<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.gtconsult.com/blogs/tag/a-team-protection/feed" rel="self" type="application/rss+xml"/><title>GTconsult - Blog #A Team Protection</title><description>GTconsult - Blog #A Team Protection</description><link>https://www.gtconsult.com/blogs/tag/a-team-protection</link><lastBuildDate>Tue, 31 Mar 2026 22:08:03 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[If You Haven't Tested Your Security, You Don't Actually Know If It Works]]></title><link>https://www.gtconsult.com/blogs/post/if-you-haven-t-tested-your-security-you-don-t-actually-know-if-it-works</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/Pen Test Thumbnail.png"/>Most businesses have security in place. But when last did anyone test if it actually works? Discover why penetration testing is the difference between assuming you're secure and knowing you are.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_3D0Tmzb5T9Wa9Wqw-ExulQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Hq-NabZSRhOrQ2_D4C9aCQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content- " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_FF1Im4yzRrqxJKBfEV4UTA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_4nOShi1pN_RP5cweEmltTQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_4nOShi1pN_RP5cweEmltTQ"] .zpimage-container figure img { width: 286px !important ; height: 195px !important ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Fire%20Elmo%20GIF.gif" size="custom" data-lightbox="true"/></picture></span></figure></div>
</div></div><div data-element-id="elm_5s78W04vb82nVS26UAaSng" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_NuKHHutt3HtylAu63MvR5w" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p style="text-align:left;">Most businesses have some form of security in place. Firewalls. Antivirus. Maybe an MFA policy that someone set up a while back. And on paper, that feels like enough.</p><p style="text-align:left;">But here's the uncomfortable question: when last did anyone actually test whether it holds up?</p><p style="text-align:left;">Not a checklist. Not a vendor assurance. An actual, deliberate attempt to break through it, the way an attacker would.</p><p style="text-align:left;">Because there's a significant difference between having security and having security that works.</p></div>
<p></p></div></div></div></div></div></div><div data-element-id="elm_AfqoiiGUNXZCXhMeWvk6Ww" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_KoWbxoLmdRNRRxWxZeO8hQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_F7yw0W46bZO-2qm96S1qgQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_1fsOWuhQaHy-z_LFJQCvNQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>The gap most businesses don't see<br/></span></h2></div>
<div data-element-id="elm_jErWC9BF9UXo1DPM1hfYvA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div> Cyber threats aren't theoretical anymore. South Africa is consistently ranked among the most targeted countries on the continent for cyber attacks (and attackers aren't just going after the big corporates). SMEs are increasingly in the crosshairs precisely because they tend to have fewer defences. </div>
<br/><div> What makes this particularly tricky is that most vulnerabilities aren't obvious. They don't announce themselves. They sit quietly in your environment, in a misconfigured permission, an unpatched API, a login page that accepts inputs it shouldn't — waiting for someone who knows what to look for. </div>
<br/><div> And the reality is, the people building and maintaining your systems are focused on making things work. That's the job. Security is a different discipline entirely, and it requires a very different mindset — one that's actively looking for what can go wrong, not just what works. </div>
</div><p></p></div></div><div data-element-id="elm_h7_XPmOop1dAnXlul-p2PA" data-element-type="dividerText" class="zpelement zpelem-dividertext "><style type="text/css"></style><style></style><div class="zpdivider-container zpdivider-text zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid zpdivider-style-none "><div class="zpdivider-common">Most breaches don't happen because nobody checked whether the security they had was actually doing its job. businesses had no security. They happen because </div>
</div></div></div></div></div></div><div data-element-id="elm_9ItA4MuDtGsrecanMRMtZg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_qZUTDjG0DVI66Qli3NM6Nw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_AvVsSZFwptov-BJ1y_q4ew" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_qcuU8YSR2T9ehNBL1Ztgkg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>What a penetration test actually does<br/></span></h2></div>
<div data-element-id="elm_5Lod1Tr1_OzgFZsdGH1wdQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_5Lod1Tr1_OzgFZsdGH1wdQ"] .zpimagetext-container figure img { width: 450px !important ; height: 302px !important ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-original zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Magnify%20Rick%20Moranis%20GIF.gif" size="original" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p><span><span></span></span></p><div><p>A penetration test (done properly) is a controlled, authorised attempt to compromise your systems before a real attacker does.</p><p><br/></p><p>It's not a automated scan. It's not a report that lists every CVE in your environment and calls it a day. It's someone thinking the way an attacker thinks, probing for the paths that matter, and documenting exactly what they found, how they found it, and what the business impact actually is.</p><p><br/></p><p>The output isn't just a list of vulnerabilities. It's clarity. You walk away knowing:</p></div>
<p></p><p><span><span><br/></span></span></p><p><span><span>Where your real exposure is, not just theoretical risk</span><br/><span>What an attacker could realistically access or do</span><br/><span>Which fixes will have the biggest impact on actual security</span><br/><span>Whether your existing controls are doing what you think they're doing</span></span></p></div>
</div></div><div data-element-id="elm_V0gXKYsV4CDyOop0nwSGbw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>That last one matters more than people realise. It's not uncommon to find a control that's been in place for years, that everyone assumes is working, that a pen tester can walk straight through in under an hour.</span></p></div>
</div></div></div></div></div><div data-element-id="elm_EkVESAhlM7hptd0LjZy0ZQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Y7eeXaCjbn309i9SshO5AQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_3aAiKlF3XKm_r2TCYY90lA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_9LJtaSe5ncL1CnUqKyPn5Q" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>The business case for testing before something goes wrong<br/></span></h2></div>
<div data-element-id="elm_J_QzvuUZxhsrM3dRBmNjGw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>There's a version of this conversation that happens after an incident. After a breach. After data has been exfiltrated, or systems have been locked down by ransomware, or a client calls asking why their data appeared somewhere it shouldn't.</p><p><br/></p><p>That conversation is expensive. Remediation is expensive. Reputational damage is expensive. Regulatory exposure (especially under POPIA) can be very expensive.</p><p><br/></p><p>A penetration test, run proactively, finds the same problems before they become incidents. It's the difference between fixing a lock and explaining to your clients why their data is gone.</p><p><br/></p><p>We've seen it go both ways. Businesses that test regularly catch things early and fix them quietly. Businesses that don't, often find out the hard way — and at the worst possible time.</p></div>
<p></p></div></div><div data-element-id="elm_jPwF5Oy4cAu65U_gYI7cVw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span style="color:rgb(166, 206, 57);"><a href="https://www.gtconsult.com/blogs/post/case-study-how-proactive-security-testing-unlocked-enterprise-growth-for-lelapa-ai" title="Read about what happens when you are proactive." target="_blank" rel="">Read about what happens when you are proactive.</a></span></p></div>
</div></div></div></div></div><div data-element-id="elm_cfdasUg-yfPur6Usg6kIKQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Z6Y28T16096t2ZlNhMEIUA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_NsvBFQoB3Pbe3_cH3Z-r0g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_yb0lhy9smTvoEKOr0xGMNw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>How often should you be testing?<br/></span></h2></div>
<div data-element-id="elm_HxsrwalybHO6W4vd5p8NAA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_HxsrwalybHO6W4vd5p8NAA"] .zpimagetext-container figure img { width: 301px !important ; height: 301px !important ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Join%20Us%20Save%20The%20Date%20GIF%20by%20Similarweb.gif" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p></p><div><div> There's no universal answer, but a good rule of thumb: any time something significant changes in your environment, test it. New application deployed. Major infrastructure change. New cloud integration. After a security incident, even a minor one. </div>
<br/><div> Beyond that, most organisations benefit from at least an annual assessment, more frequently if you're in a regulated industry or handle sensitive data at scale. </div>
<br/><div> The point isn't to test for the sake of testing. It's to make sure that as your environment evolves, your security posture evolves with it. Because attackers aren't standing still, and neither are the techniques they use. </div>
</div><p></p></div></div></div><div data-element-id="elm_Fq2n_fgWRSt2fRcG82_noQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"></style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_JeFfODD4vsNC4LokXGrKpA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Find out where your exposure actually is, before someone else does.</span></h2></div>
<div data-element-id="elm_zPLWMAlUv9dLrtDyENZYbw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span>GT Consults offers penetration testing for web applications, internal networks, APIs, and cloud environments. We give you a clear picture of your real risk — and exactly what to do about it.</span></span></p></div>
</div><div data-element-id="elm_7hKyq0OpbSvPI5GQz5_jag" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="https://outlook.office.com/bookwithme/user/6bd34779624c4a8ab5f3906f5e71baf7%40gtconsult.com/meetingtype/Cfseq1rTWEyZRk62iTNVAw2?anonymous&amp;ismsaljsauthenabled=true" target="_blank" title="Book time with our technical account manager "><span class="zpbutton-content">Book a Pen Test Consultation</span></a></div>
</div><div data-element-id="elm_EIWpnOWwc9EKOIAftLg_fg" data-element-type="iframe" class="zpelement zpelem-iframe "><style type="text/css"></style><div class="zpiframe-container zpiframe-align-center"><iframe class="zpiframe " src="https://www.youtube.com/embed/e4YSke1x13o?si=FoKco4ey1ySSdg4R" width="560" height="315" align="center" allowfullscreen frameBorder="0" title="YouTube video player"></iframe></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 17 Mar 2026 10:52:00 +0000</pubDate></item><item><title><![CDATA[The Secure Score Improvement Trap (And How to Avoid It) ]]></title><link>https://www.gtconsult.com/blogs/post/the-secure-score-improvement-trap-and-how-to-avoid-it</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/Migration Write Up Thumbnailnn.png"/>Most IT teams chase high-point Secure Score recommendations without strategy, leading to wasted effort and declining scores. Learn why "quick wins" fail, how to prioritize based on actual risk instead of points, and build sustainable improvements that stick—avoiding the trap of configuration drift.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_lz8Hp0r7T4iY_KuEprkRbA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_d6ewc2XhTWSEUvHwuZMdmg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_eef7-YFFRwin8RIYgYq_9g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_W-r_AudYSpymkQrZnktlvg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span>You know your Secure Score should be higher. You've read about configuration drift eating away at your security posture. You understand that lack of capacity is keeping your score stuck.</span></p></div>
</div></div></div></div></div><div data-element-id="elm_ppkc3NN1ZRTFkPrvMWv0pw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_QumHFkR0fQuil2FLFB1FQA" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_d5WXSPOTQFUGgIJk37JPOA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_0PTU7PUibdWrrrQeX22Btw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_0PTU7PUibdWrrrQeX22Btw"] .zpimage-container figure img { width: 480px !important ; height: 270px !important ; } } @media (max-width: 767px) { [data-element-id="elm_0PTU7PUibdWrrrQeX22Btw"] .zpimage-container figure img { width:415px ; height:233.44px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-original zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Jake%20Johnson%20Fox%20GIF%20by%20New%20Girl.gif" width="415" height="233.44" loading="lazy" size="original"/></picture></span></figure></div>
</div></div><div data-element-id="elm_QWb3cenqyl5-nbDk2doPNQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_h8NZW41xNAEasNzUhJJzAw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><p style="text-align:left;">This is the trap most IT teams fall into: they start implementing recommendations in order of points or ease, without understanding which changes actually matter for their specific risk profile—or how to sustain improvements once they're made.</p><p style="text-align:left;"><br/></p><p style="text-align:left;">The result? Wasted effort on low-impact changes, broken workflows from poorly planned implementations, and scores that plateau or even decline despite your best efforts.</p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_-lqIVfgztTQU5wIGuT2eew" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_hlzZcYoctvtUfTpjpjCPCw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_jadNP54gSUv3A256sTV4dg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_Kqw6IKmkLkONvR4BxZjlzA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong style="color:rgb(0, 27, 76);">Why Most Secure Score Improvement Efforts Fail</strong><br/></h3></div>
<div data-element-id="elm_K5dtUjhEOB7OFIyrrrywUQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>The typical approach looks something like this: open the Microsoft Defender portal, see a list of recommendations, pick the ones worth the most points or that seem easiest, and start implementing.</p><p><br/></p><p>Three months later, your score has barely moved. Or it moved briefly and then dropped back down. Or you've spent weeks on improvements that broke critical workflows and had to be rolled back.</p><p><br/></p><p>The problem isn't lack of effort. It's lack of strategy.</p><p><br/></p><p>Effective Secure Score improvement requires understanding three things most teams skip:</p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_eCvXmaRpgT-m5i0Y9HwBPA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_RX65JGdOO-3BVg2fhPf-Dw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_GgK_S1zjTP5rQpRfafDosw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_45NRgDyRD6VlmI_CZEl6dA" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-left zpicon-align-mobile-left zpicon-align-tablet-left zpicon-clear-align"><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 576 512" height="576" width="512" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path d="M569.517 440.013C587.975 472.007 564.806 512 527.94 512H48.054c-36.937 0-59.999-40.055-41.577-71.987L246.423 23.985c18.467-32.009 64.72-31.951 83.154 0l239.94 416.028zM288 354c-25.405 0-46 20.595-46 46s20.595 46 46 46 46-20.595 46-46-20.595-46-46-46zm-43.673-165.346l7.418 136c.347 6.364 5.609 11.346 11.982 11.346h48.546c6.373 0 11.635-4.982 11.982-11.346l7.418-136c.375-6.874-5.098-12.654-11.982-12.654h-63.383c-6.884 0-12.356 5.78-11.981 12.654z"></path></svg></span><h3 class="zpicon-heading " data-editor="true"><span style="font-size:16px;color:rgb(0, 27, 76);"><strong>Which improvements actually address your organization's risk profile</strong></span></h3><div class="zpicon-text-container " data-editor="true"><p><span>A 10-point recommendation that protects against threats you don't face is wasted effort. Meanwhile, a 3-point recommendation that closes a critical gap specific to your industry might be essential. Points don't equal priority.</span></p></div>
</div></div></div><div data-element-id="elm_ABAeeLAhkLcVYDfTu6Ggug" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_Kr6YXbmtaXgEstRtbQ7d1A" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-left zpicon-align-mobile-left zpicon-align-tablet-left zpicon-clear-align"><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 512 512" height="512" width="512" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path d="M328 256c0 39.8-32.2 72-72 72s-72-32.2-72-72 32.2-72 72-72 72 32.2 72 72zm104-72c-39.8 0-72 32.2-72 72s32.2 72 72 72 72-32.2 72-72-32.2-72-72-72zm-352 0c-39.8 0-72 32.2-72 72s32.2 72 72 72 72-32.2 72-72-32.2-72-72-72z"></path></svg></span><h3 class="zpicon-heading " data-editor="true"><span style="font-size:16px;color:rgb(0, 27, 76);"><strong>The sequence and dependencies between changes</strong></span></h3><div class="zpicon-text-container " data-editor="true"><p><span>Some security improvements need to happen in specific order. Others interact in ways that can break functionality if you don't understand the technical relationships. Implementing changes in the wrong sequence wastes time on rework and troubleshooting.</span></p></div>
</div></div></div><div data-element-id="elm_wzVFO7TTepfN6XCBHDbsWw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_k1Wnqrly5y8yxlJbjaV7VQ" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-left zpicon-align-mobile-left zpicon-align-tablet-left zpicon-clear-align"><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 24 24" height="24" width="24" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path fill-rule="evenodd" clip-rule="evenodd" d="M9 1H1V9H9V6H11V20H15V23H23V15H15V18H13V6H15V9H23V1H15V4H9V1ZM21 3H17V7H21V3ZM17 17H21V21H17V17Z"></path></svg></span><h3 class="zpicon-heading " data-editor="true"><strong><span style="font-size:16px;color:rgb(0, 27, 76);">How to build monitoring and maintenance into your workflows</span></strong></h3><div class="zpicon-text-container " data-editor="true"><p><span>Configuration drift is inevitable. The question isn't whether your settings will drift from their intended state—it's whether you'll catch it when they do. Without systematic monitoring, improvements degrade over time and your score reflects it.</span></p></div>
</div></div></div></div></div></div><div data-element-id="elm_Zc84FhGQRThGBq1pbzG67A" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_GORQ97KrQzti3iw8X4_-Dw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_K6ckYCgW8eRENDsDosLFZQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_lCmg9_F1Gy9YDlDASNvyrw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong style="color:rgb(0, 27, 76);">The Hidden Complexity of &quot;Simple&quot; Recommendations</strong></h3></div>
</div></div></div></div><div data-element-id="elm_ECTNIhMa5k5_7-MOY6fvrg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Ea3KzZiGkfLibwRKRqTrQA" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_HEuPMYwwn4iG1saxgikqCg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_pltIx35EwKx4rlb1k0SIwg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_pltIx35EwKx4rlb1k0SIwg"] .zpimage-container figure img { width: 400px !important ; height: 300px !important ; } } @media (max-width: 767px) { [data-element-id="elm_pltIx35EwKx4rlb1k0SIwg"] .zpimage-container figure img { width:415px ; height:233.44px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-original zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/avril%20lavigne%20GIF.gif" width="415" height="233.44" loading="lazy" size="original"/></picture></span></figure></div>
</div></div><div data-element-id="elm_QjlEiDfN90750EcVFryGRA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_M8LFpjc2nTerMXyWYH3zpA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><p style="text-align:left;">Let's take what seems like a straightforward recommendation: enable MFA for all users.</p><p style="text-align:left;"><br/></p><p style="text-align:left;">Sounds simple, right? But actually implementing it requires understanding:</p><ul><li style="text-align:left;">Which users already have MFA and which don't</li><li style="text-align:left;">Whether you have Conditional Access policies that conflict</li><li style="text-align:left;">Which applications might break with MFA enforcement</li><li style="text-align:left;">How to handle service accounts and automated processes</li><li style="text-align:left;">What exceptions might be legitimately needed</li><li style="text-align:left;">How to communicate changes to users effectively</li></ul></div><p></p></div>
</div></div></div><div data-element-id="elm_a3fkSF-WT5KZ-9kEAxjWzg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_qZM33ElEbF2CPX5Y3Is_Nw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_71hiBfhvElEi_BGxYswtLQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Get any of these wrong and you'll spend more time fixing problems than you saved by implementing the recommendation.</p><p><br/></p><p>This pattern repeats across every recommendation in your Secure Score. What looks like a configuration change on the surface requires strategic thinking about business impact, technical dependencies, and change management.</p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_G0cUKdV0pUQvS91D2i12vA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_E9XcXYXB6FJ8S9WUq5PX2g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_4oQjhwFdHGKs2i0wGEUxyg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_bwJUEViA89oZn1g4Rri9fg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong style="color:rgb(0, 27, 76);">Why Quick Wins Aren't Always Quick</strong></h3></div>
<div data-element-id="elm_578hCOsLygn0bZAGT6JTGw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>IT teams often start with &quot;quick wins&quot;—recommendations that promise high point values with supposedly minimal effort.</p><p><br/></p><p>The problem is that &quot;quick&quot; depends entirely on your environment's current state and complexity. Blocking legacy authentication might take 15 minutes in one organization and require weeks of application modernization in another.</p><p><br/></p><p>More importantly, chasing points without understanding impact leads to a dangerous pattern: implementing changes that raise your score but don't actually improve your security posture in meaningful ways for your specific risk profile.</p><p><br/></p><p>The organizations that successfully improve their Secure Score don't focus on quick wins first. They focus on <em>right</em> wins—improvements that align with their actual threat landscape and business priorities, regardless of point value.</p></div><p></p></div>
</div><div data-element-id="elm__YBKGX_onYgevAmaRtG31g" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm__YBKGX_onYgevAmaRtG31g"] div.zpspacer { height:13px; } @media (max-width: 768px) { div[data-element-id="elm__YBKGX_onYgevAmaRtG31g"] div.zpspacer { height:calc(13px / 3); } } </style><div class="zpspacer " data-height="13"></div>
</div></div></div></div></div><div data-element-id="elm_Qp2uEQGYMPP1y2vGHbz7CQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Z6XB3hcNe1eo7BXOIkvRdA" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_65xUQY6WM2cbj_PE8JN7AA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_khgYBcfzU41_Py12a0ka0Q" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_khgYBcfzU41_Py12a0ka0Q"] .zpimage-container figure img { width: 429px !important ; height: 601px !important ; } } @media (max-width: 767px) { [data-element-id="elm_khgYBcfzU41_Py12a0ka0Q"] .zpimage-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_khgYBcfzU41_Py12a0ka0Q"].zpelem-image { margin-block-start:26px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Copy%20of%20Copy%20of%20Copy%20of%20Envelope%20Template%20-500%20x%20700%20mm-.png" width="415" height="233.44" loading="lazy" size="custom"/></picture></span></figure></div>
</div></div><div data-element-id="elm_LBe_Y0ta1_1OjPOu9bLD6Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_Y5Jmkw29O69AHchIIYMn1g" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong>The Sustainability Problem</strong></h4></div>
<div data-element-id="elm_JCDU7G1M4EWUxy9xAy5Yug" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><p style="text-align:left;">Here's what happens in most organizations: someone dedicates focused time to Secure Score improvements. Over a few weeks or months, the score increases. Victory!</p><p style="text-align:left;"><br/></p><p style="text-align:left;">Six months later, the score has drifted back down. Temporary exceptions became permanent. New users onboarded without inheriting security policies. Applications deployed without security review.</p><p style="text-align:left;"><br/></p><p style="text-align:left;">The improvements weren't sustained because they weren't integrated into operational processes. Security became a project with an end date, not an ongoing practice.</p><p style="text-align:left;"><br/></p><p style="text-align:left;">Sustainable Secure Score improvement requires building security into your regular workflows:</p><ul><li style="text-align:left;">User onboarding processes that automatically apply security policies</li><li style="text-align:left;">Regular reviews of exceptions and elevated access</li><li style="text-align:left;">Monitoring that flags when configurations drift from baseline</li><li style="text-align:left;">Documentation that survives staff turnover</li></ul><p style="text-align:left;"><br/></p><p style="text-align:left;">Without these processes, you're constantly fighting to maintain improvements instead of compounding them over time.</p></div><p></p></div>
</div></div></div><div data-element-id="elm_oJDmMSkXXK8nknzJNpN11Q" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_8cl7bRsXYmxkEfOlq8cxJw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_1OCl_Yyy7MqxgiBASWmwuA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_1OCl_Yyy7MqxgiBASWmwuA"] div.zpspacer { height:11px; } @media (max-width: 768px) { div[data-element-id="elm_1OCl_Yyy7MqxgiBASWmwuA"] div.zpspacer { height:calc(11px / 3); } } </style><div class="zpspacer " data-height="11"></div>
