Defended Solutions Blog

Daniel Mulliss Daniel Mulliss

Identity Offboarding Checklist: How to Reduce Risk and Strengthen Governance Across Cloud, SaaS and AD

Identity offboarding is one of the simplest ways to reduce organisational risk, yet it is still one of the most common gaps we see inside large enterprises. Dormant accounts, unmanaged SaaS access and legacy credentials create pathways for attackers long after an employee has left. This guide explains why offboarding fails, the governance issues behind it, and the practical steps every organisation can take to build a secure and repeatable process.

Read More
Daniel Mulliss Daniel Mulliss

The Louvre Heist: A Masterclass in the Security Basics We Still Get Wrong

The recent Louvre heist revealed that the museum’s surveillance system password was simply “Louvre.” It’s a stark reminder that even the most high-profile organisations can fall to basic security failures. In this article, we examine what really causes these incidents — risk blindness, process gaps, and lack of accountability — and outline the practical steps every organisation can take to strengthen governance, culture, and identity management across the cloud.

Read More
Daniel Mulliss Daniel Mulliss

How to Maintain Cloud Compliance When Migrating to the Cloud

Migrating to the cloud offers speed, scale, and innovation, but without a compliance-first strategy, it can put your business at serious risk. This guide walks through the essential steps to maintain security and regulatory compliance before, during, and after migration, so you can move to the cloud with confidence.

Read More
Alexander Delaney Alexander Delaney

Data Protection vs. Cybersecurity: What Every Organisation Gets Wrong

In today's digital landscape, many organisations mistakenly equate cybersecurity with data protection. This article clarifies the distinction between the two, highlighting common pitfalls such as over-reliance on cybersecurity tools and inadequate data classification. It offers actionable insights for integrating both strategies to safeguard sensitive information effectively.

Read More
Alexander Delaney Alexander Delaney

The Hidden Risks of Poor Data Protection in Defence & Healthcare

Defence and healthcare organisations face growing cyber threats, with weak data security leading to national security risks and operational disruptions. This article explores key risks, real-world breaches at the NHS and MoD, and essential strategies for strengthening data protection.

Read More
Daniel Mulliss Daniel Mulliss

What is least privilege and what does it mean to me?

Least Privilege is a principle that all organisations of any size should adopt for their users, admins and developers. It’s essentially assigning the minimum permissions to accounts for them to carry out the role they need and nothing else.

Read More
Alexander Delaney Alexander Delaney

Ransomware defence and recovery: A comprehensive guide

In today’s digital age, ransomware has become one of the most formidable threats facing businesses and individuals alike. Understanding how to defend against ransomware and recover from an attack is crucial for maintaining the integrity and continuity of your operations.

Read More