Data Governance

Unlocking the power of Microsoft Purview

Unlocking the power of Microsoft Purview

Aimed at compliance, risk and IT professionals within regulated industries, this webinar drew on practical examples and client stories to demonstrate how to unlock the power of Microsoft Purview to reduce risk in your organisation. Nivasha Sanilal (Cloud Essentials’ Compliance

Read More +
90 day trial of Microsoft 365

How not to waste your 90-day trial of Microsoft 365 E5

E5 is Microsoft 365’s premium licence tier. It provides access to all Microsoft’s best-in-class productivity apps, voice and analytical capabilities, but importantly it enables advanced Microsoft Defender security features, and the full spectrum of Microsoft compliance functionality, that many compliance

Read More +
bridging the compliance divide

Bridging the compliance divide

Introducing Nivasha Sanilal, our new Compliance Lead Compliance has always been complex and multi-faceted, influencing – and influenced by – a vast number of business processes and risks. Despite this, compliance functions in many organisations remain largely isolated from other

Read More +
retention and deletion in microsoft 365

Retention and deletion in Microsoft 365

The why, the what and the how  The fifth in our series of Expert Insights webinars tackled retention (preservation) and disposition (deletion). Led by Chris Hathaway and Johann van Schalkwyk, we explored the principles of retention, the terminology used within

Read More +
Crocodile to represent insider risk in an organisation

8 top tips for an insider risk programme

Successfully managing and mitigating insider risk in your organisation requires a clear view of what you want to achieve, an information governance strategy, effective user training and close collaboration across the business. Read our top tips for establishing a successful

Read More +
hermit crab to show protection from insider risk

Introduction to insider threats

Most modern organisations put significant effort into protecting against external cybersecurity threats. Far fewer have robust protections against threats closer to home.   Given that the majority of data breaches originate from within organisations – not externally at all – we

Read More +
The only way to really know if we’re a good fit is to get in touch, so let’s have a chat! One of our friendly experts will get straight back to you. You never know, this could be the beginning of a great partnership.
Bristol
Cape Town
Johannesburg
Email