</div></div></div><div data-element-id="elm_LVK9gJgdTGYkpIkw1mgOHA" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_GTNmgfoN7hshxF4VAOyDug" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_wQ0YJQ3dSbMEXATi9CTN4g" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_wQ0YJQ3dSbMEXATi9CTN4g"] .zpimage-container figure img { width: 406px !important ; height: 568px !important ; } } @media (max-width: 767px) { [data-element-id="elm_wQ0YJQ3dSbMEXATi9CTN4g"] .zpimage-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_wQ0YJQ3dSbMEXATi9CTN4g"].zpelem-image { margin-block-start:26px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Copy%20of%20Copy%20of%20Copy%20of%20Envelope%20Template%20-500%20x%20700%20mm-%20-2-.png" width="415" height="233.44" loading="lazy" size="custom"/></picture></span></figure></div>
</div></div><div data-element-id="elm__cOiTFTXBKwJaFdDwcAvfw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_diniPTUVK1srAluvWdTE-Q" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong><span>What Actually Works</span></strong></h4></div>
<div data-element-id="elm_7x1BBI28dYNVasnINtIaJA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p style="text-align:left;"></p><div><p>Organizations that successfully improve and maintain their Secure Score approach it systematically:</p><p><br/></p><p>They <strong>understand their current state</strong> before implementing anything. Where are the critical gaps? Which recommendations address real risks versus checking compliance boxes? What's the business impact of each change?</p><p><br/></p><p>They <strong>prioritize strategically</strong>, not by points. High-impact security improvements for their specific environment come first, even if they're worth fewer points than easier changes.</p><p><br/></p><p>They <strong>test before deploying widely</strong>. Pilot changes with a small group. Identify and address issues. Then expand systematically with proper change management.</p><p><br/></p><p>They <strong>build monitoring into operations</strong>. Regular review processes catch drift before it becomes significant. Documentation ensures knowledge doesn't live in one person's head.</p><p><br/></p><p>They <strong>know when to get help</strong>. Some improvements require specialized expertise most internal teams don't have time to develop. Recognizing this early prevents wasted effort on approaches that won't work.</p></div><p style="text-align:left;"></p></div><p></p></div>
</div></div></div><div data-element-id="elm_OgXlxZsrrt6SI2qVnSUWvA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_-Mmg90cf82ynR1amFtMGuQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_Vx-0p7FsVleKfsxNYug3TA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_Vx-0p7FsVleKfsxNYug3TA"] div.zpspacer { height:16px; } @media (max-width: 768px) { div[data-element-id="elm_Vx-0p7FsVleKfsxNYug3TA"] div.zpspacer { height:calc(16px / 3); } } </style><div class="zpspacer " data-height="16"></div>
</div></div></div><div data-element-id="elm_bjEEHvkc1yCx-BEyGGfFyA" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_Q4zSKnRD-LdBFfEw6FYFng" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_tfhCd3amJOz618goLvTruA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_tfhCd3amJOz618goLvTruA"] .zpimage-container figure img { width: 419px !important ; height: 587px !important ; } } @media (max-width: 767px) { [data-element-id="elm_tfhCd3amJOz618goLvTruA"] .zpimage-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_tfhCd3amJOz618goLvTruA"].zpelem-image { margin-block-start:26px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Copy%20of%20Copy%20of%20Copy%20of%20Envelope%20Template%20-500%20x%20700%20mm-%20-1-.png" width="415" height="233.44" loading="lazy" size="custom"/></picture></span></figure></div>
</div></div><div data-element-id="elm_4Jp8Qt57e6eUMpKjRfrC6g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_Lsiga7oA_Z6iWAZrgp1jiQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong><span><span>The Path Forward Depends on Your Situation</span></span></strong></h4></div>
<div data-element-id="elm_QvT6TZN9oXdD2N7ddV6KBg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p style="text-align:left;"></p><div><p></p><div><p>Some organizations can improve their Secure Score significantly with internal resources—if they have the right strategic approach and dedicate consistent effort over time.</p><p><br/></p><p>Others reach a plateau where further improvement requires either:</p><ul><li>Specialized Microsoft 365 security expertise their team hasn't developed</li><li>Time investment their team genuinely doesn't have capacity for</li><li>Licensing and tools their current budget doesn't include</li></ul><p><br/></p><p>Neither scenario is wrong. The question is whether you're willing to accept your current risk level or invest in further improvement.</p><p><br/></p><p>But regardless of which path you choose, attempting Secure Score improvement without a systematic approach leads to wasted effort, broken workflows, and minimal sustained progress.</p></div><p></p></div><p style="text-align:left;"></p></div><p></p></div>
</div></div></div><div data-element-id="elm_SJNi1daO3PM_7wp7Ersb2w" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_a9_3RGSvZIvU3QopJe393Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_kkldWLLpYAkSy2aDw8y0aQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_kkldWLLpYAkSy2aDw8y0aQ"] div.zpspacer { height:14px; } @media (max-width: 768px) { div[data-element-id="elm_kkldWLLpYAkSy2aDw8y0aQ"] div.zpspacer { height:calc(14px / 3); } } </style><div class="zpspacer " data-height="14"></div>
</div><div data-element-id="elm_o5V014xZlvxEwz40hIGuOw" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"></style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_4vF-3aZ_ZSspc-c2DyJfHA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong style="color:rgb(0, 27, 76);">See the Strategic Approach In Action</strong></h3></div>
<div data-element-id="elm_7vhCsSfoj1zvoU6fZU2vLw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>Understanding <em>why</em> most Secure Score improvement efforts fail is one thing. Knowing <em>how</em> to avoid those pitfalls and implement changes that actually stick is another.</span></p></div>
</div><div data-element-id="elm__dcQ8-w2vvCv_K7rnoJnsg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><strong>Join our security analyst, Kyle Farr, on&nbsp;<span><strong>10th of</strong></span> February 2026</strong>&nbsp;for a live demonstration of strategic Secure Score improvement:</p><ul><li><strong>Current state analysis</strong> - How to assess your score breakdown and identify what actually matters for your risk profile (not just point values)</li><li><strong>Prioritization framework</strong> - The decision criteria for determining which recommendations to tackle first based on business impact and technical dependencies</li><li><strong>Live implementation walkthrough</strong> - Watch a real security control get configured with proper testing and rollback planning</li><li><strong>Monitoring and sustainability</strong> - Building the processes that catch drift before it degrades your security posture</li><li><strong>Q&amp;A for your specific challenges</strong> - Get answers about your environment's blockers and constraints</li></ul></div><p></p></div>
</div><div data-element-id="elm_j8_A8H_b2IF9rzwYHFJR5A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>This isn't theory or generic advice. It's a practical demonstration of the systematic approach that separates successful Secure Score improvement from wasted effort.</span></p></div>
</div><div data-element-id="elm_B7HfdqeEPNaHkI6qWGD28g" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>📅 February 10, 2026 | 4:00 PM - 5:00 PM SAST</span></p></div>
</div><div data-element-id="elm_ghTp-gP12uHOTQWn7Qwbew" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="https://events.teams.microsoft.com/event/0200f51a-7f96-496e-9887-58307aafc957@61521a12-5ef9-4e8d-b880-ea83395070fb" target="_blank"><span class="zpbutton-content">Register For FREE</span></a></div>
</div><div data-element-id="elm_6A-zwmHCULEWLQeNtBKQZQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_6A-zwmHCULEWLQeNtBKQZQ"] .zpimage-container figure img { width: 1110px ; height: 624.38px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Copy%20of%20Copy%20of%20Copy%20of%20Copy%20of%20Copy%20of%20Brown%20Orange%20Photo%20Collage%20Autumn%20Vibes%20LinkedIn%20Post%20%20.png" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_1h_dlkmGa2xkx6ZJKc5iaw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>If you've been stuck between understanding your security gaps and actually addressing them effectively, this is the bridge you need.</span></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 05 Feb 2026 20:45:54 +0000</pubDate></item><item><title><![CDATA[Case Study: How Proactive Security Testing Unlocked Enterprise Growth for Lelapa AI]]></title><link>https://www.gtconsult.com/blogs/post/case-study-how-proactive-security-testing-unlocked-enterprise-growth-for-lelapa-ai</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/Lelapa Case Study Thumbnail.png"/>Lelapa AI case study: How penetration testing and security certification removed platform uncertainty, met regulatory requirements, and enabled the company to pass cybersecurity compliance for 3 large enterprise clients.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_rXl1jDNnSwqQwIkTuNqsjw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_pzaIsu7mToG0b7H7-SqxrQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content- " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_frjj0KSVRW-yfQW_hhUe9Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_m8iqi9MvSO6L5XNJM9guEA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span>Turning Cybersecurity Compliance into a Competitive Advantage</span></h2></div>
<div data-element-id="elm_5NUU51R0QYitpRxIZxbG4w" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span><br/></span></p><p><span style="color:rgb(52, 73, 94);">Security certification isn't just about finding vulnerabilities—it's about building trust that enables business growth. Lelapa AI needed to remove uncertainty around user data safety and obtain regulatory certification to serve enterprise clients. A comprehensive two-week penetration testing engagement delivered both, becoming fundamental to passing cybersecurity compliance for three large enterprises.&nbsp;</span></p><p><span><br/></span></p></div>
</div><div data-element-id="elm_SofEsyT3yCsP4abOR3dwoQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_SofEsyT3yCsP4abOR3dwoQ"] .zpimage-container figure img { width: 1110px ; height: 624.38px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Lelapa%20Case%20Study%20Thumbnail.png" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_pfAxc724cYstwRS02-1GaA" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"></style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_bJ9fY4zAKdy7Y00PAzpUUw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong style="color:rgb(0, 27, 76);">Client Spotlight</strong></h2></div>
<div data-element-id="elm_cwqZ9OrDbSml3sdbonj-4Q" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><p style="margin-bottom:10.6667px;"><span style="font-weight:bold;">Jade Abbott, CTO of&nbsp;<a href="https://lelapa.ai/home/" title="Lelapa&nbsp;AI" target="_blank" rel="">Lelapa&nbsp;AI</a></span>, leads technology strategy at one of Africa's most innovative language AI companies.&nbsp;Lelapa&nbsp;AI builds&nbsp;cutting-edge&nbsp;transcription and translation solutions specifically designed for emerging markets, with a particular focus on Africa's diverse linguistic landscape.&nbsp;</p></div>
<div><p style="margin-bottom:10.6667px;"><span>As a fast-growing startup serving enterprise clients with&nbsp;highly sensitive&nbsp;data,&nbsp;Lelapa&nbsp;AI took a proactive approach to security—ensuring their platform could match their ambitious growth trajectory with robust protection.&nbsp;</span></p></div>
</div><p></p></div></div><div data-element-id="elm_1ii7ghNxbUV8ApEzNQpEtw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_1ii7ghNxbUV8ApEzNQpEtw"] .zpimage-container figure img { width: 500px ; height: 355.56px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-medium zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Purple%20and%20Black%20Elegant%20Business%20Pitch%20Deck%20Presentation%20Laptop%20Mockup%20Instagram%20Post.png" size="medium" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div><div data-element-id="elm_ABDP8mSpPnlg2pRVQlhUbg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_CXhGFAT1g5FWR4bE1iRhXg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_PA8xNYuNIJavgx_DM2DDKA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_dL94rCZW8HWyGOe5z-18MA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong style="color:rgb(0, 27, 76);">The Challenge: Enterprise Trust Requires Validated Security</strong></h2></div>
<div data-element-id="elm_MTiC-Y1tdtnJAVDr1OjwDQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p></p></div>
<p></p><p style="margin-bottom:10.6667px;">For&nbsp;Lelapa&nbsp;AI, securing enterprise trust was a strategic priority. Large enterprises were integrating their API to process highly protected data, and&nbsp;Lelapa&nbsp;AI was committed to providing the highest level of security assurance.&nbsp;</p><div><div></div>
<p></p><div><div></div><p></p><div><div></div><p></p><div><div></div><p></p><div><div></div>
<p></p><div><div></div><p></p><div><div></div><p></p><div><div></div><p></p><div><div></div>
<p></p><p style="text-align:center;margin-bottom:10.6667px;"><span style="font-size:20px;font-family:Raleway, sans-serif;color:rgb(166, 206, 57);"><span style="font-style:italic;">&quot;Large enterprises who use our API with highly protected data,&quot;</span>&nbsp;</span><span style="font-size:20px;font-family:Raleway, sans-serif;color:rgb(52, 73, 94);">Jade explains.</span><span style="font-size:20px;font-family:Raleway, sans-serif;color:rgb(166, 206, 57);">&nbsp;</span></p><p><span style="font-size:20px;font-family:Raleway, sans-serif;color:rgb(166, 206, 57);"></span></p><div><div><p style="text-align:center;margin-bottom:10.6667px;"><span style="font-family:Raleway, sans-serif;font-style:italic;color:rgb(166, 206, 57);"><span style="font-size:20px;">&quot;We needed a trusted team to assist us with penetration tests to ensure our system was air-tight and our clients' data was protected.&quot;</span>&nbsp;</span></p></div>
<div><p style="text-align:center;margin-bottom:10.6667px;"><span style="font-weight:bold;">The core challenge:</span>&nbsp;Enterprise clients demand rigorous proof of security before entrusting their sensitive data to any platform. Without independent, third-party validation, even the most secure systems face barriers to enterprise adoption.&nbsp;</p></div>
<div><p style="margin-bottom:10.6667px;">Lelapa&nbsp;AI's priorities were clear:&nbsp;</p></div>
<div><ul><li style="margin-left:24px;"><p><span style="font-weight:bold;">Validate their security posture</span>&nbsp;through comprehensive independent testing&nbsp;</p></li></ul></div>
<div><ul><li style="margin-left:24px;"><p><span style="font-weight:bold;">Meet stringent compliance requirements</span>&nbsp;that enterprise clients mandated&nbsp;</p></li></ul></div>
<div><ul><li style="margin-left:24px;"><p><span style="font-weight:bold;">Demonstrate commitment</span>&nbsp;to data protection and security excellence&nbsp;</p></li></ul></div>
<div><p style="margin-bottom:10.6667px;">For a growing startup, the solution needed to deliver enterprise-grade rigor while respecting both timeline and budget constraints.&nbsp;</p></div>
</div></div></div></div></div></div></div></div></div></div></div></div></div></div>
</div></div><div data-element-id="elm_Z1yzdIimsKYHQ-i88x-ocw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZSfi8GfjXSgzmE-z2gNMqA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_6OsQmYLkPZHrkSkzdhKS0w" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_zZQvzStIOmiOx1BiCS9RCw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong style="color:rgb(0, 27, 76);">Finding the Right Partner</strong><span></span></h2></div>
<div data-element-id="elm__brQpmBJl4KEsiYVoHiK6A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><p style="margin-bottom:10.6667px;"><span></span></p></div>
<div><p>After reaching out to other cybersecurity firms and seeking recommendations from the trusted ZATech Slack community, Lelapa AI found GTconsult.</p><p><br/></p><p style="text-align:center;"><span style="font-family:Raleway, sans-serif;font-size:20px;font-weight:300;"><span style="color:rgb(166, 206, 57);font-style:italic;"><strong>&quot;We decided GTConsult were the right fit as they came highly recommended, worked quickly and the pricing was well aligned with our startup budget,&quot;&nbsp;</strong></span><span style="color:rgb(52, 73, 94);">Jade notes.</span></span></p></div>
<div><p style="margin-bottom:10.6667px;"><span></span></p></div></div><p></p></div>
</div><div data-element-id="elm_25tSkDDc7-BMJoHKaw7mPg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_25tSkDDc7-BMJoHKaw7mPg"] .zpimage-container figure img { width: 1110px ; height: 466.20px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Partnership.gif" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div><div data-element-id="elm_uFyXipTTCN_HBoA1rlb2sA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_CN4VoSkshuneeEhwgQtSyg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_pSNO5uS7Bt4Uc3irF7xhAg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_MF5d_jQuddCFjBCyLKByHw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong style="color:rgb(0, 27, 76);">The Solution: Comprehensive Security Assessment and Certification</strong></h2></div>
<div data-element-id="elm_HRFbLYljr-rFH9mjwyyufg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>The engagement delivered in-depth penetration testing that combined automated and manual testing following the latest cybersecurity standards, designed to ensure there were no vulnerabilities that could lead to damage for Lelapa AI or their customers—and to provide the certification necessary for regulatory compliance.</span></p></div>
</div><div data-element-id="elm_xy0kP2PU9wcnLuTVRT3cDg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>The Process: Three-Phase Testing Over Two Weeks</span></h2></div>
<div data-element-id="elm_Y0TjBt6QxX2d-Hg10Xv73Q" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_Y0TjBt6QxX2d-Hg10Xv73Q"] div.zpspacer { height:8px; } @media (max-width: 768px) { div[data-element-id="elm_Y0TjBt6QxX2d-Hg10Xv73Q"] div.zpspacer { height:calc(8px / 3); } } </style><div class="zpspacer " data-height="8"></div>
</div></div></div></div></div><div data-element-id="elm_OVXkhjzFWsOm7CVZc-bkCw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg zscustom-section-139 "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_cQQGTC-9stn-b0hhzc2b2Q" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_uYQDIiHjvDkdB3OwiZG2Xg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zscolumn-spacing zpalign-self- zplight-section zplight-section-bg "><style type="text/css"></style><div data-element-id="elm_2h8NulGhkYFxEwnh9uMY7w" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_pI83Rcc5IzXmmFVKe2ymLQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_CP75LUg_hWfSibXAcKl6bw" data-element-type="box" class="zpelem-box zpelement zpbox-container zsbox-spacing zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_CP75LUg_hWfSibXAcKl6bw"].zpelem-box{ background-color:rgb(255, 255, 255); background-image:unset; } </style><div data-element-id="elm_UJorRtbMwPLtjcoBQS-rbQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Phase 1: External Threat Simulation</span></h3></div>
<div data-element-id="elm_CVE7AABbv_pfVuPUYYlQ6g" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>The engagement began with open-source intelligence gathering and black box testing. Acting as typical outside threat actors, the security team searched for information that could be used in hacking and phishing attempts, while testing the security of all publicly available infrastructure and web applications.</span></p></div>
</div></div></div><div data-element-id="elm_G-M8807Yh6YrGkyfQpFf6A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_O7rg51UqJ5QHIJaY5wzfAQ" data-element-type="box" class="zpelem-box zpelement zpbox-container zsbox-spacing zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_O7rg51UqJ5QHIJaY5wzfAQ"].zpelem-box{ background-color:rgb(255, 255, 255); background-image:unset; } </style><div data-element-id="elm_RygTBghSwnxXwUK1v_RKtA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Phase 2: Authenticated Assessment</span></h3></div>
<div data-element-id="elm_l6QJRajXKkJShmo1IkWLqg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>Testing progressed to an authenticated, focused assessment of the web application, associated APIs, and generative AI systems. This phase examined configurations and potential vulnerabilities from an insider perspective.</span></p><p><span><br/></span></p><p><span><br/></span></p></div>
</div></div></div><div data-element-id="elm_4gymBEeV1URDU5nnH-9y3w" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_OqWa3F6g0Z8udaTDZmbdjg" data-element-type="box" class="zpelem-box zpelement zpbox-container zsbox-spacing zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_OqWa3F6g0Z8udaTDZmbdjg"].zpelem-box{ background-color:rgb(255, 255, 255); background-image:unset; } </style><div data-element-id="elm_gvUYGyln15altYf-MpNFoQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Phase 3: Reporting and Certification</span></h3></div>
<div data-element-id="elm_vdpB2-vWockMVu4KxecTHw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>A detailed assessment report was prepared. Due to Lelapa AI's infrastructure and software design, no issues were identified and a certificate of security excellence was provided.</span></p><p><span><br/></span></p><p><span><br/></span></p><p><span><br/></span></p></div>
</div></div></div></div></div></div><div data-element-id="elm_ErrM0-EaYITIpOoPcKmJ5A" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_xo-FCgfFFGVR-Im51Fjc9Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_ipwiVYeKST52YLiRbFclRg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_ipwiVYeKST52YLiRbFclRg"] .zpimage-container figure img { width: 1110px ; height: 804.32px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Screenshot%202025-10-27%20144142.png" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div></div></div><div data-element-id="elm_-SVcxS935B69FcTO5XWb0g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_nwsbHp5xgXHKYhN2abp-Zw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_EB89Bysz9ues_cSbjCZibA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>The engagement utilized a mix of open-source and industry-standard tools, from automated vulnerability scanners to manual tests designed specifically for Lelapa AI's infrastructure and software combinations.</span></p></div>
</div><div data-element-id="elm_QyUu6QrswD66iSTp8IYvPg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><span>The Experience: Seamless and Efficient</span></span></h2></div>
<div data-element-id="elm_WbaKBuRh2iTgfsDfmxdk7A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p style="text-align:center;"><span style="font-family:Raleway, sans-serif;font-size:20px;font-weight:300;"><span style="color:rgb(166, 206, 57);font-style:italic;"><strong>&quot;The process was so straightforward, I barely remember it—and as a CTO of a startup, that's ideal,&quot;&nbsp;</strong></span><span style="color:rgb(52, 73, 94);">Jade recalls.</span></span></p><p style="text-align:center;"><span><br/></span></p><p style="text-align:center;"><br/></p><p></p><div><p><br/></p><p><strong><span style="font-weight:500;">From GTconsult's security team's perspective, the collaboration was equally smooth:</span></strong></p><p><strong><br/></strong></p><p style="text-align:center;"><strong style="font-family:Raleway, sans-serif;"><span style="font-size:20px;font-weight:300;color:rgb(166, 206, 57);font-style:italic;">&quot;Working with Lelapa AI was truly a dream. The friendly and professional staff were great to talk with. They knew exactly what they needed out of this exercise and worked closely together with us to knock it out, no time wasted.&quot; </span><span style="font-size:20px;font-weight:300;color:rgb(52, 73, 94);">Kyle Farr, Security Analyst at GTconsult</span></strong></p><p><strong>&nbsp;</strong></p><p>The engagement was characterized by clear communication, well-documented requirements from the start, and a collaborative approach.&nbsp;<span>For a startup CTO managing multiple priorities, this meant security validation could be completed without disrupting other business initiatives.</span></p><p><br/></p><p style="text-align:center;"><span style="font-family:Raleway, sans-serif;font-weight:300;"><span style="font-size:20px;"><span style="color:rgb(166, 206, 57);font-style:italic;">&quot;The main issue we usually face is that the internal infrastructure teams can see outside penetration testing in a bad light, something looking to make them look bad, but that is not the case at all with Lelapa AI's team. We are well aware that no one person can know everything and that is why we focus our expertise on security, to assist fill in the gaps and keep our clients safe.&quot;&nbsp;</span><strong style="text-align:center;"><span style="font-weight:300;color:rgb(52, 73, 94);">Kyle Farr, Security Analyst at GTconsult</span></strong></span></span></p></div>
<p><br/></p>The engagement was characterized by clear communication, well-documented requirements from the start, and a collaborative approach.&nbsp; <p></p></div>
<p></p></div></div></div></div></div></div><div data-element-id="elm_dnXxBw6nxiwCpjk_os2o-Q" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_t3psEv4BFZDiTnsSW0WvxA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_gBrGo8-GsmNXVFl_MOBf2g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_clLR3-VTPCcazzJ2IiLzvA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong style="color:rgb(0, 27, 76);">The Results: Certification, Compliance, and Enterprise Growth</strong></h2></div>
<div data-element-id="elm_ZhZCUL1KR5jGvRQKYT9JPQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>The certification and validation became fundamental enablers of business growth.</span></p></div>
</div><div data-element-id="elm_M0w3alMUuginweoQAa5Mqw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Immediate Outcomes</span></h2></div>
<div data-element-id="elm_z8GbTCr6MjrUMmFefiqVHw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span>✓&nbsp;</span>Certificate of security excellence obtained for regulatory compliance<br/> ✓ No vulnerabilities identified<br/> ✓ Regulatory requirements met<br/> ✓ Customer data safety confirmed</span></p></div>
</div><div data-element-id="elm_cPqDu0zRlKrvrUwZnfi2Uw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_cPqDu0zRlKrvrUwZnfi2Uw"] .zpimage-container figure img { width: 799px !important ; height: 462px !important ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/warriors%20state%20GIF.gif" size="custom" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_x1lcQobM_qIxJVyriUyO3A" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Business Impact</span></h2></div>
