Holiday hackers are coming. Is your business ready?

Zandre Janse van Vuuren explains why cybercrime spikes during the holiday season and shares practical tips to help you protect your organisation from opportunistic attackers.

By Zandre Janse van Vuuren | Service Delivery Manager: Cyber DFIR, BUI

The months of November and December are a perfect storm for cybercriminals. Retailers, logistics companies, and organisations closing out their financial year are at peak operational intensity, processing high volumes of sales, payments, and customer data.

But just as business activity surges, security staffing drops. Key personnel take annual leave, incident response teams shrink, and IT capacity thins out. This imbalance creates what’s known as the “holiday blackout”, a seasonal window when attackers know defences are down and reaction times are slow.

During this period, cybercriminals ramp up their ransomware, phishing and extortion campaigns to strike when you’re least prepared. And their goal isn’t just to breach your defences: it’s to disrupt your operations when downtime is most damaging.

The solution? In a word: readiness. By focusing on cyber resilience (your ability to protect your critical assets, respond to inevitable attacks, and recover quickly), you can keep your business running and reduce the risk of financial and reputational damage when attackers do strike.

The holiday season threat landscape

The holiday season brings an uptick in cybercrimes and digital scams that exploit distraction, emotion, and urgency. Understanding this threat landscape is essential for developing a proactive security strategy for your organisation.

1 | The phishing epidemic

Phishing is consistently identified as the number one social engineering strategy. During the holiday season, cybercriminals know that people are juggling personal shopping, shipping alerts and end-of-year workplace tasks, which lowers vigilance and increases click rates. Common phishing campaigns include:

  • Shipping scams, where cybercriminals impersonate retailers, couriers, or postal agencies – often through text messages or emails that include fake tracking information and compromised links.
  • Financial or account fraud, including payment confirmations for items the user never purchased or notifications claiming the user’s account is locked, disabled, or requires immediate login verification.
  • Fake invoices and payroll alerts disguised as internal communications, where specific social engineering lures (such as fake “payroll date change” or “payroll alert” messages) are deployed to steal the user credentials necessary for organisational system access.
  • Charity and job scams designed to prey on people’s emotions at a time when NGOs and charities appeal for generosity and jobseekers and recruiters are focused on seasonal employment opportunities.

When inboxes and screens are flooded with legitimate notifications, a fake one can slip through easily – especially when employees are too stressed or too distracted to stop and interrogate a suspicious message.

2 | Access brokers and ransomware

Behind many of these phishing campaigns are access brokers who specialise in gaining unauthorised initial access to organisational networks and then selling that access to ransomware groups. There’s typically a surge in access-broker activity at the end of the year when networks are busy, oversight is reduced, and employees are overwhelmed with tasks at home and at work. Successful breaches often become the entry point for larger ransomware attacks that unfold over the holidays.

Table: Threat vectors that organisations must prepare for during the holiday season

3 | The security staffing gap problem

The biggest enabler of seasonal cybercrime is reduced security staffing. Attackers time their strikes for weekends, public holidays and vacation periods, knowing that organisations are at their most vulnerable. Industry research highlights the risk clearly:

  • Four out of 10 organisations reduce their security staffing by up to 70% during weekends and holidays.
  • About 21% operate with only a skeleton crew, cutting staff by as much as 90%.

Meanwhile, modern cyberattacks move quickly: it often takes less than an hour from the moment a user clicks on a malicious link until the attacker establishes a firm foothold in the system. When critical security personnel are unavailable, alerts may go unread for hours or even days, giving attackers free rein. The risk isn’t just slower detection; it’s complete operational paralysis until normal staffing resumes. That’s why seasonal security planning should prioritise rapid response capability, not just detection.

Building cyber resilience: What really works

Cyber resilience requires more than robust technical defences and safeguards: it demands a strategic mindset. At the very least, you should:

1 | Be aware of the dangers

Don’t ever think you’re too small to be targeted. It’s a myth that cybercriminals ignore startups and micro- and medium-sized businesses. Smaller organisations like these are prime targets precisely because they likely have fewer defences. Remember, cybercrime has been industrialised: attackers sell stolen credentials and exploitative tools on the dark web, enabling virtually anyone to target any company’s digital assets.

2 | Patch and protect your systems

Legacy or unpatched systems can be easy entry points for cybercriminals – and once they’re in, they can take advantage of existing vulnerabilities, flaws, and weaknesses in your environment. If you’ve neglected your systems and become lax about your security, then a single breach could snowball into a catastrophic business failure. Make sure you concentrate on patching and protecting your systems before key security staff go on vacation.

3 | Review your identity and access management policies

Robust identity and access management controls and device encryption are essential throughout the year – but even more so during the holiday season when security teams are smaller and more pressured. Make sure you enforce strong password policies and encrypt all sensitive data (at rest and in transit) to help prevent data leaks in the event that business devices are mishandled, lost, or stolen.

4 | Have a comprehensive (and tested) incident response plan

A written incident response plan isn’t good enough; it needs to be tried and tested. Many organisations still haven’t rehearsed what to do if a ransomware attack occurs over a weekend or holiday period. Make sure you’ve run tabletop exercises, tested communications and capabilities under low-staff conditions, and confirmed that everyone knows their role.

5 | Train and empower your people

Human error remains the top cause of breaches. Take the time to give your employees a refresher course in password hygiene, general security awareness and vigilance, and the correct technical route for raising and reporting issues. Regular mini training sessions that address the current threat landscape (for example, a 10-minute overview of seasonal phishing tactics) can be more effective than lengthy presentations.

Cyber resilience means having a framework that protects your key assets, enables an effective response, supports quick recovery, and maintains customer trust even after a successful cyberattack. Building this framework involves assessing risks, keeping hardware and software updated, reviewing access policies, and enforcing security standards across your connected environment.

The yearend cyber resilience checklist: 12 essential steps

A phased, actionable checklist is necessary to translate strategic goals into measurable operational tasks. This checklist outlines the actions with the highest impact, organised by deployment priority, leading up to the end-of-year shutdown.

Phase 1: Pre-holiday system hardening (T-30 days)

Phase 2: Data protection and recovery assurance (T-14 Days)

Data-recovery capabilities are paramount over the holiday season because a cyberattack during low staffing risks permanent data loss. Your focus must be on assuring restorability rather than merely assuming backups exist.

Phase 3: Make your staff your first line of defence (T-7 Days)

The final week should be focused on staff education so that your people are aware of the heightened risk landscape and the prevalence of seasonal scams.

The weeks leading up to the holidays present one of the most dangerous periods of the year for cyberattacks. Well-organised threat groups know that yearend pressures, reduced staffing, and increased digital activity create ideal conditions to strike.

Preventing every attack isn’t realistic, but ensuring your business can withstand, respond to, and recover from one absolutely is. True cyber resilience means being ready for disruption, but this resilience isn’t built overnight: it’s achieved through deliberate preparation, tested plans, and continuous learning.

As the festive season approaches, take the opportunity to validate your defences. Run your incident response plan under reduced staffing conditions. Test your offline backups. Confirm that your recovery strategy actually works when key personnel are away.

The threats of the holiday period are predictable – and that makes them preventable. By being proactive now, you can protect your systems, your data, and your business reputation to ensure a smooth start to the new year.

Cyber threats evolve constantly and your security strategy has to keep up. If you want expert guidance, improved detection capabilities, or help building operational resilience, reach out to our security team and we’ll guide you forward. Get started today.

Strengthening your cloud security posture with Microsoft Defender for Cloud

Heinrich Wewers and Satish Sunker unpack how Microsoft Defender for Cloud can help IT leaders improve cloud security posture, detect threats, and simplify compliance.

Cloud adoption continues to accelerate faster than many organisations’ ability to secure it. As workloads span Microsoft Azure, on-premises environments, and other cloud platforms such as AWS and Google Cloud, the attack surface increases, misconfigurations multiply, and visibility often diminishes.

For CISOs and IT leaders, this creates a fundamental challenge: how do you maintain consistent security and compliance across an ever-changing cloud estate?

“Unified protection is now at the heart of modern cloud security strategies,” says Heinrich Wewers, Senior Cloud Consultant at BUI. “The focus has shifted from securing perimeters to safeguarding identities, configurations and workloads wherever they reside. It’s a reality that makes Microsoft Defender for Cloud an indispensable tool in any defender’s kit.”

What is Microsoft Defender for Cloud?

Microsoft Defender for Cloud is a unified platform for monitoring and improving the security posture of all cloud resources. It combines Cloud Security Posture Management (CSPM) with Cloud Workload Protection Platform (CWPP) capabilities. CSPM continuously assesses cloud configurations, identifies risks, and delivers actionable recommendations to prevent gaps, while CWPP protects live workloads such as virtual machines, containers, databases, and storage from active threats. Together, these capabilities provide a layered defence across the entire cloud estate.

“Microsoft Defender for Cloud gives you a single-pane-of-glass view across Azure, AWS, Google Cloud, and even on-premises systems,” Wewers explains. “It doesn’t just alert you to problems; it tells you how to fix them and, in many cases, automates the process.”

