Why grAwareness

In today’s digital landscape, your employees are one of the delicate links against cyberattacks. The strength of employee’s cybersecurity awareness could be the decisive point of a successful defence or the weakness exposed to a hack. That’s why comprehensive cybersecurity awareness training is essential for organizations of all sizes. Our turnkey training and assessment platform gives you the tools to transform your workforce into a powerful security asset.

Phishing Simulation 

Provide your employees with realistic phishing email simulations to test your organization’s security awareness and preparedness. Our service delivers customized phishing campaigns that mimic real-world threats, allowing you to assess user susceptibility and identify knowledge gaps for targeted security training. Detailed reporting helps you track progress and measure the effectiveness of your anti-phishing efforts over time.

Cybersecurity Awareness Training Platform

Equip your employees to defend against cyber threats with our interactive online training. Customizable modules cover security best practices, from phishing identification to data handling. Regular assessments track knowledge retention, allowing you to target areas needing improvement. Strengthen your organization’s security posture by empowering staff to recognize and mitigate cyber risks.

Modularized Training Program

Depending on the needs of our clients, the training theme and contents could be selected for specific business needs. Cybersecurity is very wide in scope and topics, often overwhelming for novices. Our training delivery could be tuned and focused for specific localization, industrial or compliance needs, allowing for modularized, digestible lessons that could be taken at agreeable pace.

Focus on Localization

Cyberthreat awareness and phishing techniques, while generic, are also tuned by hackers for the intended targets. Green Radar, with its local presence and make it our specialty to tackle local threats, is best positioned to deliver these trainings with local flare, making it far more relatable to the local context. Thus ensuring that our trainees are ready to apply their awareness knowledge in everyday situations.

Locally Focused Training

Localized brands and messages are increasingly used to gain trust from the users. Our cyberthreat awareness training make use of timely and localized brands and messages to ensure our users are educated for them. Language selection in Chinese & English enhance the overall experience and ease of digestion.

Continuous Training and Monitoring

We continuously engage our clients to monitor and improve weaknesses over time. Our training program reflects on known shortcomings and improve them, while introducing new attack behaviour to brace them for what is to come.

 

       Preview: Cybersecurity Awareness Training Content      

Identifying and Strengthening the Weakest Link!

In order to identify potential shortcomings in cybersecurity awareness, Green Radar offers a specialized phishing vulnerability assessment service for our clients. This exercie is essentially a phishing simulation campaign to gauge your employees’ susceptibility to real-world attacks.

You’ll receive detailed report that pinpoints areas of weakness, along with customized recommendations for bolstering your defence. Armed with these insights, you can optimize your training program and deploy targeted interventions to plug the gaps.

We take great care in executing precise and effective phishing simulation campaigns:

 

Targeted Users Execution
Individuals, Departments, Interest Groups, All Staff etc Timely and coordinated execution with the team for best results

 

Sending Source    Entrapment Levels
Familiar, trusted, obligatory, internal or external etc Depth of the Response indicates the seriousness of the breach

 

Categories & Content Response Designs
Must be local, timely, in context and relevant to the intended recipient Click on hyperlinks; attachment, login or responding to the email etc

 

Maximize Your Security Posture

Cybersecurity awareness isn’t just a “nice-to-have” – it’s a strategic imperative. By investing in your employees’ security skills, you can:

 

Reduce the risk of successful phishing, malware, and data breaches

Strengthen your overall security posture and compliance

 

Foster a culture of cyber-vigilance across your organization Avoid financial and reputational damages from cyber attacks

Cybersecurity Awareness is a Continuous Exercise

 

 

 

Partner with us to transform your workforce into your strongest security asset. Get in touch to learn more about our cybersecurity awareness training and phishing assessment solutions today!

 

 

Source: Continuous training on cybersecurity awareness

Key takeaways:

  • Cloud backup is essential for data resilience. It ensures recovery when data is lost, corrupted, or unavailable due to outages or attacks.
  • Native tools aren’t enough. Azure, AWS, and Google offer built‑in protection but may limit portability and cross‑platform recovery.
  • Plan before deployment. Define where backups are stored, how quickly they can be recovered, and what costs apply to data transfers and testing.
  • Follow the 3‑2‑1‑1‑0 rule. Keep multiple copies in different locations, with at least one immutable and air‑gapped copy to prevent tampering.
  • Test regularly. Verify backup integrity and recovery speed to ensure readiness when an outage or ransomware event occurs.

The cloud has become an essential infrastructure for IT teams due to its ease and speed of deployment. It is an ideal platform for deploying servers, modernizing workloads, and reducing vulnerabilities with current software. However, the perception of increased security and cost savings isn’t always accurate. Just like on-premises infrastructure, security is only as strong as the weakest link in your environment. While cost savings can be achieved through committed usage, these commitments should be carefully reviewed.

 

Why is cloud backup important? Data stored in the cloud is just as vulnerable as data stored on‑premises. Misconfigurations, accidental deletions, and cyberattacks can all make critical information unavailable in seconds. Cloud backup isn’t optional anymore — it’s the foundation of business continuity. It ensures that when data is lost, compromised, or corrupted, you can recover quickly and keep operations running without disruption.

How To Plan Your Backups

Prior to kicking off backups of your cloud workloads, the following considerations should be reviewed with your team, leadership, and stakeholders, so everyone is on the same page and expectations are clear.

 

  • What native options do I have in my cloud environment? Azure, AWS, and Google all have tools to protect your workloads in their environment. But as the name states, it is native to the platform the workloads are deployed to. If you want to move to another platform, or if your platform is unavailable — then what? How do you move your data to another platform to run your systems? Leveraging the native tools is great for a quick protection plan, but not ideal for data freedom as technology advances. Moving the workload could mean complicated, costly, untimely, inefficient, potential loss of data or services.

 

  • What external options do I have? There are several solutions for protecting your cloud workloads that may require one or more models, depending on what you are trying to protect in the cloud. It is important to review the options and take into consideration what they protect. What are the options for recovery, and what costs are associated with data movement and growth?

