top of page

Search
All Posts


Enhancing Cybersecurity with Microsoft's Local Administrator Password Solution (LAPS)
Understanding Local Administrator Account Vulnerabilities In the evolving landscape of cybersecurity, local administrator accounts on...

Cornerstone Cyber
Jun 163 min read


MDM vs MAM with Microsoft Intune: Making the Right Choice for Your Organisation
As businesses double down on remote work, BYOD, and cloud-first strategies, controlling access to corporate data without compromising...

Shaun Struik
Jun 63 min read


Operational, Security, and Insurance Impacts of Operating Windows 10 Post End-of-Support
Windows 10 will reach end-of-support (EOS) on 14 October 2025. After this date, Microsoft will cease providing free security updates,...

Shaun Struik
Jun 63 min read


Ensuring Device & Data Security for a Global Business
Situation A medium-sized organisation faced serious data security and operational challenges. Employees routinely accessed corporate...

Shaun Struik
May 302 min read


Microsoft 365: The Importance of Structure for Security
Microsoft 365 has all the tools you need for effective collaboration and productivity. However, if your policies, roles, and ownership...

Cornerstone Cyber
May 152 min read


The Myth of Coverage: Why Layered Security Doesn’t Mean Protected
More Tools ≠ More Protection Microsoft 365 gives you MFA, SSO, Conditional Access, Defender, Purview, and Intune. But tools don’t make...

Cornerstone Cyber
May 151 min read


You Don’t Know What You Don’t Own: Data Stewardship Gaps in the Cloud Era
Who Owns the Data? In most organisations, no one can confidently say: Who owns key SharePoint sites Who maintains access controls Who...

Cornerstone Cyber
May 151 min read


Overexposed: Why Your Collaboration Tools Might Be Your Biggest Data Risk
Microsoft Teams, SharePoint, and OneDrive make collaboration easy. But with ease comes exposure...... The Most Common Data Risks We See...

Cornerstone Cyber
May 151 min read


You Can’t Trust What You Don’t Track: Device Governance Gaps in Microsoft 365
Identity tells you who’s accessing your systems - but device trust tells you how they’re doing it, and most environments track far too...

Cornerstone Cyber
May 151 min read


How Identity Complexity Creeps In - And What It Costs You
As Microsoft 365 environments grow, so do the unintended consequences of flexibility. New apps, new users, new access - and with each...

Cornerstone Cyber
May 151 min read


The Licensing Mirage: Why Visibility Doesn't Equal Governance
Your Microsoft 365 admin centre offers powerful reports - Secure Score, licensing dashboards, usage insights. But these tools show you...

Cornerstone Cyber
May 151 min read


Licensing Doesn’t Equal Value: The Hidden Waste in Microsoft 365
Many organisations assume that buying Microsoft 365 licences ensures productivity, protection, and compliance. But the truth? Most...

Cornerstone Cyber
May 152 min read


BYOD Blindspots: Why Device Compliance Is More Than a Checkbox
Modern workforces are mobile by nature. Laptops, mobiles, tablets - employees expect to work from anywhere, often on their own devices....

Cornerstone Cyber
May 152 min read


The Identity Illusion: Why Your MFA and SSO Setup Might Not Be Enough
In today’s cloud-first workplace, most organisations take pride in having ticked off the “essentials” - Single Sign-On (SSO),...

Cornerstone Cyber
May 153 min read
bottom of page