enable – your business

User and customer behaviour is rapidly evolving. Consider how your users are sharing important data and how third parties may be accessing information or collaborating with your team. Business may be migrating products and services online. Look at secure design, data access, and deployment of tools for all new services.

questions that need to be addressed

We want to increase our use of cloud and SaaS services. How should approach this?

Cloud and many SaaS services can be a powerful enabler for business with many benefits if they are designed and secured effectively.

Can our workforce work from home securely while using their own devices?

Your company may have been reluctant to embrace BYOD previously due to the risks. Necessity mean BYOD is now widely utilised and you may need to enable users fast.


By following these actions, you will better understand your posture and be on track to creating a more secure environment.

Enable BYOD securely and easily

  • Implement Microsoft Intune to allow users to securely access corporate resources from BYOD devices.
  • To stop personal apps on BYOD devices from gaining access to your company’s information and even passwords, use Microsoft Intune and Azure Active Directory to ensure only managed apps can access corporate e-mail or other Office 365 services.

Properly secure your cloud applications and identities

  • If you are not using Multi Factor Authentication (MFA) for services such as Exchange Online, now is the time to start. Email compromise is still one of the main avenues of attack. Your account is more than 99.9% less likely to be compromised if you implment MFA.
  • Reduce the number of users who have elevated privileges and those that do need it should be restrict to only what they require.

Extend current DLP capabilities and review policy settings

  • To prevent data leakage, review current policies and make changes where appropriate.
  • If you are now currently using DLP, explore the native capability in Exchange Online, SharePoint Online, and OneDrive for Business. Set it to reporting mode first to understand how users share information before moving it to enforce/block.

Reduce the security friction

  • Rather than being a blocker of business, we find ways that allow users to do their jobs remotely and securely.
  • Improve remote user experience when accessing applications hosted in your own data centre or a public cloud such as AWS, GCP or Microsoft Azure by considering alternatives to legacy VPNs. Zscaler ZPA is an alternative that provides secure access through a zero-trust security model.

next steps

We protect australia's leading brands and businesses against cyber threats.

Cyber security is in our DNA