Microsoft Defender for Cloud integrates natively with Azure and extends protection to other clouds via built-in connectors. This unified approach enables the management of cloud infrastructure and workload security from a single interface, giving security teams consistent visibility and control without having to juggle multiple tools or dashboards.

Why Cloud Security Posture Management matters

Traditional perimeter-based security models are no longer effective in the dynamic and distributed nature of modern cloud environments: CISOs must secure virtual machines, identities, containers, databases, and APIs that expand and contract in real time. “Legacy tools lack visibility across multiple clouds. They also lack context awareness of cloud-native constructs and the automation needed for real-time detection,” observes Wewers. “Cloud security today is dynamic, identity-centric, and API-driven.”

In this landscape, many security incidents stem not from advanced zero-day exploits but from everyday misconfigurations and human errors. Problems such as excessive permissions on identities or service principals, missing endpoint protection on cloud VMs, and unmonitored configurations created during rapid deployment can all leave critical resources exposed, says Wewers.

Cloud Security Posture Management platforms such as Microsoft Defender for Cloud address these problems by delivering continuous visibility into cloud assets and their security status; applying baselines mapped to standards such as NIST to ensure consistent compliance; and prioritising remediation efforts by identifying which misconfigurations or vulnerabilities pose the highest risk.

“Cloud security posture management isn’t a one-time exercise,” Wewers emphasises. “It’s an ongoing process. Microsoft Defender for Cloud enables teams to spot risky configurations early on and prevent gaps from accumulating in the dark.”

Key capabilities of Microsoft Defender for Cloud

1. Continuous assessment and Secure Score

At the core of Microsoft Defender for Cloud’s posture management is continuous assessment, a constant evaluation of your cloud resources against Microsoft security benchmarks and global standards. Secure Score is the metric that brings this to life, explains Satish Sunker, Cloud Solutions Architect at BUI. “It continuously evaluates your Azure and multi-cloud resources against best practices and compliance standards. Each recommendation (such as enabling multi-factor authentication or restricting network access) carries a weighted impact score. As you implement the recommendations, your Secure Score improves, visually showing your progress toward a stronger security posture.”

Most organisations begin their journey with a Secure Score between 25% and 45%, depending on cloud maturity, Sunker shares. After remediating foundational issues, such as open management ports, unencrypted storage, and missing endpoint protection, many achieve 70% to 85% within months (indicating a well-hardened and monitored environment).

“Secure Score is an evidence-based, real-time metric that helps security teams prioritise actions with the biggest impact on risk reduction. Here at BUI, our customers consistently tell us that they value the contextual guidance, which turns a long list of findings into an actionable road map,” he adds. “Secure Score has also become a KPI for CISOs because it’s quantifiable, easy to track over time, and bridges the communication gap between technical teams and business stakeholders.”

2. Actionable recommendations and automated remediation

When Microsoft Defender for Cloud identifies risks, it doesn’t just report them: it actually tells you how to fix them. Sunker explains that remediation is intentionally straightforward: “Each recommendation links directly to the affected resource and includes guided or automated ‘fix’ actions. You can enable Just-In-Time VM access with one click, deploy Defender for Servers agents across subscriptions automatically, or apply policies through Azure Policy for long-term prevention.”

This built-in automation lowers the barrier to action, allowing even lean security teams to make meaningful improvements quickly. And because Microsoft Defender for Cloud integrates tightly with Microsoft Sentinel and Logic Apps, many of these remediations can be orchestrated automatically, turning what used to be manual tasks into continuous protection workflows.

3. Threat detection and real-world protection

Microsoft Defender for Cloud actively detects and responds to cloud-native threats. It identifies malicious activity such as brute-force or anomalous login attempts, suspicious data exfiltration from storage accounts, malware and crypto-mining activity on workloads, SQL injection and privilege escalation in PaaS services, lateral movement between cloud resources, and much more.

Because it’s backed by Microsoft’s global threat intelligence and AI models, threat detection is highly contextual and continuously improving. In many real-world scenarios, BUI has seen this integration prevent incidents from escalating, says Sunker, providing an example. “Microsoft Defender for Cloud might flag anomalous network behaviour on a VM, while Microsoft Sentinel correlates that with a suspicious Entra ID login. That correlation allows our Cyber SOC analysts to stop lateral movement before compromise spreads.”

4. Compliance and governance

Regulatory frameworks such as ISO 27001, NIST, GDPR, and SOC 2 increasingly demand continuous, evidence-based compliance. Sunker notes that organisations are expected to prove continuous compliance, not just once-off compliance at audit time. Microsoft Defender for Cloud’s Regulatory Compliance Dashboard simplifies this task dramatically. It maps your configuration and control data against each framework’s requirements in real time, providing comprehensive visibility and insights for auditors and security teams alike.

“Compliance reporting used to involve manual audits and spreadsheets,” says Sunker. “Now, evidence is always current and exportable. You can even customise your compliance initiatives to match internal or industry-specific standards.”

5. Multi-cloud and hybrid support

Microsoft Defender for Cloud caters for the fact that most enterprises operate across multiple platforms. Using native connectors and Azure Arc, organisations can extend visibility and policy enforcement beyond Microsoft Azure to AWS, Google Cloud, and on-premises servers. This allows security teams to apply a single set of policies across all clouds, monitor non-Azure workloads in the same dashboard, and use Defender’s threat detection for AWS EC2, Google Cloud Compute Engine, and Kubernetes clusters.

“Hybrid and multi-cloud environments require consistent security controls,” notes Sunker. “Microsoft Defender for Cloud reduces fragmentation and provides a single source of truth for your posture.”

Integration across the Microsoft Security Ecosystem

Wewers highlights that Microsoft Defender for Cloud doesn’t operate in isolation. “It’s a foundational component of the broader Microsoft security ecosystem.”

  • Its findings, alerts, and recommendations integrate directly with Microsoft Sentinel to provide unified SIEM and SOAR visibility.
  • Through its connection with Microsoft Defender XDR, Defender for Cloud contributes workload and identity signals that enhance cross-domain threat detection across endpoints, email, and identities.
  • In collaboration with Microsoft Entra ID, it supports identity protection by enforcing least-privilege access and monitoring risky sign-ins.
  • And its integration with Azure Policy and Azure Arc extends governance, compliance, and security management across hybrid and multi-cloud environments.

“This ecosystem integration allows for end-to-end visibility, from detection through investigation to remediation,” Wewers notes. “It turns Microsoft Defender for Cloud into a strategic control plane for security across the entire Microsoft security landscape and beyond.”

Future-proofing your cloud security posture

As organisations continue to evolve their digital strategies, cloud security posture management will remain a critical pillar of resilience, says Wewers. Microsoft Defender for Cloud offers not just visibility, but the intelligence and automation needed to stay ahead of threats in an ever-changing landscape. By unifying assessment, protection, and compliance under one platform, it enables security teams to move from reactive defence to proactive, strategic risk management.

“The most secure organisations are the ones that understand their security posture and continuously strive to improve it. Microsoft Defender for Cloud gives CISOs the clarity and confidence to do just that, across Azure and every connected environment,” he concludes.

To make the most of Microsoft Defender for Cloud, many organisations choose to partner with a certified Azure Expert MSP. Working alongside seasoned specialists ensures that the tool is deployed and tuned effectively, delivering measurable improvements in security posture and compliance. If you’re ready to begin, we’re here to help. Contact the BUI team today.

Bringing AI to your cloud: How Azure OpenAI and Copilot are transforming work

Jeffrey Fowels explores how organisations can bring AI into their cloud environments and what it takes to turn early experiments into lasting business value.

By Jeffrey Fowels | Cloud Solutions Architect, BUI

Artificial intelligence is no longer a distant promise: it’s reshaping how we work and how organisations operate right now. Over the past few years, this shift has accelerated dramatically as AI has moved from being an interesting experiment to a strategic necessity.

And yet, for many companies, the real question isn’t whether to embrace AI, but rather how to do so effectively and responsibly. This is where I believe Microsoft is changing the game. With tools such as Azure OpenAI and Microsoft Copilot, businesses can bring AI directly into their cloud environments, protected by enterprise-grade security, privacy and compliance.

For companies already invested in the Microsoft ecosystem, this moment represents something powerful: the ability to integrate AI seamlessly with their own data, applications and workflows safely and at scale.

From cloud infrastructure to intelligent cloud

Microsoft Azure has evolved in remarkable ways. In its early days, the focus was on running workloads in the cloud, providing scalable infrastructure and platforms through Infrastructure-as-a-Service and Platform-as-a-Service models. That alone was transformative. But today, Azure has become something far more intelligent: a cloud that doesn’t just host workloads, but actively learns from them.

Azure’s evolution into an intelligent cloud has been built on foundational services like Azure Machine Learning and Cognitive Services, which introduced speech and language capabilities long before generative AI became mainstream. These early building blocks set the stage for what we’re seeing with Azure OpenAI Service, a platform that brings reasoning, prediction and creativity directly into applications and workflows.

