: 350px ; height: 233.41px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm__rFLoedyxbyA71iSwld83Q"] .zpimage-container figure img { width:723px ; height:482.15px ; } } @media (max-width: 767px) { [data-element-id="elm__rFLoedyxbyA71iSwld83Q"] .zpimage-container figure img { width:415px ; height:276.75px ; } } [data-element-id="elm__rFLoedyxbyA71iSwld83Q"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/black-businessman-happy-expression.jpg" width="415" height="276.75" loading="lazy" size="fit"/></picture></span></figure></div>
</div><div data-element-id="elm_XWg6Co-7MdSDZpyPdPi0Rw" data-element-type="box" class="zpelem-box zpelement zpbox-container zspadding-space-allside-thin zplight-section zplight-section-bg "><style type="text/css"></style><div data-element-id="elm_Uzub3EI2TqrJKx09cSC1JQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Uzub3EI2TqrJKx09cSC1JQ"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><p>2.<span style="font-size:7pt;">&nbsp;&nbsp;</span>Follow the Principle of Least Privilege</p></div></h4></div>
<div data-element-id="elm_RmpTYW5ckyHchc98wyND0w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_RmpTYW5ckyHchc98wyND0w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>Grant users the <a href="https://learn.microsoft.com/en-us/sharepoint/security-for-sharepoint-server/plan-for-least-privileged-administration" title="Learn more about least privilege" target="_blank" rel="">minimum permissions</a> necessary to perform their tasks. Avoid assigning broad permissions to entire groups when more granular control is possible. This reduces the risk of unauthorized access and data breaches.</p><p><br></p></div>
</div></div></div></div><div data-element-id="elm_URbF0CVn_VaI5jqRhIUgsg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_SU4zabNcWHyHMbdZ_AZ1-Q" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_SU4zabNcWHyHMbdZ_AZ1-Q"] .zpimage-container figure img { width: 350px ; height: 233.41px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_SU4zabNcWHyHMbdZ_AZ1-Q"] .zpimage-container figure img { width:723px ; height:482.15px ; } } @media (max-width: 767px) { [data-element-id="elm_SU4zabNcWHyHMbdZ_AZ1-Q"] .zpimage-container figure img { width:415px ; height:276.75px ; } } [data-element-id="elm_SU4zabNcWHyHMbdZ_AZ1-Q"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/document-management-concept-businessman-using-comp1700056320770.jpeg" width="415" height="276.75" loading="lazy" size="fit"/></picture></span></figure></div>
</div><div data-element-id="elm_XHvP3A2uI-9MV_pzuo7EDQ" data-element-type="box" class="zpelem-box zpelement zpbox-container zspadding-space-allside-thin zplight-section zplight-section-bg "><style type="text/css"></style><div data-element-id="elm_eNcQCS_oCl3QXjb7Eho3iQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_eNcQCS_oCl3QXjb7Eho3iQ"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><p>3.<span style="font-size:7pt;">&nbsp;</span>Use SharePoint Inheritance Wisely</p></div></h4></div>
<div data-element-id="elm_3LYdlkHIQxr1aVrsZDr4-Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_3LYdlkHIQxr1aVrsZDr4-Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>SharePoint follows an <a href="https://support.microsoft.com/en-us/office/customize-permissions-for-a-sharepoint-list-or-library-02d770f3-59eb-4910-a608-5f84cc297782" title="SharePoint Permissions" target="_blank" rel="">inheritance</a> model where permissions applied at a higher level (e.g., site collection) trickle down to lower levels (e.g., subsites, libraries, and documents). Be mindful of this inheritance and avoid breaking it unnecessarily, as it can complicate permission management.</p></div>
</div></div></div></div></div><div data-element-id="elm_605_LsqqUSoh5Z1eXtkUZg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_lliTOd6PlhbXrz749up5OQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_wJlzAvZzM8yVJRq8TFnJ1g" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_wJlzAvZzM8yVJRq8TFnJ1g"] .zpimage-container figure img { width: 350px ; height: 233.41px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_wJlzAvZzM8yVJRq8TFnJ1g"] .zpimage-container figure img { width:723px ; height:482.15px ; } } @media (max-width: 767px) { [data-element-id="elm_wJlzAvZzM8yVJRq8TFnJ1g"] .zpimage-container figure img { width:415px ; height:276.75px ; } } [data-element-id="elm_wJlzAvZzM8yVJRq8TFnJ1g"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/security-protection-hologram.jpg" width="415" height="276.75" loading="lazy" size="fit"/></picture></span></figure></div>