 

  • Where do I place my backups? This is the most critical part of planning for cloud backups. Where can I place my data securely and cost-efficiently? How long does it take to send the backups to this location, and how long does it take to recover? Do I need additional services in my tenant, such as Express Route in Azure, to speed up data transfers? Are my backups being transferred in a secure manner? Do I send my backups to another cloud provider or on-prem — or both? These are all major considerations that have an impact on processes and budgets.

 

  • What are the costs associated with the backups? Sending data to the cloud is the easy and cheap part of the process. It’s the extraction of the data being backed up that causes the impact on budgeting. API calls, outbound data transfer, and possible delays can happen if stored in archive storage. Going through a pricing calculator or working with your partner to understand these costs and how to budget should be done before deploying any solution.

 

  • How do I ensure my backups are protected? Traditionally, repositories have been straightforward — with a storage appliance, network share, and tapes for offsite protection. Cloud repositories require more knowledge of the risks with cloud and knowing which settings need to be configured for immutability; encryption is enabled on the backup job, and security access is restricted. This is something Veeam addresses, while providing documentation for our users to ensure the settings meet best practices and that your backups are protected.
    Cloud Repository — Veeam Data Cloud Vault

 

  • How do I test my backups? Whether on-prem or cloud, backups should be tested to ensure integrity, functionality, and speed. With the cloud, there are more considerations when designing your test plans. Did you test in your production tenant? Subscription? Region? Do you have a designated clean room for testing? Do you restore to another cloud service or on-prem? What are the costs to perform a test for one system? All production? The entire environment? Are the tests scheduled, automated, or only ad hoc? What tools can be leveraged to test backups while reducing impact on budgets, resources, etc.

 

  • What other considerations exist for a cloud outage? If you are leveraging a private cloud, what documentation and visibility are the vendor providing to ensure SLAs are met? Is this defined in your contract? And if SLAs are not met, what are the consequences? The greatest question for clouds is: Will an outage impact the safety of others, revenue, or the survival of the business?

Best Practices for Backing Up Cloud Infrastructure

1. Establish Retention Policies and SLAs

 

 

2. Follow 3-2-1-1-0 rule: 3 copies, 2 different devices, 1 offsite, air-gapped, and immutable, securely restored

 

  • Having multiple copies of your data in more than one environment is critical to business continuity. Implementing a plan to leverage a service in the cloud, on-prem, off-site, and managed services will give you the confidence that your business can recover — no matter where it is stored and what outages by providers or your own infrastructure might occur.
  • In addition to multiple copies, we need to ensure that the data is protected by enabling encryption, immutability, and air-gapping logically and physically. This layer of protection reduces modifications attackers can make. When they gain access to an environment, the first place they are going to attack are your backups.
  • With AI usage increasing, attackers are finding it easier to bypass all these security configurations in place and exploit backups. This is why it’s critical to test and scan your backups prior to bringing them online. If not, the same or a new infection could be introduced and delay the recovery of your environment.

 

3. Business Continuity and Disaster Recovery Plans

Having a business continuity and disaster recovery plan is just as critical in the cloud as it is on-premises. Here is a guide on implementing these critical policies for your organization:

 

       Business Continuity & Disaster Recovery: Essential Planning Guide      

How Does Veeam Protect Cloud Workloads?

Veeam protects cloud workloads by providing a unified platform for backup, recovery, and data resilience across public, private, and hybrid environments. Since 2015, Veeam has expanded its cloud‑native capabilities to safeguard workloads running in Microsoft Azure, AWS, Google Cloud, and other platforms.

Veeam’s solutions create independent, immutable backups outside the production environment, ensuring data can be restored quickly if it’s lost, deleted, or compromised. Built‑in encryption, air‑gap support, and automated verification help prevent unauthorized access and confirm backup integrity.

Through centralized management, IT teams can monitor backup jobs, enforce retention policies, and perform granular or full‑system restores directly from the cloud. Integration with native cloud storage tiers allows flexible recovery options and cost‑efficient, long‑term data retention.

Veeam also supports cross‑cloud mobility, enabling organizations to move or recover workloads between cloud providers without vendor lock‑in. This flexibility ensures business continuity even during provider outages or regional disruptions.

Here are the links to our solutions to learn more about how they are implemented and work:

 

Hybrid Cloud Backup & Data Recovery Solution

Welcome to Veeam Data Cloud for Microsoft Azure – Veeam Data Cloud for Microsoft Azure

VDC for Azure

AWS Backup & Recovery Solutions | Veeam

Google Cloud Backup by Veeam: Secure & Fast

 

And more to come!

Cloud infrastructure is growing at a fast rate with all the changes in technology and the engineering that support it. Teams are smaller, and ease of management is becoming more of a demand than a “nice to have.” With more organizations turning to the cloud, it’s important to continue the same diligence as on-prem for protecting the data and systems. There are new considerations to ensure the data is protected, recoverable to other platforms, and cost-effective. Reviewing these questions and creating a plan prior to implementing a cloud solution will ensure the resilience of your applications and data, while protecting your business.

Take the Next Step Toward Cloud Resilience

Cloud adoption is accelerating, and every organization needs a clear, tested backup strategy to match that pace. Don’t wait until data loss or downtime force the conversation; plan it now.

Explore how Veeam Data Cloud simplifies backup management, strengthens security, and ensures fast recovery across Azure, AWS, and Google Cloud.

Start building resilience today

 

      Veeam Data Cloud      

 

Source: Cloud Backup: Why It’s Critical for Data Recovery and Business Resilience

Frequently Asked Questions

  • Why is cloud backup important for business continuity?

    Cloud backup ensures your data remains available even when systems fail, data is deleted, or ransomware strikes. It provides a secure, recoverable copy stored outside your production environment, helping you restore critical workloads quickly and keep business operations running without major disruption.

  • What is the 3‑2‑1‑1‑0 backup rule?