This shift has changed how we design cloud strategies. It’s not just about where data lives anymore, but how it can be used intelligently to drive outcomes. Data pipelines, model management, observability and governance are now central to a modern cloud architecture.

AI is in focus, across the board

The current AI landscape is being shaped by three powerful forces: generative AI, automation, and data-driven decision-making. Together, they’re redefining what’s possible for organisations of every size, in every industry.

Employees now expect tools that help them work smarter and faster, while leaders want deeper insights and better results. The appeal of AI is clear, it delivers measurable value in increasing productivity, reducing costs and unlocking new business models that didn’t even exist a few years ago.

What’s changed most dramatically is the level of maturity. AI adoption began with small proof-of-concept projects (like chatbots), but it’s quickly evolved into enterprise-scale automation and intelligence embedded directly into applications. The conversation has moved from “What is AI?” to “How do we operationalise AI securely?”

Of course, the journey isn’t always straightforward. Many organisations struggle with data quality, compliance, and uncertainty about where to begin. Azure helps overcome these challenges by providing secure data services, responsible AI frameworks and governance tools that keep innovation safe and accountable.

But in my view, the biggest success factor isn’t technology, it’s culture. AI adoption succeeds when policies are clear, when people are empowered, and when teams trust the tools that they use.

Azure OpenAI Service: a foundation for advanced applications

One of the most significant developments in Azure’s evolution is the Azure OpenAI Service. It gives organisations secure, enterprise-grade access to advanced AI models such as GPT-4, Codex and DALL-E, all hosted within the trusted Azure environment.

These models enable natural language understanding, content generation, coding assistance, and even image creation but with the governance and data protection that enterprises require. Azure OpenAI ensures that data remains within the organisation’s own Azure tenant. All requests are processed under the customer’s security boundaries, with strict privacy controls and no data shared with external systems.

The real magic happens when Azure OpenAI is connected to a company’s own data using Retrieval-Augmented Generation, combined with Cognitive Search or Azure AI Studio. This creates intelligent assistants that can answer questions and generate insights from internal knowledge bases, accurately and securely.

The most common use cases I’ve seen include:

  • Summarising lengthy reports or email chains
  • Creating intelligent chat interfaces for employees or customers
  • Generating marketing or technical content resources
  • Assisting developers with code generation

Azure’s built-in integrations (such as Entra ID for identity, Key Vault for secrets, Private Link for network isolation, and Purview for compliance) enable organisations to innovate confidently while keeping their data secure. And the outcomes are tangible: faster workflows, reduced manual effort, and measurable productivity gains.

The rise of Microsoft Copilot: AI for everyday tasks

While Azure OpenAI enables deep customisation, Microsoft Copilot brings AI to the people, right where they already work. Copilot integrates directly into tools like Word, Excel, Outlook, Teams, GitHub and Dynamics 365, acting as a digital co-worker that assists with the tasks most professionals find time-consuming: drafting content, analysing data, summarising meetings, and automating repetitive processes.

The impact has been profound:

  • Microsoft 365 Copilot helps knowledge workers boost productivity
  • Copilot in Dynamics 365 enhances business insights and automation
  • GitHub Copilot accelerates software development by generating code automatically
  • Microsoft Security Copilot helps security teams investigate and respond to threats faster

All these Copilots are powered by Azure OpenAI models and Microsoft Graph data, which means they operate inside an organisation’s existing compliance and access controls.

What’s exciting is how these two approaches, Azure OpenAI for customisation and Copilot for everyday use, complement each other perfectly. Azure OpenAI allows developers and architects to build bespoke solutions tailored to specific data and processes, while Copilot democratises AI, making it accessible to everyone.

The feedback we’ve received from organisations adopting Copilot has been overwhelmingly positive. In the months ahead, I fully expect Copilot to become more context-aware, more domain-specific, and more deeply integrated across business and industry workflows as Microsoft further refines the technology.

Bringing AI to your cloud environment

For organisations looking to get started, bringing AI into your cloud doesn’t have to be overwhelming. A step-by-step approach helps you deliver measurable outcomes safely and efficiently.

Step 1. Identify a high-impact, focused use case

Start by choosing a project that is both achievable and measurable, such as summarising documents, automating customer support or enabling internal knowledge search. Then, ask yourself a few checkpoint questions:

  • Which process consumes the most manual effort or repetitive work?
  • What would time-saving in that process mean in real terms?
  • Who are the stakeholders? How will success be measured?

By starting small, you can build trust, momentum, and a proof point that sets the tone for scaling.

Step 2. Prepare your data

Data is the fuel for AI and when it comes to generative and predictive workloads, the readiness of your data often determines success or failure. Make sure that you:

  • Map where your data lives (on-premises or in the cloud, file shares, databases, or SaaS systems)
  • Assess the quality of your data (for accuracy, completeness, and currency)
  • Classify your data by sensitivity and governance (especially in regulated industries)
  • Prepare secure access to data for the AI pipeline (i.e., ingestion, indexing, and retrieval)

Proper data preparation ensures your AI models perform reliably and ethically.

Step 3. Build a prototype

A prototype (or minimum viable AI solution for your particular business challenge) helps prove value quickly, engage your users, and reveal technical hurdles. My suggestions:

  • Use tools such as Azure AI Studio, Azure Cognitive Search and Azure OpenAI to spin up a lightweight version of your solution
  • Define a clear timeline and success criteria (e.g., usage, feedback, error rates)
  • Engage a small group of users to provide feedback and assist with iteration
  • Monitor early results (e.g., response quality, user satisfaction, performance)

A well-executed, successful prototype builds internal credibility and reveals what scaling will require.

Step 4: Embed security and governance from the start

Don’t be tempted to skip foundational controls. Make sure you’re proactive about including security and governance protocols from the beginning:

  • Use Microsoft Entra ID for identity and access control
  • Use Azure Key Vault for secrets management and encryption of sensitive assets
  • Use Azure Private Link or network isolation to restrict model/data access
  • Use Microsoft Purview for data governance, classification, and lineage

Embedding these controls at the start avoids costly rework later and ensures compliance.

Step 5: Apply the principles of responsible AI

AI is powerful, but it must be used responsibly. That means ensuring trust, fairness, transparency, and accountability across your AI-driven processes. Common best practices:

  • Select appropriate baseline models and understand their limitations
  • Design user experiences so outputs can be identified as AI-generated, and reviewed
  • Monitor model behaviour and outcomes for bias, drift or unintended consequences
  • Keep your stakeholders in the loop for critical decisions or oversight

Remember, responsible AI isn’t an optional nice-to-have: it’s foundational for trust.

Step 6: Scale iteratively

Once your pilot is successful, the next challenge is expanding the AI solution across departments, extending its scope, integrating more data, and moving to production. Here are some scaling considerations to bear in mind:

  • Create a road map that outlines your next phases (e.g., more users, additional workflows, broader data sources)
  • Monitor cost, performance, monitoring and logging
  • Iterate further as your data evolves and your business priorities shift
  • Make sure your overall cloud architecture supports scaling (i.e., observability, logging, quotas, API throttling, and load balancing)

Scaling thoughtfully turns early wins into enterprise-grade capabilities that transform operations.

Building the intelligent enterprise with Azure and AI

Moving forward, every organisation must make a choice: observe the AI transformation from the sidelines, or take an active role in shaping how it drives value across the business. Azure OpenAI and Microsoft Copilot provide the secure, enterprise-grade foundation to make that possible, combining innovation with governance and flexibility with control.

The pathway is clear… Start with a targeted use case that matters, prepare your data, and establish security and compliance guardrails. From there, scale iteratively, measure results, and refine as you go.

With the right strategy and the right partner, you can turn the promise of AI into practical, measurable impact for your teams.

Every major transformation begins with a clear vision and a trusted technology partner to make it happen. As a Microsoft Azure Expert MSP, we work side by side with business and enterprise organisations to deliver AI solutions that are secure, scalable, and aligned with strategic objectives. Contact the BUI team to get started today.

An introduction to Azure Deployment Stacks: What they are and why they matter

Satish Sunker and Heinrich Wewers explain why Azure Deployment Stacks are a smart next step toward greater governance and confidence in the cloud.

As cloud environments evolve and scale, managing infrastructure across multiple subscriptions, environments, and teams has become one of the most persistent challenges for IT professionals and managed service providers (MSPs) alike. The need for speed, consistency, and governance has never been more pressing and yet achieving all three simultaneously can often feel impossible.

Azure Deployment Stacks, one of Microsoft’s recent enhancements to the Azure Resource Manager (ARM) and Bicep ecosystem, aims to solve precisely that. By treating groups of Azure resources as cohesive, managed units, Deployment Stacks simplify lifecycle management and governance across complex environments without sacrificing flexibility or control.

To explore how Deployment Stacks can transform infrastructure management in Azure, we asked Cloud Solutions Architect Satish Sunker and Senior Cloud Consultant Heinrich Wewers to share their insights on what Deployment Stacks can do, why they matter, and how enterprises and MSPs can start benefiting from them.