</div><div data-element-id="elm_dwa5LH7yv-8fljZUpUpQSA" data-element-type="box" class="zpelem-box zpelement zpbox-container zspadding-space-allside-thin zplight-section zplight-section-bg "><style type="text/css"></style><div data-element-id="elm_eTcqypoH2RyhYtGYQkg6bw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">4. Create Unique Permissions Sparingly</span></h4></div>
<div data-element-id="elm_P1SW3y1go_2umDvAXI5l9Q" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>While unique<a href="https://support.microsoft.com/en-us/office/customize-permissions-for-a-sharepoint-list-or-library-02d770f3-59eb-4910-a608-5f84cc297782" title="SharePoint Permissions" target="_blank" rel=""> permissions</a> offer flexibility, their overuse can lead to complexity. Reserve unique permissions for specific scenarios, such as when standard inheritance does not meet security or collaboration needs. Regularly review and clean up unique permissions to avoid unnecessary complications.</p></div>
</div></div></div></div><div data-element-id="elm_HbjGNWbG1rON7mtDBfDqyQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_M4rIBLPHGbVvLFk73rTAuQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_M4rIBLPHGbVvLFk73rTAuQ"] .zpimage-container figure img { width: 350px ; height: 233.41px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_M4rIBLPHGbVvLFk73rTAuQ"] .zpimage-container figure img { width:723px ; height:482.15px ; } } @media (max-width: 767px) { [data-element-id="elm_M4rIBLPHGbVvLFk73rTAuQ"] .zpimage-container figure img { width:415px ; height:276.75px ; } } [data-element-id="elm_M4rIBLPHGbVvLFk73rTAuQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/black-businessman-using-computer-laptop.jpg" width="415" height="276.75" loading="lazy" size="fit"/></picture></span></figure></div>
</div><div data-element-id="elm_OIY5DteubJimqYOwzF7I8w" data-element-type="box" class="zpelem-box zpelement zpbox-container zspadding-space-allside-thin zplight-section zplight-section-bg "><style type="text/css"></style><div data-element-id="elm_Nwn3mWYun3_pB0oC81vqBg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><p>5.<span style="font-size:7pt;">&nbsp;&nbsp;</span>Regularly Review and Audit Permissions</p></div></h4></div>
<div data-element-id="elm_kFQZJbbVLvBk83pUB84EdA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>Conduct regular reviews of SharePoint permissions to ensure alignment with organizational changes. Use SharePoint's <a href="https://support.microsoft.com/en-us/office/customize-permissions-for-a-sharepoint-list-or-library-02d770f3-59eb-4910-a608-5f84cc297782" title="Access Checker" rel="">Access Checker</a>&nbsp;and <a href="https://support.microsoft.com/en-us/office/view-audit-log-reports-b37c5869-1b47-4a82-a30d-ea20070fe527" title="Audit Logs" target="_blank" rel="">Audit Logs</a>&nbsp; to identify potential security risks. Remove outdated permissions for users who have changed roles or left the organization.</p></div>
</div></div></div></div><div data-element-id="elm_1EfShPpdZnmPSqLrKq7Opg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_hlxLiCFLS-V1_PLij_C6YA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_hlxLiCFLS-V1_PLij_C6YA"] .zpimage-container figure img { width: 350px ; height: 233.41px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_hlxLiCFLS-V1_PLij_C6YA"] .zpimage-container figure img { width:723px ; height:482.15px ; } } @media (max-width: 767px) { [data-element-id="elm_hlxLiCFLS-V1_PLij_C6YA"] .zpimage-container figure img { width:415px ; height:276.75px ; } } [data-element-id="elm_hlxLiCFLS-V1_PLij_C6YA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/networking-concept-still-life-arrangement.jpg" width="415" height="276.75" loading="lazy" size="fit"/></picture></span></figure></div>
</div><div data-element-id="elm_fkuK4uZHfv5inJ-7D5_mQQ" data-element-type="box" class="zpelem-box zpelement zpbox-container zspadding-space-allside-thin zplight-section zplight-section-bg "><style type="text/css"></style><div data-element-id="elm_uoFN0ql20Jm4SbuqkK1puQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><p>6.<span style="font-size:7pt;">&nbsp;&nbsp;</span>Implement Role-Based Access Control (RBAC)</p></div></h4></div>
