Defended Solutions Blog
Identity Offboarding Checklist: How to Reduce Risk and Strengthen Governance Across Cloud, SaaS and AD
Identity offboarding is one of the simplest ways to reduce organisational risk, yet it is still one of the most common gaps we see inside large enterprises. Dormant accounts, unmanaged SaaS access and legacy credentials create pathways for attackers long after an employee has left. This guide explains why offboarding fails, the governance issues behind it, and the practical steps every organisation can take to build a secure and repeatable process.
The Louvre Heist: A Masterclass in the Security Basics We Still Get Wrong
The recent Louvre heist revealed that the museum’s surveillance system password was simply “Louvre.” It’s a stark reminder that even the most high-profile organisations can fall to basic security failures. In this article, we examine what really causes these incidents — risk blindness, process gaps, and lack of accountability — and outline the practical steps every organisation can take to strengthen governance, culture, and identity management across the cloud.
How to do a Data Protection Impact Assessment (DPIA) in 5 steps
How to do a DPIA in 5 simple steps.
How to Maintain Cloud Compliance When Migrating to the Cloud
Migrating to the cloud offers speed, scale, and innovation, but without a compliance-first strategy, it can put your business at serious risk. This guide walks through the essential steps to maintain security and regulatory compliance before, during, and after migration, so you can move to the cloud with confidence.
Understanding the Shared Responsibility Model in Cloud Security
The Shared Responsibility Model defines exactly where your cloud provider’s role ends and yours begins. Misunderstanding it is one of the most common and costly mistakes in cloud security.
Case Study: How a UK Software Supplier Halved a £6m Fine After a Major NHS Data Breach
A ransomware attack on a major NHS software provider led to widespread disruption and a £6 million regulatory fine. This case study breaks down what went wrong, how the company responded, and the key data protection lessons for commercial and regulated organisations alike.
What to Look for in a Cloud Security Partner
Choosing the right cloud security partner can make or break your cloud strategy. This post explains what to look for, and why it matters.
Cloud Security Posture Management (CSPM): A Critical Component of Modern Cloud Security
As businesses increasingly migrate their operations to the cloud, ensuring the security of these environments becomes paramount. Cloud Security Posture Management (CSPM) is a framework designed to address the complexities of securing cloud environments.
AWS Security Hub: What is it and how can you benefit?
If you business is based on AWS or Multi-Cloud then AWS Security Hub could benefit you. But what is it and how can it help, this blogs looks to give a high level view of its features and benefits.