The growing complexity of cloud infrastructure

Today’s cloud teams operate under immense pressure, says Satish Sunker. “Scaling infrastructure is no longer a nice-to-have… It’s actually an expectation from the business,” he explains. “Teams are required to provision and expand environments quickly, without compromising reliability or performance.”

With this pressure comes complexity. Maintaining consistency across environments, subscriptions, and regions can become a full-time job in itself. Each team may interpret organisational standards slightly differently or make ad hoc changes that cause divergence in the long run. “Over time, manual changes and one-off fixes can cause configuration drift from the original deployment templates,” adds Sunker. “Technical teams spend a lot of time remediating resources that are not compliant or do not meet security requirements.”

This challenge is compounded by concerns about cost management. “Teams are being squeezed to optimise spend while maintaining availability,” notes Sunker. “That often means implementing automation to dynamically scale resources up or down, which can add another layer of complexity.”

Before Deployment Stacks, many organisations relied solely on ARM or Bicep templates to deploy Azure resources declaratively. While effective for provisioning, they lacked robust lifecycle management capabilities. Once resources were deployed, keeping them in sync and cleaning them up safely was largely a manual or script-driven process.

“Enterprises want their cloud teams to be agile and manage their own infrastructure, but that can lead to inconsistencies in governance, security, and compliance. Technical debt tends to build up over time, as it becomes harder to maintain control and consistency across large environments,” says Sunker.

This is where Azure Deployment Stacks come into play.

What is an Azure Deployment Stack?

At its core, an Azure Deployment Stack is a resource that acts as a container for multiple deployed resources, allowing them to be treated as a single, unified entity, explains Heinrich Wewers.

“Unlike a traditional ARM or Bicep deployment, which simply provisions resources, a Deployment Stack establishes a managed relationship between Azure and the resources it deploys,” says Wewers. “Azure keeps track of those resources as part of the stack, allowing for more controlled updates and cleanups.”

Behind the scenes, when a Deployment Stack is created, Azure registers a management relationship between the stack and each deployed resource. “This relationship allows Azure to track, update and clean up those resources as a single managed identity,” adds Wewers. “It ensures consistency throughout the resource lifecycle.”

The main components that make up a Deployment Stack include:

  • A Bicep or ARM deployment template and parameters
  • A deployment scope (such as subscription, management group, or resource group)
  • Deny settings that control who can modify managed resources
  • Exclusions for specific identities or service principals that require access

The introduction of Deployment Stacks marks an important shift in how Azure environments can be managed at scale.

“They help eliminate operational risks and reduce technical debt caused by limited control, poor lifecycle management, and lack of visibility over deployed resources,” says Wewers. “By keeping related resources grouped and tracked together, they reduce compliance gaps and ensure consistent configuration across subscriptions.”

Deployment Stacks also reduce the risk of human error. “They bring structure and predictability to how resources are deployed, updated, and cleaned up,” notes Wewers. “That’s critical for large teams working across shared environments.”

By embedding management and governance directly into the deployment process, Deployment Stacks effectively extend Infrastructure-as-Code (IaC) capabilities into the operational lifecycle. “Traditional ARM and Bicep templates are great for provisioning, but they offer limited visibility and lifecycle control once resources are deployed. Deployment Stacks enhance that process with additional management capabilities.”

How do Azure Deployment Stacks work?

The workflow for building and managing an Azure Deployment Stack follows a structured, repeatable pattern. “The first step is to identify which resource groups should be managed together as part of the same stack. This helps define clear boundaries for ownership and lifecycle management. Once the scope is set, you can use existing ARM or Bicep templates to define the resources that make up the stack. From there, Azure establishes the management relationship with each deployed resource,” explains Wewers.

When templates are changed later, Azure automatically manages updates intelligently. “When changes are made to the templates, one of two things can happen: any new resources added to the template are automatically brought under management by the Deployment Stack, and any resources removed from the template become unmanaged. Azure also allows you to define what should happen to those unmanaged resources… For example, whether they should be retained or automatically deleted.”

This makes ongoing lifecycle control more predictable and less error-prone.

Tools, integrations, and limitations

Sunker highlights that Deployment Stacks integrate seamlessly into existing workflows. “You can use Azure CLI or Azure PowerShell to create and update Deployment Stacks,” he says. “In most cases, current resource deployment processes using ARM or Bicep can be seamlessly adapted to deploy and manage resources through Azure Deployment Stacks, without significant changes to existing templates or pipelines.”

However, there are a few limitations to bear in mind when working with Deployment Stacks:

  • There’s a limit of 800 deployment stacks within a single scope.
  • You can’t directly add existing Azure resources under the management of a stack if they were not originally deployed through that stack.
  • Deny settings cannot be configured at the management group scope.

These constraints are likely to evolve as the feature matures, notes Sunker, so it’s worth checking the Microsoft documentation regularly for updates.

Business and operational advantages

Sunker points out that, beyond the technical capabilities, Azure Deployment Stacks deliver measurable business benefits. “From a business and operational standpoint, the biggest advantage is the increased efficiency in managing Azure resources. This efficiency translates directly into cost savings and reduced management overhead, easing the burden on cloud teams. By simplifying resource lifecycle management and improving consistency, organisations can focus more on innovation and less on maintenance,” he says.

Deployment Stacks also play a significant role in strengthening governance, consistency, and compliance across environments by reducing the need for manual actions and therefore lowering the risk of human error or oversight. “Deny settings can enforce policy and prevent engineers from making unapproved configuration changes or quick fixes that could drift from organisational standards. Because all resources in a Deployment Stack share the same lifecycle, orphaned resources are minimised, ensuring cleaner environments and easier compliance reporting.”

By combining lifecycle management with governance controls, Deployment Stacks help enterprises achieve a more secure, predictable, and compliant cloud operating model, without slowing down delivery.

Sunker also notes that Azure Deployment Stacks naturally reinforce key pillars of the Azure Well-Architected Framework, including:

  • Operational excellence: Deployment Stacks support efficient, repeatable operations.
  • Reliability: Deployment Stacks reduce configuration drift and improve system stability.
  • Security: Deny settings and managed relationships help enforce access boundaries and prevent unauthorised changes.
  • Cost optimisation: Streamlined lifecycle management reduces resource sprawl and orphaned assets.
  • Performance efficiency: Deployment Stacks ensure consistent, optimised deployments as business requirements evolve.

This alignment makes Deployment Stacks an attractive option for enterprises pursuing well-architected cloud environments.

Real-world scenarios

BUI has started adopting Azure Deployment Stacks in customer projects to address challenges observed in previous IaC implementations, particularly around configuration drift and lifecycle management, Wewers shares.

“Azure Deployment Stacks don’t replace IaC, they enhance it. By adding structured lifecycle management and governance capabilities on top of existing ARM or Bicep deployments, Azure Deployment Stacks make it easier for enterprises to adopt and scale IaC with greater confidence and control.”

Wewers gives an example: “A common scenario where Deployment Stacks deliver real value is managing proof-of-concept projects. These environments are typically short-lived, and manually tracking every deployed resource can lead to forgotten assets and unnecessary costs. With Deployment Stacks, all resources deployed during the POC are managed together. When the stack is deleted, every associated resource is automatically cleaned up.”

Deployment Stacks can also improve environment management across the development, testing and production stages, notes Wewers. “Each environment can be deployed as its own stack. This ensures environment isolation, consistent deployment, simplified lifecycle management, and clear auditability, all of which align with DevOps and governance best practices.”

Deployment Stacks are especially valuable during workload migrations or customer onboarding scenarios, he continues. “During migrations, Deployment Stacks allow you to replicate environments easily across subscriptions or regions using the same ARM or Bicep template. Temporary or transitional resources can be managed as a unit and once the migration is complete, deleting the stack safely removes all associated resources, preventing leftover costs or configuration drift. This capability helps MSPs, like us, to streamline transitions and maintain consistency from the first deployment.”

Common pitfalls to avoid

Sunker cautions that there are nuances to understand when it comes to Azure Deployment Stacks and highlights two common pitfalls.

“Mistake number one is assuming that stacks manage everything in a scope,” he warns. “Deployment Stacks only manage the resources they deploy. Any additional resources created outside the stack won’t be managed or removed when the stack is updated or deleted. Cloud teams must communicate and document which resources are under stack management and which are not.”

The second issue is overly strict Deny settings. “If Deny assignments are too restrictive, even the original deployment identity may lose the ability to manage the stack. It’s important to exclude the right service principals or admin accounts.”

Sunker’s advice? “Start small and focus on how resource management behaves before scaling to larger environments. Document your stack design and clearly define scopes to avoid confusion.”

Wewers has a similar outlook. For cloud teams ready to explore, he recommends a simple, hands-on approach: “You can use your existing ARM or Bicep templates and deploy them as a stack using Azure CLI or Azure PowerShell. Go slowly… Deploy a basic stack that includes just a few resources. Then experiment with Deny settings and the actionOnUnmanage parameters to see how Azure enforces governance and resource cleanup in practice.”