<div data-element-id="elm_Awb3Cn2ox53n7o2pBIuJ1g" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>Define <a href="https://learn.microsoft.com/en-us/sharepoint/dev/general-development/authorization-users-groups-and-the-object-model-in-sharepoint" title="Authorization, users, groups, and the object model in SharePoint" target="_blank" rel="">roles based on job functions</a> and responsibilities within the organization. Assign permissions to these roles, streamlining onboarding processes for new employees and simplifying permission management as users move within the organization.</p><p><br></p></div>
</div></div></div></div></div></div></div><div data-element-id="elm_HFqsNXkUT2l17Om8C0NFtA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_118odkwSgB8Go-GZZYsEww" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_qBXnT5CigSK60KpveGFW8g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_NvYB7h8S49nqh146CXkhVw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_NvYB7h8S49nqh146CXkhVw"] .zpimage-container figure img { width: 350px ; height: 233.41px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_NvYB7h8S49nqh146CXkhVw"] .zpimage-container figure img { width:723px ; height:482.15px ; } } @media (max-width: 767px) { [data-element-id="elm_NvYB7h8S49nqh146CXkhVw"] .zpimage-container figure img { width:415px ; height:276.75px ; } } [data-element-id="elm_NvYB7h8S49nqh146CXkhVw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/medium-shot-people-learning-together-office.jpg" width="415" height="276.75" loading="lazy" size="fit"/></picture></span></figure></div>
</div><div data-element-id="elm_mDZtnaRy4kqRH8dHGxtDog" data-element-type="box" class="zpelem-box zpelement zpbox-container zspadding-space-allside-thin zplight-section zplight-section-bg "><style type="text/css"></style><div data-element-id="elm_Huzm_OFLBWjFGjKE2DZGWg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><p>7.<span style="font-size:7pt;">&nbsp; </span>Educate Users on SharePoint Security</p></div></h4></div>
<div data-element-id="elm_s6NtkPLy_HqZsCmYhoOGiw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>User awareness is crucial. Provide training on secure practices, emphasizing features like versioning, check-in/check-out, and document metadata. Remind users to log out when done working to prevent unauthorized access. Foster a culture of data security and compliance.</p><p>&nbsp;</p><p>You could include or add this information in your <a href="https://www.gtconsult.com/blogs/post/creating-a-knowledge-base-in-sharepoint-your-complete-guide" title="Creating a knowledge base in SharePoint" target="_blank" rel="">knowledge base</a> on your SharePoint intranet so that users can always go back to double check the information.</p></div>
</div></div></div></div><div data-element-id="elm_5AWhVq6M-Um0d8ilobbFvw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_OQhbm2xXnoZmIRnl0RKTuA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_OQhbm2xXnoZmIRnl0RKTuA"] .zpimage-container figure img { width: 350px ; height: 232.09px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_OQhbm2xXnoZmIRnl0RKTuA"] .zpimage-container figure img { width:723px ; height:479.44px ; } } @media (max-width: 767px) { [data-element-id="elm_OQhbm2xXnoZmIRnl0RKTuA"] .zpimage-container figure img { width:415px ; height:275.20px ; } } [data-element-id="elm_OQhbm2xXnoZmIRnl0RKTuA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/standard-quality-control-collage-concept%20-2-.jpg" width="415" height="275.20" loading="lazy" size="fit"/></picture></span></figure></div>
</div><div data-element-id="elm_AL1FJS6cgiHBqHRlfD1AdQ" data-element-type="box" class="zpelem-box zpelement zpbox-container zspadding-space-allside-thin zplight-section zplight-section-bg "><style type="text/css"></style><div data-element-id="elm_waaHCuirj6zlSRGlacvDVQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><p>8.<span style="font-size:7pt;">&nbsp;</span>&nbsp;Utilize SharePoint Security Groups</p></div></h4></div>