<div data-element-id="elm_YkEzW-AJPyjZiKOzmj4zfA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p style="text-align:center;"><span style="font-family:Raleway, sans-serif;font-size:20px;font-weight:300;color:rgb(166, 206, 57);"><strong style="font-style:italic;">&quot;We've been able to pass cybersecurity compliance of 3 large enterprises (and counting) which the pen test was a fundamental part of,&quot;</strong></span><span style="font-family:Raleway, sans-serif;font-size:20px;font-weight:300;color:rgb(52, 73, 94);">Jade reports.</span></p><p><br/></p><p>Three major enterprise clients were onboarded, with the penetration test playing a fundamental role in passing their cybersecurity compliance requirements.</p></div>
<p></p></div></div></div></div></div></div><div data-element-id="elm_DW0mSop26tvtD_HkLdx4fg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_yoeOIqOHOx-5mYiD26LKUA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_dU42XdpXgoZMYtrIPnVgzQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_IH9mEtID9VKM-mj-bgSctw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong style="color:rgb(0, 27, 76);">The Core Value: Trust Through Validation</strong></h2></div>
<div data-element-id="elm_8bkOD9ITtLAL4i_3i2Epzw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><div><p>When asked about the most valuable outcome, Jade's answer captured the essence:</p><p><br/></p><p style="text-align:center;"><strong style="font-family:Raleway, sans-serif;"><span style="font-size:20px;font-weight:300;font-style:italic;color:rgb(166, 206, 57);">&quot;Us and our clients now trust that our API is secure on our platform.&quot;</span></strong></p><p><strong><br/></strong></p><p>This trust operates at multiple levels:</p><p><br/></p><p></p><div><h3>Internal Confidence</h3><p>The Lelapa AI team builds and scales with assurance that their security foundation is solid, validated by external experts.</p><p><br/></p><h3>Client Confidence</h3><p>Enterprise clients onboard knowing their sensitive data is protected by a platform that has been rigorously tested and certified by independent security experts.</p><p><br/></p><h3>Regulatory Confidence</h3><p>With proper certification in hand, Lelapa AI can demonstrate compliance to regulatory bodies.</p></div>
<br/><p></p></div><p></p></div><p></p></div><p></p></div></div></div></div></div>
</div><div data-element-id="elm_ZPSU4M774bO0rUtQgdLDBg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_8-WbMhJ4_IZm54bldULsZQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_9iVZ01Hw9Qql2gK5-Inw6Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_AfohQWCznjCFPBrNCuXgrA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong style="color:rgb(0, 27, 76);">Why This Matters: Security Validation as a Strategic Lever</strong></h2></div>
<div data-element-id="elm_dPEUkO_TgChz4GdwvbHqGw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>Lelapa AI's experience demonstrates how proactive security validation and certification function as business enablers.</span></p></div>
</div><div data-element-id="elm_gpuKYZMJKGM4Fby4znC7_A" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>The Value of Penetration Testing</span></h2></div>
<div data-element-id="elm_wBqxJe-HrDEUtsnV6jKEsA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><strong>Regulatory Compliance</strong> Formal certification through penetration testing addresses regulatory requirements for operating in certain industries or serving enterprise clients.</p><p><br/></p><p><strong>Enterprise Requirements</strong> Enterprise deals often require security compliance and proper certification before contracts can be finalized.</p><p><br/></p><p><strong>Sales Documentation</strong> Having security certification ready provides documentation that enterprise procurement processes require.</p><p><br/></p><p><strong>Operational Confidence</strong> Comprehensive testing validates existing security measures and confirms platform safety.</p><p><br/></p><p><strong>Removing Uncertainty</strong> Proper security validation eliminates uncertainty about platform safety, allowing teams to focus on growth.</p></div><p></p></div>
</div><div data-element-id="elm_U4RFbL-9mU6xBIo3THURwA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_Vl6nNNIT4cnm4RIdd90ziw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zscolumn-spacing zpalign-self- zplight-section zplight-section-bg "><style type="text/css"> [data-element-id="elm_Vl6nNNIT4cnm4RIdd90ziw"].zpelem-col{ margin-block-start:21px; } </style><div data-element-id="elm_2cptznuOBEG0WdaCuIjfbg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"> [data-element-id="elm_2cptznuOBEG0WdaCuIjfbg"].zprow{ margin-block-start:18px; } </style><div data-element-id="elm_j_iz0IZkwf2lxdto79UB6g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_ZoMQLbcDFwmGyhFkmQEP7Q" data-element-type="box" class="zpelem-box zpelement zpbox-container zsbox-spacing zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_ZoMQLbcDFwmGyhFkmQEP7Q"].zpelem-box{ background-color:rgb(255, 255, 255); background-image:unset; } </style><div data-element-id="elm_SH842DpToUXsWcv41Cx_uw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><span>For CTOs and Technical Leaders</span></span></h3></div>
<div data-element-id="elm_JWq-NIDUQ7ECPGs29hIaAg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_JWq-NIDUQ7ECPGs29hIaAg"].zpelem-text { margin-block-start:14px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span></span></p><div></div><p></p><ul><li>External security testing provides validation and removes uncertainty</li><li>The right engagement requires minimal time investment from internal teams</li><li>Certification supports enterprise sales processes</li><li>A two-week engagement can address compliance requirements</li></ul><div><br/></div>
</div></div></div></div><div data-element-id="elm_0l5kBqdKlLqFpyvdEVBGGw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm__XMk9pz5aurIj66FvPKeCA" data-element-type="box" class="zpelem-box zpelement zpbox-container zsbox-spacing zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm__XMk9pz5aurIj66FvPKeCA"].zpelem-box{ background-color:rgb(255, 255, 255); background-image:unset; } </style><div data-element-id="elm_YyyIuEDvmKOLUmwJZaT3Xg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><span>For Growing Companies</span></span></h3></div>
<div data-element-id="elm_PiMOBsVcxVhGIh64ZA0w8w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_PiMOBsVcxVhGIh64ZA0w8w"].zpelem-text { margin-block-start:59px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><div><div><ul><li>Early security certification supports enterprise market entry</li><li>Compliance readiness addresses enterprise client requirements</li></ul><div><br/></div><div><br/></div><div><br/></div><div><br/></div>
<div><br/></div></div></div></div></div></div></div><div data-element-id="elm_tFKszluTv51qLWhrsdwwuw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_w5-vCIPzVM9lZgQmPwjhWA" data-element-type="box" class="zpelem-box zpelement zpbox-container zsbox-spacing zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_w5-vCIPzVM9lZgQmPwjhWA"].zpelem-box{ background-color:rgb(255, 255, 255); background-image:unset; } </style><div data-element-id="elm_s3G5BwG1mvUVLH1oTdG6Lg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><span>For Sales and Business Development</span></span></h3></div>
<div data-element-id="elm_dEQ81BCD_abIXmJMeh_aRg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><div><div><ul><li>Security certification provides documentation enterprise prospects require</li><li>Regulatory compliance documentation is necessary for many enterprise deals</li><li>Third-party certification supports enterprise sales processes</li></ul><div><br/></div></div></div><div><br/></div>
</div></div></div></div></div></div></div></div></div></div></div><div data-element-id="elm_5qTZ-Ae0yTAKwsdyXxWOIg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_zhRCkJUgReGTeGSQPv3nXQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_PlUGrgejpNJyBntQkB0l-g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_jVFFM00St45fFLCN5C_Waw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-center zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong style="color:rgb(166, 206, 57);">Side Quest: Learn how we conduct a penetration test</strong></h2></div>
<div data-element-id="elm_FoOoBs5fjDR4VxdvChVi8g" data-element-type="video" class="zpelement zpelem-video "><style type="text/css"> @media (max-width: 767px) { [data-element-id="elm_FoOoBs5fjDR4VxdvChVi8g"].zpelem-video iframe.zpvideo{ width:560px !important; height:315px !important; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_FoOoBs5fjDR4VxdvChVi8g"].zpelem-video iframe.zpvideo{ width:560px !important; height:315px !important; } } </style><div class="zpvideo-container zpiframe-align-center zpiframe-mobile-align-center zpiframe-tablet-align-center"><iframe class="zpvideo " width="560" height="315" src="https://www.youtube.com/embed/e4YSke1x13o?si=TaIlXdi1ChpEDzhV" frameborder="0" allowfullscreen></iframe></div>
</div><div data-element-id="elm_DWeP2bLwht_5TcRbU-Mdbw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><strong style="color:rgb(0, 27, 76);">The Bottom Line: Certification Supports Growth</strong></h2></div>
<div data-element-id="elm_sATENfUYJrbM3iPekcyAOw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>Lelapa AI's approach to security testing and certification addressed regulatory compliance requirements and supported their enterprise client onboarding.</p><p><br/></p><p><strong>Three enterprise clients onboarded. Certification obtained. Regulatory requirements met.</strong></p><p><strong><br/></strong></p><p>The two-week engagement provided the certification that was a fundamental part of passing cybersecurity compliance for three large enterprises.</p><p>For technology companies serving enterprise clients: security validation and certification can address regulatory requirements and support enterprise sales processes.</p></div><p></p></div>
</div><div data-element-id="elm_NDW5gk-qJ4ouPSBPu02NSQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_NDW5gk-qJ4ouPSBPu02NSQ"].zpelem-divider{ margin-block-start:10px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div></div></div></div></div><div data-element-id="elm_AkQzUy5kO7zHa5pRoFbgKg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm__KQoLtlxQWF1N3sErmrSrw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_f1N-HbfZJSpOZe7bCxtFeg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_ibBb3IKas2AfFlRJHXYgRg" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_ibBb3IKas2AfFlRJHXYgRg"] .zpimageheadingtext-container figure img { width: 157.46px !important ; height: 37px !important ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/A-team%20protection%20logo.png" data-src="/Blog%20Site/A-team%20protection%20logo.png" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left" data-editor="true"><strong style="color:rgb(192, 57, 43);font-style:italic;">When was the last time you had your API score tested?</strong></h3><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p></p><div><p>If your API hasn’t been tested in a while, you might be relying more on luck than on performance. Unnoticed errors, broken endpoints, or security gaps can easily slip through and impact your users. Our QA team specializes in comprehensive API testing to help you catch issues early, improve system stability, and build user trust.</p><p><br/></p><p>Have a look at our A Team Security Services:</p></div>
<p></p></div></div></div></div><div data-element-id="elm_IiSnilx7SGcWfMI2FCpiEg" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"> [data-element-id="elm_IiSnilx7SGcWfMI2FCpiEg"] .zpbutton.zpbutton-type-primary{ background-color:#C0392B !important; } </style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="/protection" target="_blank"><span class="zpbutton-content">A Team Protection</span></a></div>
</div><div data-element-id="elm_Y9LUKbZInCSEOrQf7093vg" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"></style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_HW9ThXI-2MG49_VV985xKw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><em>Lelapa AI continues to grow across African markets, serving enterprise clients with validated security and regulatory compliance.</em></p><p><em><br/></em></p><p><strong>We're grateful to Jade Abbott and the Lelapa AI team for taking the time to share their experience and insights for this case study.</strong></p></div><p></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 27 Oct 2025 12:38:44 +0000</pubDate></item><item><title><![CDATA[The Five Most Common Vulnerabilities Uncovered During Penetration Testing ]]></title><link>https://www.gtconsult.com/blogs/post/the-five-most-common-vulnerabilities-uncovered-during-penetration-testing-real-life-lessons</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/CRITICAL VULNERABILITIES THUMBNAIL.png"/>Discover the five most common vulnerabilities from real 2023-2025 breaches. Learn how weak passwords bankrupted 23andMe and unpatched systems exposed 193M records—and how penetration testing prevents these devastating attacks.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_uJ3z3gRBSmSmvURjDSW3mQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_HKs2gz2KTlSmhFu2iKO2_w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_8-n6u601RPWAGdXGFIBnKQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_KQPkFfIFTgGhrXdNyq910g" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span>Real-Life Lessons</span></h2></div>
<div data-element-id="elm_88zBcHc0TaiAo3Gs11YSjg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><div><p style="margin-bottom:10.6667px;"><span>Now, more than ever, most organizations only discover their security weaknesses after an attack. But it does not have to be that way, a lot these attacks could have been prevented if organizations just had a proactive approach rather than a reactive one when it comes to their cybersecurity.&nbsp;</span></p></div>
<div><p style="margin-bottom:10.6667px;"><span>Penetration testing simulates real-world attacks to identify and help remediate security vulnerabilities before malicious actors can exploit them.</span></p></div>
</div><p></p></div></div><div data-element-id="elm_Nyzryuswbot45m5f24atgw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><b><span>The Uncomfortable Truth About Modern Cybersecurity</span></b></span></h2></div>
<div data-element-id="elm_eU25B0wsXhc0dzePoglOqw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><span>If you’re a security professional, and even if you aren’t actually, this question may have crossed your mind before:</span></p><p><span>&nbsp;</span></p><p><span style="font-style:italic;color:rgb(166, 206, 57);"><strong>**If Microsoft, Google, and healthcare giants with unlimited security budgets can be breached, what chance do we have?**</strong></span></p><p><span>&nbsp;</span></p><p><span>The answer might surprise you—and it starts with understanding that these breaches weren't the result of sophisticated attack chains or unknown zero-day exploits.</span></p><p><span>&nbsp;</span></p><p><span>They failed because of the same vulnerabilities we discovered in majority of penetration tests.</span></p></div><p></p></div>
</div><div data-element-id="elm_wHX25U9BHKr6rWkmEl1-bA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><b><span>Why This Matters to Your Organization</span></b><span>&nbsp;</span></span></h2></div>
<div data-element-id="elm_VjxvhII64Pgn2lwrozKLRQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><span>You might be thinking:&nbsp;</span></p><p><span><br/></span></p><p><span style="font-style:italic;color:rgb(166, 206, 57);"><strong>*&quot;We're not Microsoft. We're not a target for these attacks.&quot;*</strong></span></p><p><span>&nbsp;</span></p><p><span>That's precisely the mindset that creates vulnerability.</span></p><p><span>&nbsp;</span></p><p><span>The attacks that compromised Microsoft or any of the organizations in this blog weren't sophisticated. They were opportunistic. Attackers used password spraying—a technique so basic it's covered in entry-level security courses.</span></p><p><span><br/></span></p><p><span>Your organization doesn't need to be &quot;important enough&quot; to be targeted. You just need to be vulnerable enough to be profitable.</span></p><p><span><br/></span></p><p><span>Let's have a look at the five common vulnerabilities we've uncovered during penetration testing.</span></p><p><span>&nbsp;</span></p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_swwpEbiD9b9kRv574PwfjA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_MF-CrQAOWtnkLiwL6mLzOg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_LszLbRe4uqhpYpJcKYbozQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_cCPWvW4-aCiziCKkKpnl2g" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_cCPWvW4-aCiziCKkKpnl2g"] .zpimageheadingtext-container figure img { width: 500px ; height: 333.44px ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-medium zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/strong-and-weak-easy-password-concept-2025-02-21-00-00-34-utc.jpg" data-src="/Blog%20Site/strong-and-weak-easy-password-concept-2025-02-21-00-00-34-utc.jpg" size="medium" data-lightbox="true"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left" data-editor="true"><strong style="color:rgb(0, 27, 76);">1. Weak or Reused Passwords</strong></h3><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p></p><p><strong>23andMe (2023-2024)</strong>: In 2023, 23andMe experienced a credential stuffing attack that exposed genetic data of approximately 7 million customers—roughly half of the service's userbase. The breach had devastating consequences, with the biotech company filing for Chapter 11 bankruptcy in March 2025. The UK Information Commissioner's Office fined 23andMe £2.3 million for failing to implement mandatory multi-factor authentication and secure password requirements. This demonstrates the catastrophic business impact that credential-based attacks can have on organizations.</p><p><br/></p><p><span><strong>Snowflake Breaches (2024):</strong> The Snowflake breach in late 2024 exposed customer data where improperly secured accounts—some without multifactor authentication—were used to exfiltrate information. This breach affected multiple organizations using the platform and highlighted how weak authentication practices can have cascading effects across an entire ecosystem.</span><br/></p><p><span><br/></span></p><p><span></span></p><div><p><strong>The Scale of the Problem:</strong> In 2025, researchers discovered 16 billion exposed credentials from 30 different databases, primarily harvested by infostealer malware campaigns, representing the largest credential breach compilation recorded to date. Analysis of data leaks from 2024-2025 reveals that 94% of passwords are reused or duplicated, with only 6% being unique.</p><p>Weak or reused passwords are one of the easiest ways for attackers to gain unauthorized access. Despite widespread use of multi-factor authentication (MFA), poor password practices remain a primary entry point for attacks.</p></div><br/><p></p><p><span></span></p><div><p><strong>Prevention:</strong></p><ul><li>Enforce complex, unique passwords and implement MFA</li><li>Conduct regular password audits</li><li>Educate employees about password hygiene</li></ul><div><span><strong><br/></strong></span></div><div><span><strong>Pen Test Role:</strong> Pen testers use brute-force attacks, credential stuffing, and password spraying to uncover weak or reused passwords across systems.</span><br/></div></div><p></p></div>
</div></div></div></div></div></div></div><div data-element-id="elm_YHs4ovdUB14TNwZexIE1KA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_nM3WSnS_zhXI5ty4oFyazA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_HErHEM45O1qgRZV61i8iuA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_pQQWX2wwFnnQP-U_PV39xQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-size:24px;color:rgb(0, 27, 76);"><strong>2. Unpatched Systems &amp; Software</strong></span></h2></div>
<div data-element-id="elm_UX7pjrT-3QrFCu5VyfpvpQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><strong>Change Healthcare (2024):</strong> In February 2024, United Health-owned prescription processor Change Healthcare suffered a massive ransomware attack that cost the company $2.457 billion and exposed the private data of approximately 193 million individuals—making it the largest healthcare data breach ever reported. The ALPHV/BlackCat ransomware group exploited a Citrix remote access service that lacked multi-factor authentication. This breach disrupted healthcare services across the United States, affecting 94% of hospitals and preventing billions of dollars in claims processing.</span></p><p><span><br/></span></p><p><span></span></p><div><p><strong>MOVEit Transfer (2023):</strong> In May 2023, the CLOP ransomware gang exploited a zero-day SQL injection vulnerability (CVE-2023-34362) in Progress Software's MOVEit Transfer application. By the end of 2023, the attack had compromised more than 2,700 organizations and exposed approximately 93.3 million personal records, with total damages estimated at $12.15 billion. High-profile victims included British Airways, the BBC, Shell, the U.S. Department of Energy, and numerous universities. This breach highlighted the critical importance of rapid vulnerability patching and the devastating consequences of zero-day exploits.</p><p><br/></p><p><strong>AVTECH IP Cameras (2024):</strong> In August 2024, security researchers discovered an unpatched vulnerability in AVTECH IP cameras used in critical infrastructure was being exploited to spread Mirai malware, despite the vulnerability being known since 2019. This five-year delay in addressing a known vulnerability put essential services at risk.</p></div><p></p></div>
</div><div data-element-id="elm_jfKxukBsa3fdBF4ViATjAw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_jfKxukBsa3fdBF4ViATjAw"] .zpimagetext-container figure img { width: 500px ; height: 356.88px ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-medium zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/keys-to-deploy-and-patch-2025-10-13-10-07-42-utc.jpg" size="medium" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p><span>Outdated systems and unpatched software are among the most common vulnerabilities exploited by attackers. Missing security updates can allow attackers to leverage known vulnerabilities to compromise systems.</span></p><p><span><br/></span></p><p><span></span></p><div><p><strong>Prevention:</strong></p><ul><li>Maintain a robust patch management program</li><li>Conduct regular vulnerability scans</li><li>Prioritize patching critical systems</li></ul><p><strong><br/></strong></p><p><strong>Pen Test Role:</strong> Pen testers identify unpatched systems and attempt to exploit publicly known vulnerabilities (CVEs) to assess the potential impact.</p></div><br/><p></p></div>
</div></div></div></div></div></div><div data-element-id="elm_VXvtA4j7W9MVMkGbmcn8zw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_SoJwQ82Dr6ZrWWwyzcDZwQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_XF2F0hhpplR2gg0ePlbjWg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_SlJrOxZAypPFF91NfIHnJQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-size:24px;color:rgb(0, 27, 76);"><strong>3. Misconfigured Permissions &amp; Access Controls</strong></span></h2></div>
<div data-element-id="elm_5xMQdQebX6Gr86Grt8KvVw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><strong>Microsoft Breach (2024):</strong> In late 2023 (discovered January 2024), state-backed cyber espionage group Midnight Blizzard (also known as APT29, Nobelium, and CozyBear) gained access to Microsoft leadership and cybersecurity team emails. The attackers used password spraying attacks against a legacy test account that lacked multi-factor authentication and had elevated access. They then exploited a legacy OAuth application that granted full access to all mailboxes in the organization. Even one of the world's leading technology companies fell victim to misconfigured access controls and orphaned test accounts.</span></p></div>
</div><div data-element-id="elm_keLX2Wj9ocUXXEu4d-jnqA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><strong>Marks &amp; Spencer (2025):</strong> In May 2025, M&amp;S suffered a major cyberattack attributed to the &quot;Scattered Spider&quot; group deploying DragonForce ransomware, potentially linked to vulnerabilities in its IT outsourcing partner Tata Consultancy Services, with an expected £300 million profit loss. This breach demonstrates how misconfigurations in third-party relationships can have massive financial consequences.</span></p></div>
</div><div data-element-id="elm_BrS7AkcFfza4Vuq4-TD0yA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><strong>Western Alliance Bank (2025):</strong> Western Alliance Bank experienced a data breach in March 2025, stemming from exploitation of a zero-day vulnerability in a third-party secure file transfer tool provided by Cleo. The Clop ransomware group gained unauthorized access to approximately 22,000 customers' sensitive information, highlighting vulnerabilities in supply chain security.</span></p></div>
</div></div></div></div></div><div data-element-id="elm_3gVr-Be2hrQkMlsK06WgJg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZnqnRkvmZn1h7AjtZMSCkg" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_7Wkws9QEStbs3SeYAQXQwQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_7Wkws9QEStbs3SeYAQXQwQ"].zpelem-col{ margin-block-start:-164px; } </style><div data-element-id="elm_NhAMyyxJb524iAnkaX_fWA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_NhAMyyxJb524iAnkaX_fWA"].zpelem-text { margin-block-start:171px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span></span></p><div><p><strong>Prevention:</strong></p><ul><li>Enforce least-privilege access principles</li><li>Regularly review and audit permissions</li><li>Segment networks and sensitive data appropriately</li><li>Remove legacy and test accounts with elevated privileges</li></ul><p><strong><br/></strong></p><p><strong>Pen Test Role:</strong> Pen testers attempt privilege escalation, unauthorized access, and lateral movement to uncover misconfigurations.</p></div><p><span><br/></span></p><p><span><br/></span></p></div>
</div></div><div data-element-id="elm_eM9f85hggJ45zoOhr-u3NA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_0PrJZrGpfjVJj4r7gb70Ew" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_0PrJZrGpfjVJj4r7gb70Ew"] .zpimage-container figure img { width: 534px !important ; height: 339px !important ; } } @media (max-width: 767px) { [data-element-id="elm_0PrJZrGpfjVJj4r7gb70Ew"] .zpimage-container figure img { width:415px ; height:276.39px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Screenshot%202025-10-20%20150919.png" width="415" height="276.39" loading="lazy" size="custom"/></picture></span></figure></div>
</div></div></div></div></div><div data-element-id="elm_-GZ5iHujlFHvkHyglKYXng" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_JZBVUmwXys8bi4-eH4424g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_SA67up74noiBNTH5K3CodA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_tA36bCw4yeJqIlnMLM06Fw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-size:24px;color:rgb(0, 27, 76);"><strong>4. Insufficient Network Monitoring &amp; Logging</strong></span></h2></div>