    The 3‑2‑1‑1‑0 rule means keeping three copies of data, on two different media types, with one copy off‑site, one immutable or air‑gapped, and zero backup errors, verified by testing. This strategy ensures resilience against accidental deletion, ransomware, or cloud outages.

  • How do I secure backups in the cloud?

    Use encryption, immutability, and strict access controls to protect cloud backups. Store them in separate accounts or regions, apply multi‑factor authentication, and monitor for unauthorized activity. Regularly test and verify backups to confirm data integrity and readiness for recovery.

The hyperconnected world has made it easier than ever for businesses and consumers to exchange documents, approve transactions, and complete critical financial workflows with just a click. Digital file sharing and electronic signature platforms used widely across banking, real estate, insurance, and everyday business operations, have become essential to how modern organizations move at speed. But that same convenience creates an opening for cyber criminals.

Email security researchers at Check Point have recently uncovered a phishing campaign where attackers impersonate file-sharing and e-signature services to deliver finance-themed lures that look like legitimate notifications.

In this incident, attackers sent over 40,000 phishing emails targeting roughly 6,100 customers over the past two weeks. All malicious links were funneled through https://url.za.m.mimecastprotect.com, increasing trust by mimicking familiar redirect flows.

How the campaign works

The attackers abused Mimecast’s secure-link rewriting feature, using it as a smokescreen to make their links appear safe and authenticated. Because Mimecast Protect is a trusted domain, this technique helps malicious URLs bypass both automated filters and user suspicion.

 

To boost credibility, the emails copied official service visuals (Microsoft and Office products logos), used service-style headers, footers, and “review Document” buttons, and spoofed display names such as “ X via SharePoint (Online) ”, “ eSignDoc via Y ”, and “ SharePoint ”, closely matching authentic notification patterns.

 

Related Variant: DocuSign-Style Phishing Using a Different Redirect Method

 

Alongside the large SharePoint/e-signing campaign, researchers also identified a smaller but related operation that imitates DocuSign notifications. Like the primary attack, it impersonates a trusted SaaS platform and leverages legitimate redirect infrastructure, but the technique used to mask the malicious destination differs significantly.

 

In the main campaign, the secondary redirect acts as an open redirect, leaving the final phishing URL visible in the query string despite being wrapped in trusted services. In the DocuSign-themed variant, the link moves through a Bitdefender GravityZone URL and then Intercom’s click-tracking service, with the true landing page fully hidden behind a tokenized redirect. This approach conceals the final URL entirely, making the DocuSign variant even more stealthy and harder to detect.

 

  • Image 1: Example of a phishing email CHECK POINT intercepted.
  • Image 2: Example of a phishing email from the DocuSign-style variant of the campaign.

Campaign Scale and Patterns

The campaign primarily targeted organizations across the U.S., Europe, Canada, APAC, and the Middle East, focusing heavily on consulting, technology, and construction/real estate sectors, with additional victims spanning healthcare, finance, manufacturing, media and marketing, transportation and logistics, energy, education, retail, hospitality and travel, and government. These sectors are attractive targets because they routinely exchange contracts, invoices, and other transactional documents, making file-sharing and e-signature impersonation lures highly convincing and more likely to succeed.

Data from Check Point’s Harmony Email telemetry shows that over 40,000 phishing emails targeting roughly 6,100 customers over the past two weeks. The campaign primarily targeted organizations across the U.S., Europe, Canada, APAC, and the Middle East. By region, the breakdown is as follows:

  • USA: 34,057
  • Europe: 4,525
  • Canada: 767
  • Asia: 346
  • Australia: 267
  • Middle East: 256

Note: Regional distribution reflects where customer data is hosted within our infrastructure and does not necessarily represent customers’ physical locations.

 

By industry, most affected customers operate in Consulting, Technology, and Construction/Real Estate, with additional representation across Healthcare, Finance, Manufacturing, Media/Marketing, Transportation/Logistics, Energy, Education, Retail, Hospitality/Travel, and Government. These sectors are likely targeted because they frequently exchange contracts, invoices, and other financial documents, making file-sharing and e-signature lures especially convincing.

Why It Matters

Now we’ve written about similar phishing campaigns in previous years, but what makes this attack unique is that it shows how easily attackers can imitate trusted file-sharing services to trick users and highlights the need for continued awareness, especially when emails include clickable links, suspicious sender details, or unusual email body content.

What organizations should do

Organizations and individuals must also take proactive steps to reduce their risk. A few ways to stay protected include:

 

  1. Always approach links embedded in emails with caution, especially when they appear unexpected or urgent.
  2. Pay close attention to email details such as mismatches between the display name and the actual sender address, inconsistencies in formatting, unusual font sizes, low-quality logos or images, and anything that feels out of place.
  3. Hover over links before clicking to inspect the real destination and ensure it matches the service that supposedly sent the message.
  4. Open the service yourself in the browser and search for the document directly, rather than using links provided in emails.
  5. Educate employees and teams regularly about emerging phishing techniques so they understand what suspicious patterns look like.
  6. Use security solutions such as email threat detection, anti phishing engines, URL filtering, and user reporting tools to strengthen overall protection.

Statement from Mimecast:

The attacker campaign described by Check Point exploited legitimate URL redirect services to obfuscate malicious links, not a Mimecast vulnerability. Attackers abused trusted infrastructure – including Mimecast’s URL rewriting service – to mask the true destination of phishing URLs. This is a common tactic where criminals leverage any recognized domain to evade detection.

 

Mimecast customers are not susceptible to this type of attack.  Mimecast’s detection engines identify and block these attacks. Our URL scanning capabilities automatically detect and block malicious URLs before delivery. After delivery, our URL rewriting service inspects links on click, providing an additional layer that catches threats even when they’re hidden behind legitimate redirect chains.

 

We continue to enhance our protections against evolving phishing techniques. Customers can review our analysis from 2024 of similar campaigns here: https://www.mimecast.com/threat-intelligence-hub/phishing-campaigns-using-re-written-links/ 

We appreciate Check Point sharing their findings through responsible disclosure.