By experimenting early on, cloud teams can build familiarity and confidence before rolling out Azure Deployment Stacks across production environments.

Looking ahead

As a Microsoft Azure Expert MSP, BUI is already helping customers identify workloads that are ideal candidates for Azure Deployment Stacks. “Our approach focuses on planning the right configuration from the start and aligning governance, lifecycle management and team workflows to leverage the benefits fully,” says Sunker.

For enterprises looking to reduce operational overhead, enhance automation maturity, and improve governance, Deployment Stacks represent a significant evolution in how Azure environments can be deployed and managed, he continues. “By turning groups of resources into manageable, lifecycle-bound entities, Deployment Stacks bring order, visibility, and control to environments that were once sprawling and difficult to standardise.”

Wewers concurs. “The benefits extend beyond the technical: Deployment Stacks simplify operations, strengthen compliance, and support a more consistent, cost-effective cloud strategy. For enterprises that depend on Azure, Deployment Stacks are a smart next step toward greater governance and confidence in the cloud,” he concludes.

As a Microsoft Azure Expert MSP, we’re here to support every stage of your cloud journey, from design and deployment to automation, security, and optimisation. Our certified architects and engineers can help you leverage innovations like Azure Deployment Stacks to streamline your infrastructure now, while laying the foundation for future growth and resilience. Contact our team to get started.

How to combat five of the most common cyberthreats

Zandre Janse van Vuuren identifies five of the most common cyberthreats and shares practical tips to help you defend against them.

By Zandre Janse van Vuuren | Service Delivery Manager: Cyber DFIR, BUI

As our world becomes increasingly interconnected through digital systems, the threat landscape for cyberattacks continues to expand. In 2024, global cybercrime costs soared to an estimated $9.22 trillion, with projections indicating a rise to more than $13 trillion by 2028.

These staggering figures highlight the need for robust security measures. Cyberthreats not only risk sensitive data, but can also disrupt operations and cause significant financial and reputational damage. Let’s take a closer look at five of the most common cyberthreats organisations face today, their potential impact, and actionable steps for mitigation.

1 | PHISHING

Phishing remains one of the most prevalent cyberthreats due to its simplicity and effectiveness. Attackers often exploit human error, leveraging psychological tactics such as urgency, fear, and curiosity to trick people into revealing critical information.

Common phishing techniques include posing as trusted organisations like banks or government agencies, using realistic-looking fake websites to capture login credentials, and embedding malware in email attachments.

The rise of spear phishing (i.e., highly targeted attacks against specific individuals or organisations) has further increased the threat’s sophistication and success rate. Even tech-savvy users can fall victim if vigilance lapses, making continuous awareness and training essential.

Potential impact:

  • Unauthorised access to an organisation’s accounts and systems.
  • Data breaches extending to the organisation’s network.
  • Financial losses and reputational damage.

Mitigation:

  • Implement a robust email filter to block phishing attempts from known malicious sources.
  • Teach employees how to recognise phishing emails. Cultivate good habits like checking the sender’s details, avoiding clicking on suspicious links, and reporting suspected phishing activities to the IT department.
  • Use multi-factor authentication and conditional access policies to add an extra layer of security.

2 | RANSOMWARE

With the rise of Ransomware-as-a-Service platforms, even attackers with little technical aptitude can deploy sophisticated ransomware campaigns, making this threat more pervasive than ever. These platforms provide pre-packaged ransomware tools, technical support, and even revenue-sharing models, significantly lowering the barrier to entry for cybercriminals.

Compounding the issue is the growing use of double extortion tactics, where attackers encrypt data and threaten to publicly release sensitive information unless the ransom is paid. This evolution has made ransomware one of the most concerning and financially devastating cyberthreats today, affecting organisations of all sizes across industries.

Potential impact:

  • Loss of access to critical data and services.
  • Operational downtime.
  • Financial losses from ransom payments and recovery efforts.

Mitigation:

  • Ensure regular backups of critical data and systems, abiding by the rule of three: two offline and offsite backups in different locations and one cloud-based backup.
  • Keep software and systems updated, patch vulnerabilities, and conduct regular vulnerability assessments and penetration testing.
  • Deploy endpoint detection and response tools to identify and stop ransomware early.

3 | INSIDER THREATS

While external attacks often dominate headlines, insider threats can be just as damaging and sometimes more difficult to detect. Whether malicious or negligent, insiders already have authorised access to critical systems and data, allowing them to bypass many traditional security measures.

Malicious insiders may act out of financial gain, dissatisfaction, or coercion, while negligent insiders might unintentionally expose sensitive information through careless behaviour or a lack of awareness.

The dual nature of insider threats makes them particularly challenging to manage, underscoring the importance of comprehensive monitoring and regular employee training.

Potential impact:

  • Data theft or leaking of sensitive information.
  • Compromised intellectual property.
  • Damage to internal systems.

Mitigation:

  • Restrict access to sensitive data based on job roles and responsibilities using the principle of least privilege.
  • Monitor user activity for unusual behaviour using insider threat detection tools capable of behavioural monitoring.
  • Conduct regular security awareness training for employees.

4 | MALWARE

Malware attacks are often the first step in larger, multi-stage cyberattacks, serving as a gateway for attackers to establish a foothold in a target’s system. These attacks can infiltrate systems through various vectors, including compromised downloads, malicious websites, infected USB devices, phishing emails with malicious attachments, and even unsecured IoT devices.

Once installed, malware can perform a range of harmful activities, from data exfiltration and credential harvesting to deploying additional payloads for ransomware or botnet creation. The versatility and adaptability of malware make it a cornerstone of many sophisticated cyberattack campaigns.

Potential impact:

  • System downtime.
  • Data corruption or theft.
  • Financial losses from recovery efforts.

Mitigation:

  • Install and regularly update antivirus and anti-malware software.
  • Employ network firewalls and intrusion detection/prevention systems.
  • Educate employees on safe browsing habits and the risks of downloading unknown files.

5 | DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS

As businesses increasingly rely on online services, Distributed Denial of Service (DDoS) attacks have become a favoured method for disrupting operations. These attacks flood networks or servers with overwhelming traffic, rendering them inaccessible to legitimate users.

Beyond their immediate disruptive effects, DDoS attacks are often used as a smokescreen to divert attention while attackers execute more invasive activities, such as data breaches or malware deployment.

The increasing accessibility of DDoS-for-hire services has further amplified the threat, enabling attackers to launch large-scale attacks with minimal resources or technical expertise.

Potential impact:

  • Website downtime or service outages.
  • Loss of customer trust.
  • Potential financial losses.

Mitigation:

  • Use a content delivery network or DDoS protection service to absorb attack traffic.
  • Configure rate-limiting and traffic-filtering rules on your network.
  • Develop an incident response plan to address and mitigate DDoS attacks quickly.

Understanding the most common cyberthreats is crucial for safeguarding your organisation. Phishing, ransomware, insider threats, malware, and DDoS attacks each present unique challenges, but proactive measures such as employee training, robust technical defences, and regular updates to security protocols can mitigate their impact.

Cybersecurity is a continuous effort that demands vigilance, adaptation, and a culture of awareness. You can protect your business assets, maintain trust, and ensure resilience in an ever-changing threat landscape by staying informed and prepared.

BUI is a 2025 Data Privacy Week Champion

The 2025 Data Privacy Week awareness campaign aims to educate and empower individuals to take control of their personal data.

BUI is proud to announce its commitment to the 2025 Data Privacy Week campaign. As a Data Privacy Week Champion, BUI recognises and supports the principle that all organisations share the responsibility of being conscientious stewards of personal information.

Data Privacy Week is an annual awareness initiative that takes place from 27-31 January. The goal is twofold: to help individuals understand that they have the power to manage their data and to help organisations appreciate why it’s necessary to respect the user data they collect, process, and store.

This year’s theme is Take control of your data – and it’s a timely reminder for everyone as the world becomes more digitally connected, notes BUI Group Governance and Compliance Manager Dhiren Boodhia. “Data Privacy Week highlights the fact that trust is built on transparency. Individuals want to know that their personal information is respected and protected by those who have access to it,” says Boodhia. “As privacy laws and public expectations continue to evolve, organisations should strive to go beyond mere compliance to create a culture of accountability around data privacy and security.”

How vigilant are you about your data privacy?

Your digital activities generate huge amounts of data: websites, apps and online services collect information about your behaviours, your interests, and your purchases. Often, this includes personal data like your identity number and home address. It can even include data about your physical self: think about how smart devices can save health and fitness records as you exercise.

While you cannot control how each byte of data about yourself and your family is shared and processed, you are not helpless! In many cases, you can control how you share your data with a few simple steps. Remember, your personal data is precious and you deserve to be selective about who you share it with. Here are three simple steps to help you manage your data privacy, according to guidelines from the National Cybersecurity Alliance:

1. Know the trade-off between privacy and convenience

Nowadays, when you download a new app, create a new online account, or join a new social media platform, you’ll often be asked for access to your personal information before you can even use it! This data might include your geographic location, contacts, and photos.

