{"id":14633,"date":"2025-05-29T08:00:00","date_gmt":"2025-05-29T08:00:00","guid":{"rendered":"https:\/\/intelliworx.co\/uk\/?p=14633"},"modified":"2025-07-14T02:28:35","modified_gmt":"2025-07-14T02:28:35","slug":"adopting-zero-trust-security-with-microsoft-365-a-guide-for-uk-businesses","status":"publish","type":"post","link":"https:\/\/intelliworx.co\/uk\/blog\/adopting-zero-trust-security-with-microsoft-365-a-guide-for-uk-businesses\/","title":{"rendered":"Adopting Zero Trust Security with Microsoft 365: A Guide for UK Businesses"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"14633\" class=\"elementor elementor-14633\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a15ba3 e-flex e-con-boxed e-con e-parent\" data-id=\"5a15ba3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5f2de5e elementor-widget elementor-widget-text-editor\" data-id=\"5f2de5e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW171384923 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW171384923 BCX8\">Cyber threats <\/span><span class=\"NormalTextRun SCXW171384923 BCX8\">aren\u2019t<\/span><span class=\"NormalTextRun SCXW171384923 BCX8\"> just knocking anymore; <\/span><span class=\"NormalTextRun SCXW171384923 BCX8\">they\u2019re<\/span><span class=\"NormalTextRun SCXW171384923 BCX8\"> already inside. For UK organisations, the old \u201ctrust but verify\u201d mindset is no longer enough. Zero Trust flips this on its head, treating everyone and everything as untrusted until proven otherwise. With <a href=\"https:\/\/intelliworx.co\/uk\/microsoft-365-consulting-services\/\">Microsoft 365<\/a>, <\/span><span class=\"NormalTextRun SCXW171384923 BCX8\">you\u2019ve<\/span><span class=\"NormalTextRun SCXW171384923 BCX8\"> already got the tools to strengthen your defences, protect sensitive data, and stay ahead of threats, without <\/span><span class=\"NormalTextRun SCXW171384923 BCX8\">starting from scratch<\/span><span class=\"NormalTextRun SCXW171384923 BCX8\">. This guide will help CISOs, IT admins, and compliance teams take smart, practical steps to adopt Zero Trust.<\/span><\/span><span class=\"EOP SCXW171384923 BCX8\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a88eb6e elementor-widget elementor-widget-heading\" data-id=\"a88eb6e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is Zero Trust Security?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cb7e3b2 elementor-widget elementor-widget-text-editor\" data-id=\"cb7e3b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Put simply, Zero Trust is about questioning everything \u2013 no blind trust allowed, and <\/span><b><span data-contrast=\"auto\">everyone and everything has to show they\u2019re above board<\/span><\/b><span data-contrast=\"auto\">. You verify every user and device, limit access to just what\u2019s needed, and spot dodgy activity early.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The heart of it? &#8220;Never trust, always verify.&#8221; It\u2019s a principle that speaks directly to CISOs, IT admins, and compliance teams running businesses across the UK \u2013 simple, clear, and built for tackling today\u2019s security challenges.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2875374 elementor-widget elementor-widget-heading\" data-id=\"2875374\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why Should UK Businesses Embrace Zero Trust? <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b769091 elementor-widget elementor-widget-image\" data-id=\"b769091\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"780\" height=\"305\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039; viewBox%3D&#039;0 0 1024 401&#039;%2F%3E\" class=\"attachment-large size-large wp-image-12787 ld-lazyload\" alt=\"\" data-src=\"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2024\/11\/iStock-2164198524-e1739512637670-1024x401.jpg\" data-srcset=\"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2024\/11\/iStock-2164198524-e1739512637670-1024x401.jpg 1024w, https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2024\/11\/iStock-2164198524-e1739512637670-300x118.jpg 300w, https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2024\/11\/iStock-2164198524-e1739512637670-768x301.jpg 768w, https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2024\/11\/iStock-2164198524-e1739512637670.jpg 1286w\" data-sizes=\"(max-width: 780px) 100vw, 780px\" data-aspect=\"2.5536159601\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a490581 elementor-widget elementor-widget-text-editor\" data-id=\"a490581\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW160375633 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW160375633 BCX8\">If your business is <\/span><span class=\"NormalTextRun SCXW160375633 BCX8\">operating<\/span><span class=\"NormalTextRun SCXW160375633 BCX8\"> in the UK, staying compliant <\/span><span class=\"NormalTextRun SCXW160375633 BCX8\">isn\u2019t<\/span><span class=\"NormalTextRun SCXW160375633 BCX8\"> a luxury; <\/span><span class=\"NormalTextRun SCXW160375633 BCX8\">it\u2019s<\/span><span class=\"NormalTextRun SCXW160375633 BCX8\"> a legal obligation. Adopting Zero Trust makes perfect sense for stronger security and <\/span><span class=\"NormalTextRun SCXW160375633 BCX8\">here\u2019s<\/span><span class=\"NormalTextRun SCXW160375633 BCX8\"> why:<\/span><\/span><span class=\"EOP SCXW160375633 BCX8\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c4096eb elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"c4096eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"remixicon ri-checkbox-blank-fill\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">GDPR compliance \u2013 Meet legal obligations with confidence. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"remixicon ri-checkbox-blank-fill\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Evolving cyber threats \u2013 Stay ahead of smarter attacks. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"remixicon ri-checkbox-blank-fill\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Beyond box-ticking \u2013 Actively reduce security risks. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"remixicon ri-checkbox-blank-fill\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Built-in advantage \u2013 Leverage Microsoft 365 for easy adoption. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"remixicon ri-checkbox-blank-fill\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Smart security \u2013 Practical, proactive, and sensible. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0cdc96b elementor-widget elementor-widget-text-editor\" data-id=\"0cdc96b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW128178315 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW128178315 BCX8\">For CISOs, IT admins, and compliance teams, Zero Trust provides clarity and control. Are you ready to unlock a smarter, safer way to safeguard your organisation?<\/span><\/span><span class=\"EOP SCXW128178315 BCX8\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40b99a2 elementor-widget elementor-widget-heading\" data-id=\"40b99a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Key Principles of Zero Trust Security <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8551f7d elementor-widget elementor-widget-text-editor\" data-id=\"8551f7d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW212430776 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW212430776 BCX8\">Here\u2019s<\/span><span class=\"NormalTextRun SCXW212430776 BCX8\"> what Zero Trust means for UK CISOs, IT admins, and compliance teams:<\/span><\/span><span class=\"EOP SCXW212430776 BCX8\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ac7792d elementor-widget elementor-widget-heading\" data-id=\"ac7792d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Always Verify  <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c594120 elementor-widget elementor-widget-text-editor\" data-id=\"c594120\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Every access request needs checking. Use signals like identity, location, and device health to ensure it\u2019s legitimate. Microsoft 365\u2019s Conditional Access simplifies this process.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Tip: <\/span><\/b><span data-contrast=\"auto\">Start with high-risk systems and expand verification as you go.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2136973 elementor-widget elementor-widget-heading\" data-id=\"2136973\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Minimise Permissions <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b742d35 elementor-widget elementor-widget-text-editor\" data-id=\"b742d35\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Only allow access to what\u2019s necessary. Tools like Role-Based Access Control (RBAC) and Privileged Identity Management (PIM) give IT admins precise control while keeping compliance teams happy.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Tip:<\/span><\/b><span data-contrast=\"auto\"> Review permissions regularly to keep them up to date.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c480950 elementor-widget elementor-widget-heading\" data-id=\"c480950\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Assume a Breach <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9d8792 elementor-widget elementor-widget-text-editor\" data-id=\"b9d8792\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Work as if a breach has already happened. Continuous monitoring in Microsoft 365 helps IT admins catch suspicious activity fast, reducing downtime and risk.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Tip:<\/span><\/b><span data-contrast=\"auto\"> Run breach simulations to sharpen your team\u2019s response.