 

 

Source:40,000 Phishing Emails Disguised as SharePoint and and e-Signing Services: A New Wave of Finance-Themed Scams

At Microsoft, we empower every organization to innovate—while helping people stay productive, protected, and prepared for what’s next. With over 430 million people1 using Microsoft 365 apps and more than 90% of Fortune 500 companies2 trusting Microsoft 365 Copilot, Microsoft’s committed to delivering secure, innovative solutions for an AI-powered future.

 

Today, Microsoft announces expanded availability of AI, security, and management capabilities coming to Microsoft 365 offerings in 2026. With these innovations, we will also update our commercial pricing for Microsoft 365 suite subscriptions effective July 1, 2026. We’re sharing these updates now to give customers ample time to plan.

Extending Value to More Customers

Organizations face an increasingly complex threat landscape, rising IT demands, and the urgent need for AI-powered transformation. To help customers meet these challenges head-on, Microsoft is enhancing Microsoft 365 offerings with additional security and management capabilities empowered by AI.

 

Bringing the Power of AI to Everyone in Your Organization

With the release of Microsoft 365 Copilot Chat, Microsoft delivered secure AI chat for work to all Microsoft 365 users. In September, Microsoft started rolling out Copilot Chat in Word, Excel, PowerPoint, Outlook, and OneNote, bringing a unified chat experience right into the flow of work.

 

At Microsoft Ignite 2025, Microsoft announced Copilot Chat will understand your inbox and calendar and include access to Agent Mode in chat and the Office apps, enabling you to work iteratively with Copilot to create high-quality documents, spreadsheets, and presentations.3 And IT administrators now have integrated, enterprise-grade controls to secure, manage, and measure Copilot Chat.

 

Protecting More Users Against Advanced Threats in Email and Microsoft Teams

Microsoft is adding the enhanced email security features of Microsoft Defender for Office 365 Plan 1 to Office 365 E3 and Microsoft 365 E3 to help more organizations detect and protect against phishing, malware, and malicious links across their email and collaboration platforms.

 

In addition, Microsoft includes URL checks in Office 365 E1, Business Basic, and Business Standard, which help protect against known, malicious websites when users click on links in email and Office apps.

Empowering IT Teams with Integrated Endpoint Management

Microsoft is bringing additional endpoint management features to Microsoft 365 E3 and Microsoft 365 E5 by adding capabilities that empower IT to solve issues faster, preemptively detect exposures, and keep devices productive. These features include Microsoft Intune Remote Help,  Intune Advanced Analytics, and Intune Plan 2.4

 

In addition, for Microsoft 365 E5 customers, Intune Endpoint Privilege Management, Enterprise Application Management, and Microsoft Cloud PKI will enable IT teams to safeguard AI use and strengthen security by mitigating risk, maintaining compliance, and delivering more secure user experiences.

Building Security Agents into Your Workflows

At Microsoft Ignite 2025, Microsoft announced that Security Copilot agents are built into the flow of work for security teams using Microsoft Defender, Entra, Intune, and Microsoft Purview. To help teams get started quickly and easily with more than 70 Microsoft and partner-built agents, Microsoft Security Copilot will be coming to all Microsoft 365 E5 customers.

 

Available today for existing Security Copilot customers with Microsoft 365 E5, Security Copilot will continue rolling out for all Microsoft 365 E5 customers in the upcoming months, with customers receiving a 30-day advanced notice before activation. 

 

These changes reflect Microsoft’s commitment to helping organizations of every size protect their people and data, streamline IT operations, and confidently embrace the future of work.

 

“The latest AI and security capabilities in Microsoft 365 demonstrate Microsoft’s sustained commitment to helping organizations stay ahead of the latest innovations and evolving threats.”

Dion Hinchcliffe, VP and Practice Lead, CIO, Futurum

New Capabilities Coming to Microsoft 365 Suites in 2026

To understand the full value of Microsoft BusinessOffice, and Enterprise suites, view the webpages for details. The table below summarizes the new capabilities that adding to the Microsoft 365 offerings.

 

 

Explore the full value of Business BasicBusiness StandardBusiness PremiumOffice 365 E1Office 365 E3Microsoft 365 E3, and Microsoft 365 E5. 

 

Updated Pricing

The following list price changes will go into effect on July 1, 2026.5

 

 

The changes will apply globally with local market adjustments for Microsoft commercial products, and nonprofit pricing will be adjusted in line with commercial pricing.6 In addition to commercial products, Microsoft today also announced changes to the Microsoft 365 Government Suites. Learn more in the Government blog.

 

Microsoft Commitment to Innovation

Microsoft is continuously investing and innovating our platform for the future. In the last year, Microsoft released more than 1,100 features across Microsoft 365, Security, Copilot, and SharePoint.7 Microsoft has enabled organizations to mitigate the risks of shadow AI through Cloud App Discovery, unlock more ways to collaborate in Microsoft Loop and Microsoft Clipchamp, reimagine hybrid work by coordinating where work happens with Microsoft Places, and improve business continuity with Windows Resiliency Initiative enhancements, including quick machine recovery and post-quantum security APIs.

 

Collectively these features have increased the value of our suites across security, productivity, and management. Microsoft is excited about what’s next—and will continue investing in ways to build a more secure, productive, and AI-powered future.

1. Microsoft FY25 Third Quarter Earnings Conference Call, Microsoft, April, 2025. 

2. Microsoft FY26 First Quarter Earnings Conference Call, Microsoft, October, 2025. 

3. Microsoft 365 Copilot Chat includes standard access to these new agents and Agent Mode and only uses web data and files referenced as part of the prompt when creating or refining content.

4. These features are also currently available as add-ons or part of the Intune Suite. 

5. These list prices are for the SKUs that include Microsoft Teams. You can also purchase suites without Teams which will also have an equivalent dollar value increase. List prices apply globally with local market adjustments for certain regions. Existing customers can reach out to their account executive or partner for more information. New customers can request a sales call to discuss plans with a product specialist. 

