You assumed Microsoft made it safe. Find out what they left for you to do.

M365 Security Assessment

Most small businesses trust that Microsoft 365 is secure from the start. It's not. MFA isn't enforced. Former employees still have active accounts. Sensitive files are accessible to people who left two years ago.

The security features are in your subscription. They're paid for every month. They just haven't been turned on.

And most don't find out until something goes wrong.

What we do.

We review your entire Microsoft 365 environment — identity, access, email protection, device security — and tell you exactly where you're exposed. Not a scan. Not an automated report. A hands-on review by someone who knows what to look for.

What we check.

  • Whether MFA is actually enforced (not just "available")

  • Every former employee's account — are they fully offboarded, or just forgotten?

  • Conditional Access — are logins being verified, or is the front door wide open?

  • Defender configurations — turned on, or just licensed?

  • SharePoint and OneDrive permissions — who can see what, and should they?

  • Email protection — are phishing and spoofing defences actually working?

What you get.

A prioritized findings report. Not 40 pages of jargon — a clear scorecard that shows where you were, where you are, and what to fix first. We rank every finding by risk and give you a remediation plan you can act on — starting with the quick wins that close the biggest gaps fastest.

What this costs.

For about the price of one unused software licence per employee, you'll know exactly where your security gaps are and have a plan to close them. Most environments take 1–2 weeks to assess.

Copilot doesn't create security problems. It amplifies the ones you already have.

Copilot Readiness Assessment

Microsoft Copilot is powerful. It searches your files, reads your emails, scans your SharePoint. It finds things fast.

That's exactly the problem.

Every permission gap in your environment — every file shared too broadly, every former employee's account still lingering, every SharePoint site open to "everyone" — becomes an active risk the moment Copilot goes live. What used to be a quiet misconfiguration becomes a searchable, surfaceable vulnerability.

If a junior employee can technically access the finance team's SharePoint site, that's a permissions issue. But it's a theoretical one — they'd have to know it exists, navigate to it, and open the right files. Turn on Copilot, and that same employee can ask "show me salary information" and get results in seconds.

That's not a Copilot problem. That's a permissions problem that Copilot made impossible to ignore.

What we do.

Before you deploy Copilot, we review the foundations it depends on — identity, access, and permissions across your entire Microsoft 365 environment. We find the gaps that Copilot would exploit and close them first.

What we check.

  • Permissions audit Who can access what across SharePoint, OneDrive, and Teams? We find the oversharing: sites open to "Everyone except external users," files shared org-wide, inherited permissions nobody reviewed.
  • Identity hygiene Are former employees fully removed? Are shared accounts and service accounts locked down? Every active identity is a potential Copilot user.
  • Access controls Is Conditional Access enforcing who can log in, from where, on what device? Without this, Copilot access is uncontrolled.
  • Sensitivity labels Are your most sensitive documents classified and protected? If not, Copilot treats them the same as everything else.

What you get.

A Copilot Readiness Report that shows your current state, the specific risks Copilot would amplify, and a prioritized remediation plan. We don't just tell you what's wrong — we sequence the fixes so you can deploy Copilot with confidence, not anxiety.

They left the company. They didn't leave your systems.

Offboarding & Identity Cleanup

Someone leaves your organisation. HR sends an email. IT disables the account. Done.

Except it's not done. The account is disabled but not deleted. The licence is still assigned — you're paying for it every month. Their OneDrive is still there, full of files, some shared with external contacts. Their mailbox is still receiving messages. Their permissions on SharePoint, Teams, and shared drives haven't changed. Their device is still enrolled.

Nobody notices because nobody checks. It's not on anyone's task list. And because nothing visibly goes wrong, it stays that way for months. Sometimes years.

This is the most expensive problem nobody's looking at.

It's expensive twice. First, you're paying for licences assigned to people who don't work for you anymore. Second — and this is the one that should keep you up at night — every one of those accounts is a door. A door with a key still under the mat.