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-05fd345 elementor-widget elementor-widget-heading\" data-id=\"05fd345\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Configuration Steps for Zero Trust Using Microsoft 365 <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-268f664 elementor-widget elementor-widget-image\" data-id=\"268f664\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"780\" height=\"385\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039; viewBox%3D&#039;0 0 1024 505&#039;%2F%3E\" class=\"attachment-large size-large wp-image-12929 ld-lazyload\" alt=\"Business training, night planning and employees talking about corporate proposal on internet in dark office at night. African workers working on partnership on the web with computer during overtime\" data-src=\"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2024\/11\/iStock-1705796778-e1731321483679-1024x505.jpg\" data-srcset=\"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2024\/11\/iStock-1705796778-e1731321483679-1024x505.jpg 1024w, https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2024\/11\/iStock-1705796778-e1731321483679-300x148.jpg 300w, https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2024\/11\/iStock-1705796778-e1731321483679-1536x758.jpg 1536w, https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2024\/11\/iStock-1705796778-e1731321483679-2048x1010.jpg 2048w, https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2024\/11\/iStock-1705796778-e1731321483679-1200x590.jpg 1200w, https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2024\/11\/iStock-1705796778-e1731321483679-768x379.jpg 768w\" data-sizes=\"(max-width: 780px) 100vw, 780px\" data-aspect=\"2.02772277228\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bb848e9 elementor-widget elementor-widget-text-editor\" data-id=\"bb848e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW132306709 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW132306709 BCX8\">Let\u2019s<\/span><span class=\"NormalTextRun SCXW132306709 BCX8\"> dive into the practical steps for configuring Zero Trust within Microsoft 365.<\/span><\/span><span class=\"EOP SCXW132306709 BCX8\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-790c79e elementor-widget elementor-widget-heading\" data-id=\"790c79e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Step 1: Set Up Conditional Access <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f7dee3c elementor-widget elementor-widget-text-editor\" data-id=\"f7dee3c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW98305326 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW98305326 BCX8\">Think of this as your frontline defence. Conditional Access helps you create rules based on real-time risks.<\/span><\/span><span class=\"EOP SCXW98305326 BCX8\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-375284a elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"375284a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"remixicon ri-checkbox-blank-fill\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Define risky scenarios. Look out for things like logins from unknown locations or untrusted devices. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"remixicon ri-checkbox-blank-fill\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Use multi-factor authentication (MFA). This is your must-have to stop unauthorised access. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"remixicon ri-checkbox-blank-fill\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Go granular. Only allow access when devices are compliant or roles and apps fit specific rules. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25c4bbc elementor-widget elementor-widget-text-editor\" data-id=\"25c4bbc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW231952886 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW231952886 BCX8\"><strong>Why it matters:<\/strong> <\/span><\/span><span class=\"TextRun SCXW231952886 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW231952886 BCX8\">It\u2019s<\/span><span class=\"NormalTextRun SCXW231952886 BCX8\"> about getting the balance right between security and seamless user experience.<\/span><\/span><span class=\"EOP SCXW231952886 BCX8\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-305af24 elementor-widget elementor-widget-heading\" data-id=\"305af24\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Step 2: Utilise Identity Protection <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c43325 elementor-widget elementor-widget-text-editor\" data-id=\"3c43325\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW213696832 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW213696832 BCX8\">Identity threats are easier to handle when spotted early. Microsoft 365\u2019s Identity Protection <\/span><span class=\"NormalTextRun SCXW213696832 BCX8\">leverages<\/span><span class=\"NormalTextRun SCXW213696832 BCX8\"> machine learning to flag issues.<\/span><\/span><span class=\"EOP SCXW213696832 BCX8\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c8fe2e6 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"c8fe2e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"remixicon ri-checkbox-blank-fill\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Implement risk-based policies. Block, challenge, or monitor users when risks like compromised accounts or leaked credentials are detected. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"remixicon ri-checkbox-blank-fill\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Keep an eye on risks. Track user and sign-in activities to identify problems and automate responses. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59887ee elementor-widget elementor-widget-text-editor\" data-id=\"59887ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong><span class=\"TextRun SCXW61695459 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW61695459 BCX8\">Why it matters:<\/span><\/span><\/strong><span class=\"TextRun SCXW61695459 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW61695459 BCX8\"> Proactive monitoring saves time and reduces damage.<\/span><\/span><span class=\"EOP SCXW61695459 BCX8\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3017cc2 elementor-widget elementor-widget-heading\" data-id=\"3017cc2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Step 3: Implement Privileged Identity Management (PIM) <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8ead73c elementor-widget elementor-widget-text-editor\" data-id=\"8ead73c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW113812537 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW113812537 BCX8\">With PIM, you can control admin permissions smartly, avoiding the risks of permanent elevated access.<\/span><\/span><span class=\"EOP SCXW113812537 BCX8\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eca398d elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"eca398d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"remixicon ri-checkbox-blank-fill\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Just-in-time (JIT) access. Grant admin roles only when needed and revoke them automatically after use. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"remixicon ri-checkbox-blank-fill\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Approval workflows. Require justification and management approval for granting admin access. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a0d8470 elementor-widget elementor-widget-text-editor\" data-id=\"a0d8470\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong><span class=\"TextRun SCXW172954788 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW172954788 BCX8\">Why it matters:<\/span><\/span><\/strong><span class=\"TextRun SCXW172954788 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW172954788 BCX8\"> Limiting access reduces unnecessary vulnerabilities.<\/span><\/span><span class=\"EOP SCXW172954788 BCX8\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a60528 elementor-widget elementor-widget-heading\" data-id=\"8a60528\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Step 4: Secure Endpoint Devices <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59de463 elementor-widget elementor-widget-text-editor\" data-id=\"59de463\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW89924808 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW89924808 BCX8\">Zero Trust <\/span><span class=\"NormalTextRun SCXW89924808 BCX8\">isn\u2019t<\/span> <span class=\"NormalTextRun SCXW89924808 BCX8\">just about users<\/span><span class=\"NormalTextRun SCXW89924808 BCX8\">; <\/span><span class=\"NormalTextRun SCXW89924808 BCX8\">it\u2019s<\/span><span class=\"NormalTextRun SCXW89924808 BCX8\"> about devices too. Microsoft Endpoint Manager makes endpoint security straightforward.<\/span><\/span><span class=\"EOP SCXW89924808 BCX8\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a66cbb4 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"a66cbb4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"remixicon ri-checkbox-blank-fill\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Enforce device compliance. Allow access only when devices meet your security standards. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"remixicon ri-checkbox-blank-fill\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Use Intune. Configure rules for mobile devices to ensure they\u2019re properly secured. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ca9a1e1 elementor-widget elementor-widget-text-editor\" data-id=\"ca9a1e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong><span class=\"TextRun SCXW99583600 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW99583600 BCX8\">Why it matters: <\/span><\/span><\/strong><span class=\"TextRun SCXW99583600 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW99583600 BCX8\">If your devices <\/span><span class=\"NormalTextRun SCXW99583600 BCX8\">aren\u2019t<\/span><span class=\"NormalTextRun SCXW99583600 BCX8\"> secured, neither is your organisation.<\/span><\/span><span class=\"EOP SCXW99583600 BCX8\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c29b090 elementor-widget elementor-widget-heading\" data-id=\"c29b090\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Monitoring and Continuous Improvement <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b6e34b5 elementor-widget elementor-widget-image\" data-id=\"b6e34b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"780\" height=\"411\" src=\"data:image\/svg+xml;charset=utf-8,%3Csvg xmlns%3D&#039;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#039; viewBox%3D&#039;0 0 1024 540&#039;%2F%3E\" class=\"attachment-large size-large wp-image-10002 ld-lazyload\" alt=\"\" data-src=\"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2023\/11\/iStock-1489413825-e1698880771462-1024x540.jpg\" data-srcset=\"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2023\/11\/iStock-1489413825-e1698880771462-1024x540.jpg 