How we help

What we do

Explore

Key takeaways from the Microsoft Digital Defence Report, written by Leon Godwin

We drew inspiration from the Churchill War Rooms to host our latest Security Briefing – a venue where strategic defence decisions once shaped our history, and now where security professionals learned from Cloud Direct and Microsoft about the new cyber landscape being shaped by AI-driven threats. 

To paraphrase Winston Churchill: “Never before in the field of digital defence has the security of so many relied so heavily on the vigilance of so few.” The battleground consists of intelligence, speed, and resilience, and adversaries are using AI-powered attacks to rapidly infiltrate and compromise organisations, faster than human-based defences can respond. 

From a day in the life of a modern CISO through attack simulations, to insights from Microsoft’s Aileen Finlay and concrete steps that you can take to adjust to the new threats, I’ll reflect on the event and share my take on the newly released Microsoft Digital Defence Report 2025. 

The reality on the ground

On 13 October, the UK government took the unprecedented step of sending a letter out to all UK businesses to highlight the significance of new cyber threats. The letter’s goal was to fundamentally reclassify cyber security from a technical operational task to a critical board-level imperative. By issuing a direct mandate, the government signaled that the intense and sophisticated nature of modern threats now constitutes a primary risk to national economic stability.  

The Microsoft Digital Defence Report 

The recent release of the Microsoft Digital Defence Report makes it clear why the UK government is so concerned, and why you should be too. 

The threat landscape isn’t just evolving – it’s accelerating. Attacks are more aggressive, more organised, and frankly, more relentless than ever. The UK is now ranked number two in the global index of countries most impacted by cyber threats. 

Defence Report takeaways for the Modern CISO 

One theme that kept coming up during the event was the “prevention versus response” paradigm, or what the military calls “Left of Bang” and “Right of Bang.” The Microsoft Digital Defence Report 2025 makes it clear; you can’t choose one over the other. You need both. 

Here’s a breakdown of the key findings of the report, and actions to take off the back of it.  

1. Identity is the Battleground 

Problem: Attackers aren’t only breaking in, they’re logging in. Identity compromise is still the number one entry point for ransomware and data theft, and it’s getting smarter. When you login to a computer you gate a token that is your permission to use that session for a period of time before you need to reauthenticate. Token theft and Adversary-in-the-Middle (AiTM) attacks are on the rise, bypassing traditional protections. Your traditional Multi-Factor Authentication (MFA) that secured you for many years is now simply not enough. 

Solution: Phishing-resistant MFA is the gold standard. 

Action: 

  • Audit your Entra ID environment today. 
  • Enforce phishing-resistant MFA for everyone, especially admins. 
  • Update legacy authentication protocols.

Impact: Phishing-resistant MFA blocks over 99% of unauthorised access attempts, according to the Microsoft report. If you do one thing this quarter, make it updating your systems from traditional MFA to phishing-resistant MFA. 

2. The Double-Edged Sword of AI 

Problem: AI isn’t just our friend, it’s the attacker’s too. They’re using it to craft convincing phishing lures, scale attacks, and even create deepfakes for fraud. 

Solution: We fight fire with fire. AI-driven defence can now contain breaches in seconds, suspending compromised accounts before a human is aware of an issue. This is helped further now that Microsoft Copilot has been bundled into the M365 E5 licenses, rather than an expensive bolt-on. 

Action: 

  • Put an AI governance framework in place. ISO 42001 is a great starting point.  
  • Deploy AI-powered tools like Copilot for Security, Microsoft Sentinel, and Defender XDR to automate detection and response. 
  • You already have access to the phishing simulations within your M365 subscriptions, you should increase the schedule to be at least weekly. 

Impact: Moving from reactive to proactive defence shrinks dwell time, improves awareness, and limits the blast radius of an attack. 

3. Cyber Risk is Business Risk 

Problem: Too often, security is treated as an IT issue. But as we see in the examination of real-world breaches, it doesn’t just impact systems. It’s effecting revenue, supply chains and reputation. In one case this resulted in liquidation of the business and termination of it’s 700 employees.  

Solution: Security needs a seat at the boardroom table. 

Action: 

  • Build reports with metrics that matter including, MFA coverage, patch latency, incident response times.  
  • Run tabletop roleplaying exercises so your executive team knows what to do when, not if, the breach happens. 