What we do.

We audit every identity in your Microsoft 365 environment and answer three questions: Who has access? Should they? And what's the blast radius if that account is compromised?

What we check.

  • Ghost accounts Every disabled, inactive, or orphaned account that's still consuming a licence or retaining access. We find them all.
  • Incomplete offboarding The account was disabled, but was the licence reclaimed? Were SharePoint permissions revoked? Was the OneDrive transferred or wiped? Was the mailbox converted or removed? Was the device unenrolled from Intune? Most organisations get one or two of these right. Almost nobody gets all of them.
  • Shared and service accounts The accounts that don't belong to anyone specific are often the least governed and the most dangerous. We identify every one and assess how they're secured.
  • Permission inheritance Former employees whose access was granted through group memberships that were never cleaned up. They're gone, but their permissions aren't.

What you get.

A full identity hygiene report: every account that shouldn't exist, every licence you can reclaim, every permission that should have been revoked and wasn't. Plus a remediation plan — prioritised by risk, with the quick wins flagged so you can start closing gaps immediately.

Most clients recover the cost of this engagement in reclaimed licences alone.

An assessment tells you where you stand. This keeps you there.

Ongoing Security Management

Here's what usually happens after a security assessment.

We hand over the report. The client fixes the urgent items. Momentum carries them through the first few weeks. Then other priorities take over. Three months later, a new employee is onboarded without MFA. A contractor gets broad SharePoint access "temporarily." Someone leaves and their account lingers. The gaps start reopening.

Not because anyone was careless. Because security isn't anyone's full-time job.

This isn't a monitoring dashboard you'll never check. It's not an automated scan that sends you alerts you don't understand. It's a person — someone who already knows your environment — keeping it secure on an ongoing basis.

What's included.

  • Monthly security review We check what changed since last month. New accounts, modified permissions, policy changes, licence assignments, Defender alerts. If something drifted, we catch it before it becomes a problem.
  • Offboarding verification Every time someone leaves, we verify the full offboarding checklist was completed. Account disabled, licence reclaimed, permissions revoked, device unenrolled, mailbox handled. Not just the first step — all of them.
  • Onboarding baseline New employees get the right security posture from day one. Correct licence, MFA enforced, Conditional Access applied, device enrolled. No "we'll get to that later."
  • Configuration drift detection Policies get changed. Exclusions get added. Someone turns something off to troubleshoot and forgets to turn it back on. We catch these before they compound.
  • Quarterly posture report A clear summary for your leadership: here's your security posture, here's what changed, here's what we addressed. The kind of document that answers the board's questions before they ask.

What's not included — and why.

This isn't a helpdesk. We don't reset passwords or troubleshoot Outlook. That's your IT provider's job, and they're better at it than we are. We do one thing: we keep your Microsoft 365 environment secure.

What this costs.

A few dollars per user per month — less than most organisations spend on a single unused software subscription. Flat monthly number. No timesheets, no surprise invoices, no meter running every time you ask a question.

The Tools Already in Your Subscription

SharePoint logo

SharePoint

Your team has files in email, desktops, and shared drives nobody remembers. We put them in one place with a search that actually works.

OneDrive logo

OneDrive

Right now if an employee's laptop dies, their files die with it. We make every file auto-save to the cloud so nothing is ever lost.

Microsoft Teams logo

Teams

Your team emails a file, someone edits it, emails it back, and now there are four versions. We set up Teams so everyone edits the same document at the same time.

Microsoft Intune logo

Intune

An employee loses their phone with company email on it. Can you wipe it remotely right now? We make sure the answer is yes.

Microsoft Certifications

Find Out What You Don't Know

Book a free call. Tell us what's worrying you — or what you're not sure about. No sales pitch. Just a real conversation about where your environment stands.

BOOK YOUR FREE CALL →

No obligation. No jargon. Just answers.