6. Nonprofit pricing will be adjusted in line with commercial pricing, as it is tied to commercial rates through a fixed percentage discount. 

7. Microsoft product release notes.

 

 

Source:Advancing Microsoft 365: New capabilities and pricing update

About “The Customer”

A global leader in industrial manufacturing, specializing in high-volume production of consumer goods and components. With operations spanning multiple continents.

Overview

To support its digital transformation journey, migrated its ERP and other mission-critical systems to Microsoft Azure, aiming to enhance agility, scalability, and security across its global IT infrastructure.

The Challenges | Unstructured Cloud Architecture & Scalability Barriers

  • Complex resource organization  

Lack of structured hierarchy in Azure led to difficulties in managing resources across departments and regions.

  • Inefficient access management

Inconsistent role assignments and manual access provisioning posed security risks and operational delays.

  • Limited visibility into cloud security posture

Without centralized monitoring, the company struggled to assess and respond to threats effectively.   

  • Manual, undocumented processes

Deployment and management relied heavily on manual steps, increasing the risk of errors and slowing down operations.

  • Scalability concerns

The unstructured cloud setup hindered the company’s ability to scale quickly for new projects or business units.

 

The Solutions | Azure Landing Zone: Structure & RBAC

SUPERHUB delivered a comprehensive Azure landing zone solution tailored to the company’s needs.

  • Structured Azure landing zone  

Designed and implemented a hierarchical structure using management groups, subscriptions, resource groups, and standardized naming conventions.

  • Role-Based Access Control (RBAC)

Configured RBAC policies to ensure secure, role-specific access across environments.

  • Microsoft Defender for Cloud

 Enabled advanced threat protection, vulnerability management, and compliance monitoring.

  • Azure Firewall

Deployed to enforce network-level security and control traffic flow between resources.

  • Documentation and training

Developed and delivered detailed operational guides, while conducting hands-on training for the company’s IT team.

  • End-to-end project delivery

Provided planning, design, implementation, configuration, testing, and formal handover with post-deployment support.

The Benefits | Secure and Scalable Cloud Transformation

The migration exceeded expectations in terms of security, scalability, and operational readiness.

  • Customized Azure Environment

 A secure, scalable, and manageable Azure environment was built, perfectly aligned with specific business needs and operational demands.

  • Enhanced Security Posture

 The security posture was enhanced through RBAC, Microsoft Defender for Cloud, and Azure Firewall, forming a more robust cloud security defense.

  • Improved Operational Efficiency

Operational efficiency was improved via automated policies, resource tagging, and industry best practices, reducing manual workload for the IT team.

  • Security & Compliance Control

 Full visibility and strict control over security incidents and policy compliance were achieved, ensuring the cloud environment meets regulatory requirements.

  • Future-Ready Infrastructure

A future-ready cloud infrastructure was established, effectively supporting ongoing innovation and business expansion plans.

  • Docs & Training Support

 Comprehensive documentation and targeted training were provided, ensuring smooth operation and management of the cloud system.

“With SUPERHUB’s expertise, we transformed our Azure environment into a secure, scalable, and well-managed foundation for our business. The structured landing zone and advanced security controls have given us confidence to migrate and operate our mission-critical systems in the cloud. Our IT team now spends less time on manual administration and more time driving innovation. We’re ready for future growth, knowing our cloud infrastructure is robust and compliant with industry best practices.”

From confidential business strategies to client data and financial reports, meetings often carry highly sensitive conversations. Preventing this content from being shared outside the organization has always been a challenge. Just one screenshot or unauthorized screen recording can open the door to data leaks, compliance violations, and reputational damage.

 

To address this risk, Microsoft Teams is now introducing a screen capture block for meetings. This powerful feature ensures that screenshots or screen recordings during meetings cannot be taken without permission, keeping sensitive information secure. Let’s take a closer look at how this update is set to change the game!

How Screen Capture Block Works in Microsoft Teams Meetings?

The Prevent Screen Capture feature in Teams meetings safeguards sensitive content by blocking screenshots and screen recordings across supported platforms. This capability is part of Microsoft Teams Premium and is not governed by meeting policy.

It restricts screen capture using both native device tools and most third-party apps, making it far more difficult for attendees to copy or share visual content. As this feature limits access to visual meeting content, it may also affect how users access, export, capture, delete, or retain personal data shared during meetings (GDPR Data Subject Rights).

 

To ensure confidentiality across different devices, the feature applies platform-specific protections, such as:

  • Windows desktop: Any attempt to capture will result in a screenshot showing a black screen over the meeting window and pop-outs.
  • Mac desktop: Captured content leaves no trace, with both the window and pop-outs completely hidden.
  • Android devices: When users attempt to take a screenshot or screen recording, a ‘screen capture restricted’ message appears. The protection also covers stage, chat, participant list, notes, banners, Copilot panels, and more.
  • iOS devices: Screenshots and screen recordings are permitted, but live video like participant feeds is replaced with profile pictures or static content. Further protections for additional screens are planned in future updates.

 

Note: Attendees on unsupported platforms will join meetings in audio-only mode without visual access.

How to Enable Prevent Screen Capture in Teams Meetings?

By default, this feature is off and must be enabled per meeting by organizers or co-organizers. After creating the meeting, organizers can enable it via Meeting Options using the path:

 

Meeting Options → Advanced Protection → Prevent Screen Capture toggle

 

Rollout Timeline for Prevent Screen Capture Feature in Microsoft Teams

The targeted release of the new screen capture block in Teams meetings will start in mid-September 2025 and is expected to finish by late September 2025. Then, the worldwide general availability rollout will begin in mid-October 2025 and complete by late October 2025.

What Actions Should Admins Take?

  • Educate stakeholders: Inform meeting organizers as well as security and compliance teams about the feature’s purpose, and guide them on how to enable it via Meeting Options.
  • Prepare and govern: Manage Teams Premium licensing to ensure the feature is available to the right users. Additionally, review and update internal documentation and policies for Teams Premium usage.
  • Enforce device enrollment: Use Entra ID group membership to make sure devices are Intune-enrolled and compliant with screen capture prevention requirements.

