Managing Office 365 (or Microsoft 365) can sometimes be a bit daunting for schools and small businesses.

If you’re looking for help – you’ve found the right solution… Us!

Outsourcing the management of Microsoft 365 to a managed service provider like us can provide a number of benefits for your school.

Firstly, we can help ensure that your school’s Microsoft 365 environment is secure and compliant with any relevant regulations. This can include implementing multi-factor authentication, setting up data loss prevention policies, and monitoring for suspicious activity.

Secondly, we can provide ongoing technical support for your staff. This can include troubleshooting issues, providing training on how to use various features of Microsoft 365 and assisting with migrations to new versions of the software.

Thirdly, we can help your school to maximize the value of its Microsoft 365 investment by providing expertise on how to use the various tools and services included in the suite. This can include advice on how to use Microsoft Teams or how to use SharePoint for document management.

Finally, outsourcing the management of Microsoft 365 can free up the school’s staff to focus on other important tasks, like teaching and learning.

Some the services we provide are listed below:

a black and white photo of a clock tower

Email Migration

  • Migration to O365
  • Training
  • Support

a black and white photo of a clock tower

Mail Flow Rules

  • Reduce Spam
  • Suspicious Email Banner Warnings
  • External Email Banner Message
  • Retention Policies

a black and white photo of a clock tower


  • MFA Setup
  • Anti-Malware
  • Phishing Protection
  • Ransomware Protection
  • Phishing Simulation
  • Encryption
  • Data Loss Prevention (DLP)
  • NCSC Mailcheck Management
  • Break Glass Accounts with MFA

a black and white photo of a clock tower


  • Microsoft DO NOT backup your data *
  • Our Secure Backups include:
    • eMail
    • Teams
    • OneDrive
    • Sharepoint
    • Calendars

Frequently Asked Questions

MFA stands for Multi-Factor Authentication, which is a security process that requires more than one method of authentication from independent categories of authentication methods to grant access to a system or application. This adds an extra layer of security to ensure that the person accessing the system is who they claim to be. Examples of MFA include combining a password with a fingerprint or a security token.

Here’s a great video from Jordan M. Schroeder – a Chief Information Security Officer who has led information security programmes for public and private sector organisations in the US, Canada and the UK.

Multi-Factor Authentication (MFA) is an important security measure that can help protect your Office 365 account from unauthorised access. MFA requires users to provide a second form of verification, in addition to their password, to confirm their identity. This helps to ensure that only authorised users can access your account, even if someone else has your password. It may be a bit annoying, but it is a small inconvenience compared to the potential risks of not having it.

If you’ve lost or had your mobile device stolen, you can take either of the following actions:

  • Sign in using your alternative method if you have one set up
  • Ask us to reset your MFA method.

We can make the appropriate updates to your account and after your settings have been reset, you’ll be prompted to set up MFA again the next time you sign in.

If you receive a sign-in request that wasn’t you, please contact us immediately so we can take appropriate actions.

You’ll need to set up MFA each time you get a new device.

The quickest way to do this is to:

  1. Sign in to your Office 365 account
  2. Choose Add method and then follow the instructions onscreen to add a new device.
  3. Once you’ve added your new device, Delete the old device from your list of methods.

Alternatively you can set up a new device using the cloud backup and recovery option, see: How to Move Microsoft Authenticator to a New Phone (

Tip: Don’t forget to remove your data before getting rid of any old devices – remove MFA from the device, delete all your information, restore it to its factory settings and wipe any memory cards.

Phishing is a type of cyber attack that uses social engineering tactics to trick individuals into giving away sensitive information, such as login credentials or financial information. This is typically done through the use of fake emails or websites that appear legitimate, but are actually controlled by cybercriminals.

To protect your school from phishing attacks, you can implement the following best practices:

  • Educate your staff about the dangers of phishing and how to identify and avoid it
  • Implement spam filters and anti-phishing tools on your email system to help detect and block phishing emails
  • Regularly update your software and systems to protect against known vulnerabilities
  • Encourage users to be skeptical of unsolicited emails, especially those that ask for personal information or login credentials
  • Use multi-factor authentication (MFA) to protect against the possibility of login credentials being stolen.
  • Create a incident response plan to respond quickly and efficiently if a phishing attack is detected
  • Regularly review the security logs to detect any suspicious activity

Unfortunately, Yes. Schools can be targeted by cybercriminals for a variety of reasons. Schools often have valuable personal and financial information about students and staff, as well as access to sensitive educational resources, which can make them an attractive target for cyberattacks.