1024w, https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2023\/11\/iStock-1489413825-e1698880771462-300x158.jpg 300w, https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2023\/11\/iStock-1489413825-e1698880771462-768x405.jpg 768w, https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2023\/11\/iStock-1489413825-e1698880771462.jpg 1411w\" data-sizes=\"(max-width: 780px) 100vw, 780px\" data-aspect=\"1.8962962963\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ee3dbbe elementor-widget elementor-widget-text-editor\" data-id=\"ee3dbbe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW265117275 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW265117275 BCX8\">Zero Trust <\/span><span class=\"NormalTextRun SCXW265117275 BCX8\">isn\u2019t<\/span><span class=\"NormalTextRun SCXW265117275 BCX8\"> a one-and-done approach. <\/span><span class=\"NormalTextRun SCXW265117275 BCX8\">It\u2019s<\/span><span class=\"NormalTextRun SCXW265117275 BCX8\"> ongoing. Monitoring and refining your setup <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW265117275 BCX8\">is<\/span><span class=\"NormalTextRun SCXW265117275 BCX8\"> crucial. Think of it as regular maintenance for your digital walls!<\/span><\/span><span class=\"EOP SCXW265117275 BCX8\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-288c37b elementor-widget elementor-widget-heading\" data-id=\"288c37b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Put Microsoft Defender to Work <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-84c5364 elementor-widget elementor-widget-text-editor\" data-id=\"84c5364\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW224738324 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW224738324 BCX8\">Why make things harder than they need to be? Microsoft Defender for Office 365 and Endpoint is packed with tools to keep you protected. Phishing emails? Covered. Rogue devices? Handled. Look at what it offers:<\/span><\/span><span class=\"EOP SCXW224738324 BCX8\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a0ad178 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"a0ad178\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"remixicon ri-checkbox-blank-fill\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Threat analytics \u2013 Quickly uncover flaws or patterns that attackers might exploit. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"remixicon ri-checkbox-blank-fill\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Automated response \u2013 Compromised? Defender will take action instantly! No messing about. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-42acfb2 elementor-widget elementor-widget-text-editor\" data-id=\"42acfb2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW241196954 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW241196954 BCX8\">Set it up right, and <\/span><span class=\"NormalTextRun SCXW241196954 BCX8\">you\u2019ll<\/span><span class=\"NormalTextRun SCXW241196954 BCX8\"> save loads of time and hassle. The more you configure, the safer <\/span><span class=\"NormalTextRun SCXW241196954 BCX8\">you\u2019ll<\/span><span class=\"NormalTextRun SCXW241196954 BCX8\"> be.<\/span><\/span><span class=\"EOP SCXW241196954 BCX8\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c9920a5 elementor-widget elementor-widget-heading\" data-id=\"c9920a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Regular Audits and Reports <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58cddf4 elementor-widget elementor-widget-text-editor\" data-id=\"58cddf4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Nobody loves audits, but they\u2019re invaluable. Microsoft 365 makes it manageable with handy tools to track access, policy tweaks, and compliance progress.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Block out time for regular reviews. Are your policies sharp enough? Small gaps can make all the difference. Better to catch them sooner rather than later, right?<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d5849a1 elementor-widget elementor-widget-heading\" data-id=\"d5849a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Train Your Team <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a58d242 elementor-widget elementor-widget-text-editor\" data-id=\"a58d242\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Here\u2019s a shocker \u2013 not all threats come from the outside. Employees can be your weakest link or your strongest asset. Have you trained them to spot a dodgy email? Do they know how MFA works or how to follow access rules?<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Keep them clued up! Regular security training can stop mistakes before they happen. It\u2019s not just helpful; it\u2019s a must. Make it a habit, and you\u2019ll see the difference in no time.