 

With this update, Microsoft Teams makes a significant move to reduce one of the biggest risks in virtual meetings. However, risks like photos taken with external devices still exist. To ensure confidentiality, deploy key Teams meeting configurations such as restricting anonymous access, limiting external participants, and other security settings to safeguard meetings.

At Microsoft, Microsof believe that collaboration tools are essential to modern productivity. Microsoft Teams has become a cornerstone of how organizations connect, communicate, and get work done. At the same time, Microsof recognize the importance of customer choice and interoperability in a dynamic and competitive digital landscape, as well as our responsibility to work productively with regulators on issues of global or regional concern.

 

In keeping with these values and responsibilities Microsoft recently finalized an agreement with the European Commission (Microsoft’s “Commitments”) in which Microsof will expand interoperability and data portability resources, and make additional changes to licensing and pricing for Microsoft 365, Office 365, and Microsoft Teams. These changes are designed to enhance flexibility, support open ecosystems, and give customers more options to meet their unique needs.

Commitments to interoperability and data portability

Microsoft has long supported a vibrant partner ecosystem, and Microsof continue to enable third-party solutions to integrate with our productivity apps.

Microsoft’s Commitments formalize and advance our dedication to Microsoft 365 interoperability. Microsoft will maintain our add-in model, allowing communication and collaboration solution providers to access Microsoft 365 and Teams in the same ways as other software development companies that provide add-ins to Microsoft 365 and Teams. Microsoft will maintain the AppSource marketplace as a distribution channel for these add-ins. In addition, to better serve our shared customers, Microsoft will continue to enable other solution providers to embed Microsoft’s Office Web Applications directly within their own solutions through the Microsoft Document Collaboration Partner Program (MDCPP).

 

Microsof also believe that customers should have full control over their data. Microsoft has committed to make available APIs that enable access to customer data from Microsoft Entra ID, Microsoft Exchange Online, Microsoft SharePoint Online, and Microsoft OneDrive that is effectively equivalent to what Teams accesses from these services. Microsoft is also providing APIs and tools to help customers export their information from Microsoft Teams for use in other communication and collaboration solutions if desired. Customers can now access APIs for Teams data migration, and small businesses and end users can use our Teams data export tool, at no additional cost.

 

To further support these interoperability and data portability commitments, Microsof will be launching a centralized developer resource site in the coming weeks that consolidates these interoperability resources and provides ways for software development companies to provide feedback and seek support. Microsoft has committed to maintaining these resources over time.

 

Customers and software development companies can learn more about the full scope of Microsoft’s Commitments related to interoperability and data portability by referring to the text of the Commitments.

Added flexibility in licensing and pricing

Microsof are also introducing several additional changes to our licensing and pricing structure to comply with our Commitments while remaining focused on customer needs. These changes will take effect on November 1, 2025.

First, new customers worldwide will once again be able to purchase Microsoft 365 and Office 365 Enterprise suites that include Teams. This will maximize available options, as customers will be able to choose from the full lineup of Microsoft 365 and Office 365 suites with Teams or opt for suites without Teams—on their own or paired with other collaboration solutions.

Second, the Commitments require the establishment of the following price deltas between Microsoft 365 and Office 365 suites with Teams and those without, and the maintenance of Teams standalone pricing at or above the required delta for each segment:

SKUNew Price (from Nov 1, 2025)
YY / Yearly price per seat
Office 365 E1$936
Office 365 E1 (no Teams)$637
Office 365 E3$2,153
Office 365 E3 (no Teams)$1,358
Office 365 E5 (w/o Audio Conf.)$3,557
Office 365 E5 (no Teams, w/o Audio Conf.)$2,762
Microsoft 365 E3$3,370
Microsoft 365 E3 (no Teams)$2,574
Microsoft 365 E5 (w/o Audio Conf.)$5,336
Microsoft 365 E5 (no Teams, w/o Audio Conf.)$4,540
Microsoft Teams Enterprise$805

“*Note: Exact price deltas in other currencies (including USD and Euro) may fluctuate over time due to changes in foreign exchange rates. Final HKD delta amounts may be adjusted based on the exchange rate from EUR as of November 1, 2025.”

As noted above, Microsoft already offers versions of our business and enterprise productivity suites without Teams as well as versions of our Teams service standalone worldwide. Microsoft will adjust the prices for those products, in accordance with the requirements of the Commitments. Microsof will roll out these pricing changes to customers globally, effective November 1, 2025. Globally consistent licensing helps ensure clarity for customers and streamline decision making and negotiations.

 

Finally, Microsoft’s agreement with the European Commission provides two additional guarantees for customers in the European Economic Area (EEA):

1.  EEA customers on multi-year contracts will be able to transition from suites with Teams to the corresponding suites without Teams at their annual order period for the next five years. Customers who switch at their annual order period will pay the current suite price without Teams, maintaining their previous percentage discount, for the rest of the their agreement term.

2. Any discounts offered by Microsoft to EEA customers on suites that include Teams will also be applicable to suites without Teams, at the same percentage rate.

 

While Microsoft will enable partners to offer the same guarantees on transitions and discounts, each partner may choose whether or not to provide them.

Learn more

At Microsoft, Microsof are committed to empowering organizations with collaboration tools that enhance productivity while safeguarding customer choice and an open ecosystem for partners. These changes reflect our continued efforts to foster innovation while working constructively with regulators. For more information, please contact your Microsoft account team or partner representative.

 

 

Read through Microsoft’s Commitments for more information

 

Source: Evolving our productivity offerings to resolve Microsoft Teams concerns| Microsoft 365 Blog

About “The Customer”

Globally recognized retail and character licensing brand with an extensive portfolio of popular characters and lifestyle products, distributed across Asia and worldwide. It operates a complex ecosystem including retail operations, e-commerce platforms, and partner networks—all dependent on robust security and always-on digital infrastructure. 