<div data-element-id="elm_4T0pXem7V54amCW_Oxe3pQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>Create <a href="https://learn.microsoft.com/en-us/sharepoint/sites/overview-of-security-groups-in-sharepoint-server" title="Security groups" target="_blank" rel="">security groups</a> for departments, projects, or job functions. Adding users to these groups streamlines permission management, allowing for consistent access control updates. It simplifies administration by updating security groups instead of individual user permissions.</p><p><br></p><p><br></p><p><br></p><p><br></p><p><br></p></div>
</div></div></div></div><div data-element-id="elm_w6X9fadMSTS8Zunow8WQuA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_Ih8aqakhtCYWy7NBFpSTOg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_Ih8aqakhtCYWy7NBFpSTOg"] .zpimage-container figure img { width: 350px ; height: 229.91px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_Ih8aqakhtCYWy7NBFpSTOg"] .zpimage-container figure img { width:723px ; height:474.92px ; } } @media (max-width: 767px) { [data-element-id="elm_Ih8aqakhtCYWy7NBFpSTOg"] .zpimage-container figure img { width:415px ; height:272.60px ; } } [data-element-id="elm_Ih8aqakhtCYWy7NBFpSTOg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/please-wait-loading-waitng-trasfer-anticipation-concept.jpg" width="415" height="272.60" loading="lazy" size="fit"/></picture></span></figure></div>
</div><div data-element-id="elm_EmSRLx6lWSqdVijaiMXvlw" data-element-type="box" class="zpelem-box zpelement zpbox-container zspadding-space-allside-thin zplight-section zplight-section-bg "><style type="text/css"></style><div data-element-id="elm_hlM_hvaV0pEkLkl28gYm7Q" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><p>9.<span style="font-size:7pt;">&nbsp; </span>Regularly Backup and Restore Permissions</p></div></h4></div>
<div data-element-id="elm_tCJlcIXwz1JkxCrZQaOp8g" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>Before significant changes, perform a backup of SharePoint permissions. Utilize SharePoint's built-in tools for <a href="https://learn.microsoft.com/en-us/sharepoint/administration/configure-permissions-for-backup-and-restore" title="Backup and Restore" target="_blank" rel="">backup and restore</a> operations. Regularly scheduled backups ensure the ability to recover data in case of accidental changes or issues.</p><p><br></p><p><br></p><p><br></p><p><br></p><p><br></p></div>
</div></div></div></div></div><div data-element-id="elm_fuGtqdtvBhqzrwBb-39uFg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_RdF6BlI8XSeVfa1pmh2jvQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_gOy3HpukYc-BnRrIXmveYg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_gOy3HpukYc-BnRrIXmveYg"] .zpimage-container figure img { width: 350px ; height: 195.13px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_gOy3HpukYc-BnRrIXmveYg"] .zpimage-container figure img { width:723px ; height:403.07px ; } } @media (max-width: 767px) { [data-element-id="elm_gOy3HpukYc-BnRrIXmveYg"] .zpimage-container figure img { width:415px ; height:231.36px ; } } [data-element-id="elm_gOy3HpukYc-BnRrIXmveYg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/89559.jpg" width="415" height="231.36" loading="lazy" size="fit"/></picture></span></figure></div>
</div><div data-element-id="elm_z3nI-EdwkPlPr7aEfKuSnw" data-element-type="box" class="zpelem-box zpelement zpbox-container zspadding-space-allside-thin zplight-section zplight-section-bg "><style type="text/css"></style><div data-element-id="elm_HsjAc8KnxJjjjC-KW_o04Q" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><p>10.<span style="font-size:7pt;">&nbsp; </span>Stay Informed about SharePoint Updates</p></div></h4></div>
<div data-element-id="elm_kRxVI3ce8Vvu-Belk4HV6Q" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>Stay updated on Microsoft's official documentation for SharePoint updates, patches, and new features. Implement updates promptly to benefit from the latest security enhancements and improvements, ensuring a secure and up-to-date SharePoint environment.</p></div>