<div data-element-id="elm_7SJrg3a0pMuKH-lFO4k4yQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><strong>Office of the Comptroller of the Currency (2025):</strong> In early 2025, the U.S. OCC identified suspicious interactions between a system administrative account and internal user mailboxes—activity that had gone undetected for months, raising concerns about the agency's visibility into its systems and the effectiveness of its logging practices. This breach at a federal financial regulator highlighted how even government agencies struggle with monitoring gaps.</p><p><br/></p><p><strong>AT&amp;T Breach (2022-2024):</strong> AT&amp;T confirmed a significant data breach involving unauthorized access to its Snowflake cloud storage environment. The breach occurred between May 1, 2022, and October 31, 2022, but wasn't detected until April 2024—a detection delay of nearly two years. The breach exposed over 86 million records, including Social Security Numbers. This prolonged detection window allowed attackers extensive time to access and potentially monetize sensitive customer data.</p><p>Without effective monitoring and logging, suspicious activity can go undetected, giving attackers more time to exploit vulnerabilities and exfiltrate data.</p></div><p></p></div>
</div><div data-element-id="elm_TSYZKIxBq06RfvT0EPudSA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><strong>Prevention:</strong></p><ul><li>Implement centralized logging and real-time monitoring solutions</li><li>Regularly analyze logs for anomalies</li><li>Set up automated alerts for suspicious activity</li><li>Establish baseline behavior to detect deviations</li></ul><p><strong><br/></strong></p><p><strong>Pen Test Role:</strong> Pen testers attempt to bypass detection and exfiltrate data to identify gaps in monitoring systems and incident response processes.</p></div><p></p></div>
</div><div data-element-id="elm_82n8Go8UnMobWIli9PqS9g" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-size:24px;color:rgb(0, 27, 76);"><strong>5. Human Error &amp; Social Engineering Vulnerabilities</strong></span></h2></div>
<div data-element-id="elm_s35FSM2BjhpANhWBhCwhGA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_s35FSM2BjhpANhWBhCwhGA"] .zpimage-container figure img { width: 1110px ; height: 459.26px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/pensive-doubtful-businessman-brainstorming-ideas-2025-02-18-02-35-46-utc.JPG" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_qwwrJ76KvnNj1w3HinRCng" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><strong>Coinbase (2025):</strong> In May 2025, Coinbase confirmed a breach when cybercriminals bribed overseas support staff to leak sensitive customer data, including names, birthdates, email addresses, and partial Social Security numbers. Attackers used this data to orchestrate highly targeted social engineering attacks against customers. This breach highlighted the vulnerability of outsourced operations and the human element in security, demonstrating that even financial incentives can compromise insider threats.</p><p><br/></p><p><strong>Google Salesforce Breach (2025):</strong> In August 2025, Google confirmed a data breach from a compromised Salesforce-hosted corporate database. The hacking group ShinyHunters gained access through social engineering by impersonating IT support staff and tricking a Google employee into approving a malicious application. Even at tech giants with sophisticated security teams and trained personnel, social engineering remains remarkably effective.</p><p><br/></p><p><strong>Workday Breach (2025):</strong> On August 18, 2025, Workday disclosed a data breach stemming from a social engineering campaign where threat actors impersonated HR or IT staff. They contacted employees by phone or text to trick them into granting access to a third-party CRM platform. This demonstrates the evolving sophistication of social engineering tactics and the importance of verification procedures for access requests.</p><p>Humans are often the weakest link in cybersecurity. Attackers use phishing, pretexting, impersonation, and other social engineering tactics to manipulate employees into granting access.</p></div><p></p></div>
</div><div data-element-id="elm_Rcv30wOoXGc3U4DlgVEnNA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><strong>Prevention:</strong></p><ul><li>Conduct ongoing security awareness training</li><li>Simulate phishing campaigns regularly</li><li>Implement multi-factor authentication and verify requests for sensitive actions</li><li>Establish clear protocols for verifying identity before granting access</li><li>Create a culture where employees feel comfortable questioning suspicious requests</li></ul><p><strong><br/></strong></p><p><strong>Pen Test Role:</strong> Pen testers simulate phishing attacks and social engineering scenarios to assess employee awareness and identify weak points in organizational security culture.</p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_55eupCmehmJZB7u8g3Wyxw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_icfhLNsVUAXd3grU_izZ3g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_bdveC3dLaCgF1liOFwQJog" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_MFeHPn3zwVAiRpcO4BOWtw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-size:24px;color:rgb(0, 27, 76);"><strong>Conclusion</strong></span></h2></div>
<div data-element-id="elm_png9rh5TOgppzwbsVA6hGQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>Penetration testing serves as a proactive approach to identifying and mitigating security vulnerabilities. By addressing these common weaknesses, organizations can significantly enhance their security posture. The breaches highlighted above demonstrate that no organization—regardless of size, industry, or technical sophistication—is immune to cyber attacks when fundamental security controls are not properly implemented and maintained.</span></p></div>
</div><div data-element-id="elm_n3e9qx_EEblhReZkq0oXfA" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"></style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div></div></div></div></div><div data-element-id="elm_JwnRr7WVo9656OyLMHE81A" data-element-type="section" class="zpsection zplight-section zplight-section-bg zscustom-section-145 "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_XflqE4kytax2YPuXh-KpMg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_Hh3etpQ3mU32ZhQSM5vEMg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_M2HwpZrIAYpyg9iR0Jtp_g" data-element-type="box" class="zpelem-box zpelement zpbox-container zsbox-spacing zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_M2HwpZrIAYpyg9iR0Jtp_g"].zpelem-box{ background-color:rgb(255, 255, 255); background-image:unset; margin-block-start:24px; } </style><div data-element-id="elm_89sFocecBJmMVD_fW0Dq8A" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_89sFocecBJmMVD_fW0Dq8A"] div.zpspacer { height:6px; } @media (max-width: 768px) { div[data-element-id="elm_89sFocecBJmMVD_fW0Dq8A"] div.zpspacer { height:calc(6px / 3); } } </style><div class="zpspacer " data-height="6"></div>
</div><div data-element-id="elm_-G9Zq8h74gIZYTgsm6l7XQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-G9Zq8h74gIZYTgsm6l7XQ"].zpelem-text { margin-block-start:-10px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>At GTconsult, we specialize in penetration testing services tailored to your organization's needs. Our team of experts utilizes the latest tools and methodologies to uncover vulnerabilities and provide actionable recommendations to fortify your defences.</p><p><br/></p><p>Don't wait for a breach to occur. Contact GTconsult today to schedule a penetration test and take the first step towards securing your organization's future.</p></div><p></p></div>
</div><div data-element-id="elm__Rq63HSz2DN0RSjD4-FMdg" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://www.gtconsult.com/protection" target="_blank" title="A Team Protection"><span class="zpbutton-content">Get a Penetration Test</span></a></div>
</div></div></div><div data-element-id="elm_IJZGal7aUaeVWT8KzEG-vg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zsorder-one zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_UnTFvVXZJD8LmNLs93BZrw" data-element-type="video" class="zpelement zpelem-video "><style type="text/css"> [data-element-id="elm_UnTFvVXZJD8LmNLs93BZrw"].zpelem-video{ margin-block-start:42px; } @media (max-width: 767px) { [data-element-id="elm_UnTFvVXZJD8LmNLs93BZrw"].zpelem-video iframe.zpvideo{ width:560px !important; height:315px !important; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_UnTFvVXZJD8LmNLs93BZrw"].zpelem-video iframe.zpvideo{ width:560px !important; height:315px !important; } } </style><div class="zpvideo-container zpiframe-align-left zpiframe-mobile-align-center zpiframe-tablet-align-center"><iframe class="zpvideo " width="560" height="304" src="https://www.youtube.com/embed/e4YSke1x13o?si=0gkyiijiHFyz0FoL" frameborder="0" allowfullscreen></iframe></div>
</div></div></div><div data-element-id="elm_UzyVib124nFr7V_sv9U7-Q" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_HAVbHCAfaLzb-qi_wX2dYw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_4AHqBA_-fHWv4zTn7J90KA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_4AHqBA_-fHWv4zTn7J90KA"] div.zpspacer { height:4px; } @media (max-width: 768px) { div[data-element-id="elm_4AHqBA_-fHWv4zTn7J90KA"] div.zpspacer { height:calc(4px / 3); } } </style><div class="zpspacer " data-height="4"></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 22 Oct 2025 13:25:44 +0000</pubDate></item><item><title><![CDATA[How to spot a 'Phishing' email and Keep Your Business Safe]]></title><link>https://www.gtconsult.com/blogs/post/how-to-spot-a-phishing-email</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/Black White Yellow Modern Simple How To Youtube Thumbnail.png"/>A blog on tell-tale signs of a phishing email using an email received by one of our team members as an example.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_I0SlJRa2T7a__5egIxeIug" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_tF4AhLKqQrOAQksVt62Psg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_r0gv9pXSSnmS3k2nyrYA3g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_I6IGXPWiT2ukNTl4Jh78vQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true">Watch Out: Think before you click</h2></div>
<div data-element-id="elm_woEIXYt3QXywcaw1VASFUw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span>Phishing attacks have become increasingly deceptive— if you're not careful, it's easy to fall for one. Some prey on our tendency to skim emails, rely on visual cues like familiar logos or jargon, or respond hastily to anything marked as urgent. They’re not always complex— many are simple, but just convincing enough to earn your trust if you’re not paying attention.</span></p></div>
</div><div data-element-id="elm_QWW5tV3mE2tS40ceQASCRA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_QWW5tV3mE2tS40ceQASCRA"] .zpimage-container figure img { width: 1110px ; height: 323.75px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Untitled-4i.png" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_5Qo3kHCgqTI3imZ0jyy2hg" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_5Qo3kHCgqTI3imZ0jyy2hg"].zpelem-divider{ margin-block-start:10px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_NBQqEwmLuoFyV0Hd9QZ1NA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_NBQqEwmLuoFyV0Hd9QZ1NA"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_NBQqEwmLuoFyV0Hd9QZ1NA"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div></div></div></div></div><div data-element-id="elm_z95QZlXn5KvfpiCrmzsQcA" data-element-type="section" class="zpsection zplight-section zplight-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_oExU6pP8eRXN9yPE4DE2xw" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"> [data-element-id="elm_oExU6pP8eRXN9yPE4DE2xw"].zprow{ margin-block-start:-22px; } </style><div data-element-id="elm_AiWjrXoB3Lik35olKI5Shw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_Fc0BW_suIx9Zc7Zp8SDApQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_Fc0BW_suIx9Zc7Zp8SDApQ"] .zpimage-container figure img { width: 298px !important ; height: 434.08px !important ; } } @media (max-width: 767px) { [data-element-id="elm_Fc0BW_suIx9Zc7Zp8SDApQ"] .zpimage-container figure img { width:458px ; height:655.00px ; } } [data-element-id="elm_Fc0BW_suIx9Zc7Zp8SDApQ"].zpelem-image { margin-block-start:0px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/1749470707541.png" width="458" height="655.00" loading="lazy" size="custom" data-lightbox="true"/></picture></span></figure></div>
</div></div><div data-element-id="elm_y2_jyyyWIHYVd91yhBuZjA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_HIYmq8X5QLw1WvLD5QjDXA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-weight:400;">Received something like this before?</span></h2></div>
<div data-element-id="elm_mJKZyGzEpOyWsZAJUwhDng" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div>Or maybe you've received a variation with subjects like:</div></div><p></p><ul><li>&quot;Your Zoom account is suspended&quot;</li><li>&quot;You missed a Zoom meeting&quot;</li><li>&quot;New Zoom message received&quot;</li></ul><div><div><br/></div><div>Whatever variation you have (or have not received), these kinds of emails can be so easy to click on if you are not paying attention.&nbsp;</div></div>
</div></div><div data-element-id="elm_QoeQlmLyo_Q5pobMdwdiKg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_QoeQlmLyo_Q5pobMdwdiKg"] div.zpspacer { height:7px; } @media (max-width: 768px) { div[data-element-id="elm_QoeQlmLyo_Q5pobMdwdiKg"] div.zpspacer { height:calc(7px / 3); } } </style><div class="zpspacer " data-height="7"></div>
</div></div></div></div></div><div data-element-id="elm_0MXa7S7rW341lcLNfDwl3w" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg zscustom-section-59 "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1N9PAhaa2NKf6j6OYLtg2g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_-vGtJQ6bHisES_PMAlRYQg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_OW9kkLqtJYi8R6OWDJJjyQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_OW9kkLqtJYi8R6OWDJJjyQ"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_OW9kkLqtJYi8R6OWDJJjyQ"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div></div></div></div></div><div data-element-id="elm_ELybx6pCYgGFaCsV-OIqSw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_gbhRR7P4So8XtZhwo6Y0Dg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_mOJOfckLCdaniTQdoFwAzA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_Jlj0v5UtlgBcPTdh6jBApg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div>To answer the question,' How do I know if an email is a phishing email or a scam?' Let's have a look at what's wrong with this email that was recently received by one of our team members:</div></div><p></p></div>
</div><div data-element-id="elm_ZSoSW0nBARnxhtuvOSr7VA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_ZSoSW0nBARnxhtuvOSr7VA"] .zpimage-container figure img { width: 1110px ; height: 582.75px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Sus%20Email.png" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div><div data-element-id="elm_rzcfMGRy4SnZUVVi8XWZ4w" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_65rQcY9J5JJSvN6S9sqbGw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_vQTF4gPrtiA1eLEP2jobRg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_AwLK0nlNGBolvkbBWHcY2w" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-weight:700;">Platform</span></h2></div>
<div data-element-id="elm_mxk_WhEIbJEEOGrQTzNP4w" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span>While this may not apply to all organizations, it's still something to consider. If your organization holds all internal meetings on a different platform (such as Teams). Receiving an email inviting you to a weekly meeting on Zoom might be an immediate red flag. Also, if you notice, it says 'accepted'- be careful not to click the link to find out what exactly you accepted.</span></span></p></div>
</div><div data-element-id="elm_tpvAkL3arfvgyacVug06Xg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_tpvAkL3arfvgyacVug06Xg"] .zpimage-container figure img { width: 500px ; height: 77.52px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-medium zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/1d.png" size="medium" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div><div data-element-id="elm_fOBnmG9I33qp8WBp-_juBw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_cPv5ya11_A6BYYierMvm6g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_noFQ9uGKNcaDfaIhSzQqDQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_AUZoh51KSqbj5AqU_LKECA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-weight:700;"><span><span style="font-weight:700;">Strange sender format</span></span></span></h2></div>
<div data-element-id="elm_hqfbOZhn3Xx_RiQEaLh_0g" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span></span></span></p><div><div>The format (O=EXCHANGELABS/OU=EXCHANGE...), is not how legit Zoom emails are structured.&nbsp;</div><br/><div>Zoom emails should come from @zoom.us or @zoom.com- not from an Exchange server's internal address format.</div></div><p></p></div>
</div><div data-element-id="elm_37oEEL9ya-D6OJ_yRwCjWQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_37oEEL9ya-D6OJ_yRwCjWQ"] .zpimage-container figure img { width: 500px ; height: 114.34px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-medium zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/2d.png" size="medium" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div><div data-element-id="elm_IDFkm7PS8qQVWCLqOBd4kw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_OiOmsaX1lI4XIL92TVSMfQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_FOnjYqdmmbQ_8YQneTEN7g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_rrehfmk9B5-q33CJtal_AA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-weight:700;"><span>The use of a legit logo to gain trust<br/></span></span></h2></div>
<div data-element-id="elm_BnPP4cDzcj6vSJSMMAtvcQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span></span></span></p><div><p style="margin-bottom:32px;">When you first click open the email, the first thing that draws your attention is the Zoom logo. It's familiar/recognizable, so if you're skimming through, you may let your guard down and miss all the other red flags.</p></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_MnwiwMsfa-Kuc8-_amHlYQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_3_vKum-omFmXxJZdPkPHQQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_4L7c82um3MSqeFaIvaKioA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_fijc1iIbGFoMgUaoZYrBgg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-weight:700;"><span><span style="font-weight:700;"><span>Suspicious sender email<br/></span></span></span></span></h2></div>
<div data-element-id="elm_P7lo62SH53OyzcDjoD4T2w" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span></span></span></p><div><div></div><div><div>Always, always, always check the sender email, majority of the time, it's the dead give away that something is fishy...or, you know, phishy.</div><div>In this case, the email is not a Zoom domain. It looks like a personal or small org email, which is unusual for a Zoom system-generated message.</div></div><div></div></div><p></p></div>
</div><div data-element-id="elm_orXZ3mKcs5CcjEyOLqaR6w" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_orXZ3mKcs5CcjEyOLqaR6w"] .zpimage-container figure img { width: 408px ; height: 60.00px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-medium zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/3d.png" size="medium" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div><div data-element-id="elm_S5n4v0AWsKVO_E-I7w6X_A" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Pac9Kpg7klEUdk7ZQ-MgRg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_zzrG9dedrt6SDQUc3UWfuQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_s0X1b3EAOLQWKkZjKL2J6w" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-weight:700;"><span><span style="font-weight:700;"><span>Generic language<br/></span></span></span></span></h2></div>
<div data-element-id="elm_j5HZcmnbbIn7SlFiFp_BYA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span></span></span></p><div><div></div><div><div>No meeting title, organizer name, or details. Often, emails like this will also contain urgency without much context.&nbsp;</div><div><br/></div><div>Real Zoom invites usually include specifics like topic, time, and host name.</div></div><div></div></div><p></p></div>
</div><div data-element-id="elm_ioSV28xQC4whjxMb-rNeug" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_ioSV28xQC4whjxMb-rNeug"] .zpimage-container figure img { width: 500px ; height: 59.49px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-medium zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Image%20-36-.png" size="medium" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div><div data-element-id="elm_EEZTyi0WB4BY1vki22FyKQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_2MHNB6PCjLpvQExLHCuaCQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_JPuQ3yed2pWGL5RMD85vKQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_ThwNnlzX7QS6C9GUdIc_HA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-weight:700;"><span><span style="font-weight:700;"><span>File size</span></span></span></span></h2></div>
<div data-element-id="elm_AyvcfTnbH64C4X2z9e-wQA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span></span></span></p><div><div></div><div><div>This might not always be the case, but it's worth adding to the mix.&nbsp;</div><div><br/></div><div>Legitimate Zoom or Outlook meeting invites usually include metadata like date, time, location, meeting link, agenda, and possibly attachments or participant info. This often results in a file size larger than 1 KB.</div><br/><div>Attackers often use tiny files to avoid detection by email filters and to appear harmless to users.</div><br/><div>While .ics calendar invites can be legit, the file size is small (1KB) and may indicate that it is a malicious redirect link or a script meant to exploit vulnerabilities in calendar applications when opened or imported.</div><br/><div>Think before you click!</div></div><div></div></div><p></p></div>
</div><div data-element-id="elm_yAWhHg2zLPcTJqbqRdzIdA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_yAWhHg2zLPcTJqbqRdzIdA"] .zpimage-container figure img { width: 500px ; height: 139.31px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-medium zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/5d.png" size="medium" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div><div data-element-id="elm_oZ6NE6b8mD2bSExA-5viSA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_jjJg2_muMS1Ep1JKD0J6mw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_0x8yiK_pQ_JahMwX2oqOxQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_mKwzM1GaKPtKBKvlsWOEAQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-weight:700;"><span><span style="font-weight:700;"><span>Odd Time<br/></span></span></span></span></h2></div>
<div data-element-id="elm_piex1_oWK-bRo2PPq1wD3Q" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span></span></span></p><div><div></div><div><div>Though this one may not always be the case, coupled with the other clues, it becomes the cherry on top.</div><div><br/></div><div>Look out for emails coming in after business hours or on the weekends, timezone mismatches or mismatched time stamps.</div></div><div></div></div><p></p></div>
</div><div data-element-id="elm_yoFkrfMKG0e-jDb4bzVZ2Q" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_yoFkrfMKG0e-jDb4bzVZ2Q"] .zpimage-container figure img { width: 500px ; height: 86.96px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-medium zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/4d.png" size="medium" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div><div data-element-id="elm_hB0C3Nds2ZBxBSSSU093Wg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_mh-E6No6joSx1_7NJ1nblA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_p1D6uoZZ8nLt_pD5xVCaWg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_4--8OfChwM5yW30aj0osqA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-weight:700;"><span><span style="font-weight:700;"><span>Other red flags to look out for</span></span></span></span></h2></div>
<div data-element-id="elm_hBe9zSKwpjcacaEvlC9Q6g" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span></span></span></p><div><div></div><span>The red flags never end, but be on the lookout for poor grammar, punctuation, or formatting.</span><div></div></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_0zrddmsbMS6QdZ69RiyCTg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_n1EfdpeGpDunxS60_oeJ7g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_OarZnWz48i3euN-AujOOzQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_LyvjveTiy0t7iLTpF_pgVQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-weight:700;"><span><span style="font-weight:700;"><span>The takeaway?</span></span></span></span></h2></div>
<div data-element-id="elm_4UBVnPa2y5kSG8-i16p0oQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div>Pay Attention. Pay Attention. Pay Attention.</div><br/><div>The days of clicking on things without any consequences are long gone (were they ever there?)</div><br/><div>The logo might look legit. The meeting title might sound important. But if you don’t slow down to examine the details, you could end up compromising your organization.</div><br/><div><div><strong>Before you click, check:</strong></div></div><div><ul><li>Who sent it?</li><li>What are they asking?</li><li>Does this align with how your organization usually communicates?</li></ul></div><div><br/></div><div><div>When in doubt- <strong>don’t click</strong>. Verify through a different channel.&nbsp;</div></div></div></div>
</div><div data-element-id="elm_oUfN0w95NRKmX_tK7UWHVA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span style="font-weight:700;"><span><span style="font-weight:700;"><span>Want to check if your MS365 Environment is prepared for the just in case?</span></span></span></span></h2></div>
<div data-element-id="elm_1vd9HNFfWc4VVG0f4i5yww" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>We recommend getting a penetration test to ensure your organization is well-protected against potential vulnerabilities and&nbsp; attacks. A thorough assessment can uncover weaknesses before cybercriminals do, giving you the opportunity to strengthen your defences and train your team. Don't wait for a breach to take action!</span></p></div>