Overview

It needed to align its IT security posture with the global cybersecurity and compliance standards set by its parent company. While its existing IT systems were stable and well-supported, several security governance and control gaps were identified in a recent audit.

The Challenges | Aligning with Global Parent Standards and Closing Audit

The need to meet the parent company’s global security standards, paired with audit-discovered vulnerabilities, posed risks to brand trust, data integrity, and operational continuity. Key challenges included.

  • Unified Identity 

Lack of unified identity and access management to control user permissions and authentication.

  • Inconsistent Endpoint & Device Governance

Inconsistent endpoint and device management, with varying security configurations.

  • Insufficient Incident Response Readiness

Limited documentation and readiness for incident response and recovery processes.

  • Data Leakage Risks

Exposure to phishing and data leakage risks due to insufficient user awareness and email protection.

The Solutions | Phased Security Modernization (NIST CSF) – Infrastructure & Security Enhancement

SUPERHUB delivered a comprehensive security modernization program designed around international best practices such as NIST Cybersecurity Framework (CSF).

  • Infrastructure Upgrade and Foundation Strengthening

SUPERHUB carried out a full infrastructure upgrade, including new server deployment, storage setup, and system migration. This ensured performance, reliability, and readiness for the next stages of security implementation.

  • Email and Data Protection 

Deployed Check Point Harmony Email Security to safeguard against phishing, malware, and data leakage threats.

  • Security Awareness Training

Conducted GreenRadar phishing simulation and user awareness programs to enhance employee vigilance.

  • Vulnerability Assessment

Performed internal and external vulnerability assessments to identify risks and prioritize remediation.

  • Server Backup and Data Resilience

Implemented SuperVault Backup for secure, scalable, and compliant server data protection.

  • Microsoft 365 Policy and Access Management

SUPERHUB reviewed and enhanced Microsoft 365 security policies, focusing on identity protection, access control, and device compliance. This included planning for Entra ID and Intune integration to strengthen governance and endpoint security.

The Benefits | Boosting Cybersecurity & Resilient Data Protection

Through the phased engagement, the client achieved measurable improvements in both IT resilience and cybersecurity maturity. The collaboration with Superhub delivered the following key outcomes

  • Stronger Security Governance  

Established a structured cybersecurity framework aligned with global best practices, ensuring consistent compliance reporting and audit readiness.

  • Improved Infrastructure Reliability

The new server setup and system upgrades enhanced performance, uptime, and scalability across core operations.

  • Enhanced Threat Protection

Deployment of advanced email and data security significantly reduced exposure to phishing and malware attacks.

  • Increased Employee Awareness

Company-wide security awareness and phishing simulation training improved user vigilance and reporting of suspicious activity.

  • Resilient Data Protection

Centralized backup with SuperVault provided reliable recovery capabilities and reduced risks of data loss.

  • Operational Efficiency

Consolidated policy management through Microsoft 365 and planned integration of Entra ID and Intune strengthened identity and device governance.

 

 

Overall, the client reinforced its cyber resilience, operational stability, and audit compliance, maintaining business continuity and protecting brand trust across its regional operations.

 

 

About “The Customer”

A global leader in sustainable packaging design and production, delivering end-to-end brand packaging services including structural engineering and graphic design.

Overview

Legacy on-prem SAP caused scalability limits, high costs, weak disaster recovery, complex compliance, and poor real-time visibility.

The Challenges | High Costs and Disaster Recovery Gaps

The customer faced several operational and strategic challenges with its legacy SAP environment

  • Limited Agility & Scalability

Limited agility and scalability due to ageing hardware and rigid architecture.

  • High TCO

High operational costs and resource inefficiencies are driving up the total cost of ownership (TCO). 

  • Inadequate SAP DR & Availability

Inadequate disaster recovery and availability for mission-critical SAP workloads.

  • SAP Security & Compliance Issues

Security and compliance complexities across distributed SAP environments.

  • Lack of Real-Time System Visibility

Lack of real-time visibility into system performance and health hinders proactive management.

The Solutions | SAP Migration to Azure for Agility and Security

To address these challenges, SUPERHUB delivered a comprehensive SAP migration solution to Microsoft Azure

  • Custom Azure Architecture

Tailored Azure architecture featuring SAP-certified VMs, premium SSD storage, and secure network topology.

  • Data resilience/visibility

Implemented SuperVault 365 (cloud/offsite backup); used Nmap for network asset documentation. 

  • Phased Migration

Phased migration strategy ensuring minimal downtime and data integrity throughout the transition.

  • Boosted Security & Governance

Enhanced security and governance with role-based access control (RBAC), Azure Backup, and Azure Monitor.

  • Ongoing Optimisation

Ongoing optimisation services including performance tuning, cost management, and proactive security enhancements.

The Benefits | Cost Optimisation & Innovation Enablement

The migration to Azure unlocked significant business value

  • Scalability & Agility

On-demand compute and storage scaling supports dynamic SAP workload demands and business growth.

  • Improved Security

Enterprise-grade encryption, identity management, and compliance controls safeguard sensitive SAP data. 

  • High Availability & Resilience

Azure’s global infrastructure and backup capabilities ensure business continuity and disaster recovery.

  • Operational Efficiency

Automated monitoring and alerting reduce manual oversight and improve system reliability.

  • Cost Optimisation

Strategic use of Reserved Instances, pay-as-you-go models, and continuous cost tuning significantly lowered TCO.

  • Innovation Enablement

A modern, secure cloud platform empowers the organization to accelerate digital transformation and focus on core innovation.

“Migrating our SAP S/4HANA environment to Microsoft Azure with SUPERHUB’s expertise has transformed our business. We now enjoy greater agility, improved security, and significant cost savings, all while ensuring high availability for our mission-critical operations. This migration has empowered us to accelerate our digital transformation and focus on innovation. ”

Small and medium businesses (SMBs) are under pressure like never before. Cyber threats are evolving rapidly, and regulatory requirements are becoming increasingly complex. Microsoft 365 Business Premium is a productivity and security solution designed for SMBs (25–300 users). It includes Office apps, Teams, advanced security such as Microsoft Defender for Business, and device management — all in one cost-effective package.