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6d65452 elementor-widget elementor-widget-heading\" data-id=\"6d65452\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Final Thoughts <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9aa004a elementor-widget elementor-widget-text-editor\" data-id=\"9aa004a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW127983874 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW127983874 BCX8\">Zero Trust <\/span><span class=\"NormalTextRun SCXW127983874 BCX8\">isn\u2019t<\/span><span class=\"NormalTextRun SCXW127983874 BCX8\"> just a tech buzzword; <\/span><span class=\"NormalTextRun SCXW127983874 BCX8\">it\u2019s<\/span><span class=\"NormalTextRun SCXW127983874 BCX8\"> a smarter way to secure your organisation. With Microsoft 365, UK businesses have everything they need to protect their assets, stay compliant, and outpace cyber threats. Take it step by step, <\/span><span class=\"NormalTextRun SCXW127983874 BCX8\">monitor<\/span><span class=\"NormalTextRun SCXW127983874 BCX8\"> regularly, and keep your teams trained up. The result? A safer, more resilient future for your business.<\/span><\/span><span class=\"EOP SCXW127983874 BCX8\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Discover how Intelliworx helps UK businesses adopt Zero Trust security with Microsoft 365. Enhance compliance, safeguard data, and outpace threats effortlessly.<\/p>\n","protected":false},"author":26,"featured_media":12429,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[204,32],"tags":[],"class_list":["post-14633","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-microsoft"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Zero Trust with Microsoft 365 for UK Businesses | Intelliworx<\/title>\n<meta name=\"description\" content=\"Discover how Intelliworx helps UK businesses adopt Zero Trust security with Microsoft 365. Enhance compliance, safeguard data, and outpace threats effortlessly.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/intelliworx.co\/uk\/blog\/microsoft\/adopting-zero-trust-security-with-microsoft-365-a-guide-for-uk-businesses\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero Trust with Microsoft 365 for UK Businesses | Intelliworx\" \/>\n<meta property=\"og:description\" content=\"Discover how Intelliworx helps UK businesses adopt Zero Trust security with Microsoft 365. Enhance compliance, safeguard data, and outpace threats effortlessly.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/intelliworx.co\/uk\/blog\/microsoft\/adopting-zero-trust-security-with-microsoft-365-a-guide-for-uk-businesses\/\" \/>\n<meta property=\"og:site_name\" content=\"Intelliworx\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/IntelliworxGlobal\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-29T08:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-14T02:28:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2024\/09\/iStock-1987788756.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2547\" \/>\n\t<meta property=\"og:image:height\" content=\"1177\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Joy Johnson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joy Johnson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zero Trust with Microsoft 365 for UK Businesses | Intelliworx","description":"Discover how Intelliworx helps UK businesses adopt Zero Trust security with Microsoft 365. Enhance compliance, safeguard data, and outpace threats effortlessly.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/intelliworx.co\/uk\/blog\/microsoft\/adopting-zero-trust-security-with-microsoft-365-a-guide-for-uk-businesses\/","og_locale":"en_US","og_type":"article","og_title":"Zero Trust with Microsoft 365 for UK Businesses | Intelliworx","og_description":"Discover how Intelliworx helps UK businesses adopt Zero Trust security with Microsoft 365. Enhance compliance, safeguard data, and outpace threats effortlessly.","og_url":"https:\/\/intelliworx.co\/uk\/blog\/microsoft\/adopting-zero-trust-security-with-microsoft-365-a-guide-for-uk-businesses\/","og_site_name":"Intelliworx","article_publisher":"https:\/\/www.facebook.com\/IntelliworxGlobal","article_published_time":"2025-05-29T08:00:00+00:00","article_modified_time":"2025-07-14T02:28:35+00:00","og_image":[{"width":2547,"height":1177,"url":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2024\/09\/iStock-1987788756.jpg","type":"image\/jpeg"}],"author":"Joy Johnson","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Joy Johnson","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/intelliworx.co\/uk\/blog\/microsoft\/adopting-zero-trust-security-with-microsoft-365-a-guide-for-uk-businesses\/#article","isPartOf":{"@id":"https:\/\/intelliworx.co\/uk\/blog\/microsoft\/adopting-zero-trust-security-with-microsoft-365-a-guide-for-uk-businesses\/"},"author":{"name":"Joy Johnson","@id":"https:\/\/intelliworx.co\/uk\/#\/schema\/person\/2882af924cc2e3fa0b5c413229fbfa21"},"headline":"Adopting Zero Trust Security with Microsoft 365: A Guide for UK