</div></div></div></div></div></div></div><div data-element-id="elm_cFT3oTg7tkEZeCxAVGIHQQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_cFT3oTg7tkEZeCxAVGIHQQ"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_lZfnKlRpCITvW5PaYBQq3A" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_lZfnKlRpCITvW5PaYBQq3A"].zprow{ border-radius:1px; } </style><div data-element-id="elm_-wIu7_mNmJZYUDNGahjGNA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_-wIu7_mNmJZYUDNGahjGNA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_kpI3kea8qkHi30eAjgrWrw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_kpI3kea8qkHi30eAjgrWrw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>In conclusion, mastering SharePoint permissions is pivotal for organizations seeking a secure and streamlined collaboration environment. By adhering to best practices such as understanding group and role structures, following the principle of least privilege, and implementing role-based access control, businesses can fortify their data security while fostering efficient teamwork. Regular reviews, education on SharePoint security features, and strategic use of security groups contribute to a robust permission management strategy.</p><p>&nbsp;</p><p>As organizations navigate the dynamic landscape of collaboration and data management, staying informed about SharePoint updates is equally crucial. Embracing these best practices not only ensures a resilient SharePoint environment but also positions businesses to leverage the latest enhancements, bolstering their overall digital infrastructure.</p></div></div>
</div><div data-element-id="elm_JpwDwEsbKbwTjV1Q4W9mxQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_JpwDwEsbKbwTjV1Q4W9mxQ"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_N7XQWeCpnEUZ8bdJH3s2Xg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_N7XQWeCpnEUZ8bdJH3s2Xg"] .zpimagetext-container figure img { width: 136px !important ; height: 148.6px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_N7XQWeCpnEUZ8bdJH3s2Xg"] .zpimagetext-container figure img { width:136px ; height:148.6px ; } } @media (max-width: 767px) { [data-element-id="elm_N7XQWeCpnEUZ8bdJH3s2Xg"] .zpimagetext-container figure img { width:136px ; height:148.6px ; } } [data-element-id="elm_N7XQWeCpnEUZ8bdJH3s2Xg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/GT_icon_gr-1.png" width="136" height="148.6" loading="lazy" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><p><b>Empower your organization with GTconsult's expertise in SharePoint consulting and solutions.</b>&nbsp;&nbsp;</p><p><br></p><p>Whether you are looking to optimize your SharePoint permissions strategy, implement robust security measures, or harness the full potential of SharePoint for your unique business needs, our team at GTconsult is here to guide you. Contact us today to explore how we can collaborate to enhance your SharePoint experience, ensuring a secure, efficient, and tailored solution for your organization. Your journey to elevated collaboration and data security begins with GTconsult.</p></div></div>
</div></div><div data-element-id="elm_lIjQV07ksrwQmD2-V52j5Q" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_lIjQV07ksrwQmD2-V52j5Q"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="javascript:;"><span class="zpbutton-content">I need GTconsult</span></a></div>
</div><div data-element-id="elm_NQYyaCdd3b8T0Ui1n6DlHQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_NQYyaCdd3b8T0Ui1n6DlHQ"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_NQYyaCdd3b8T0Ui1n6DlHQ"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div></div></div></div></div><div data-element-id="elm_J2BYJvkhgusuGn_e9sxvuw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg zpbackground-size-cover zpbackground-position-center-center zpbackground-repeat-all zpbackground-attachment-scroll " style="background-image:linear-gradient(to bottom, rgba(30, 34, 45, 0.8), rgba(30, 34, 45, 0.8)), url(https://static.zohocdn.com/sites/stock-images/images/zpstock-image-08.jpg);"><style type="text/css"> [data-element-id="elm_J2BYJvkhgusuGn_e9sxvuw"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_IWm57evzgBkAlSjYe_bCmA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_IWm57evzgBkAlSjYe_bCmA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_K11jRkuK-DbMh7JZepjHbg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_K11jRkuK-DbMh7JZepjHbg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_hEtxHMd7QiGErjmsArUYTg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_hEtxHMd7QiGErjmsArUYTg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="text-align:center;"><span style="font-size:28px;font-weight:700;color:rgb(255, 255, 255);font-family:&quot;Noto Sans&quot;, sans-serif;">Keep Reading</span></p></div>
