- If we're attacked at 3 AM, what actually happens?
- The 24x7 SOC sees the alert, classifies it, and if compromise is confirmed, remotely isolates the affected device or user account before the attacker can finish what they started. If it's suspected but not confirmed, the frontline helpdesk investigates and rings the user out of an abundance of caution. You hear about it in the morning with a written incident report, not a phone call at 3 AM.
- We already have Microsoft 365 MFA. Isn't that enough?
- MFA is one of the Essential Eight's eight controls, and only effective if it's phish-resistant, applied to every system (not just Microsoft 365), and enforced rather than suggested. Most businesses we assess have MFA on email and SMS codes elsewhere, which is what attackers are already bypassing in 2026. See our /essential-eight page for the maturity model and what ML1, ML2 and ML3 actually require.
- Is rolling out Microsoft 365 Copilot a security risk for us?
- It's not the model that's the risk; it's the access-permissions debt Copilot makes visible. Copilot can surface anything a user has permission to see, which in most tenants includes over-shared SharePoint sites, calendars that leak client names, and mailboxes with more access than anyone realised. We audit sharing, label sensitive data, pilot Copilot with a small group, and tighten the policies before a broader rollout. The risk is real but manageable.
- Can our staff use ChatGPT, Claude, or other AI tools on client data safely?
- Not the free consumer tiers; those can train on your inputs or retain transcripts. For business use we help clients pick an enterprise tier (ChatGPT Business / Enterprise, Claude for Work, or Microsoft 365 Copilot depending on the rest of the stack), sign the right data-processing addendum, write a short acceptable-use policy, and block the consumer tiers at DNS level. "Use the approved tool, here's how" lands better than "don't use AI" which doesn't hold.
- Do you cover incident response? What if we have a live ransomware event?
- Yes. We have a documented incident-response playbook and the containment tooling to execute it: remote device and identity isolation, credential rotation, privileged-account lockdown, backup recovery. For clients under an active engagement, IR is included up to the point a specialist forensic firm needs to come in (for certain kinds of insurer-mandated investigation). We've worked alongside the named DFIR firms before.