</div></div></div></div></div><div data-element-id="elm_4j7txhnwpmk-cre-ro5X-A" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_TDRlbm6xgEFDGiugbuC4Sg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_K9pw5g2tYeVjYaEXiEi1Nw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_YerYWnGIZjBetJo1X7-GYg" data-element-type="video" class="zpelement zpelem-video "><style type="text/css"> @media (max-width: 767px) { [data-element-id="elm_YerYWnGIZjBetJo1X7-GYg"].zpelem-video iframe.zpvideo{ width:560px !important; height:315px !important; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_YerYWnGIZjBetJo1X7-GYg"].zpelem-video iframe.zpvideo{ width:560px !important; height:315px !important; } } </style><div class="zpvideo-container zpiframe-align-center zpiframe-mobile-align-center zpiframe-tablet-align-center"><iframe class="zpvideo " width="560" height="315" src="https://www.youtube.com/embed/e4YSke1x13o?si=XjCgOkyOXbW4FzRJ" frameborder="0" allowfullscreen></iframe></div>
</div><div data-element-id="elm_ET45Le8yz73gvM9bxoZC1w" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_ET45Le8yz73gvM9bxoZC1w"].zpelem-button{ margin-block-start:41px; } </style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="/contact" target="_blank"><span class="zpbutton-content">Book a Consultation</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 11 Jun 2025 10:19:43 +0000</pubDate></item><item><title><![CDATA[Quick Action Protects Company Data After Phone Theft]]></title><link>https://www.gtconsult.com/blogs/post/quick-action-protects-company-data-after-phone-theft</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/Phone security blog.png"/>Smartphones play such a huge role in our lives- but what happens to your work data if it gets stolen, lost or compromised? In this blog, learn how GTconsult protected company information when a team member's iPhone was stolen and learn the essential steps to take if it happens to you.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_90yfd5ZcRFqM_yf6JnUkgQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_sTyD4menQM28rEScaUXkrQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_EGGkuRpAQQyP5bmoN5CukA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_JwquE2HkSsSXWKehdcaJTA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">A blog on the critical role of security on employee mobile devices</span></h2></div>
<div data-element-id="elm_-XakgccO7FFtNw2gPJZu5A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><div><div>Today, more than ever, employees rely on their smartphones to stay connected and productive. But with that convenience comes risk.</div></div></div></div>
</div><div data-element-id="elm_8_Lqe7vRz-8VcSqWAUPmwA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_8_Lqe7vRz-8VcSqWAUPmwA"] .zpimage-container figure img { width: 1110px ; height: 624.38px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Fixed.png" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div><div data-element-id="elm_itspJ6W1Px21zuICtQw0Og" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm__iLqYzTjGXFRCmUMQgAahA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_-O4b2kn-lRoSFt5S9pxEcw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_iQDTapJYtzM1USsG4JoYjw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;font-size:15px;">At GTconsult, a recent incident reinforced just how critical it is to have robust security measures in place. One of our team members experienced a frightening robbery in which their iPhone was stolen. While such situations are always distressing, we’re relieved that our company data remained fully protected- thanks to proactive security policies and swift response actions.</span></p></div>
</div></div></div></div></div><div data-element-id="elm_34_VN8HjQLefmg-SO96-uQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_-m_JmB3V1NWMGogVBeFK6g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_Se-Tp-IzSfxn1m00MO8Jog" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_SN3155fS6Z1XmT3YhMpQaQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><h3><span style="font-weight:700;">Strong Security Measures Made All the Difference</span></h3></div></h2></div>
<div data-element-id="elm_XLnWGo9dlgd5GFhpTasC6A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><div>Long before this incident, our company implemented strict security protocols to safeguard sensitive information. Every company device must meet compliance policies, including:</div></div></div></div>
</div></div></div></div></div><div data-element-id="elm_19fBrNMaoX5quycdfxRnhQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_EiAICGUA1MivyRfTHAIxgg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_jqm-Vu-rD-1hJTj83pEgwQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_kn-K9kubpS7LkpZJYisNqA" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-center "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 448 512" height="448" width="512" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path d="M400 256H152V152.9c0-39.6 31.7-72.5 71.3-72.9 40-.4 72.7 32.1 72.7 72v16c0 13.3 10.7 24 24 24h32c13.3 0 24-10.7 24-24v-16C376 68 307.5-.3 223.5 0 139.5.3 72 69.5 72 153.5V256H48c-26.5 0-48 21.5-48 48v160c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V304c0-26.5-21.5-48-48-48zM264 408c0 22.1-17.9 40-40 40s-40-17.9-40-40v-48c0-22.1 17.9-40 40-40s40 17.9 40 40v48z"></path></svg></span><h3 class="zpicon-heading " data-editor="true"><span style="color:inherit;">Mandatory Multi-Factor Authentication (MFA)</span></h3><div class="zpicon-text-container " data-editor="true"><p><span style="color:inherit;">Employees need to verify their identity before accessing company applications like Outlook, Teams, and SharePoint.</span></p></div>
</div></div></div><div data-element-id="elm_wEcHf55n8eas19Zj1BKdMg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_e8cJaVa5nvhLQzlqtYP98Q" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-center "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 320 512" height="320" width="512" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path d="M272 0H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h224c26.5 0 48-21.5 48-48V48c0-26.5-21.5-48-48-48zM160 480c-17.7 0-32-14.3-32-32s14.3-32 32-32 32 14.3 32 32-14.3 32-32 32zm112-108c0 6.6-5.4 12-12 12H60c-6.6 0-12-5.4-12-12V60c0-6.6 5.4-12 12-12h200c6.6 0 12 5.4 12 12v312z"></path></svg></span><h3 class="zpicon-heading " data-editor="true"><span style="color:inherit;">Mobile Device Management (MDM)</span></h3><div class="zpicon-text-container " data-editor="true"><p><span style="color:inherit;">Our IT team can remotely manage and secure corporate data on employee devices.</span></p></div>
</div></div></div><div data-element-id="elm_MhFEDoFNhV56xiOm9DUGkA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_td67GkriDD41VLiNYeIr4A" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-center "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 576 512" height="576" width="512" aria-label="hidden" xmlns="http://www.w3.org/2000/svg"><path d="M528 32H48C21.5 32 0 53.5 0 80v352c0 26.5 21.5 48 48 48h480c26.5 0 48-21.5 48-48V80c0-26.5-21.5-48-48-48zm0 400H48V80h480v352zM208 256c35.3 0 64-28.7 64-64s-28.7-64-64-64-64 28.7-64 64 28.7 64 64 64zm-89.6 128h179.2c12.4 0 22.4-8.6 22.4-19.2v-19.2c0-31.8-30.1-57.6-67.2-57.6-10.8 0-18.7 8-44.8 8-26.9 0-33.4-8-44.8-8-37.1 0-67.2 25.8-67.2 57.6v19.2c0 10.6 10 19.2 22.4 19.2zM360 320h112c4.4 0 8-3.6 8-8v-16c0-4.4-3.6-8-8-8H360c-4.4 0-8 3.6-8 8v16c0 4.4 3.6 8 8 8zm0-64h112c4.4 0 8-3.6 8-8v-16c0-4.4-3.6-8-8-8H360c-4.4 0-8 3.6-8 8v16c0 4.4 3.6 8 8 8zm0-64h112c4.4 0 8-3.6 8-8v-16c0-4.4-3.6-8-8-8H360c-4.4 0-8 3.6-8 8v16c0 4.4 3.6 8 8 8z"></path></svg></span><h3 class="zpicon-heading " data-editor="true"><span style="color:inherit;">Access Control with Microsoft Entra ID</span></h3><div class="zpicon-text-container " data-editor="true"><p><span style="color:inherit;">Formerly known as Azure AD, this system ensures only authorized users can access company resources.</span></p></div>
</div></div><div data-element-id="elm_eYFnwfFpSUAk-bHAXiZJrA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><p>[Learn more about transitioning to Microsoft Entra ID <a href="https://www.gtconsult.com/blogs/post/transitioning-from-azure-acs-to-microsoft-entra-id-what-you-need-to-know" title="Transitioning from Azure ACS to Microsoft Entra ID" target="_blank" rel=""><span style="font-weight:700;">here</span></a>.]</p></div>
</div></div></div><div data-element-id="elm_AFSzmD0m_dY-RbfTCHC3eQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_viIsixQQYzUl3yYvaZmA5Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_X_Y5XqG4Y4229Eem7szJ-Q" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">These layers of protection meant that even with the physical loss of a device, our company data remained secure.</span></p></div>
</div></div></div><div data-element-id="elm_b8uN8wKpNpFqlBrYhQ_mRQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_AmGESD1PKMiA-dWBIwbMCg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_2KJ7iv2e11BAHs00gfA0Jg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_2KJ7iv2e11BAHs00gfA0Jg"] div.zpspacer { height:11px; } @media (max-width: 768px) { div[data-element-id="elm_2KJ7iv2e11BAHs00gfA0Jg"] div.zpspacer { height:calc(11px / 3); } } </style><div class="zpspacer " data-height="11"></div>
</div></div></div></div></div><div data-element-id="elm_X3k0kUSvyRpxj5S7Q36vLg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_lFqNDZRhrTXA9sDR5648kw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_kAtLuYBM8QdmxSXuFy1hpg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_JD5R-j5H26Ovyg1ZDoQ2iA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><h3><span style="font-weight:700;">Rapid Response Prevented Unauthorized Access</span></h3></div></h2></div>
<div data-element-id="elm_qONvwm3vv4elaJLtbzds2w" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="font-size:16px;">As soon as the theft was reported, our IT team acted swiftly:</p><p style="font-size:16px;"><span style="color:inherit;font-size:15px;"><br/></span></p><ol><li><span style="color:inherit;"><span style="font-weight:700;">Immediate Sign-Out:</span></span><span style="color:inherit;">Using Microsoft Entra ID, all active sign-in sessions were revoked, cutting off any potential access.</span></li><li><span style="color:inherit;"><span style="font-weight:700;">Removal of Authentication Methods:</span></span><span style="color:inherit;">The Microsoft Authenticator app and associated phone number were unlinked from company accounts.</span></li><li><span style="color:inherit;"><span style="font-weight:700;">Remote Wipe:</span></span><span style="color:inherit;">Microsoft Intune was used to erase all company data and applications from the stolen device.</span></li><li><span style="color:inherit;"><span style="font-weight:700;">Secure Re-Authentication:</span></span><span style="color:inherit;">The affected employee had to complete a fresh MFA registration on their new device before regaining access to company systems.</span></li></ol><p style="font-size:16px;"><br/></p><p style="font-size:16px;">These quick actions ensured that no unauthorized person could exploit the stolen device to access sensitive information.</p><div><br/></div></div></div>
</div></div><div data-element-id="elm_WxfjM9385LFFjtC6EuBnUw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_WxfjM9385LFFjtC6EuBnUw"].zpelem-col{ background-color:rgba(0,0,0,0.07); background-image:unset; } </style><div data-element-id="elm_sKIojc1hnM-k1l8rgI0NtA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:rgb(166, 206, 57);font-weight:600;">You might also like:</span></h2></div>
<div data-element-id="elm_ZEuWiuJIg_Z-vY2FJlyLBA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_ZEuWiuJIg_Z-vY2FJlyLBA"] .zpimage-container figure img { width: 540px ; height: 303.75px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/a-guide-to-sharepoint-security-best-practices" target="_blank" title="A Guide to SharePoint Security Best Practices" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/SharePoint%20Security%20Best%20Practices%20Write%20up.jpg" size="fit"/></picture></a></figure></div>
</div><div data-element-id="elm_VwHfgQxoVlRAQUsPKw-qTg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;font-style:italic;">SharePoint Intranets serve as central hubs for document management, collaboration, and communication, making them critical assets that require robust security measures. This <a href="https://www.gtconsult.com/blogs/post/a-guide-to-sharepoint-security-best-practices" title="A Guide to SharePoint Security Best Practices" target="_blank" rel="">blog </a>post explores essential security best practices to fortify your SharePoint Intranet.</span></p><p><span style="color:inherit;"><br/></span></p></div>
</div></div></div></div></div><div data-element-id="elm_As-_rRXNGekdu_BIIOyf7A" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_s09bFkUaBUS2YnTyq0UGHA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_cFsmVI3O4ilvUTsiKNFsJQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_rHqtMZT9RbuncLqwMniQUg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><h3><div style="color:inherit;"></div></h3><h3><span style="font-weight:700;">Security Steps Matter – Even When They Seem Inconvenient</span></h3></div></h2></div>
<div data-element-id="elm_Zdsfh_OJgNWK0jGOTE8Pkg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="color:inherit;font-size:15px;">This incident serves as a real-world example of why our security practices- like MFA prompts and compliance checks- are essential. While they may feel like minor inconveniences in day-to-day operations, they act as crucial safeguards in critical moments. Our investment in Microsoft 365’s security ecosystem continues to protect both our employees and our organization.</span></p><div><br/></div></div></div>
</div></div></div></div></div><div data-element-id="elm_5zqTFSs86eaTPvupKMMWpQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_PQeVf697fs8jG752KlcZRw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_MF8fhFK0hgIMHMoqUfyR3A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_JT964kir-Rv3uoobfah4fg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><h3><div style="color:inherit;"></div></h3><h3><div style="color:inherit;"></div></h3><h3><span style="font-weight:700;">What to Do If You Experience a Similar Incident</span></h3></div></h2></div>
<div data-element-id="elm_MUAu654sBIKKINw6gUUDrg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-size:15px;">If your company device is lost or stolen, take immediate action:</span></p><p><span style="color:inherit;"><br/></span></p><ul><li><span style="color:inherit;">Report the incident to local law enforcement and provide details.</span></li><li><span style="color:inherit;">Notify your IT department as soon as possible so they can secure your accounts and device.</span></li><li><span style="color:inherit;">Follow security procedures for re-authentication and device replacement.</span></li></ul><p><span style="font-size:15px;"><br/></span></p><p><span style="font-size:15px;">Speed is key when it comes to preventing unauthorized access. By acting quickly and relying on your established security measures, you can keep your company data safe- even in worst-case scenarios.</span></p></div></div></div></div>
</div><div data-element-id="elm_st7mi7RBZ56Ssfvt-c6t2A" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"></style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_VRtJVV6Plo6MaRgQn3nhXQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>In conclusion, safeguarding your company data requires a holistic approach that encompasses user authentication, encryption, data loss prevention, auditing, backup procedures, and user education. By incorporating these security best practices into your security strategy, you can create a resilient and secure digital environment that protects your organization's valuable assets. Remember, proactive measures are key to staying ahead of potential threats in the ever-evolving landscape of cybersecurity.</p><p><br/></p><p>Need our help? From penetration testing to hiring a hacker to conduct a real-world attack (without the consequences of course), we have an expert team ready for action.</p></div></div>
</div><div data-element-id="elm_elj-iPqQXioXyJzd4Uvk1w" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="https://www.gtconsult.com/protection" target="_blank" title="A Team Protection"><span class="zpbutton-content">Protect Your SharePoint Data</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 11 Feb 2025 14:51:20 +0000</pubDate></item><item><title><![CDATA[A Guide to SharePoint Security Best Practices]]></title><link>https://www.gtconsult.com/blogs/post/a-guide-to-sharepoint-security-best-practices</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/SharePoint Security Best Practices Write up.jpg"/>A write up focusing on the best practices when it comes to SharePoint security.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_SsZrnnXWQjiAwjWBa2oqFA" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm_SsZrnnXWQjiAwjWBa2oqFA"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_OszD7tJyRH-yZoYS8eG17g" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- zpbackground-size-cover zpbackground-position-center-center zpbackground-repeat-all zpbackground-attachment-scroll " data-equal-column=""><style type="text/css"> [data-element-id="elm_OszD7tJyRH-yZoYS8eG17g"].zprow{ background-image:linear-gradient(to bottom, rgba(30,34,45,0.74), rgba(30,34,45,0.74)), url(/Blog%20Site/Cyber%20Security.jpg); border-radius:1px; } </style><div data-element-id="elm_0PddenaYREeEbwlCxS5bdw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_0PddenaYREeEbwlCxS5bdw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_2tmj_U8BQhOPF73b9dw0wQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_2tmj_U8BQhOPF73b9dw0wQ"].zpelem-heading { border-radius:1px; text-shadow:1px 1px 1px #000000; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:rgb(255, 255, 255);">Fortifying Your Intranet</span></h2></div>
<div data-element-id="elm_rdneNfkVT3uJBC9XlwVadA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_rdneNfkVT3uJBC9XlwVadA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:rgb(255, 255, 255);">In the dynamic landscape of modern workplaces, the integrity and security of your organization's data are non-negotiable. Nowhere is this more critical than in the heart of your digital operations: the SharePoint Intranet.</span><br></p></div>
</div><div data-element-id="elm_GXKnpTkfQSWabkD9AbFG2w" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_GXKnpTkfQSWabkD9AbFG2w"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"> [data-element-id="elm_GXKnpTkfQSWabkD9AbFG2w"] .zpbutton.zpbutton-type-primary:hover{ color: #FFFFFF !important; } </style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval zpbutton-outline " href="https://www.gtconsult.com/protection" target="_blank" title="A Team Protection"><span class="zpbutton-content">A Team Protection</span></a></div>
</div><div data-element-id="elm_vCztPkIkXBmqMLEBXo4osg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_vCztPkIkXBmqMLEBXo4osg"] div.zpspacer { height:14px; } @media (max-width: 768px) { div[data-element-id="elm_vCztPkIkXBmqMLEBXo4osg"] div.zpspacer { height:calc(14px / 3); } } </style><div class="zpspacer " data-height="14"></div>
</div></div></div></div></div><div data-element-id="elm_-1DR2GWiyQeG51r5T6hFyQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_-1DR2GWiyQeG51r5T6hFyQ"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_62P3aRIJogHMKKLflue_gQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_62P3aRIJogHMKKLflue_gQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_XeU4nNfiCoWJA8LczaN4Tw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_XeU4nNfiCoWJA8LczaN4Tw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_vnD5WV31g1zs4hqBS2ArsQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_vnD5WV31g1zs4hqBS2ArsQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>In the realm of modern workplaces, where digital collaboration and information sharing are paramount, ensuring the security of your organization's data is non-negotiable. SharePoint Intranets serve as central hubs for document management, collaboration, and communication, making them critical assets that require robust security measures. In this blog post, we'll explore essential security best practices to fortify your SharePoint Intranet.</p></div></div>
</div><div data-element-id="elm_yi17XDt1HUqP-mlLxwxZUg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_yi17XDt1HUqP-mlLxwxZUg"] div.zpspacer { height:6px; } @media (max-width: 768px) { div[data-element-id="elm_yi17XDt1HUqP-mlLxwxZUg"] div.zpspacer { height:calc(6px / 3); } } </style><div class="zpspacer " data-height="6"></div>
</div></div></div></div></div><div data-element-id="elm_1kEA0-El8ln2YsKwLldUwQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg zscustom-section-123 "><style type="text/css"> [data-element-id="elm_1kEA0-El8ln2YsKwLldUwQ"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_YDECHm82v930eVcBykILmQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"> [data-element-id="elm_YDECHm82v930eVcBykILmQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_FbV1I3sn3qN-0lgaqwT9AA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_FbV1I3sn3qN-0lgaqwT9AA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_xGdJYbHOt9jJE9_wrpSD6w" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div><p><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">1. User Authentication and Authorization Controls</span></p></div></h2></div>
<div data-element-id="elm_ssSXWMip39JE9q0MjGp6JQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>Begin by implementing strong user authentication mechanisms. User authentication and authorization controls are critical for ensuring that only authorized users have access to SharePoint resources.&nbsp;</p></div>
</div></div><div data-element-id="elm_KLnGE88nmAKgYyy9J9lxbQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-weight:700;">Key considerations include:</span></p><ul><li>Implementing strong authentication mechanisms, such as multi-factor authentication (MFA), to verify user identities and prevent unauthorized access.</li><li>Defining clear roles and permissions within SharePoint to restrict access to sensitive data and functionality based on user roles and responsibilities.</li><li>Regularly reviewing and updating user access privileges to ensure that access permissions align with users' current roles and requirements.</li></ul></div>
</div></div><div data-element-id="elm_EuSGslXsBD-MMRKjRDo6oQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_EuSGslXsBD-MMRKjRDo6oQ"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>Multi-factor authentication enhances user identity verification.</li><li>Granular permissions reduce the risk of unauthorized access.</li></ul></div></div>
</div><div data-element-id="elm_ftSnufxY9yDmfMpfPjDeig" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_ftSnufxY9yDmfMpfPjDeig"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div><p><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">2. SSL Encryption Data in Transit (only applies to On-Premises)</span></p></div></h2></div>
<div data-element-id="elm_QecZanllTI3uF9HZvhRCGw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p>Secure data in transit by implementing SSL encryption. This ensures that data exchanged between users and the SharePoint Intranet is encrypted, minimizing the risk of interception and ensuring that your sensitive information remains confidential. Obtain and install a valid SSL certificate to authenticate the server and establish a secure connection.&nbsp;</p></div></div>
</div></div></div><div data-element-id="elm_oJ6TYpqxxFivWajH1sfRMg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_oJ6TYpqxxFivWajH1sfRMg"].zpelem-col{ border-style:solid; border-color:rgba(0,0,0,0.2) !important; border-block-start-width:0px; border-inline-end-width:0px; border-block-end-width:0px; border-inline-start-width:2px; border-radius:1px; } </style><div data-element-id="elm_7HCTb-08jS1rR7BXJVCACg" data-element-type="box" class="zpelem-box zpelement zpbox-container zsbox-spacing zplight-section zplight-section-bg "><style type="text/css"> [data-element-id="elm_7HCTb-08jS1rR7BXJVCACg"].zpelem-box{ border-radius:1px; } </style><div data-element-id="elm_mPw86Oby4sRrw1caQaM1_g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_mPw86Oby4sRrw1caQaM1_g"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="font-weight:700;color:rgb(166, 206, 57);">Also Read:</span></h3></div>
<div data-element-id="elm_ohK9o8HQPp2c7PPQmBJV6Q" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_ohK9o8HQPp2c7PPQmBJV6Q"] .zpimage-container figure img { width: 193.7px !important ; height: 109px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_ohK9o8HQPp2c7PPQmBJV6Q"] .zpimage-container figure img { width:193.7px ; height:109px ; } } @media (max-width: 767px) { [data-element-id="elm_ohK9o8HQPp2c7PPQmBJV6Q"] .zpimage-container figure img { width:193.7px ; height:109px ; } } [data-element-id="elm_ohK9o8HQPp2c7PPQmBJV6Q"].zpelem-image { border-radius:1px; margin-block-start:6px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/let-s-talk-sharepoint-permissions" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Permissions%202.jpg" width="193.7" height="109" loading="lazy" size="custom"/></picture></a></figure></div>
</div><div data-element-id="elm_b2atEyGw1cnV_BQbJusTEw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_b2atEyGw1cnV_BQbJusTEw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;">Let's talk SharePoint Permissions</span><br></p></div>
</div><div data-element-id="elm_qKCcQHfMbDHOTIu3ARsEbA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_qKCcQHfMbDHOTIu3ARsEbA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval zpbutton-outline " href="https://www.gtconsult.com/blogs/post/let-s-talk-sharepoint-permissions" target="_blank"><span class="zpbutton-content">Read Me</span></a></div>
</div><div data-element-id="elm_fEhwwwJNhtp_S-SwC1ZTfg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_fEhwwwJNhtp_S-SwC1ZTfg"] .zpimage-container figure img { width: 184.28px !important ; height: 104px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_fEhwwwJNhtp_S-SwC1ZTfg"] .zpimage-container figure img { width:184.28px ; height:104px ; } } @media (max-width: 767px) { [data-element-id="elm_fEhwwwJNhtp_S-SwC1ZTfg"] .zpimage-container figure img { width:184.28px ; height:104px ; } } [data-element-id="elm_fEhwwwJNhtp_S-SwC1ZTfg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/kyles-take-the-recent-surge-in-sharepoint-malware-downloads" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Security%20write%20up%20thumbnail.jpg" width="184.28" height="104" loading="lazy" size="custom"/></picture></a></figure></div>
</div><div data-element-id="elm_E6MPT1tW2VroIFVuzcccVQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_E6MPT1tW2VroIFVuzcccVQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;">Kyle's Take: The recent surge in SharePoint Malware downloads</span><br></p></div>
</div><div data-element-id="elm_0KwGOtvwFDNvDCj-MQS4Ug" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_0KwGOtvwFDNvDCj-MQS4Ug"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval zpbutton-outline " href="https://www.gtconsult.com/blogs/post/kyles-take-the-recent-surge-in-sharepoint-malware-downloads" target="_blank"><span class="zpbutton-content">Read Me</span></a></div>