</div><div class="zpelement zpelem-carousel " data-element-id="elm_Oqlc_NP8FKxajsd4UPJskw" data-element-type="carousel" data-currentslide-index="0" data-transition="slide_left" data-slider-interval="5000" data-zs-autoslide="true" data-zs-slidepause-option="false" data-zs-slider="min-height-el: zpcarousel-content-container;arrow-cont: zpcarousel-arrows-container; active-controller: zpcarousel-controller-active; controller-cont: zpcarousel-controller-container; controller: zpcarousel-controller; right-arrow: zpcarousel-arrow-right; left-arrow: zpcarousel-arrow-left;active-slide:zpcarousel-content-active; slide: zpcarousel-content; slides-cont: zpcarousel-content-container;content-cont : zpcarousel-content-inner; background: false;slide-pause-btn:zpcarousel-pause-btn;slide-play-btn:zpcarousel-play-btn;"><div class="zpcarousel-container zpcarousel-style-01"><style></style><div class="zpcarousel-content-container"><div class="zpelement zpcarousel-content " data-element-type="carouselslide" data-element-id="elm_kfy1RuIcbcuya3a3cCzaNw" data-slide-name="Slide 1"><div class="zpcarousel-content-inner"><div data-element-id="elm_Uev7DsFhfF8uk8R8U9EOmg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_Uev7DsFhfF8uk8R8U9EOmg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_Vn7NXBGvq_cgSQHSdolSVg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_Vn7NXBGvq_cgSQHSdolSVg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_V4qUW_kNJ5mPa6XLNGAFbQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_V4qUW_kNJ5mPa6XLNGAFbQ"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_V4qUW_kNJ5mPa6XLNGAFbQ"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_V4qUW_kNJ5mPa6XLNGAFbQ"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_V4qUW_kNJ5mPa6XLNGAFbQ"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/kyles-take-the-recent-surge-in-sharepoint-malware-downloads" target="_blank" title="Kyle's Take: The recent surge in SharePoint Malware downloads" rel=""><picture><img class="zpimage zpimage-style-roundcorner zpimage-space-none " src="/Blog%20Site/Security%20write%20up%20thumbnail.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">Migration Tools and Technologies</span><br></p><p><span style="color:inherit;"><span style="font-size:20px;"><br></span></span></p></div>
</div></div></div><div data-element-id="elm_v-GhaRzzhGx5JBJUIvV8Jg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_v-GhaRzzhGx5JBJUIvV8Jg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_jkyy09anh69AaqfJeAnuXA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_jkyy09anh69AaqfJeAnuXA"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_jkyy09anh69AaqfJeAnuXA"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_jkyy09anh69AaqfJeAnuXA"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_jkyy09anh69AaqfJeAnuXA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/creating-a-knowledge-base-in-sharepoint-your-complete-guide" target="_blank" title="Creating a knowledge base in SharePoint" rel=""><picture><img class="zpimage zpimage-style-roundcorner zpimage-space-none " src="/Blog%20Site/Knowledge%20base.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">SharePoint Migration Best Practices</span><br></p><p><span style="color:inherit;"><span style="font-size:20px;"><br></span></span></p></div>
</div></div></div><div data-element-id="elm_j7AwoB4q9SqRIrwQXgmyag" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_j7AwoB4q9SqRIrwQXgmyag"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_IkDvoOS8kIB5p5VSt5iVkQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_IkDvoOS8kIB5p5VSt5iVkQ"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_IkDvoOS8kIB5p5VSt5iVkQ"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_IkDvoOS8kIB5p5VSt5iVkQ"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_IkDvoOS8kIB5p5VSt5iVkQ"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/powerapps-in-sharepoint" target="_blank" title="PowerApps in SharePoint" rel=""><picture><img class="zpimage zpimage-style-roundcorner zpimage-space-none " src="/Blog%20Site/Power%20Apps.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">Upgrading SharePoint 2016 to SharePoint 2019 step-by-step</span><br></p></div>