For these businesses, personal information about you is tremendously valuable – and you should think about whether the service you get in return is worth the data you must hand over, even if the service is free. Make informed decisions about sharing your data with businesses or third-party service providers… Ask yourself:

  • Is the service, app, or game worth the amount or type of personal data wanted in return?
  • Is the data requested even relevant for the service, app, or game?
  • Can you control your data privacy and still use the service, app, or game?
  • If you haven’t used the service, app, or game in several months, is it worth keeping around knowing that it might be collecting and sharing your data?

2. Adjust privacy settings to your comfort level

For every app, account, or device, check the privacy and security settings. These should be easy to find in the relevant Settings section and should take a few moments to change. Set them to your comfort level for personal information sharing. In general, it’s wise to share less data, not more.

You don’t have to do this for every account at once: start small and over time you’ll make a habit of adjusting all your settings to your comfort level. The National Cybersecurity Alliance has several free resources, including the Manage Your Privacy Settings page, to help you find and check the settings of social media accounts, apps, and more.

3. Protect your data

Data privacy and data security go hand-in-hand. Along with managing your data privacy settings, remember these four tips to safeguard your information:

  • Create long, strong, unique passwords for each account and device, and consider using a password manager to store each password securely.
  • Turn on multi-factor authentication wherever it is permitted. This helps keep your data safe even if your password is compromised.
  • Turn on automatic device, software and browser updates, or make sure you install updates as soon as they are available.
  • Learn how to identify phishing messages, which can be sent as emails, texts, or direct messages.

During Data Privacy Week this January, we’ll be sharing useful tips and resources to help you become more aware about data privacy at work, at home, and on the move. Follow us on Facebook and LinkedIn so you never miss a post, and join the conversation by using the #DataPrivacyWeek hashtag online.

About Data Privacy Week

Data Privacy Week began as Data Privacy Day in the United States and Canada in January 2008 as an extension of the Data Protection Day celebration in Europe. Data Protection Day commemorates the 28 January 1981 signing of Convention 108, the first legally binding international treaty dealing with privacy and data protection. The National Cybersecurity Alliance, the United States’ leading non-profit, public-private partnership promoting cybersecurity and privacy education and awareness, leads the effort in North America each year. For more information, visit www.staysafeonline.org/data-privacy-week/.

About the National Cybersecurity Alliance

The National Cybersecurity Alliance (NCA) is a non-profit organisation on a mission to create a more secure, interconnected world. The NCA advocates for the safe use of all technology and educates everyone on how best to protect themselves, their families, and their organisations from cybercrime. The NCA creates strong partnerships between governments and corporations to amplify its message and to foster a greater digital good. For more information, visit www.staysafeonline.org.

Your guide to a comprehensive Incident Response Plan

In Part 2 of our spotlight series on incident response, Zandre Janse van Vuuren explains how to create a comprehensive Incident Response Plan for your organisation.

By Zandre Janse van Vuuren | Service Delivery Manager: Cyber DFIR, BUI

In Part 1, we highlighted the importance of having an Incident Response Plan (IRP) to minimise damage, reduce recovery time, and secure sensitive data during a cybersecurity incident. Now, let’s dive into how to create an effective IRP for your organisation, with practical, step-by-step guidelines you can follow.

Step 1: Define your objectives and scope

The foundation of any effective IRP begins with setting clear objectives and defining the scope. Objectives help align your incident response efforts with your organisation’s goals, risk tolerance, and regulatory requirements. Typical objectives include:

  • minimising data loss;
  • ensuring business continuity;
  • reducing recovery time;
  • and protecting your business reputation.

The scope defines the types of incidents the IRP covers and may vary depending on industry standards or regulatory guidelines. For instance, a healthcare provider may need a specific scope for protecting patient data, while a financial institution may focus on transaction security and fraud prevention. By establishing scope early on, you can ensure that your IRP is comprehensive yet focused.

Step 2: Identify key stakeholders and roles

An IRP functions best when it has a well-structured team with clear roles and responsibilities. The team may include internal stakeholders, like IT and management, and external stakeholders, such as legal consultants or third-party security experts.

Each member of your incident response team should have a clearly defined role to prevent delays and confusion during an incident. Roles may include:

  • Incident Manager: Oversees the incident response process and co-ordinates with other teams.
  • Technical Lead: Directs containment, eradication, and recovery tasks.
  • Communication Officer: Manages internal and external communications.
  • Legal Advisor: Ensures compliance with legal obligations during and after an incident.

Designating these roles upfront helps the team respond more efficiently and cohesively during an incident.

Step 3: Establish incident categories and prioritisation

Incidents can range widely in scope and severity, from minor phishing attempts to full-blown data breaches. To streamline response efforts, you must categorise potential incidents and assign impact levels to each. Incident categories could include:

  • Network attacks: Attempts to compromise network infrastructure, such as Distributed Denial-of-Service (DDoS) attacks.
  • Phishing and social engineering: Attacks targeting individuals for unauthorised access.
  • Data breaches: Incidents where sensitive data is exposed or stolen.

Each category should have multiple impact levels (e.g., low, medium, high) based on criteria like the number of affected systems, potential data loss, and the severity of business impact. This prioritisation ensures critical incidents receive immediate attention, while lower-priority events are handled appropriately without over-allocating resources.

Step 4: Develop detection and notification protocols

Timely detection and reporting are crucial for an effective IRP. Make sure you implement security tools and monitoring systems that can detect unusual activities or potential threats. There’s a wide range of endpoint protection platforms, network monitoring tools, and intrusion detection systems available for business and enterprise organisations.

Once an incident is detected, a notification protocol outlines how and when incidents should be reported internally and externally.

  • Internal reporting should be rapid, with team members knowing whom to notify immediately.
  • External reporting may be required for regulatory compliance and could include notifying partners, customers, or the authorities depending on the type of incident.

Make sure you clearly define the people or parties to be notified, the method of notification, and the relevant timeframe.

Step 5: Outline incident containment and eradication steps

Containment and eradication are central to limiting an incident’s impact and preventing further damage. Document your procedures for both short-term and long-term containment and eradication.

  • Short-term containment may involve disconnecting affected devices from the network or blocking malicious traffic.
  • Long-term containment might include applying patches, implementing segmentation, or reconfiguring permissions.
  • Eradication focuses on eliminating the incident’s root cause and could involve removing malware, resetting compromised credentials, or closing exploited vulnerabilities.

Both containment and eradication should be documented in detail, tailored to specific incident types, and tested to confirm that they are feasible and effective.

Step 6: Create recovery and remediation procedures

Once the incident is contained and eradicated, recovery efforts aim to return systems to regular operation safely and reliably. The recovery phase may involve restoring affected systems, verifying data integrity, and assessing system functionality. A critical part of this step is to monitor your systems for any indication that the incident may recur, ensuring any residual threats are eliminated.

Remediation actions may also include taking preventative steps, such as reinforcing security controls, updating policies, or providing additional employee training. Documentation is essential here, as lessons learned in recovery and remediation will help improve your IRP over time.

Step 7: Build a communication strategy

Communication during an incident is essential to inform all stakeholders, control potential reputational damage, and fulfil legal obligations. Your communication strategy should differentiate between internal communications, which provide regular updates to relevant staff, and external communications, which may include notifying customers, partners, regulatory bodies, and the media.

Effective communication strategies often use predefined templates and include guidelines for customising messaging based on the nature and impact of the incident. Designate a spokesperson from your communications or public relations team to ensure consistency and accuracy in your external messages.

Step 8: Plan for post-incident review and continuous improvement

Every incident provides a learning opportunity. The post-incident review process aims to evaluate the IRP’s performance, identify areas for improvement, and ensure that lessons are incorporated into the IRP for future incidents.

This step typically includes:

  • Documentation: Detail the incident timeline, response actions, and decision points.
  • Evaluation: Analyse what went well and what didn’t, identifying any gaps in response.
  • Update procedures: Adjust protocols, tools, and policies to address any identified weaknesses.

A robust post-incident review process strengthens the IRP and demonstrates a commitment to continuous improvement, which is critical for fostering a proactive security culture and maintaining regulatory compliance.

Bonus tip! The success of any IRP is closely tied to the response team’s performance during high-pressure situations – and that’s why it’s important to cultivate the right mindset. If you and your teammates can maintain your composure, think objectively, and work in unison, then you’ll be ready when it matters most.

  • Stay calm under pressure: Panic can lead to mistakes and misinterpretations during critical moments. Breathe, focus, and assess the situation calmly before you act. Rely on your IR training and processes to guide you.
  • Stay objective and avoid assumptions: Jumping to conclusions or making assumptions can lead to missteps and wasted resources. Base your decisions on verified data; cross-check evidence; and don’t let personal biases influence your actions.
  • Focus on collaboration, not isolation: Incident response is a team effort: isolating yourself or hoarding information can slow the overall response time and hinder your progress. Communicate openly, delegate tasks, and leverage others’ expertise if necessary.

With a comprehensive IRP and a teamwork mindset, your organisation will be better equipped to navigate security incidents. Download our checklist to guide you in creating your IRP.