 

Today, Microsoft is taking that a step further. They announced three new Microsoft 365 Business Premium add-ons designed to supercharge security and compliance. Tailored for medium-sized organizations, these add-ons bring enterprise-grade security, compliance, and identity protection to the Business Premium experience without the enterprise price tag.

 

Microsoft Defender Suite for Business Premium: US$10/user/month

Cyberattacks are becoming more complex. Attackers are getting smarter. Microsoft Defender Suite provides end-to-end security to safeguard your businesses from identity attacks, device threats, email phishing, and risky cloud apps. It enables SMBs to reduce risks, respond faster, and maintain a strong security posture without adding complexity. It includes:

 

 

Protect Your Business from Identity Threats:

Microsoft Entra ID P2 offers advanced security and governance features, including Microsoft Entra ID Protection and Microsoft Entra ID Governance. Microsoft Entra ID protection offers risk-based conditional access that helps block identity attacks in real time using behavioral analytics and signals from both user risk and sign-in risk. It also enables SMBs to detect, investigate, and remediate potential identity-based risks using sophisticated machine learning and anomaly detection capabilities. With detailed reports and alerts, your business is notified of suspicious user activities and sign-in attempts, including scenarios like a password-spray where attackers try to gain unauthorized access to company employee accounts by trying a small number of commonly used passwords across many different accounts. ID Governance capabilities are also included to help automate workflows and processes that give users access to resources. For example, IT admins historically manage the onboarding process manually and generate repetitive user access requests for Managers to review, which is time-consuming and inefficient. With ID Governance capabilities, pre-configured workflows facilitate the automation of employee onboarding, user access, and lifecycle management throughout their employment, streamlining the process and reducing onboarding time.

 

Microsoft Defender for Identity includes dedicated sensors and connectors for common identity elements that offer visibility into your unique identity landscape and provide detailed posture recommendations, robust detections and response actions. These powerful detections are then automatically enriched and correlated with data from other domains across Defender XDR for true incident-level visibility.

 

 

Keep Your Devices Safe:

Microsoft Defender for Endpoint Plan 2 offers industry-leading antimalware, cyberattack surface reduction, device-based conditional access, comprehensive endpoint detection and response (EDR), advanced hunting with support for custom detections, and attack surface reduction capabilities powered by Secure Score.

 

 

Secure Email and Collaboration:

With Microsoft Defender for Office 365 P2, you gain access to cyber-attack simulation training, which provides SMBs with a safe and controlled environment to simulate real-world cyber-attacks, helping to train employees in recognizing phishing attempts. Additionally, automated response capabilities and post-breach investigations help reduce the time and resources required to identify and remediate potential security breaches. Detailed reports are also available that capture information on employees’ URL clicks, internal and external email distribution, and more.

 

 

Protect Your Cloud Apps: 

Microsoft Defender for Cloud Apps is a comprehensive, AI-powered software-as-a-service (SaaS) security solution that enables IT teams to identify and manage shadow IT and ensure that only approved applications are used. It protects against sophisticated SaaS-based attacks, OAuth attacks, and risky interactions with generative AI apps by combining SaaS app discovery, security posture management, app-to-app protection, and integrated threat protection. IT teams can gain full visibility into their SaaS app landscape, understand the risks and set up controls to manage the apps. SaaS security posture management quickly identifies app misconfigurations and provides remediation actions to reduce the attack surface.

 

Microsoft Purview Suite for Business Premium: US$10/user/month

 

Protect Against Insider Threats

Microsoft Purview Insider Risk Management uses behavioral analytics to detect risky activities, like an employee downloading large volumes of files before leaving the company. Privacy is built in, so you can act early without breaking employee trust.

 

 

Protect Sensitive Data Wherever It Goes

Microsoft Purview Information Protection classifies and labels sensitive data, so the right protections follow the data wherever it goes. Think of it as a ‘security tag’ that stays attached to a document, whether it’s stored in OneDrive, shared in Teams, or emailed outside the company. Policies can be set based on the ‘tag’ to prevent data oversharing, ensuring sensitive files are only accessible to the right people.

Microsoft Purview Data Loss Prevention (DLP) works in the background to stop sensitive information, like credit card numbers or health data, from being accidentally shared with unauthorized people.

 

Microsoft Purview Message Encryption adds another layer by making sure email content stays private, even when sent outside the organization.

 

Microsoft Purview Customer Key gives organizations control of their own encryption keys, helping meet strict regulatory requirements.

 

 

Ensure Data Privacy and Compliant Communications

Microsoft Purview Communication Compliance monitors and flags inappropriate or risky communications to protect against policy and compliance violations.

 

 

Manage Information Through Its Lifecycle

Microsoft Purview Records and Data Lifecycle Management helps businesses meet compliance obligations by applying policies that enable automatic retention or deletion of data.

 

 

Stay Investigation-ready

Microsoft Purview eDiscovery (Premium) makes it easier to respond to internal investigations, legal holds, or compliance reviews. Instead of juggling multiple systems, you can search, place holds, and export information in one place — ensuring legal and compliance teams work efficiently.

 

Microsoft Purview Audit (Premium) provides deeper audit logs and analytics to trace activity like file access, email reads, or user actions. This level of detail is critical for incident response and forensic investigations, helping SMBs maintain regulatory readiness and customer trust.

 

Together, these capabilities help SMBs operate with the same level of compliance and data protection as large enterprises but simplified for smaller teams and tighter budgets.

 

Microsoft Defender and Purview Suites for Business Premium: US$15/user/month

The new Microsoft Defender and Purview Suites unite the full capabilities of Microsoft Defender and Purview into a single, cost-effective package. This all-in-one solution delivers comprehensive security, compliance, and data protection, while helping SMB customers unlock up to 68% savings compared to buying the products separately, making it easier than ever to safeguard your organization without compromising on features or budget.

 

 

Sources: Microsoft Security Community Blog

Frequently Asked Questions