</div></div></div></div></div></div><div class="zpelement zpcarousel-content " data-element-type="carouselslide" data-element-id="elm_loS69v16-PkYGnSiVI9LJA" data-slide-name="Slide 2"><div class="zpcarousel-content-inner"><div data-element-id="elm_QUlw0pgqRuJBXDXtoYXetA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_QUlw0pgqRuJBXDXtoYXetA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_xZkj3aOs4SQiaS7-eDBlVw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_xZkj3aOs4SQiaS7-eDBlVw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_5dLecq0k3dbWfvRsEDedng" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_5dLecq0k3dbWfvRsEDedng"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_5dLecq0k3dbWfvRsEDedng"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_5dLecq0k3dbWfvRsEDedng"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_5dLecq0k3dbWfvRsEDedng"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/Expert-Insights-Why-and-How-to-Migrate-to-SharePoint-SE" target="_blank" title="SharePoint SE" rel=""><picture><img class="zpimage zpimage-style-roundcorner zpimage-space-none " src="/Blog%20Site/Migration%20Write%20Up%20Thumbnail%202.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;"><span style="color:rgb(255, 255, 255);">SharePoint Online: The Upgrade Your Business Needs</span><span style="color:inherit;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></span><br></p></div>
</div></div></div><div data-element-id="elm_BFJHL4BJkASNnG3tJr5qoQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_BFJHL4BJkASNnG3tJr5qoQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_dm3biey9hB3oPqayh-0yXA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_dm3biey9hB3oPqayh-0yXA"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_dm3biey9hB3oPqayh-0yXA"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_dm3biey9hB3oPqayh-0yXA"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_dm3biey9hB3oPqayh-0yXA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/what-is-sharepoint" target="_blank" title="What is SharePoint" rel=""><picture><img class="zpimage zpimage-style-roundcorner zpimage-space-none " src="/Blog%20Site/What%20is%20sharepoint%20Thumbnail.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">What is SharePoint?</span><br></p><p><span style="color:inherit;"><span style="font-size:20px;"><br></span></span></p></div>
</div></div></div><div data-element-id="elm_6GaYqrb0G3-f3vJRFQk9iQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_6GaYqrb0G3-f3vJRFQk9iQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_kYxj1T_cLJLBicwWdO-XCA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_kYxj1T_cLJLBicwWdO-XCA"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_kYxj1T_cLJLBicwWdO-XCA"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_kYxj1T_cLJLBicwWdO-XCA"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_kYxj1T_cLJLBicwWdO-XCA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/sharepoint-intranets-an-overview" target="_blank" title="SharePoint Intranets" rel=""><picture><img class="zpimage zpimage-style-roundcorner zpimage-space-none " src="/Blog%20Site/SharePoint%20Intranets.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">Migrate SharePoint with GTconsult’s A Team</span><br></p></div>
</div></div></div></div></div></div><div class="zpelement zpcarousel-content " data-element-type="carouselslide" data-element-id="elm_1FLBViO3c9ukrWrfjYLy2Q" data-slide-name="Slide 3"><div class="zpcarousel-content-inner"><div data-element-id="elm_AzPYMRKLhPMN8VqkJg4SNA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_AzPYMRKLhPMN8VqkJg4SNA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_oSHK58mjseoRCtAdw7Vltg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_oSHK58mjseoRCtAdw7Vltg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_h9210x1rgE6Om0igQ3qeag" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_h9210x1rgE6Om0igQ3qeag"] .zpimagetext-container figure img { width: 980px ; height: 551.25px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_h9210x1rgE6Om0igQ3qeag"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_h9210x1rgE6Om0igQ3qeag"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_h9210x1rgE6Om0igQ3qeag"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/6-easy-steps-for-a-office-365-tenant-to-tenant-migration" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/6%20EASY%20STEPS.png" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">6 Easy Steps for an Office 365 Tenant to Tenant Migration</span><br></p></div>