Incident response planning: The key to business resilience

In today’s digital world, it’s not a matter of if but when your organisation will experience a cyber incident. In Part 1 of our incident response spotlight series, Zandre Janse van Vuuren explains why an Incident Response Plan is a critical component of a robust security strategy.

By Zandre Janse van Vuuren | Service Delivery Manager: Cyber DFIR, BUI

In today’s digital world, cybersecurity threats are an ever-present reality. Last year alone, password attacks increased to 4,000 per second (on average) and the number of human-operated ransomware attacks rose by 195 percent. From ransomware to identity breaches, organisations of all sizes are potential targets. The 2024 Microsoft Digital Defense Report (MDDR) puts the growing threat landscape into sharp focus: Microsoft customers face more than 600 million cybercriminal and nation-state attacks every day. While it’s impossible to eliminate the risk of an attack altogether, organisations can significantly reduce the impact by having a well-structured Incident Response Plan in place.

Incident response is not just about reacting to a cyber incident; it’s about being prepared to act swiftly, decisively, and efficiently.

What is incident response planning?

Incident response (IR) planning is the process of developing a structured, documented approach to handling security breaches and cyberattacks. An effective IR plan includes predefined procedures, roles, and responsibilities for responding to and mitigating the effects of cyber incidents. It also outlines communication strategies, legal obligations, and methods for preserving evidence for forensic investigations.

The importance of incident response planning

  1. Mitigating damage and loss
    A comprehensive IR plan enables organisations to contain an attack before it causes extensive damage. With the surge in human-operated ransomware attacks—which Microsoft reports have increased by 2.75x—a timely and co-ordinated response is critical. Without a plan, response times are slower, and the financial and reputational damage can be catastrophic. Being prepared can prevent the spread of malware, data theft, or further unauthorised access.
  2. Reducing downtime
    Every minute of downtime during a cyber incident translates to lost revenue, especially in industries that rely heavily on operational continuity. A quick and co-ordinated response allows organisations to resume business operations faster, minimising disruption.
  3. Enhancing co-ordination and communication
    A well-structured IR plan ensures that all stakeholders, including internal teams and external partners, know their roles in responding to an incident. With nation-state and cybercriminal activities converging more than ever, it is crucial that organisations have clear communication channels. These help prevent confusion, allowing teams to act in unison and avoid mistakes during critical moments.
  4. Maintaining regulatory compliance
    Many industries are subject to data protection laws and regulations, such as the General Data Protection Regulation (GDPR), the Health Insurance Portability and Accountability Act (HIPAA), and the Payment Card Industry Data Security Standard (PCI DSS), which mandate swift responses to data breaches. Having an IR plan ensures compliance with these legal obligations, protecting organisations from penalties and fines.
  5. Preserving evidence for forensic analysis
    Properly handling an incident means preserving crucial data for investigation and legal purposes. According to the 2024 MDDR, nation-state actors are increasingly targeting critical infrastructure and high-profile organisations. Without an IR plan, organisations may inadvertently destroy or fail to collect essential forensic evidence, which could hinder law enforcement or legal action.

A comprehensive IR plan does far more than provide a structured way to deal with attacks and cyber incidents: it also empowers organisations to be proactive about their security posture.

The advantages of effective incident response planning

  • Proactive risk management
    Incident response planning allows organisations to identify vulnerabilities before they are exploited. Conducting regular IR drills helps businesses improve their overall security posture and minimise potential risks.
  • Improved customer trust
    Customers want to know their data is secure. Organisations with publicly communicated IR strategies can reassure their customers that they take cybersecurity seriously and are prepared to handle any breaches professionally and swiftly.
  • Cost savings
    The costs of a cyber incident, particularly those involving data breaches, can be astronomical. Expenses often include data recovery, legal fees, regulatory fines, and lost revenue. A timely response significantly reduces the financial burden associated with cyber incidents.
  • Continuous improvement
    Incident response planning is not static. Lessons learned from each incident feed back into the plan, making it more effective with every iteration. Continuous improvement is essential to staying ahead of emerging threats. Regular updates to the IR plan help organisations remain resilient and prepared for new types of attacks.

How our Cyber DFIR team can help with incident response planning

Incident response is not a one-size-fits-all solution and creating an effective IR plan requires expertise and experience in dealing with complex cyber threats. Our Cyber DFIR team specialises in helping organisations develop, implement, and refine their incident response strategies. When you choose BUI as your security partner, you gain access to seasoned professionals who will work closely with your organisation to:

  • Conduct thorough risk assessments to identify potential vulnerabilities.
  • Develop tailored IR plans that align with your business objectives and regulatory requirements.
  • Implement response playbooks that include clear steps for containment, eradication, and recovery.
  • Provide hands-on support during incident response efforts to minimise impact and downtime.
  • Offer forensic analysis and reporting to ensure proper evidence-handling and compliance.
  • Conduct post-incident reviews and refine the IR plan to ensure continuous improvement.

At BUI, we understand that every organisation faces unique cybersecurity challenges. Our proactive approach ensures that your organisation is prepared, resilient, and capable of responding effectively to any incident. Let our Cyber DFIR team help you safeguard your digital assets and build a stronger security posture through a robust incident response plan. Contact us to get started today.

BUI Cyber Research – Resolving a vulnerability in outdated versions of Microsoft Teams

In October 2023, a significant software security vulnerability was discovered that impacts Microsoft Teams. The vulnerability, designated as CVE-2023-4863, affects not only Microsoft Teams but also Microsoft Edge, Skype for Desktop, and WebP Image Extensions.

Although software updates have been released for Microsoft Teams, Microsoft Defender continues to flag multiple devices as vulnerable. The persistence of this vulnerability is due to the Machine-wide Installer, which installs Teams for all profiles, while deployed updates only update the Teams.exe file for the logged-in user.

While Microsoft does not provide direct remediation for this specific issue, there are steps you can take to address it. Although manual remediation via scripting may not be ideal, a script released on GitHub by Lee Vilenski has proven to be very successful.

Figure 1: Notable reduction of exposure due to deployment of the remediation script
Figure 1: Notable reduction of exposure due to deployment of the remediation script

We have modified Vilenski’s script to meet our requirements and deployment methods, as shown below. The original script can be found here.

Script

# Define minimum acceptable version (replace with your desired version)
$minVersion = “1.7.00.8651”

############### Do Not Edit Below This Line #################################

###Finding SIDs for loop
# Regex pattern for SIDs
$PatternSID = ‘S-1-5-21-\d+-\d+\-\d+\-\d+$’

# Get Username, SID, and location of ntuser.dat for all users
$ProfileList = gp ‘HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\*’ | Where-Object {$_.PSChildName -match $PatternSID} |
Select @{name=”SID”;expression={$_.PSChildName}},
@{name=”UserHive”;expression={“$($_.ProfileImagePath)\ntuser.dat”}},
@{name=”Username”;expression={$_.ProfileImagePath -replace ‘^(.*[\\\/])’, ”}}

# Get all user SIDs found in HKEY_USERS (ntuder.dat files that are loaded)
$LoadedHives = gci Registry::HKEY_USERS | ? {$_.PSChildname -match $PatternSID} | Select @{name=”SID”;expression={$_.PSChildName}}

# Get all users that are not currently logged
$UnloadedHives = Compare-Object $ProfileList.SID $LoadedHives.SID | Select @{name=”SID”;expression={$_.InputObject}}, UserHive, Username

# Loop through each profile on the machine
Foreach ($item in $ProfileList) {
# Load User ntuser.dat if it’s not already loaded
IF ($item.SID -in $UnloadedHives.SID) {
reg load HKU\$($Item.SID) $($Item.UserHive) | Out-Null
}

#####################################################################


# Check and potentially remove outdated Teams versions

# Get Teams uninstall keys for the user
$teamsUninstallKeys = Get-ItemProperty registry::HKEY_USERS\$($item.SID)\Software\Microsoft\Windows\CurrentVersion\Uninstall\Teams*

if ($teamsUninstallKeys) {
foreach ($teamsKey in $teamsUninstallKeys) {
# Check DisplayVersion and remove key if outdated (with confirmation)
$displayVersion = $teamsKey.DisplayVersion

if ($displayVersion -lt $minVersion) {
$uninstallString = “C:\Users\$($item.Username)\appdata\local\microsoft\teams\update”
# Consider error handling for uninstall process (not shown here)
try {
Start-Process -FilePath $uninstallString -ArgumentList “–uninstall” -Wait -Verb RunAsAdministrator
} catch {
}

# Remove the Teams uninstall key (use with caution)
Remove-Item -Path “registry::HKEY_USERS\$($item.SID)\Software\Microsoft\Windows\CurrentVersion\Uninstall\$($teamsKey.PSName)” -Recurse}
}

} # Unload ntuser.dat
IF ($item.SID -in $UnloadedHives.SID) {
[gc]::Collect()
reg unload HKU\$($item.SID) | Out-Null
}
}

################## Remove Teams where Regkey doesn’t exist #############################

 