</div></div></div></div></div></div><div data-element-id="elm_U5rAhJ3iaA4nGGm4bhb73g" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg zscustom-section-123 "><style type="text/css"> [data-element-id="elm_U5rAhJ3iaA4nGGm4bhb73g"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_s-spPx4NaHeyPzjDZgSfzg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"> [data-element-id="elm_s-spPx4NaHeyPzjDZgSfzg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_8Bu5QuMPrC5SEzPuuEgr1A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_8Bu5QuMPrC5SEzPuuEgr1A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_BgrztguO06nuTlQclHkgGg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_BgrztguO06nuTlQclHkgGg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-weight:700;">Considerations include:</span></p><ul><li>Obtaining and installing a valid SSL certificate from a trusted certificate authority to authenticate the server's identity and establish a secure connection.</li><li>Enabling SSL encryption for all communications between users and the SharePoint environment, including web traffic, file transfers, and data synchronization.</li><li>Periodically renewing SSL certificates and configuring SSL/TLS settings to comply with industry standards and best practices.</li></ul></div></div>
</div><div data-element-id="elm_sXY5TfNmDxY2r9Pk2ekeRg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_sXY5TfNmDxY2r9Pk2ekeRg"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>SSL encryption safeguards data during transmission.</li><li>Valid SSL certificates verify the authenticity of the server.</li></ul></div></div>
</div></div></div></div></div><div data-element-id="elm_bSo-ggMrOmpDnJ1yAy7jog" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_bSo-ggMrOmpDnJ1yAy7jog"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_xgOLxeMkKGz95VrO3smdhg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_xgOLxeMkKGz95VrO3smdhg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_0omc7CpCALrpfa9WK8HjEw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_0omc7CpCALrpfa9WK8HjEw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_gnrJGBMZnZd0o1C0GKcSRw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_gnrJGBMZnZd0o1C0GKcSRw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">3. Regular security audits and monitoring</span><br></h2></div>
<div data-element-id="elm_MvjKhomz5yAN2rnK4Bp0Lg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_MvjKhomz5yAN2rnK4Bp0Lg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>Regular security audits and monitoring are essential for detecting and mitigating security risks within the SharePoint environment.</p></div></div>
</div><div data-element-id="elm_sf0MZs2t8Kt_KwzTdPLptA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_sf0MZs2t8Kt_KwzTdPLptA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-weight:700;">Considerations include:</span></p><ul><li>Conducting periodic security audits to assess the effectiveness of security controls, identify vulnerabilities, and ensure compliance with security policies and standards.</li><li>Implementing robust monitoring tools and solutions to track user activities, detect suspicious behavior, and alert administrators to potential security incidents.</li><li>Establishing incident response procedures to investigate and respond to security events identified through security audits and monitoring activities.</li></ul></div></div>
</div><div data-element-id="elm_L1qQNKoxXA5-Ewdab_RaZQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_L1qQNKoxXA5-Ewdab_RaZQ"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>Security audits identify and address vulnerabilities.</li><li>Monitoring tools enable real-time threat detection.</li></ul></div></div>
</div></div></div></div></div><div data-element-id="elm_OPn66VQQ7t67SW2iM-qd0w" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_OPn66VQQ7t67SW2iM-qd0w"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_iz9TEPUZFdfA0DACLTKyXg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_iz9TEPUZFdfA0DACLTKyXg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_ejiGdg4supFFfWbZScnadA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_ejiGdg4supFFfWbZScnadA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_6qwyJW8AXiECy5Xn1OO7MQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6qwyJW8AXiECy5Xn1OO7MQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p>Establish comprehensive backup and recovery procedures to safeguard against data loss due to unforeseen events.&nbsp;</p></div></div></div>
</div><div data-element-id="elm_hJ230GXgIv0aUcoIZeV1JA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_hJ230GXgIv0aUcoIZeV1JA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Best practices include:</span></p><ul><li>Establishing regular backup schedules to create copies of SharePoint data, configurations, and content databases.</li><li>Testing backup and recovery procedures to ensure data integrity and verify the ability to restore SharePoint environments to a functional state.</li><li>Storing backup copies securely in off-site locations or cloud storage services to protect against data loss due to disasters, hardware failures, or malicious attacks.</li></ul></div></div></div>
</div><div data-element-id="elm_pLuW-JNcToHVsqRPfBsJag" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_pLuW-JNcToHVsqRPfBsJag"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>Backup procedures protect against data loss.</li><li>Regular testing ensures the reliability of the recovery process.</li></ul></div></div></div>
</div><div data-element-id="elm_eeQnZeh00O6Gp4Xp4JBy-Q" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_eeQnZeh00O6Gp4Xp4JBy-Q"] div.zpspacer { height:10px; } @media (max-width: 768px) { div[data-element-id="elm_eeQnZeh00O6Gp4Xp4JBy-Q"] div.zpspacer { height:calc(10px / 3); } } </style><div class="zpspacer " data-height="10"></div>
</div></div></div></div></div><div data-element-id="elm_x9Ux0a111RejHOAhph8xMQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg zscustom-section-139 "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ihtl4vcaL3P2zHa10NKJJw" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-flex-start " data-equal-column=""><style type="text/css"> [data-element-id="elm_ihtl4vcaL3P2zHa10NKJJw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_p739uGkDRfUtWZ-ABDQBqQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_p739uGkDRfUtWZ-ABDQBqQ"].zpelem-col{ border-style:solid; border-color:rgba(0,0,0,0.2) !important; border-block-start-width:0px; border-inline-end-width:2px; border-block-end-width:0px; border-inline-start-width:0px; border-radius:1px; } </style><div data-element-id="elm_WLLBZAxTTn9HbC9zJQuVnw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_WLLBZAxTTn9HbC9zJQuVnw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="font-size:18px;font-weight:900;color:rgb(0, 27, 76);">Have you read our <a href="https://www.gtconsult.com/history-of-cyber-security-ebook" title="eBook" target="_blank" rel="">eBook</a>?</span><br></h2></div>
<div data-element-id="elm_kHgbnWw9bIBSyy4Ot7Vdwg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_kHgbnWw9bIBSyy4Ot7Vdwg"] .zpimage-container figure img { width: 200px ; height: 200.00px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_kHgbnWw9bIBSyy4Ot7Vdwg"] .zpimage-container figure img { width:200px ; height:200.00px ; } } @media (max-width: 767px) { [data-element-id="elm_kHgbnWw9bIBSyy4Ot7Vdwg"] .zpimage-container figure img { width:200px ; height:200.00px ; } } [data-element-id="elm_kHgbnWw9bIBSyy4Ot7Vdwg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/history-of-cyber-security-ebook" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Cover%20Square.jpg" width="200" height="200.00" loading="lazy" size="small"/></picture></a></figure></div>
</div></div><div data-element-id="elm_vrfXdrO5tauQMIPT43CkuQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_vrfXdrO5tauQMIPT43CkuQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_zwO1ZU6O4Xg-9UDAkTT34w" data-element-type="heading" class="zpelement zpelem-heading sub-heading "><style> [data-element-id="elm_zwO1ZU6O4Xg-9UDAkTT34w"].zpelem-heading { border-radius:1px; } </style><h5
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div><h2><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">4. Back up and recovery procedures</span></h2></div></h5></div>
<div data-element-id="elm_7Q0HjRBdUIJZ61Pya10glA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_7Q0HjRBdUIJZ61Pya10glA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p>Establish comprehensive backup and recovery procedures to safeguard against data loss due to unforeseen events.&nbsp;</p></div></div></div>
</div><div data-element-id="elm_sHVT9lNqLe2qLC821rFQiA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_sHVT9lNqLe2qLC821rFQiA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Best practices include:</span></p><ul><li>Establishing regular backup schedules to create copies of SharePoint data, configurations, and content databases.</li><li>Testing backup and recovery procedures to ensure data integrity and verify the ability to restore SharePoint environments to a functional state.</li><li>Storing backup copies securely in off-site locations or cloud storage services to protect against data loss due to disasters, hardware failures, or malicious attacks.</li></ul></div></div></div>
</div></div></div><div data-element-id="elm_vKzDl-TR0ZNikSTOGuyLTw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_TihoWtynmRWXHpVZ3olVyw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_sLUOYw6D40wqyO3FVSxuPA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_sLUOYw6D40wqyO3FVSxuPA"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>Backup procedures protect against data loss.</li><li>Regular testing ensures the reliability of the recovery process.</li></ul></div></div></div>
</div></div></div></div></div><div data-element-id="elm_UOPaIOhUeSNzMSXqBtiznA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_UOPaIOhUeSNzMSXqBtiznA"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_uSe-g-3JFVbmbiwpWnkBqA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_uSe-g-3JFVbmbiwpWnkBqA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_kJ2AWKQ_pu1314NI41arog" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_kJ2AWKQ_pu1314NI41arog"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_W7atDZV-U7bFFu8DXSM7aQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_W7atDZV-U7bFFu8DXSM7aQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">5. Security awareness training for users</span><br></h2></div>
<div data-element-id="elm_5GA36hiL2MuZcsbjMylEqw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_5GA36hiL2MuZcsbjMylEqw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p>User awareness is an important piece of the puzzle. Educate users on security best practices through comprehensive awareness training programs. Foster a culture of security consciousness by informing users about potential threats, phishing attacks, and the importance of safeguarding sensitive information.</p></div></div></div>
</div><div data-element-id="elm_t2JLQ7iz1WU5uCIlSg5GZQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_t2JLQ7iz1WU5uCIlSg5GZQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Considerations include:</span></p><ul><li>Developing comprehensive security awareness training programs that cover topics such as phishing attacks, password security, and data handling practices.</li><li>Providing regular training sessions, workshops, and resources to reinforce security awareness and promote a culture of security within the organization.</li><li>Encouraging user participation and engagement in security awareness initiatives through interactive training modules, quizzes, and real-world examples of security incidents and their impact.</li></ul></div></div></div>
</div><div data-element-id="elm_YTOXXVufhfWBKB07WMB_nQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_YTOXXVufhfWBKB07WMB_nQ"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>User awareness is a critical component of overall security.</li><li>Training programs empower users to recognize and mitigate risks.</li></ul></div></div></div>
</div></div></div></div></div><div data-element-id="elm_sMsQus8GTTDAgAYjl3ZnWg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_sMsQus8GTTDAgAYjl3ZnWg"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_e5ymGxewDYiSBiXV131pNQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_e5ymGxewDYiSBiXV131pNQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_fx_dbjmv-_gUyn4sdT2h0g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_fx_dbjmv-_gUyn4sdT2h0g"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_SyKew3QsXA6eSffjUreURw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_SyKew3QsXA6eSffjUreURw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">6. Patch Management</span><br></h2></div>
<div data-element-id="elm_wmHrzlb8aPaRdIm_2G-sYg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_wmHrzlb8aPaRdIm_2G-sYg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p>Patch management is the process of planning, testing, deploying, and monitoring software updates, also known as patches, to address vulnerabilities, bugs, or security flaws in software applications and operating systems. It is an essential aspect of cybersecurity and IT infrastructure management aimed at keeping systems secure and up-to-date.</p><p><span style="color:inherit;"><span style="font-size:11pt;">Effective patch management is crucial for maintaining the security of your SharePoint environment.&nbsp;</span></span><br></p></div></div></div>
</div><div data-element-id="elm_0f0Y5tNZI0lw2NCmnvMVVA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_0f0Y5tNZI0lw2NCmnvMVVA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Consider the following steps:</span></p><ul><li>Regularly monitor for security patches and updates released by Microsoft for SharePoint and associated software components.</li><li>Establish a patch testing process to evaluate patches in a non-production environment before deployment to the production environment.</li><li>Implement a schedule for deploying patches during maintenance windows to minimize disruptions to users and business operations.</li><li>Maintain detailed documentation of patching activities, including patch versions, deployment dates, and any issues encountered during the patching process.</li></ul></div></div></div>
</div><div data-element-id="elm_h11DXPWnqC-Ta3KwT7AcLA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_h11DXPWnqC-Ta3KwT7AcLA"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>Regular patching helps address known vulnerabilities and reduce the risk of security breaches.</li><li><span style="font-size:11pt;">Testing patches in a controlled environment before deployment helps mitigate the risk of unintended consequences in the production environment.</span></li></ul></div></div></div>
</div><div data-element-id="elm_OHY1Ufkq8NfSj_3LQ71VpA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_OHY1Ufkq8NfSj_3LQ71VpA"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_OHY1Ufkq8NfSj_3LQ71VpA"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div></div></div></div></div><div data-element-id="elm_IuhSeHvfCo31_NApM2PRDw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_IuhSeHvfCo31_NApM2PRDw"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_uBdeooJjPgC3crqgZAXJDQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_uBdeooJjPgC3crqgZAXJDQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_e-k4W6ZRtzKgdZdzCrc7Dw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-5 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_e-k4W6ZRtzKgdZdzCrc7Dw"].zpelem-col{ background-color:rgba(52,73,94,0.2); background-image:unset; border-radius:1px; margin-block-start:5px; } </style><div data-element-id="elm_YrJGMPIBFLWS2vBGsOV0lw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_YrJGMPIBFLWS2vBGsOV0lw"].zpelem-heading { border-radius:1px; margin-block-start:4px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-size:20px;color:rgb(255, 255, 255);font-weight:700;">Learn more on our podcast: Ten Ton Potato</span><br></h2></div>
<div data-element-id="elm_bTCe07v8E53FvMmh7owPnA" data-element-type="video" class="zpelement zpelem-video "><style type="text/css"> [data-element-id="elm_bTCe07v8E53FvMmh7owPnA"].zpelem-video{ border-radius:1px; } </style><div class="zpvideo-container zpiframe-align-left zpiframe-mobile-align- zpiframe-tablet-align-"><iframe class="zpvideo " width="560" height="250" src="//www.youtube.com/embed/WRVatfwLeCM?enablejsapi=1" frameborder="0" allowfullscreen id=youtube-video-1 data-api=youtube></iframe></div>
</div><div data-element-id="elm_tcTSSvH-S_5g7R6-HQN0ng" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_tcTSSvH-S_5g7R6-HQN0ng"] .zpimagetext-container figure img { width: 32px !important ; height: 32px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_tcTSSvH-S_5g7R6-HQN0ng"] .zpimagetext-container figure img { width:32px ; height:32px ; } } @media (max-width: 767px) { [data-element-id="elm_tcTSSvH-S_5g7R6-HQN0ng"] .zpimagetext-container figure img { width:32px ; height:32px ; } } [data-element-id="elm_tcTSSvH-S_5g7R6-HQN0ng"].zpelem-imagetext .zpimage-text, [data-element-id="elm_tcTSSvH-S_5g7R6-HQN0ng"].zpelem-imagetext .zpimage-text :is(h1,h2,h3,h4,h5,h6){ text-shadow:1px 1px 1px #000000; } [data-element-id="elm_tcTSSvH-S_5g7R6-HQN0ng"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-center zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://podcasts.apple.com/za/podcast/ten-ton-potato-by-gtconsult/id1719258790?i=1000644363073" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/standard.png" width="32" height="32" loading="lazy" size="custom" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p style="text-align:center;"><span style="font-size:16px;color:rgb(255, 255, 255);">Listen on Apple Podcasts</span></p></div>
</div></div><div data-element-id="elm_GMhxaosSYxs-bzYKNdG8DA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_GMhxaosSYxs-bzYKNdG8DA"] .zpimagetext-container figure img { width: 33px !important ; height: 33px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_GMhxaosSYxs-bzYKNdG8DA"] .zpimagetext-container figure img { width:33px ; height:33px ; } } @media (max-width: 767px) { [data-element-id="elm_GMhxaosSYxs-bzYKNdG8DA"] .zpimagetext-container figure img { width:33px ; height:33px ; } } [data-element-id="elm_GMhxaosSYxs-bzYKNdG8DA"].zpelem-imagetext .zpimage-text, [data-element-id="elm_GMhxaosSYxs-bzYKNdG8DA"].zpelem-imagetext .zpimage-text :is(h1,h2,h3,h4,h5,h6){ text-shadow:1px 1px 1px #000000; } [data-element-id="elm_GMhxaosSYxs-bzYKNdG8DA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-center zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://open.spotify.com/episode/6XbO2MiJtcx3KW3hKOOvYA?si=_-qsW_-6ROSPSNlSDrqimw&amp;nd=1&amp;dlsi=04bd234f250c4329" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Spotify_logo_without_text.svg.png" width="33" height="33" loading="lazy" size="custom" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p style="text-align:center;"><span style="font-size:16px;color:rgb(255, 255, 255);">Listen on Spotify</span></p></div>
</div></div><div data-element-id="elm_rF4LMpF1vKBl8JUNon8xEA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_rF4LMpF1vKBl8JUNon8xEA"] div.zpspacer { height:0px; } @media (max-width: 768px) { div[data-element-id="elm_rF4LMpF1vKBl8JUNon8xEA"] div.zpspacer { height:calc(0px / 3); } } </style><div class="zpspacer " data-height="0"></div>
</div></div><div data-element-id="elm_hWjoIgCMbVhWPpsJbRHLmw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-7 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_hWjoIgCMbVhWPpsJbRHLmw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_03sTYsfavYljJCyVSQCn7Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_03sTYsfavYljJCyVSQCn7Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">7. Intrusion Detection and Prevention Systems (IDPS)</span><br></h2></div>
<div data-element-id="elm_u6ZhC2FcFI3dQkVa7EthHg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_u6ZhC2FcFI3dQkVa7EthHg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;"><span style="font-size:11pt;">Deploying intrusion detection and prevention systems (IDPS) can help monitor network traffic and detect potential security threats in real-time.</span></span><br></p></div>
</div><div data-element-id="elm_HHZeNQnfMZYL3FFnKCFwOA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_HHZeNQnfMZYL3FFnKCFwOA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-weight:700;">Consider the following strategies:</span></p><ul><li>Place IDPS sensors strategically throughout the network to monitor traffic entering and exiting SharePoint servers.</li><li>Configure IDPS rules and signatures to detect known attack patterns, anomalous behavior, and suspicious network activities.</li><li>Integrate IDPS with security information and event management (SIEM) systems for centralized logging, correlation, and analysis of security events.</li></ul></div></div>
</div><div data-element-id="elm_oBlD21lOvoL7wERZsofhyQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oBlD21lOvoL7wERZsofhyQ"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>IDPS solutions provide proactive threat detection and help organizations respond to security incidents in a timely manner.</li><li>Integration with SIEM systems enhances visibility and enables comprehensive analysis of security events across the SharePoint environment.</li></ul></div></div>
</div></div></div></div></div><div data-element-id="elm_Dl-_Y1yczcyW21UWSmwBxQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_Dl-_Y1yczcyW21UWSmwBxQ"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_NuqgWUMAh2KDIaqnZHA_lQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_NuqgWUMAh2KDIaqnZHA_lQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm__WJH6AFz45DLlAMd5JBGDA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm__WJH6AFz45DLlAMd5JBGDA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_aNGx42C8U8F35zp-BHkCKA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_aNGx42C8U8F35zp-BHkCKA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">8. Secure external Sharing</span><br></h2></div>
<div data-element-id="elm_Z32HCptWZ-yVBtg3gaxLCw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Z32HCptWZ-yVBtg3gaxLCw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="color:inherit;"><span style="font-size:11pt;">Implementing secure external sharing practices helps prevent unauthorized access to sensitive information shared with external users.</span></span><br></p></div></div></div>
</div><div data-element-id="elm_gXx8DericCxhcrZQYtw5KQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_gXx8DericCxhcrZQYtw5KQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Consider the following recommendations:</span></p><ul><li>Configure external sharing settings to restrict access to specific domains, email addresses, or groups.</li><li>Implement expiration dates and access controls for shared links to limit the lifespan and scope of external sharing.</li><li>Enforce authentication requirements, such as requiring external users to sign in with a Microsoft or third-party identity provider, to verify their identities and control access to shared content.</li></ul></div></div></div></div>
</div><div data-element-id="elm_pWqjDkw1r38IYtD6R44S2A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_pWqjDkw1r38IYtD6R44S2A"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><div><div><p><span style="font-weight:700;color:rgba(52, 73, 94, 0.7);">Key Takeaways:</span></p><ul><li><span style="color:rgba(52, 73, 94, 0.7);">Secure external sharing practices help organizations maintain control over shared content and protect sensitive information from unauthorized disclosure.</span></li><li><span style="color:rgba(52, 73, 94, 0.7);">Enforcing authentication requirements enhances security and ensures that only authorized external users can access shared resources.</span></li></ul></div>
</div></div></div></div></div></div></div></div><div data-element-id="elm_YpIcfe7RMBM9jmWhC5LT5g" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_YpIcfe7RMBM9jmWhC5LT5g"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_2XtFlVZpFvhDypojczGS9w" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_2XtFlVZpFvhDypojczGS9w"].zprow{ border-radius:1px; } </style><div data-element-id="elm_X-g7MbUmaRJILcfvqeRLeg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_X-g7MbUmaRJILcfvqeRLeg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_HphuCj2CCvDNBwXmTJdAyg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_HphuCj2CCvDNBwXmTJdAyg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">9. Network Segmentation</span><br></h2></div>
<div data-element-id="elm_oNy34yE1RazDfUVZ9qjc3w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oNy34yE1RazDfUVZ9qjc3w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><p>Network segmentation is the practice of dividing a computer network into smaller, isolated segments or subnetworks to improve security, performance, and manageability. By segmenting a network, organizations can control the flow of traffic, limit access to sensitive resources, and contain the impact of security breaches or unauthorized access attempts.</p></div></div></div></div>
</div><div data-element-id="elm_8m9-guyFfhjmTPFiDADBfQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_8m9-guyFfhjmTPFiDADBfQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">In the context of SharePoint security, consider:</span></p><ul><li>Segregating SharePoint servers into dedicated network segments or VLANs to isolate them from other parts of the network.</li><li>Implementing firewalls and access control lists (ACLs) to restrict traffic between network segments and enforce security policies.</li><li>Applying network segmentation principles to SharePoint farms, service applications, and databases to minimize the impact of security breaches or unauthorized access.</li></ul></div></div></div></div>
</div><div data-element-id="elm_PFEd2ng4-nSK1K9dXQ9JXg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_PFEd2ng4-nSK1K9dXQ9JXg"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>Network segmentation helps contain potential security breaches and reduce the impact of unauthorized access or malicious activities.</li><li>Segregation of SharePoint resources can help limit lateral movement and prevent the spread of security threats within the environment.</li></ul></div>
</div></div></div></div></div></div></div></div><div data-element-id="elm_iGRJpWbOKWMizltHB_n7dg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_iGRJpWbOKWMizltHB_n7dg"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_BdKyFDSOAePHxDAEupwe_g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_BdKyFDSOAePHxDAEupwe_g"].zprow{ border-radius:1px; } </style><div data-element-id="elm_AzZ50k5-UsGE-b0KCOzpiw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_AzZ50k5-UsGE-b0KCOzpiw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_DmHmmRt5aGL73siYLOmu_A" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_DmHmmRt5aGL73siYLOmu_A"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-size:24px;font-weight:900;color:rgb(0, 27, 76);">10. Incident Response Plan</span><br></h2></div>