</div></div></div><div data-element-id="elm_IoZqGKnIJYXrXo0tybQGSA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_IoZqGKnIJYXrXo0tybQGSA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_4AUGocHMc2kMTNE0_JzJcQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_4AUGocHMc2kMTNE0_JzJcQ"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_4AUGocHMc2kMTNE0_JzJcQ"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_4AUGocHMc2kMTNE0_JzJcQ"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_4AUGocHMc2kMTNE0_JzJcQ"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/sharepoint-migration-checklist" target="_blank" title="Migration Checklist" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Checklist%2016%20by%209.png" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><p><span style="font-size:20px;color:rgb(255, 255, 255);">SharePoint Migration Checklist</span><br></p><div style="color:inherit;"><span style="font-size:20px;"><br></span></div></div></div>
</div></div></div><div data-element-id="elm_SQMXGOhw2xNVokEG4pL-tQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_SQMXGOhw2xNVokEG4pL-tQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_MnjMyagPt9dPt4-HAqz6FQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_MnjMyagPt9dPt4-HAqz6FQ"] .zpimagetext-container figure img { width: 307px ; height: 172.57px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_MnjMyagPt9dPt4-HAqz6FQ"] .zpimagetext-container figure img { width:723px ; height:406.40px ; } } @media (max-width: 767px) { [data-element-id="elm_MnjMyagPt9dPt4-HAqz6FQ"] .zpimagetext-container figure img { width:415px ; height:233.27px ; } } [data-element-id="elm_MnjMyagPt9dPt4-HAqz6FQ"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/cci-case-study" target="_blank" title="CCI Case Study" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/CCI%20Case%20Study.png" width="415" height="233.27" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">CCI Case Study</span><br></p><p><span style="color:inherit;"><span style="font-size:20px;"><br></span></span></p></div>
</div></div></div></div></div></div></div><div class="zpcarousel-arrows-container zpcarousel-arrow-type-01" data-arrow-style="2"><div class="zpcarousel-arrow-left" tabindex="0" role="button" aria-label="Previous"><svg aria-hidden="true" viewBox="0 0 32 32" xmlns="http://www.w3.org/2000/svg" class="svg-icon-18px"><path d="M0,16c0,0.3,0.1,0.5,0.3,0.7l9.9,10c0.4,0.4,1,0.4,1.4,0c0.4-0.4,0.4-1,0-1.4L3.4,17H31 c0.6,0,1-0.5,1-1s-0.4-1-1-1H3.4l8.2-8.3c0.4-0.4,0.4-1,0-1.4c-0.4-0.4-1-0.4-1.4,0l-9.9,10C0.1,15.5,0,15.7,0,16z"></path></svg></div>
<div class="zpcarousel-arrow-right" tabindex="0" role="button" aria-label="Next"><svg aria-hidden="true" viewBox="0 0 32 32" xmlns="http://www.w3.org/2000/svg" class="svg-icon-18px"><path id="arrow-right-style2-Arrow_Forward" d="M32,16c0-0.3-0.1-0.5-0.3-0.7l-9.9-10c-0.4-0.4-1-0.4-1.4,0c-0.4,0.4-0.4,1,0,1.4 l8.2,8.3H1c-0.6,0-1,0.5-1,1s0.4,1,1,1h27.6l-8.2,8.3c-0.4,0.4-0.4,1,0,1.4c0.4,0.4,1,0.4,1.4,0l9.9-10C31.9,16.5,32,16.3,32,16z"></path></svg></div>
</div><div class="zpcarousel-controller-container zpcarousel-controller-type-01"><svg class="zpcarousel-pause-btn" tabindex="0" role="button" aria-label="Pause" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 14 14"><path d="M3.85.53C3.6.5 3.34.5 3.07.5 1.68.5.95 1.09.95 2.18V12c.03.74.56 1.32 1.44 1.44.53.07 1.11.07 1.64 0 .9-.13 1.42-.72 1.42-1.5V2.07c0-.09 0-.18-.03-.28-.1-.66-.75-1.17-1.59-1.26h.01ZM11.43.53C11.18.5 10.92.5 10.65.5c-1.39 0-2.12.59-2.12 1.68V12c.03.74.56 1.32 1.44 1.44.53.07 1.11.07 1.64 0 .9-.13 1.42-.72 1.42-1.5V2.07c0-.09 0-.18-.03-.28-.1-.66-.75-1.17-1.59-1.26h.01Z"/></svg><svg class="zpcarousel-play-btn" tabindex="0" role="button" aria-label="Play" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 14 14"><path d="M.59 7.02C.57 5.33.57 3.63.51 1.94.45.63 1.72-.17 2.9.45c3.2 1.68 6.42 3.32 9.64 4.96.59.3.95.76.96 1.43 0 .66-.34 1.11-.91 1.43-3.18 1.75-6.35 3.5-9.52 5.25-1.2.66-2.39-.04-2.41-1.41C.63 10.42.61 8.72.59 7.03Z"/></svg><div class="zpcarousel-controller zpcarousel-controller-active" data-slide-index="0"></div>
<div class="zpcarousel-controller " data-slide-index="1"></div><div class="zpcarousel-controller " data-slide-index="2"></div>
</div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 08 Jan 2024 10:54:54 +0000</pubDate></item></channel></rss>