$userProfiles = Get-ChildItem -Path “C:\Users” -Directory -Exclude Default,Public
# Loop through each user profile
foreach ($profile in $userProfiles) {
# Check if Teams executable exists
$teamsPath = Join-Path -Path $profile.FullName -ChildPath “AppData\Local\Microsoft\Teams\current\Teams.exe”
if (Test-Path $teamsPath) {
# Get the installed version
$installedVersion = (Get-ItemProperty $teamsPath).VersionInfo.FileVersion

# Check version – inform about outdated and above versions
if ($installedVersion -lt $minVersion) {
Write-Host “Outdated Teams version found in $($profile): $installedVersion”
# Uninstall Teams (requires admin privileges)
Remove-Item -Path $teamsPath -Recurse -Force -ErrorAction SilentlyContinue
if ($?) {
Write-Host “Uninstalled Teams from $profile successfully.”
} else {
Write-Host “Failed to uninstall Teams from $profile.”
}
} else {
Write-Host “Teams version in $profile ($installedVersion) is above or meets the minimum requirement.”
}
}
}

Please see below steps to implement the remediation script using Microsoft Intune:

  1. Copy the Script code above into Notepad and save as a PowerShell file (TeamsUpdate.ps1)
  2.  In Microsoft Intune,
    • Navigate to the Devices blade,
    • Select Scripts and remediations,
    • Select the Platform scripts tab
Figure 2: Step 2 Navigating to Platform scripts
Figure 2: Step 2 Navigating to Platform scripts

3. Select Add/Create to create a new script, select Windows 10 and later

Figure 3: Step 3 Adding a Platform script
Figure 3: Step 3 Adding a Platform script

4. Enter Name and Description for script

Figure 4: Step 4 Configuring the Platform script
Figure 4: Step 4 Configuring the Platform script

5. Under script settings:

    • Upload the script
    • Set “Run this script using the logged-on credentials” to No
    • Set “Enforce script signature check” to No
    • Set “Run script in 64bit PowerShell Host” to Yes
Figure 5: Step 5 Configuring the Platform script
Figure 5: Step 5 Configuring the Platform script

6. On next screen, Assign the script to the All devices group

Figure 6: Step 6 Assigning the Platform script
Figure 6: Step 6 Assigning the Platform script

7. Save

By BUI SecOps Principal Technical Consultant, Terryanne du Toit and BUI SecOps Technical Consultant, Danie Miller.

Copilot for Microsoft 365: It’s got lots of friends

In Part 4 of our Copilot for Microsoft 365 spotlight series, Cloud Security Architect Neil du Plessis highlights neighbouring technologies, including Copilot for Azure and Copilot for Sales.

By Neil du Plessis | Cloud Security Architect, BUI

The artificial intelligence that powers Copilot for Microsoft 365 is also used in neighbouring Microsoft technologies for the modern workplace. Copilot for Azure, Copilot for Sales, Copilot for Service, Microsoft Copilot Studio, and Microsoft Copilot for Security are either coming soon or already available to Business and Enterprise customers. Let’s take a closer look at each one.

1. Copilot for Azure

Microsoft describes Copilot for Azure as an AI-powered assistant that simplifies the design, operation, optimisation, and troubleshooting of applications and infrastructure within the Azure ecosystem. It utilises Large Language Models, the Azure control plane, and insights about your Azure and Azure Arc-enabled assets to help you streamline cloud orchestration and management.

Highlights: Copilot for Azure can help you design and develop your cloud applications, choose the best frameworks, languages, and tools, and test and debug your code. It can also help you deploy and manage your applications by providing automation, scalability, and monitoring. In addition, Copilot for Azure can recommend ways to optimise costs and improve security and compliance in your environment.

Availability: Copilot for Azure is currently in preview, and existing Azure customers and Microsoft Partners can apply to participate. If you’re interested, review the registration process before filling in the application form.

2. Copilot for Sales

Copilot for Sales is designed to help your sales teams boost productivity, improve customer engagements, and close more deals. It takes the foundational capabilities of Copilot for Microsoft 365 and enhances them by connecting to customer relationship management platforms (like Microsoft Dynamics 365 Sales and Salesforce Sales Cloud) and providing sales teams with relevant in-app insights and recommendations to enhance customer interactions.

Highlights: According to Microsoft, Copilot for Sales empowers your sellers to simplify daily tasks, personalise customer interactions, and streamline workflows. From drafting emails in Outlook and setting up meetings in Teams to creating pitch decks in PowerPoint and data visualisations in Excel, Copilot for Sales is geared to help sales teams accomplish more in less time with AI-powered communication, content, and CRM activities.

Availability: Copilot for Sales is available now for $50 per user per month, which includes the requisite Copilot for Microsoft 365 licence. If you already have Copilot for Microsoft 365 (via your Office 365 E3, Office 365 E5, Microsoft 365 E3, Microsoft 365 E5, Microsoft 365 Business Standard, or Microsoft 365 Business Premium subscription), then you can get Copilot for Sales for an additional $20 per user per month. The Copilot for Sales pricing guide has further details, terms, and conditions.

3. Copilot for Service

Copilot for Service applies artificial intelligence to your call centre operations to help your customer service and support teams handle customer interactions more efficiently. Copilot for Service brings together all relevant content from your CRM platforms, websites, SharePoint sites, and third-party knowledge bases (like Salesforce, ServiceNow, and Zendesk) and puts it at your agents’ fingertips through conversational AI.

Highlights: Your customer service and support teams can enter natural language prompts and Copilot for Service will generate answers based on your organisational content – from call centre playbooks and user manuals to customer records and case histories in your CRM tools. Your agents can do this in their flow of work during real-time engagements with customers to handle queries faster, resolve issues earlier, and improve customer satisfaction over time.

Availability: Copilot for Service is available now for $50 per user per month, which includes the requisite Copilot for Microsoft 365 licence. If you already have Copilot for Microsoft 365 (via your Office 365 E3, Office 365 E5, Microsoft 365 E3, Microsoft 365 E5, Microsoft 365 Business Standard, or Microsoft 365 Business Premium subscription), then you can get Copilot for Service for an additional $20 per user per month. The Copilot for Service pricing guide has further details, terms, and conditions.

4. Microsoft Copilot Studio

Unveiled by Microsoft at the 2023 Microsoft Ignite conference, Microsoft Copilot Studio is a low-code tool that enables you to tailor Copilot for Microsoft 365 and build your own AI-driven copilots by leveraging conversational features like custom GPTs and generative AI plugins.

Highlights: With Microsoft Copilot Studio, you’re able to personalise Copilot for Microsoft 365 according to your business needs. You can develop, test, and publish standalone copilots and regulate and secure them with the appropriate permissions, data access, and user controls. You can also see the end-to-end lifecycle of your customisations and standalone copilots in one place, which makes building, deploying, managing, and analysing them easier and simpler. In addition, you can use Microsoft Copilot Studio to link Copilot to other data sources to access any system of record, including SAP, ServiceNow, and Workday.

Availability: Microsoft Copilot Studio is available now, and the integration with Copilot for Microsoft 365 is currently in public preview. The Microsoft Copilot Studio website has further details, terms, and conditions.

5. Microsoft Copilot for Security

Microsoft Copilot for Security was also announced at the 2023 Microsoft Ignite conference, where Microsoft explained it as an AI-powered cybersecurity product that “enables security professionals to respond to cyberthreats quickly, process signals at machine speed, and assess risk exposure in minutes”.

Highlights: Microsoft Copilot for Security combines an advanced Large Language Model with a security-specific model informed by Microsoft’s unique global threat intelligence and more than 65 trillion daily signals. The result is a sophisticated, security-focused AI assistant that can provide actionable responses to your natural language questions. These responses can be in the form of text, code, or a visual that helps you understand the full context of a security incident, its impact, and the next steps you should take for remediation and defence hardening.

Availability: Microsoft Copilot for Security is currently in private preview through an invitation-only Early Access Programme for customers and Microsoft Partners. BUI is participating in the Microsoft Copilot for Security Partner Private Preview, and is working with Microsoft product teams to help shape product development. Learn more in our news update.

With Copilot for Azure, Copilot for Sales, Copilot for Service, Microsoft Copilot Studio, and Microsoft Copilot for Security, Microsoft is expanding its range of AI-powered technologies to help you streamline cloud orchestration and management, boost sales productivity, improve customer service, spur innovation, and secure your data and resources. The sooner you start exploring these tools, the sooner you’ll be ready to empower your teams for even greater success.

BUI Cloud Security Architect Neil du Plessis is a certified CISSP and Microsoft Cybersecurity Expert specialising in holistic, cloud-powered defences for modern workplaces.

Wondering if Copilot for Microsoft 365 is right for your organisation? Join the BUI team for an interactive workshop and we’ll assess your Copilot for Microsoft 365 readiness and define a road map for your adoption journey. The workshop is conducted virtually, and is suitable for senior business development managers, line-of-business leaders, managers, technical decision-makers, and end-users. Register your interest by completing this digital form and we’ll contact you directly.