<div data-element-id="elm_3oBFtK4i842jRfpPRYNTUA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_3oBFtK4i842jRfpPRYNTUA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p><span style="color:inherit;"><span style="font-size:11pt;">Developing and maintaining an incident response plan helps organizations effectively detect, respond to, and recover from security incidents affecting SharePoint.</span></span><br></p></div></div></div>
</div><div data-element-id="elm_605rfgOcSOJu68ILGuVVhA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_605rfgOcSOJu68ILGuVVhA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Consider the following elements:</span></p><ul><li>Establish an incident response team with defined roles, responsibilities, and communication channels.</li><li>Document incident response procedures, including escalation paths, notification requirements, and evidence preservation protocols.</li><li>Conduct regular tabletop exercises and simulations to test the effectiveness of the incident response plan and identify areas for improvement.</li><li>Continuously review and update the incident response plan based on lessons learned from past incidents, changes in the threat landscape, and regulatory requirements.</li></ul></div></div></div></div>
</div><div data-element-id="elm_ouI5539HZzOl67FtY5A3TA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ouI5539HZzOl67FtY5A3TA"].zpelem-text { background-color:rgba(52,73,94,0.07); background-image:unset; border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><p><span style="font-weight:700;">Key Takeaways:</span></p><ul><li>An incident response plan helps organizations minimize the impact of security incidents and restore normal operations in a timely manner.</li><li>Regular testing and refinement of the incident response plan ensure preparedness and readiness to respond effectively to security threats and incidents.</li></ul></div>
</div></div></div></div></div></div></div></div><div data-element-id="elm_wiD-zFybyQxO-PuYVsso6g" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_wiD-zFybyQxO-PuYVsso6g"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_7Q5fBM_BQWihQ025SfYf2g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_7Q5fBM_BQWihQ025SfYf2g"].zprow{ border-radius:1px; } </style><div data-element-id="elm_xLasTE9Jqi53teBr4CoEig" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_xLasTE9Jqi53teBr4CoEig"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_XuJteKjAyghzKXtkVYO-UQ" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_XuJteKjAyghzKXtkVYO-UQ"] .zpimageheadingtext-container figure img { width: 137px !important ; height: 150.2px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_XuJteKjAyghzKXtkVYO-UQ"] .zpimageheadingtext-container figure img { width:137px ; height:150.2px ; } } @media (max-width: 767px) { [data-element-id="elm_XuJteKjAyghzKXtkVYO-UQ"] .zpimageheadingtext-container figure img { width:137px ; height:150.2px ; } } [data-element-id="elm_XuJteKjAyghzKXtkVYO-UQ"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-left zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/GT_icon_gr-1.png" data-src="/Blog%20Site/GT_icon_gr-1.png" width="137" height="150.2" loading="lazy" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true">Conclusion</h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><p><span style="color:inherit;">In conclusion, safeguarding your SharePoint Intranet requires a holistic approach that encompasses user authentication, encryption, data loss prevention, auditing, backup procedures, and user education. By incorporating these security best practices into your Intranet management strategy, you can create a resilient and secure digital environment that protects your organization's valuable assets. Remember, proactive measures are key to staying ahead of potential threats in the ever-evolving landscape of cybersecurity.</span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">Looking to fortify your SharePoint Intranet and bolster your organization's security defenses? Partner with GTconsult, a Microsoft Solutions Partner for Modern Work, and leverage A Team Protection for expert guidance and tailored solutions. Safeguard your valuable assets with our comprehensive security services. Let GTconsult be your trusted ally in navigating the complex landscape of SharePoint security. Contact us today to discuss your security needs and take proactive steps towards a resilient and secure digital environment.</span><span style="color:inherit;"><br></span></p></div></div>
</div></div></div><div data-element-id="elm_TAibQxMDBCWCgnaGl-zEMA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_TAibQxMDBCWCgnaGl-zEMA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="https://www.gtconsult.com/contact" target="_blank"><span class="zpbutton-content">I need GTconsult!</span></a></div>
</div><div data-element-id="elm_ma9DncK53uSGwm8XnXo6cA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_ma9DncK53uSGwm8XnXo6cA"] div.zpspacer { height:14px; } @media (max-width: 768px) { div[data-element-id="elm_ma9DncK53uSGwm8XnXo6cA"] div.zpspacer { height:calc(14px / 3); } } </style><div class="zpspacer " data-height="14"></div>
</div></div></div></div></div><div data-element-id="elm_hNxrNWWz_mr5gRqH20Xguw" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg zpbackground-size-cover zpbackground-position-center-center zpbackground-repeat-all zpbackground-attachment-scroll " style="background-image:linear-gradient(to bottom, rgba(30, 34, 45, 0.8), rgba(30, 34, 45, 0.8)), url(https://static.zohocdn.com/sites/stock-images/images/zpstock-image-08.jpg);"><style type="text/css"> [data-element-id="elm_hNxrNWWz_mr5gRqH20Xguw"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_sIKsiAUtKkQLfIF2AjTPLA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_sIKsiAUtKkQLfIF2AjTPLA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_B_aiW12DuHPKcQbj8oEtrQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_B_aiW12DuHPKcQbj8oEtrQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_Rl9gbYg6XQfRZ25Ib7K55A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Rl9gbYg6XQfRZ25Ib7K55A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="text-align:center;"><span style="font-size:28px;font-weight:700;color:rgb(255, 255, 255);font-family:&quot;Noto Sans&quot;, sans-serif;">Keep Reading</span></p><p style="text-align:center;"><span style="font-weight:400;color:rgb(255, 255, 255);font-family:Nunito;">Check out our other blogs below:</span><br></p></div>
</div><div class="zpelement zpelem-carousel " data-element-id="elm_o6ZNTEATP6vjerleehZQdg" data-element-type="carousel" data-currentslide-index="0" data-transition="slide_left" data-slider-interval="5000" data-zs-autoslide="true" data-zs-slidepause-option="false" data-zs-slider="min-height-el: zpcarousel-content-container;arrow-cont: zpcarousel-arrows-container; active-controller: zpcarousel-controller-active; controller-cont: zpcarousel-controller-container; controller: zpcarousel-controller; right-arrow: zpcarousel-arrow-right; left-arrow: zpcarousel-arrow-left;active-slide:zpcarousel-content-active; slide: zpcarousel-content; slides-cont: zpcarousel-content-container;content-cont : zpcarousel-content-inner; background: false;slide-pause-btn:zpcarousel-pause-btn;slide-play-btn:zpcarousel-play-btn;"><div class="zpcarousel-container zpcarousel-style-01"><style></style><div class="zpcarousel-content-container"><div class="zpelement zpcarousel-content " data-element-type="carouselslide" data-element-id="elm_hOTLftfs755aUD5Bn9cFOA" data-slide-name="Slide 1"><div class="zpcarousel-content-inner"><div data-element-id="elm_bip4VbkFNza41hqIpGkTnA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_bip4VbkFNza41hqIpGkTnA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_x1BGrjYsPhYS8KYZ79_H9Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_x1BGrjYsPhYS8KYZ79_H9Q"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_S_4vaGooCvpb4RMFsWsABQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_S_4vaGooCvpb4RMFsWsABQ"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_S_4vaGooCvpb4RMFsWsABQ"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_S_4vaGooCvpb4RMFsWsABQ"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_S_4vaGooCvpb4RMFsWsABQ"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/kyles-take-the-recent-surge-in-sharepoint-malware-downloads" target="_blank" title="Kyle's take" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Security%20write%20up%20thumbnail.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">Kyle's Take: The recent surge in SharePoint Malware downloads</span></p></div>
</div></div></div><div data-element-id="elm_MsqyVhfg--AQrwbyzl0CRQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_MsqyVhfg--AQrwbyzl0CRQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_uW9SbxNRw8x4_UIVloRscA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_uW9SbxNRw8x4_UIVloRscA"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_uW9SbxNRw8x4_UIVloRscA"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_uW9SbxNRw8x4_UIVloRscA"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_uW9SbxNRw8x4_UIVloRscA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/creating-a-knowledge-base-in-sharepoint-your-complete-guide" target="_blank" title="Creating a knowledge base in SharePoint" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Knowledge%20base.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">Creating a knowledge base in SharePoint</span></p></div>
</div></div></div><div data-element-id="elm_Q-hf1DaElEMqubDgDmPlow" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_Q-hf1DaElEMqubDgDmPlow"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_lUj5flEzQQRL3KStx4isqg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_lUj5flEzQQRL3KStx4isqg"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_lUj5flEzQQRL3KStx4isqg"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_lUj5flEzQQRL3KStx4isqg"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_lUj5flEzQQRL3KStx4isqg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/let-s-talk-sharepoint-permissions" target="_blank" title="SharePoint Permissions" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Permissions%202.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">Let's talk SharePoint permissions</span><br></p></div>
</div></div></div></div></div></div><div class="zpelement zpcarousel-content " data-element-type="carouselslide" data-element-id="elm_9aM0Zrf0c1ROVCNi0bB2xg" data-slide-name="Slide 2"><div class="zpcarousel-content-inner"><div data-element-id="elm_WFeIiXndEL_eDNMj9lmVRw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_WFeIiXndEL_eDNMj9lmVRw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_jRAMosBEPIBd7PKI3iVVPg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_jRAMosBEPIBd7PKI3iVVPg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_ZcvDtdabosHAN0e4FPwwVg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_ZcvDtdabosHAN0e4FPwwVg"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_ZcvDtdabosHAN0e4FPwwVg"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_ZcvDtdabosHAN0e4FPwwVg"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_ZcvDtdabosHAN0e4FPwwVg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/micro-moments-macro-impact" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Chair%20Write%20Up.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;"><a href="https://www.gtconsult.com/blogs/post/micro-moments-macro-impact" title="Micro-moments, Macro-impact&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;" target="_blank" rel="" style="color:rgb(255, 255, 255);">Micro-moments, Macro-impact</a><a href="https://www.gtconsult.com/blogs/post/micro-moments-macro-impact" title="Micro-moments, Macro-impact&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;" target="_blank" rel=""><span style="color:rgb(255, 255, 255);">&nbsp;</span><span style="color:inherit;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></a><span style="color:inherit;">&nbsp; &nbsp; &nbsp; &nbsp;</span></span><br></p></div>
</div></div></div><div data-element-id="elm_kkKCWsuuUe65nh0HMXxvpg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_kkKCWsuuUe65nh0HMXxvpg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_zYL8S3e6lQXhE8105axshw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_zYL8S3e6lQXhE8105axshw"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_zYL8S3e6lQXhE8105axshw"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_zYL8S3e6lQXhE8105axshw"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_zYL8S3e6lQXhE8105axshw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/Expert-Insights-Why-and-How-to-Migrate-to-SharePoint-SE" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Migration%20Write%20Up%20Thumbnail%202.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">Expert insights: Why and how to migrate to SharePoint SE</span></p></div>
</div></div></div><div data-element-id="elm_p8G4Cy9APFZix_i6rCmcdw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_p8G4Cy9APFZix_i6rCmcdw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_4QsZD4n7xhMqkFSxdXtrSQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_4QsZD4n7xhMqkFSxdXtrSQ"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_4QsZD4n7xhMqkFSxdXtrSQ"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_4QsZD4n7xhMqkFSxdXtrSQ"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_4QsZD4n7xhMqkFSxdXtrSQ"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/powerapps-in-sharepoint" target="_blank" title="PowerApps" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Power%20Apps.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">PowerApps in SharePoint</span><br></p></div>
</div></div></div></div></div></div><div class="zpelement zpcarousel-content " data-element-type="carouselslide" data-element-id="elm_azJ7G-NY3n-mwrXtH5f4nQ" data-slide-name="Slide 3"><div class="zpcarousel-content-inner"><div data-element-id="elm_RIlW_Yv5Bp9iaIHDgDCFfw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_RIlW_Yv5Bp9iaIHDgDCFfw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_feQV2UdRRbOfXyoHfSMyqA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_feQV2UdRRbOfXyoHfSMyqA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_DwficQ1ays7UkzX60PLQdA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_DwficQ1ays7UkzX60PLQdA"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_DwficQ1ays7UkzX60PLQdA"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_DwficQ1ays7UkzX60PLQdA"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_DwficQ1ays7UkzX60PLQdA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/gtconsult-your-trusted-microsoft-solutions-partner-for-modern-work" target="_blank" title="Microsoft Partner" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Microsft%20Partner%20Thumbnail.jpg" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">GTconsult: Your trusted Microsoft<a href="https://www.gtconsult.com/blogs/post/gtconsult-your-trusted-microsoft-solutions-partner-for-modern-work" title="Microsoft partner" target="_blank" rel=""></a> Solutions Partner for Modern Work&nbsp;</span><br></p></div>
</div></div></div><div data-element-id="elm_21bjcSkuTocbCs1l7gplMg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_21bjcSkuTocbCs1l7gplMg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_oWiro0EGkoR95bkfXIPkpg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_oWiro0EGkoR95bkfXIPkpg"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_oWiro0EGkoR95bkfXIPkpg"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_oWiro0EGkoR95bkfXIPkpg"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_oWiro0EGkoR95bkfXIPkpg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/sharepoint-migration-checklist" target="_blank" title="Migration Check list" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Checklist%2016%20by%209.png" width="415" height="233.44" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><p><span style="font-size:20px;color:rgb(255, 255, 255);">SharePoint Migration Checklist<a href="https://www.gtconsult.com/sharepoint-migration-checklist" title="Migration Check list" target="_blank" rel=""></a></span><br></p><div style="color:inherit;"><span style="font-size:20px;"><br></span></div></div></div>
</div></div></div><div data-element-id="elm_nDK6PSFVPnRcVCLgTT8Heg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_nDK6PSFVPnRcVCLgTT8Heg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_vkg0CbfV4_Cl_Ltm7EgtjQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_vkg0CbfV4_Cl_Ltm7EgtjQ"] .zpimagetext-container figure img { width: 307px ; height: 172.57px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_vkg0CbfV4_Cl_Ltm7EgtjQ"] .zpimagetext-container figure img { width:723px ; height:406.40px ; } } @media (max-width: 767px) { [data-element-id="elm_vkg0CbfV4_Cl_Ltm7EgtjQ"] .zpimagetext-container figure img { width:415px ; height:233.27px ; } } [data-element-id="elm_vkg0CbfV4_Cl_Ltm7EgtjQ"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.gtconsult.com/blogs/post/cci-case-study" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/CCI%20Case%20Study.png" width="415" height="233.27" size="fit" data-lightbox="false"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">CCI Case Study</span><br></p><p><span style="color:inherit;"><span style="font-size:20px;"><br></span></span></p></div>
</div></div></div></div></div></div></div><div class="zpcarousel-arrows-container zpcarousel-arrow-type-01" data-arrow-style="2"><div class="zpcarousel-arrow-left" tabindex="0" role="button" aria-label="Previous"><svg aria-hidden="true" viewBox="0 0 32 32" xmlns="http://www.w3.org/2000/svg" class="svg-icon-18px"><path d="M0,16c0,0.3,0.1,0.5,0.3,0.7l9.9,10c0.4,0.4,1,0.4,1.4,0c0.4-0.4,0.4-1,0-1.4L3.4,17H31 c0.6,0,1-0.5,1-1s-0.4-1-1-1H3.4l8.2-8.3c0.4-0.4,0.4-1,0-1.4c-0.4-0.4-1-0.4-1.4,0l-9.9,10C0.1,15.5,0,15.7,0,16z"></path></svg></div>
<div class="zpcarousel-arrow-right" tabindex="0" role="button" aria-label="Next"><svg aria-hidden="true" viewBox="0 0 32 32" xmlns="http://www.w3.org/2000/svg" class="svg-icon-18px"><path id="arrow-right-style2-Arrow_Forward" d="M32,16c0-0.3-0.1-0.5-0.3-0.7l-9.9-10c-0.4-0.4-1-0.4-1.4,0c-0.4,0.4-0.4,1,0,1.4 l8.2,8.3H1c-0.6,0-1,0.5-1,1s0.4,1,1,1h27.6l-8.2,8.3c-0.4,0.4-0.4,1,0,1.4c0.4,0.4,1,0.4,1.4,0l9.9-10C31.9,16.5,32,16.3,32,16z"></path></svg></div>
</div><div class="zpcarousel-controller-container zpcarousel-controller-type-01"><svg class="zpcarousel-pause-btn" tabindex="0" role="button" aria-label="Pause" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 14 14"><path d="M3.85.53C3.6.5 3.34.5 3.07.5 1.68.5.95 1.09.95 2.18V12c.03.74.56 1.32 1.44 1.44.53.07 1.11.07 1.64 0 .9-.13 1.42-.72 1.42-1.5V2.07c0-.09 0-.18-.03-.28-.1-.66-.75-1.17-1.59-1.26h.01ZM11.43.53C11.18.5 10.92.5 10.65.5c-1.39 0-2.12.59-2.12 1.68V12c.03.74.56 1.32 1.44 1.44.53.07 1.11.07 1.64 0 .9-.13 1.42-.72 1.42-1.5V2.07c0-.09 0-.18-.03-.28-.1-.66-.75-1.17-1.59-1.26h.01Z"/></svg><svg class="zpcarousel-play-btn" tabindex="0" role="button" aria-label="Play" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 14 14"><path d="M.59 7.02C.57 5.33.57 3.63.51 1.94.45.63 1.72-.17 2.9.45c3.2 1.68 6.42 3.32 9.64 4.96.59.3.95.76.96 1.43 0 .66-.34 1.11-.91 1.43-3.18 1.75-6.35 3.5-9.52 5.25-1.2.66-2.39-.04-2.41-1.41C.63 10.42.61 8.72.59 7.03Z"/></svg><div class="zpcarousel-controller zpcarousel-controller-active" data-slide-index="0"></div>
<div class="zpcarousel-controller " data-slide-index="1"></div><div class="zpcarousel-controller " data-slide-index="2"></div>
</div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 13 Feb 2024 13:25:29 +0000</pubDate></item><item><title><![CDATA[Kyle's Take: The recent surge in SharePoint Malware downloads]]></title><link>https://www.gtconsult.com/blogs/post/kyles-take-the-recent-surge-in-sharepoint-malware-downloads</link><description><![CDATA[<img align="left" hspace="5" src="https://www.gtconsult.com/Blog Site/Security write up thumbnail.jpg"/>Explore DarkGate Malware: Learn about its impact on SharePoint, causes, prevention, and safeguarding your digital assets. Stay protected from this digital threat. #DarkGateMalware #SharePointSecurity]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_TzuCWzp3SoqHwt0bb9tZwA" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm_TzuCWzp3SoqHwt0bb9tZwA"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_c4mr7JEvScCUyfp_X9JRLA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- zpbackground-size-cover zpbackground-position-center-center zpbackground-repeat-all zpbackground-attachment-scroll " data-equal-column=""><style type="text/css"> [data-element-id="elm_c4mr7JEvScCUyfp_X9JRLA"].zprow{ background-image: url(/Blog%20Site/hacker-jacket-with-hood-with-laptop-sits-table.jpg); border-radius:1px; } </style><div data-element-id="elm_a9-Y2nGRSKCmQAofiNe7vA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_a9-Y2nGRSKCmQAofiNe7vA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_z_9PhqrxR2eltES0bWV7Mw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_z_9PhqrxR2eltES0bWV7Mw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:rgb(255, 255, 255);">What the hack is going on?!</span><br></h2></div>
<div data-element-id="elm_ef0ZnwyFSl-XACvOZ09aoA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ef0ZnwyFSl-XACvOZ09aoA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:rgb(255, 255, 255);"><span style="font-size:16px;">A comprehensive write-up on the recent surge in DarkGate Malware – a menacing digital threat that has sent shockwaves through the tech world.&nbsp;</span><br></span></p><p><span style="font-size:16px;color:rgb(255, 255, 255);">This blog focuses on the malware campaign that has targeted SharePoint, the cause, prevention and cure for such an attack and the measures to take in order to safeguard your digital assets and sensitive information against this pervasive menace.</span><br></p></div>
</div></div></div></div></div><div data-element-id="elm_q21YbQxy7gREeamVrmfBKg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_q21YbQxy7gREeamVrmfBKg"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_OWe6FAxC6G320Bg2qTrN5A" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_OWe6FAxC6G320Bg2qTrN5A"].zprow{ border-radius:1px; } </style><div data-element-id="elm_4lyGr3msP-KUERkLLR8jZg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_4lyGr3msP-KUERkLLR8jZg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_Umjud1z0sk3ckGci1siyXw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Umjud1z0sk3ckGci1siyXw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-size:11pt;">If you've been keeping an eye on the ever-churning tech rumour mill, you might have come across the unsettling news of a surge in malware downloads linked to a cunning DarkGate malware campaign. This devious scheme tricks victims into unwittingly downloading and opening a malicious LNK file, thereby setting off a chain of infection that culminates in the deployment of the dreaded DarkGate payload.</span></p><p><span style="font-size:11pt;">&nbsp;</span></p><p><span style="font-size:11pt;">But this isn't just another rumour – unfortunately, it's a harsh reality that has ensnared numerous individuals and organizations.&nbsp;</span><span style="font-size:14.6667px;color:inherit;">In recent months, malware downloads in SharePoint have doubled.</span></p></div></div>
</div><div data-element-id="elm_dWlaw_SLiO8wa3aDne5O-A" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_dWlaw_SLiO8wa3aDne5O-A"] .zpimagetext-container figure img { width: 500px !important ; height: 334px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_dWlaw_SLiO8wa3aDne5O-A"] .zpimagetext-container figure img { width:500px ; height:334px ; } } @media (max-width: 767px) { [data-element-id="elm_dWlaw_SLiO8wa3aDne5O-A"] .zpimagetext-container figure img { width:500px ; height:334px ; } } [data-element-id="elm_dWlaw_SLiO8wa3aDne5O-A"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/asian-hacker-black-hood-with-matrix-background.jpg" width="500" height="334" loading="lazy" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><p><span style="color:inherit;font-size:11pt;">Attackers employ a covert strategy by harnessing the widespread popularity of cloud applications to distribute malicious content. Leveraging cloud apps for malware delivery not only enables attackers to elude security controls reliant on domain block lists and URL filtering but also evades inspection of cloud-based traffic.</span><br></p><p><span style="font-size:11pt;">To maximize their success in targeting enterprise users, attackers tend to exploit cloud apps already deeply integrated into corporate environments. Microsoft OneDrive, a leading enterprise cloud app, has consistently occupied the top spot for hosting the highest number of cloud malware downloads for over six months.</span></p><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p><p><span style="font-size:11pt;">In September, malware downloads from SharePoint surged significantly due to the DarkGate malware campaign, propelling SharePoint to the second position for hosting the highest number of cloud malware downloads.</span></p><p><span style="color:inherit;font-size:11pt;"><br></span></p><p><span style="color:inherit;font-size:11pt;">So, what does this all mean for us?</span></p><p><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p><p><span style="font-size:11pt;">We recently had a chat with Kyle, our in-house security analyst and resident ethical hacker, to delve into the nitty-gritty of this threat. In this discussion, we aim to shed light on why this happened, how you can shield yourself from it, and chart a path forward.</span></p></div></div>
</div></div><div data-element-id="elm_lF1SKa3NCCF3fqgnzQNuRg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_lF1SKa3NCCF3fqgnzQNuRg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><b><span style="font-size:11pt;color:rgb(255, 255, 255);background-color:rgb(199, 0, 0);">What is the cause?</span></b><br></p><p><span style="color:inherit;"><b><span style="font-size:11pt;"><br></span></b></span></p><div style="color:inherit;"><p><span style="font-size:11pt;">It's just an unusual way of delivering ransomware. These hackers are always trying to find new and exciting ways of getting their horrible, dangerous software in people’s environments. Ever since the rise of work from home, a lot more companies are jumping onto SharePoint as a collaboration platform because of everybody working from home. It's bred the perfect environment for hackers to take advantage. They are taking advantage of the fact that there are a lot of new SharePoint users who aren't as experienced and haven't set up heavy security measures.</span></p><p><span style="font-size:11pt;">&nbsp;</span></p><p><span style="font-size:11pt;">So, the issue here is not SharePoint itself, but rather the knowledge on how to keep your platform safe.</span></p></div></div>