Businesses","datePublished":"2025-05-29T08:00:00+00:00","dateModified":"2025-07-14T02:28:35+00:00","mainEntityOfPage":{"@id":"https:\/\/intelliworx.co\/uk\/blog\/microsoft\/adopting-zero-trust-security-with-microsoft-365-a-guide-for-uk-businesses\/"},"wordCount":1000,"commentCount":0,"publisher":{"@id":"https:\/\/intelliworx.co\/uk\/#organization"},"image":{"@id":"https:\/\/intelliworx.co\/uk\/blog\/microsoft\/adopting-zero-trust-security-with-microsoft-365-a-guide-for-uk-businesses\/#primaryimage"},"thumbnailUrl":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2024\/09\/iStock-1987788756.jpg","articleSection":["Blog","Microsoft"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/intelliworx.co\/uk\/blog\/microsoft\/adopting-zero-trust-security-with-microsoft-365-a-guide-for-uk-businesses\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/intelliworx.co\/uk\/blog\/microsoft\/adopting-zero-trust-security-with-microsoft-365-a-guide-for-uk-businesses\/","url":"https:\/\/intelliworx.co\/uk\/blog\/microsoft\/adopting-zero-trust-security-with-microsoft-365-a-guide-for-uk-businesses\/","name":"Zero Trust with Microsoft 365 for UK Businesses | Intelliworx","isPartOf":{"@id":"https:\/\/intelliworx.co\/uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/intelliworx.co\/uk\/blog\/microsoft\/adopting-zero-trust-security-with-microsoft-365-a-guide-for-uk-businesses\/#primaryimage"},"image":{"@id":"https:\/\/intelliworx.co\/uk\/blog\/microsoft\/adopting-zero-trust-security-with-microsoft-365-a-guide-for-uk-businesses\/#primaryimage"},"thumbnailUrl":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2024\/09\/iStock-1987788756.jpg","datePublished":"2025-05-29T08:00:00+00:00","dateModified":"2025-07-14T02:28:35+00:00","description":"Discover how Intelliworx helps UK businesses adopt Zero Trust security with Microsoft 365. Enhance compliance, safeguard data, and outpace threats effortlessly.","breadcrumb":{"@id":"https:\/\/intelliworx.co\/uk\/blog\/microsoft\/adopting-zero-trust-security-with-microsoft-365-a-guide-for-uk-businesses\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/intelliworx.co\/uk\/blog\/microsoft\/adopting-zero-trust-security-with-microsoft-365-a-guide-for-uk-businesses\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/intelliworx.co\/uk\/blog\/microsoft\/adopting-zero-trust-security-with-microsoft-365-a-guide-for-uk-businesses\/#primaryimage","url":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2024\/09\/iStock-1987788756.jpg","contentUrl":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2024\/09\/iStock-1987788756.jpg","width":2547,"height":1177},{"@type":"BreadcrumbList","@id":"https:\/\/intelliworx.co\/uk\/blog\/microsoft\/adopting-zero-trust-security-with-microsoft-365-a-guide-for-uk-businesses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/intelliworx.co\/uk\/"},{"@type":"ListItem","position":2,"name":"Adopting Zero Trust Security with Microsoft 365: A Guide for UK Businesses"}]},{"@type":"WebSite","@id":"https:\/\/intelliworx.co\/uk\/#website","url":"https:\/\/intelliworx.co\/uk\/","name":"Intelliworx","description":"Managed IT Services","publisher":{"@id":"https:\/\/intelliworx.co\/uk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/intelliworx.co\/uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/intelliworx.co\/uk\/#organization","name":"Intelliworx","alternateName":"INTELLIWORX","url":"https:\/\/intelliworx.co\/uk\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/intelliworx.co\/uk\/#\/schema\/logo\/image\/","url":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2021\/07\/INX-Logo-colour.png","contentUrl":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2021\/07\/INX-Logo-colour.png","width":600,"height":90,"caption":"Intelliworx"},"image":{"@id":"https:\/\/intelliworx.co\/uk\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/IntelliworxGlobal","https:\/\/www.linkedin.com\/company\/intelliworx\/"]},{"@type":"Person","@id":"https:\/\/intelliworx.co\/uk\/#\/schema\/person\/2882af924cc2e3fa0b5c413229fbfa21","name":"Joy Johnson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2024\/03\/joyjohnson-profile-image-96x96.png","url":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2024\/03\/joyjohnson-profile-image-96x96.png","contentUrl":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2024\/03\/joyjohnson-profile-image-96x96.png","caption":"Joy Johnson"},"description":"Joy Johnson, Manager Client Services and Operations for UK\/US, thrives on the dynamic interplay of innovation and problem-solving. With an insatiable curiosity and a penchant for mastering new skills, she navigates the web of code, data, and systems. As a key member of the Intelliworx team, Joy enjoys the opportunity to collaborate with diverse businesses across continents.","sameAs":["https:\/\/www.linkedin.com\/in\/joy-johnson-bb0a8b221\/"],"url":"https:\/\/intelliworx.co\/uk\/author\/joyjohnson\/"}]}},"_links":{"self":[{"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/posts\/14633","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/comments?post=14633"}],"version-history":[{"count":0,"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/posts\/14633\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/media\/12429"}],"wp:attachment":[{"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/media?parent=14633"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/categories?post=14633"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/tags?post=14633"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}