CPI Consulting
  • About
  • Blog
  • Security Health Check
  • BI-Weekly Insights
  • Essential Eight Security
  • AI
  • Microsoft Foundry
  • Fractional CTO
Select Page

The North Korean Threat Actor Now Targeting macOS Fleets — and Why Your Intune for Mac Baseline Matters

by CPI Staff | Apr 22, 2026 | Blog, Cybersecurity, Essential 8, Microsoft 365 Security, Microsoft defender XDR, Microsoft Intune

For years, Australian IT leaders treated macOS as the “quiet corner” of the fleet. A handful of executives and designers on MacBooks, a sprinkle of engineers, and a general assumption that Apple’s built-in protections were enough. That assumption no...
Microsoft’s New Critique Feature Changes How Deep Research Should Be Governed in M365

Microsoft’s New Critique Feature Changes How Deep Research Should Be Governed in M365

by CPI Staff | Apr 18, 2026 | AI Governance & Risk Management, Blog, Essential 8, Microsoft 365, Microsoft 365 Security, Microsoft Purview

Microsoft’s Deep Research in Copilot for Microsoft 365 has already reshaped how knowledge workers produce long-form analysis. Teams that used to spend days pulling together market scans, risk reviews, and competitive briefings now have a drafting partner that...
AI-Powered Device Code Phishing Now Bypasses MFA — What Australian Organisations Must Do Next

AI-Powered Device Code Phishing Now Bypasses MFA — What Australian Organisations Must Do Next

by CPI Staff | Apr 9, 2026 | AI, Blog, Cybersecurity, Entra ID, Microsoft 365 Security

Multi-factor authentication has been the security baseline for years. Most Australian organisations treat it as the final checkpoint — if MFA is in place, accounts are protected. That assumption just got a serious challenge. Microsoft Defender Security Research has...
The 3 Biggest Security Gaps I See in Mid-Size Australian Businesses

The 3 Biggest Security Gaps I See in Mid-Size Australian Businesses

by CPI Staff | Feb 16, 2026 | Blog, Microsoft 365 Security

In this blog post The 3 Biggest Security Gaps I See in Mid-Size Australian Businesses we will cover the most common (and fixable) security holes we see in organisations with 50–500 staff—especially those running Microsoft 365 and Azure—and what to do about them. If...
How to Use Microsoft Graph Security API

How to Use Microsoft Graph Security API

by CPI Staff | Jul 23, 2024 | Blog, Microsoft 365 Security, Microsoft defender XDR, Microsoft Graph API, Microsoft Graph security API

In this Microsoft Defender XDR article, we will show how to use Microsoft Graph Security API using a REST API client and retrieve XDR alerts. Microsoft Defender Extended Detection and Response (XDR) is an enterprise end-to-end security solution that detects, prevents,...
How to Prevent Microsoft 365 Emails from Blacklisting

How to Prevent Microsoft 365 Emails from Blacklisting

by CPI Staff | Jul 15, 2024 | Blog, Email Security, Microsoft 365, Microsoft 365 Security

In this Microsoft 365 Email Security article, we will explain how to prevent Microsoft 365 emails from blacklisting. As an IT consultancy in the Microsoft 365 space, we help Microsoft 365 customers that get affected by anti-spam systems that blacklist and graylist...
« Older Entries
Next Entries »

Recent Posts

  • How Intune Helps Businesses Control Devices Without Slowing People Down
  • How to Move from Basic Microsoft 365 Setup to a Proper Secure Workplace
  • Why Microsoft 365 Security Is More Than Just Turning on MFA
  • The Intune Policy Gap That Leaves Company Devices Exposed
  • How We Would Secure a Small Business Microsoft 365 Environment in 5 Days
  • The Microsoft 365 Tenant Looked Fine Until We Checked the Security Defaults
  • The Hidden Risk of Unmanaged Devices Accessing Microsoft 365
  • The First 10 Things We Check in a Microsoft 365 Security Review
  • Windows 365 and Intune Advanced Endpoint Management Give Australian IT Teams a Single Device Control Plane
  • Windows 365 and Intune Advanced Endpoint Management Give Australian IT Teams a Single Device Control Plane

Categories

Subscribe

Top Posts

How to Add a Registry Key to Windows 11 Using Microsoft Intune
Updating Microsoft Edge Using Intune
How to Turn Off Windows Hello in Microsoft Intune
Sync SharePoint Site Libraries with Microsoft Intune
How to Deploy a Wiz Outpost to Microsoft Azure
Setting Google Chrome as the Default Browser with Microsoft Intune
Whitelist USB Devices on Windows Using Intune
Create a Custom Extension Attribute Entra ID
Maximizing Security: When to Use Wiz Outpost with Azure
Block Copy Paste from iOS Business Apps with Intune