Impact: A resilient culture means the business keeps moving, even when attackers try to stop it. 

What you can do next 

The MDDR 2025 isn’t just a collection of scary stats, it’s a wake-up call. 

If you’re planning your 2026 roadmap and wondering how to prioritise (or fund) these improvements, let’s talk. We can help secure funding for assessments to pinpoint your weakest links and help provide guidance on your security journey.  

Don’t wait for the breach to happen. Build resilience now.

Sign up to one of our Security Innovation consultancy sessions. These sessions are designed to help you with your specific business challenges  

In 2025, the UK’s cyber resilience has been tested like never before. Major brands have made headlines after suffering disruptive cyberattacks, forcing them to halt operations and exposing sensitive customer data.

These incidents are not isolated. The UK government’s latest Cyber Security Breaches Survey reveals that 43 per cent of UK businesses experienced a cyber breach or attack in the past year, rising to 74 per cent among large organisations. Phishing remains the most prevalent and disruptive threat, and the financial and reputational costs are mounting. 

For IT decision makers, the message is clear: robust device management is no longer optional, it’s a strategic imperative. 

The evolving threat landscape

  • Identity is the new perimeter: With traditional network boundaries dissolving, user identities have become the frontline of defence. Almost all (97 per cent) identity hacks are password spray or brute force attacks. Despite headlines proclaiming more sophisticated attacks, the majority of identity-based attacks still target weak or reused passwords.

Why Traditional Approaches Fall Short 

Legacy Mobile Device Management (MDM) is no longer sufficient. The modern enterprise requires Unified Endpoint Management (UEM) and Unified Endpoint Security (UES) – these integrate antivirus, encryption, detection, and response into a single platform, ensuring consistent security across all devices and operating systems. 

How enhanced device management protects your organisation 

1. Limit identity breaches by adopting… 

  • Mandatory Multi-Factor Authentication (MFA): Enforce phishing resistant MFA across all devices to drastically reduce the risk of unauthorised access, even if passwords are compromised. 
  • Adaptive Access Policies: Integrate with Identity and Access Management (IAM) systems to trigger additional authentication or restrict access based on risk factors like device health, location, or user behaviour. 
  • Continuous Monitoring & Zero Trust: Leverage AI and machine learning to monitor for anomalies, enforce “never trust, always verify” principles, and detect compromised credentials before they’re exploited. 

2. Prevent data breaches with… 

  • Robust Encryption: Ensure data is encrypted both in transit and at rest, including full-disk encryption and protection for removable media. 
  • Data Loss Prevention (DLP): Flag, track, and control sensitive data to prevent unauthorised sharing or exposure. 
  • Remote Device Control: Instantly lock or wipe lost or stolen devices to prevent data leaks. 

Turning theory into practice 

Addressing Unmanaged Devices 

  • Device Discovery: Use tools like Microsoft Defender for Endpoint to identify all devices (managed and unmanaged) on your network. 
  • Onboarding: Bring unmanaged endpoints under management to close visibility gaps and reduce vulnerabilities. 

Leveraging Microsoft’s Ecosystem 

  • Microsoft 365 & Defender Suite: Deploy built-in MDM, DLP, and Conditional Access Policies for consistent, integrated security. 
  • Intune Security Baselines: Rapidly deploy recommended security configurations to all managed devices, addressing the root cause of most breaches – poor configuration. 

Navigating the Age of AI 

  • BYOAI Risks: With four in five AI users bringing their own tools to work, device management is essential for controlling application use and preventing data leakage using tools like Microsoft Defender for Cloud Apps.  
  • AI-Driven Security: Modern device management platforms use AI to predict threats, automate policy updates, and shift security from reactive to proactive. 

What next?

  1. Assess your current device management posture: Identify unmanaged devices, poor configurations, and BYOAI risks. 
  2. Adopt a unified, AI-powered device management strategy: Leverage Microsoft’s ecosystem and you’re existing M365 investment for comprehensive protection. 
  3. Don’t wait for a breach: Proactive action today is the best defence for tomorrow’s threats. 

Ready to strengthen your security posture?

The Microsoft Security Briefing: Data Defence and Governance

Join industry experts and peers to explore the latest strategies, tools, and real-world insights for protecting your organisation in today’s threat landscape.