</div><div data-element-id="elm_fgf6K1vWsngWV5BGsGS_lA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_fgf6K1vWsngWV5BGsGS_lA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p><b><span style="font-size:11pt;background-color:rgb(199, 0, 0);color:rgb(255, 255, 255);">What would you say to people who are doubting the safety SharePoint as a collaboration tool?</span></b></p><p style="color:inherit;"><span style="font-size:11pt;">&nbsp;</span></p><p style="color:inherit;"><span style="font-size:11pt;">SharePoint is a phenomenal tool and when you set it up correctly, it can be incredibly secure. It's just about knowing how to set it up correctly. Just make sure you do the correct research going into it or get the advice of people who have a great deal of experience with SharePoint, like us (GTconsult).</span></p></div></div>
</div><div data-element-id="elm_iX_i7mpkabsOurD5f9oGMQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_iX_i7mpkabsOurD5f9oGMQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p><b><span style="font-size:11pt;color:rgb(255, 255, 255);background-color:rgb(199, 0, 0);">How can A Team Protection by GTconsult assist clients in keeping their platform secure?</span></b></p><p style="color:inherit;"><span style="font-size:11pt;">&nbsp;</span></p><p style="color:inherit;"><span style="font-size:11pt;">Microsoft has given us many ways of improving the security for Office 365 and SharePoint, but it very daunting, there are hundreds and thousands of different configurations, policies and alerts that can set up. For an inexperienced staff member to try and find all the right things and all the best practices and put them in place, it's hard.</span></p><p style="color:inherit;"><span style="font-size:11pt;">&nbsp;</span></p><p style="color:inherit;"><span style="font-size:11pt;">A lot of companies just don’t have the resources or the skills to get it done.</span></p><p style="color:inherit;"><span style="font-size:11pt;">&nbsp;</span></p><p style="color:inherit;"><span style="font-size:11pt;">This is where A Team Protection comes in. We do an overview of your current secure score, go through the list of recommendations that Microsoft gives and work together with you to find the easiest way of implementing changes without causing a problem with user experience.</span></p></div></div>
</div><div data-element-id="elm_50CMAOSW-Wjx5ltDpHS0wA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_50CMAOSW-Wjx5ltDpHS0wA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"> [data-element-id="elm_50CMAOSW-Wjx5ltDpHS0wA"] .zpbutton.zpbutton-type-primary{ background-color:#C70000 !important; } </style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://www.gtconsult.com/protection"><span class="zpbutton-content">A Team Protection</span></a></div>
</div></div></div></div></div><div data-element-id="elm_2OnI8KjsME6uzJLBcYmXkQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_2OnI8KjsME6uzJLBcYmXkQ"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_mM-f_OGv4XK1K94XInvBtA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_mM-f_OGv4XK1K94XInvBtA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_qTFHpVdIMPwYlSq2bgAuiQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_qTFHpVdIMPwYlSq2bgAuiQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_cFuiVAtuDveOxTk7tjTuUA" data-element-type="video" class="zpelement zpelem-video "><style type="text/css"> [data-element-id="elm_cFuiVAtuDveOxTk7tjTuUA"].zpelem-video{ border-radius:1px; } </style><div class="zpvideo-container zpiframe-align-center zpiframe-mobile-align- zpiframe-tablet-align-"><iframe class="zpvideo " width="560" height="315" src="//www.youtube.com/embed/e4YSke1x13o?enablejsapi=1" frameborder="0" allowfullscreen id=youtube-video-2 data-api=youtube></iframe></div>
</div><div data-element-id="elm_GkGB-sc6bLn3YSaiDoIOzQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_GkGB-sc6bLn3YSaiDoIOzQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p><b><span style="font-size:11pt;color:rgb(255, 255, 255);background-color:rgb(199, 0, 0);">When is the best time to do this?</span></b></p><p style="color:inherit;"><b><span style="font-size:11pt;"><br></span></b></p><div style="color:inherit;"><p><span style="font-size:11pt;">The best time is always now! The sooner, the better. The longer you leave it, the longer you're at risk. Bigger companies are at bigger risk compared to smaller ones. The risk still exists but it’s less than for a company with say, 500 employees.</span></p><p><span style="font-size:11pt;">&nbsp;</span></p><p><span style="font-size:11pt;">The attack surface area is far greater and their value as a bigger company makes them a more exciting target for rogue individuals who are looking to make some money.</span></p><p><span style="font-size:11pt;">&nbsp;</span></p><p><span style="font-size:11pt;">So, the best time is as soon as possible.</span></p></div></div></div>
</div><div data-element-id="elm_CPzhlxxYgqx7D1ThRAThtw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_CPzhlxxYgqx7D1ThRAThtw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p><b><span style="font-size:11pt;color:rgb(255, 255, 255);background-color:rgb(199, 0, 0);">What are the next steps for those who have already fallen victim to the malware?</span></b></p><p style="color:inherit;"><span style="font-size:11pt;">&nbsp;</span></p><p style="color:inherit;"><span style="font-size:11pt;">Organizations who have been victims of this already are on the radar and have been ear marked as a company with weaker security and maybe they've been labelled as an easy target.</span></p><p style="color:inherit;"><span style="font-size:11pt;">&nbsp;</span></p><p style="color:inherit;"><span style="font-size:11pt;">If it happens once, there's a higher likelihood that you will become a victim of this type of thing again- unless your security is improved.</span></p></div></div>
</div><div data-element-id="elm_8vtUSh4I480xK2JtDnaJHg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_8vtUSh4I480xK2JtDnaJHg"] .zpimagetext-container figure img { width: 210.5px !important ; height: 140px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_8vtUSh4I480xK2JtDnaJHg"] .zpimagetext-container figure img { width:210.5px ; height:140px ; } } @media (max-width: 767px) { [data-element-id="elm_8vtUSh4I480xK2JtDnaJHg"] .zpimagetext-container figure img { width:210.5px ; height:140px ; } } [data-element-id="elm_8vtUSh4I480xK2JtDnaJHg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/cyber-security-concept-login-user-identification-i1698680313341.jpeg" width="210.5" height="140" loading="lazy" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><p><b><span style="font-size:11pt;color:rgb(255, 255, 255);background-color:rgb(199, 0, 0);">Do you have any other comments on SharePoint Security?</span></b></p><p style="color:inherit;"><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p><p style="color:inherit;"><span style="font-size:11pt;">Don't always rely on one layer of security because no security solution is ever 100% effective. In the case that someone manages to find a way around to first layer of security, it's great to have a reputable antivirus or endpoint security solution on your work computers to make sure that even if a dodgy malware does come through, it gets caught on the operating system level and is cleaned up.</span></p><p style="color:inherit;"><span style="font-size:11pt;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p></div></div>
</div></div><div data-element-id="elm_UU_pFrnr3OMJs9al8mHU9g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_UU_pFrnr3OMJs9al8mHU9g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-size:11pt;">And there you have it – a comprehensive response from our expert analyst on the ongoing threat landscape. It's clear that you shouldn't take any chances; don't become the next victim. Instead, reach out to an organization that possesses extensive knowledge in securing platforms like SharePoint. Reach out to GTconsult. With our expertise, we'll proactively assess your security measures before cybercriminals have a chance. Let us fortify your defences before they get the chance to strike. Your data's safety is paramount, and we're here to ensure it.</span></p><p><span style="font-size:11pt;">&nbsp;</span></p><p><span style="font-size:11pt;">Let us hack you before you get hacked!</span></p></div></div>
</div><div data-element-id="elm_27VQuLrv2JedrL9dJM2kUA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_27VQuLrv2JedrL9dJM2kUA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"> [data-element-id="elm_27VQuLrv2JedrL9dJM2kUA"] .zpbutton.zpbutton-type-primary{ background-color:#C70000 !important; } </style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://www.gtconsult.com/contact" target="_blank"><span class="zpbutton-content">Hack me, Baby!</span></a></div>
</div><div data-element-id="elm_hfOz-Hs8JrKoeKNebkUbkw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_hfOz-Hs8JrKoeKNebkUbkw"] .zpimagetext-container figure img { width: 147px !important ; height: 147px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_hfOz-Hs8JrKoeKNebkUbkw"] .zpimagetext-container figure img { width:147px ; height:147px ; } } @media (max-width: 767px) { [data-element-id="elm_hfOz-Hs8JrKoeKNebkUbkw"] .zpimagetext-container figure img { width:147px ; height:147px ; } } [data-element-id="elm_hfOz-Hs8JrKoeKNebkUbkw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20Site/Kyle%20Circle.png" width="147" height="147" loading="lazy" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-weight:700;">Insights provided by: Kyle Farr</span></p><p><br></p><p><span style="color:inherit;"><span style="font-size:14px;">Kyle is an experienced Guru with a demonstrated history of working in the information technology and services industry. He is skilled in Untangle, BMC Remedy, Remote Desktop, Management, all versions of Windows, and Kali Linux. He is currently focused on penetration testing. He is a strong engineering professional with a BSc focused in Computer Science from University of South Africa</span></span><br></p></div>
</div></div></div></div></div></div><div data-element-id="elm_n_sJrPZal0EGhoTlXS-l6g" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg zpbackground-size-cover zpbackground-position-center-center zpbackground-repeat-all zpbackground-attachment-scroll " style="background-image:linear-gradient(to bottom, rgba(30, 34, 45, 0.8), rgba(30, 34, 45, 0.8)), url(https://static.zohocdn.com/sites/stock-images/images/zpstock-image-08.jpg);"><style type="text/css"> [data-element-id="elm_n_sJrPZal0EGhoTlXS-l6g"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZwHOtMTi1JUOy_WkGe1zFw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_ZwHOtMTi1JUOy_WkGe1zFw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_g4GxDM5Afee2GnHXrKUPKw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_g4GxDM5Afee2GnHXrKUPKw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_FTMG8yDoX2O-fR-f0vrLvA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_FTMG8yDoX2O-fR-f0vrLvA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="text-align:center;"><span style="font-size:28px;font-weight:700;color:rgb(255, 255, 255);font-family:&quot;Noto Sans&quot;, sans-serif;">Keep Reading</span></p><p style="text-align:center;"><span style="font-weight:400;color:rgb(255, 255, 255);font-family:Nunito;">Check out our other content below:</span><br></p></div>
</div><div class="zpelement zpelem-carousel " data-element-id="elm_5hZU_rm3J5vi8Vu9ZASavw" data-element-type="carousel" data-currentslide-index="0" data-transition="slide_left" data-slider-interval="5000" data-zs-autoslide="true" data-zs-slidepause-option="false" data-zs-slider="min-height-el: zpcarousel-content-container;arrow-cont: zpcarousel-arrows-container; active-controller: zpcarousel-controller-active; controller-cont: zpcarousel-controller-container; controller: zpcarousel-controller; right-arrow: zpcarousel-arrow-right; left-arrow: zpcarousel-arrow-left;active-slide:zpcarousel-content-active; slide: zpcarousel-content; slides-cont: zpcarousel-content-container;content-cont : zpcarousel-content-inner; background: false;slide-pause-btn:zpcarousel-pause-btn;slide-play-btn:zpcarousel-play-btn;"><div class="zpcarousel-container zpcarousel-style-01"><style></style><div class="zpcarousel-content-container"><div class="zpelement zpcarousel-content " data-element-type="carouselslide" data-element-id="elm_r58-oscTOzRJ7WN_Oc74Lw" data-slide-name="Slide 1"><div class="zpcarousel-content-inner"><div data-element-id="elm_VoDHgNrepXJ5UlVK0N1AdQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_VoDHgNrepXJ5UlVK0N1AdQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_KVAku_uhV4nzjHE8UJZ0YQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_KVAku_uhV4nzjHE8UJZ0YQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_bYhbfVpF3TAN4Np8xIzdXA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_bYhbfVpF3TAN4Np8xIzdXA"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_bYhbfVpF3TAN4Np8xIzdXA"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_bYhbfVpF3TAN4Np8xIzdXA"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_bYhbfVpF3TAN4Np8xIzdXA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-roundcorner zpimage-space-none " src="/Blog%20Site/Microsft%20Partner%20Thumbnail.jpg" width="415" height="233.44" size="fit" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><h1 style="text-align:center;line-height:1;"><span style="color:rgb(255, 255, 255);font-size:20px;">GTconsult: Your Modern Work Partner</span></h1></div></div>
</div></div><div data-element-id="elm_VUGPlz1pFKHPY-_RjEjwNQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_VUGPlz1pFKHPY-_RjEjwNQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://www.gtconsult.com/blogs/post/gtconsult-your-trusted-microsoft-solutions-partner-for-modern-work" target="_blank"><span class="zpbutton-content">Read Me</span></a></div>
</div></div><div data-element-id="elm_-1gRxM8AQ2p4dCnU19M3cw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_-1gRxM8AQ2p4dCnU19M3cw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_Ywbq0Ecexw--soovORW3MQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_Ywbq0Ecexw--soovORW3MQ"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_Ywbq0Ecexw--soovORW3MQ"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_Ywbq0Ecexw--soovORW3MQ"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_Ywbq0Ecexw--soovORW3MQ"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-roundcorner zpimage-space-none " src="/Blog%20Site/Power%20Apps.jpg" width="415" height="233.44" size="fit" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><h2 style="line-height:1;"><span style="font-size:20px;color:rgb(255, 255, 255);">Power Apps in SharePoint</span></h2><div><span style="font-size:20px;color:rgb(255, 255, 255);"><br></span></div></div>
</div></div><div data-element-id="elm_fCNpsHp0-JFNj4QgNNPwOA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_fCNpsHp0-JFNj4QgNNPwOA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://www.gtconsult.com/blogs/post/powerapps-in-sharepoint" target="_blank"><span class="zpbutton-content">Read Me</span></a></div>
</div></div><div data-element-id="elm_9vvXsyPdYNmGYJZzsvmRYw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_9vvXsyPdYNmGYJZzsvmRYw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_l2TEweAr8h6Img0akQD0Qw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_l2TEweAr8h6Img0akQD0Qw"] .zpimagetext-container figure img { width: 308.68px ; height: 173px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_l2TEweAr8h6Img0akQD0Qw"] .zpimagetext-container figure img { width:308.68px ; height:173px ; } } @media (max-width: 767px) { [data-element-id="elm_l2TEweAr8h6Img0akQD0Qw"] .zpimagetext-container figure img { width:308.68px ; height:173px ; } } [data-element-id="elm_l2TEweAr8h6Img0akQD0Qw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-roundcorner zpimage-space-none " src="/Blog%20Site/Teams%20thumbnail.jpg" width="308.68" height="173" size="fit" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><h1 style="text-align:center;line-height:1;"><span style="color:rgb(255, 255, 255);font-size:20px;">Critical Vulnerability Discovered in Microsoft Teams</span></h1></div>
</div></div><div data-element-id="elm_LLBdh2PxzN-qFG9CyGFnQA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_LLBdh2PxzN-qFG9CyGFnQA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://www.gtconsult.com/blogs/post/critical-vulnerability-discovered-in-microsoft-teams-puts-organizations-at-risk" target="_blank"><span class="zpbutton-content">Read Me</span></a></div>
</div></div></div></div></div><div class="zpelement zpcarousel-content " data-element-type="carouselslide" data-element-id="elm_8p0huL3zSac8I1BMD8utwQ" data-slide-name="Slide 2"><div class="zpcarousel-content-inner"><div data-element-id="elm_Li2MxnvTWmjMWt8yyb5xcg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_Li2MxnvTWmjMWt8yyb5xcg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_xY961In-OZUl7p_lc_ArZw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_xY961In-OZUl7p_lc_ArZw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_jkpLJa-4ksoQbyWloEjogQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_jkpLJa-4ksoQbyWloEjogQ"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_jkpLJa-4ksoQbyWloEjogQ"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_jkpLJa-4ksoQbyWloEjogQ"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_jkpLJa-4ksoQbyWloEjogQ"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-roundcorner zpimage-space-none " src="/Blog%20Site/SharePoint%20Write%20Up%20Thumbnail.jpg" width="415" height="233.44" size="fit" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;"><span style="color:rgb(255, 255, 255);">SharePoint Online: The Upgrade Your Business Needs</span><span style="color:inherit;">&nbsp;&nbsp;</span></span><br></p></div>
</div></div><div data-element-id="elm_dBu2ViUXwGbzoygw6MPMbw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_dBu2ViUXwGbzoygw6MPMbw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://www.gtconsult.com/blogs/post/sharepoint-online-the-upgrade-your-business-needs" target="_blank"><span class="zpbutton-content">Read Me</span></a></div>
</div></div><div data-element-id="elm_PeNOYwTqu9NWu9LTD_Rb6w" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_PeNOYwTqu9NWu9LTD_Rb6w"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_cnS_DZrYCdHfjG0FGJP1tw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_cnS_DZrYCdHfjG0FGJP1tw"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_cnS_DZrYCdHfjG0FGJP1tw"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_cnS_DZrYCdHfjG0FGJP1tw"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_cnS_DZrYCdHfjG0FGJP1tw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-roundcorner zpimage-space-none " src="/Blog%20Site/What%20is%20sharepoint%20Thumbnail.jpg" width="415" height="233.44" size="fit" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">What is SharePoint?</span><br></p><p><span style="color:inherit;"><span style="font-size:20px;"><br></span></span></p></div>
</div></div><div data-element-id="elm_UJ-LoFNMVStPweqhiMTlJw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_UJ-LoFNMVStPweqhiMTlJw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://www.gtconsult.com/blogs/post/what-is-sharepoint" target="_blank"><span class="zpbutton-content">Read Me</span></a></div>
</div></div><div data-element-id="elm_nqb3S0P0cFksa3ZKal1hYA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_nqb3S0P0cFksa3ZKal1hYA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_jAygemQpy3wZPP7MEQBolA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_jAygemQpy3wZPP7MEQBolA"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_jAygemQpy3wZPP7MEQBolA"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_jAygemQpy3wZPP7MEQBolA"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_jAygemQpy3wZPP7MEQBolA"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-roundcorner zpimage-space-none " src="/Blog%20Site/Migration.png" width="415" height="233.44" size="fit" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">Migrate SharePoint with GTconsult’s A Team</span><br></p></div>
</div></div><div data-element-id="elm_s6vVbUwlWUWTD93KWKNYSw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_s6vVbUwlWUWTD93KWKNYSw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://www.gtconsult.com/sharepoint-migration" target="_blank"><span class="zpbutton-content">Read Me</span></a></div>
</div></div></div></div></div><div class="zpelement zpcarousel-content " data-element-type="carouselslide" data-element-id="elm_Xri_HVxUHJAy6f3427hKbA" data-slide-name="Slide 3"><div class="zpcarousel-content-inner"><div data-element-id="elm_XAQOXVAAu4n6NJmQ7aogdA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_XAQOXVAAu4n6NJmQ7aogdA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_Ayuho2TEYKbMd7di29CYGg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_Ayuho2TEYKbMd7di29CYGg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_TfKLGsgQc2ceF3u5P-BkJQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_TfKLGsgQc2ceF3u5P-BkJQ"] .zpimagetext-container figure img { width: 980px ; height: 551.25px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_TfKLGsgQc2ceF3u5P-BkJQ"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_TfKLGsgQc2ceF3u5P-BkJQ"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_TfKLGsgQc2ceF3u5P-BkJQ"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-roundcorner zpimage-space-none " src="/Blog%20Site/6%20EASY%20STEPS.png" width="415" height="233.44" size="fit" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">6 Easy Steps for an Office 365 Tenant to Tenant Migration</span><br></p></div>
</div></div><div data-element-id="elm_Ml5I4wq1mLCuDSI8sAeKIw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_Ml5I4wq1mLCuDSI8sAeKIw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://www.gtconsult.com/6-easy-steps-for-a-office-365-tenant-to-tenant-migration" target="_blank"><span class="zpbutton-content">Read Me</span></a></div>
</div></div><div data-element-id="elm_u3HDwD11sEwM7FcVqoUFRQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_u3HDwD11sEwM7FcVqoUFRQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_r3tUU97Q0RM2XJ-h2snpIg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_r3tUU97Q0RM2XJ-h2snpIg"] .zpimagetext-container figure img { width: 307px ; height: 172.69px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_r3tUU97Q0RM2XJ-h2snpIg"] .zpimagetext-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_r3tUU97Q0RM2XJ-h2snpIg"] .zpimagetext-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_r3tUU97Q0RM2XJ-h2snpIg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-roundcorner zpimage-space-none " src="/Blog%20Site/Checklist%2016%20by%209.png" width="415" height="233.44" size="fit" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><p><span style="font-size:20px;color:rgb(255, 255, 255);">SharePoint Migration Checklist</span><br></p><div style="color:inherit;"><span style="font-size:20px;"><br></span></div></div></div>
</div></div><div data-element-id="elm_k7t9dOVN3C-pb7K4iN-jyw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_k7t9dOVN3C-pb7K4iN-jyw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://www.gtconsult.com/sharepoint-migration-checklist" target="_blank"><span class="zpbutton-content">Read Me</span></a></div>
</div></div><div data-element-id="elm_NzFB-4RgTVzlEBgNHKQjQw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_NzFB-4RgTVzlEBgNHKQjQw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_37EK6MC1YZkOXVZ7vYD3xw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_37EK6MC1YZkOXVZ7vYD3xw"] .zpimagetext-container figure img { width: 307px ; height: 172.57px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_37EK6MC1YZkOXVZ7vYD3xw"] .zpimagetext-container figure img { width:723px ; height:406.40px ; } } @media (max-width: 767px) { [data-element-id="elm_37EK6MC1YZkOXVZ7vYD3xw"] .zpimagetext-container figure img { width:415px ; height:233.27px ; } } [data-element-id="elm_37EK6MC1YZkOXVZ7vYD3xw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-roundcorner zpimage-space-none " src="/Blog%20Site/CCI%20Case%20Study.png" width="415" height="233.27" size="fit" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:20px;color:rgb(255, 255, 255);">CCI Case Study</span><br></p><p><span style="color:inherit;"><span style="font-size:20px;"><br></span></span></p></div>
</div></div><div data-element-id="elm_adYWkrlKwN_4-NUtx0780Q" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_adYWkrlKwN_4-NUtx0780Q"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://www.gtconsult.com/blogs/post/cci-case-study" target="_blank"><span class="zpbutton-content">Read Me</span></a></div>
</div></div></div></div></div></div><div class="zpcarousel-arrows-container zpcarousel-arrow-type-01" data-arrow-style="2"><div class="zpcarousel-arrow-left" tabindex="0" role="button" aria-label="Previous"><svg aria-hidden="true" viewBox="0 0 32 32" xmlns="http://www.w3.org/2000/svg" class="svg-icon-18px"><path d="M0,16c0,0.3,0.1,0.5,0.3,0.7l9.9,10c0.4,0.4,1,0.4,1.4,0c0.4-0.4,0.4-1,0-1.4L3.4,17H31 c0.6,0,1-0.5,1-1s-0.4-1-1-1H3.4l8.2-8.3c0.4-0.4,0.4-1,0-1.4c-0.4-0.4-1-0.4-1.4,0l-9.9,10C0.1,15.5,0,15.7,0,16z"></path></svg></div>
<div class="zpcarousel-arrow-right" tabindex="0" role="button" aria-label="Next"><svg aria-hidden="true" viewBox="0 0 32 32" xmlns="http://www.w3.org/2000/svg" class="svg-icon-18px"><path id="arrow-right-style2-Arrow_Forward" d="M32,16c0-0.3-0.1-0.5-0.3-0.7l-9.9-10c-0.4-0.4-1-0.4-1.4,0c-0.4,0.4-0.4,1,0,1.4 l8.2,8.3H1c-0.6,0-1,0.5-1,1s0.4,1,1,1h27.6l-8.2,8.3c-0.4,0.4-0.4,1,0,1.4c0.4,0.4,1,0.4,1.4,0l9.9-10C31.9,16.5,32,16.3,32,16z"></path></svg></div>
</div><div class="zpcarousel-controller-container zpcarousel-controller-type-01"><svg class="zpcarousel-pause-btn" tabindex="0" role="button" aria-label="Pause" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 14 14"><path d="M3.85.53C3.6.5 3.34.5 3.07.5 1.68.5.95 1.09.95 2.18V12c.03.74.56 1.32 1.44 1.44.53.07 1.11.07 1.64 0 .9-.13 1.42-.72 1.42-1.5V2.07c0-.09 0-.18-.03-.28-.1-.66-.75-1.17-1.59-1.26h.01ZM11.43.53C11.18.5 10.92.5 10.65.5c-1.39 0-2.12.59-2.12 1.68V12c.03.74.56 1.32 1.44 1.44.53.07 1.11.07 1.64 0 .9-.13 1.42-.72 1.42-1.5V2.07c0-.09 0-.18-.03-.28-.1-.66-.75-1.17-1.59-1.26h.01Z"/></svg><svg class="zpcarousel-play-btn" tabindex="0" role="button" aria-label="Play" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 14 14"><path d="M.59 7.02C.57 5.33.57 3.63.51 1.94.45.63 1.72-.17 2.9.45c3.2 1.68 6.42 3.32 9.64 4.96.59.3.95.76.96 1.43 0 .66-.34 1.11-.91 1.43-3.18 1.75-6.35 3.5-9.52 5.25-1.2.66-2.39-.04-2.41-1.41C.63 10.42.61 8.72.59 7.03Z"/></svg><div class="zpcarousel-controller zpcarousel-controller-active" data-slide-index="0"></div>
<div class="zpcarousel-controller " data-slide-index="1"></div><div class="zpcarousel-controller " data-slide-index="2"></div>
</div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 31 Oct 2023 06:54:10 +0000</pubDate></item></channel></rss>