Some common types of cyberattacks that have been reported against schools in the UK include:

  • Phishing: Attempts to trick individuals into giving away sensitive information, such as login credentials or financial information.
  • Ransomware: Malicious software that encrypts a victim’s files and demands payment in exchange for the decryption key.
  • Denial of Service (DoS) attacks: Attempts to disrupt or disable a website or online service by overwhelming it with traffic.
  • Data breaches: Attempts to gain unauthorised access to sensitive data, such as personal information or educational resources.

SPF (Sender Policy Framework), DKIM (DomainKeys Identified Mail) and DMARC (Domain-based Message Authentication, Reporting & Conformance) are all email authentication protocols that help to ensure that the email you receive is legitimate and not spam or phishing. Here’s a simple explanation of each:

  • SPF is a method for validating the authenticity of the sender of an email message. It works by publishing a list of IP addresses that are authorized to send email on behalf of a domain. When an email is received, the receiving server can check the SPF record to see if the IP address that the email was sent from is on the list of authorized IP addresses.
  • DKIM is a method for validating the authenticity of the content of an email message. It works by adding a digital signature to the email’s headers, which can be used to verify that the email’s content has not been modified in transit.
  • DMARC is a method for validating the authenticity of both the sender and the content of an email message. It works by building on SPF and DKIM, and allows domain owners to publish a policy that specifies which authentication methods should be used and what to do with messages that fail authentication.

TLS-RPT (Transport Layer Security Reporting) and MTA-STS (Mail Transfer Agent Strict Transport Security) are two methods to increase the security of email communication.

  • TLS-RPT: is a reporting mechanism that allows domain owners to receive reports about the use of Transport Layer Security (TLS) encryption for email sent to their domain. This allows domain owners to monitor and ensure that their email is being transmitted securely.
  • MTA-STS: Is a security mechanism that allows domain owners to specify, via a policy published in the domain’s DNS, that all mail sent to their domain should be sent over an encrypted connection (TLS) and that only specific mail servers are authorised to send mail on behalf of their domain. This helps to prevent man-in-the-middle attacks and increase the security of email communication.

Both are designed to improve the security of email communication by ensuring that email is transmitted securely, which helps to protect against eavesdropping and tampering. Together, these protocols can help to protect your school from cyber threats and increase the overall security of email communication.

Data Loss Prevention (DLP) is a security feature that helps to prevent sensitive or confidential information from being accidentally shared or leaked. In the context of Office 365, DLP can be used to protect sensitive information stored in various Office 365 services, such as email, SharePoint, and OneDrive.

DLP uses a set of predefined policies and rules to automatically identify, monitor and protect sensitive data in Office 365. For example, a DLP policy can be set to detect credit card numbers or National Insurance numbers in an email and prevent them from being sent outside of the school.

Here’s a simple explanation of how DLP works in Office 365:

  • Identify: DLP uses a combination of predefined policies, regular expressions, and machine learning to identify sensitive data, such as credit card numbers, social security numbers, and personal information.
  • Monitor: DLP monitors the content of emails, files, and other data stored in Office 365 to detect sensitive information.
  • Protect: DLP can take a variety of actions to protect sensitive information, such as blocking an email from being sent, quarantining a file, or alerting an administrator.

DLP can be a powerful tool for protecting sensitive information in Office 365 and can help organizations comply with data protection regulations. It’s important to note that DLP is not a replacement for other security measures, such as firewalls and antivirus software, but it can be a powerful tool for protecting sensitive information.

2022 Cyber Audit Results

In 2022, LGfL (the National Grid for Learning) and the NCSC (National Cyber Security Centre, a part of GCHQ) carried out a joint audit of cyber security in schools across the UK.

Summary of the findings:

  • 73% reported that fraudulent emails have been received by staff
  • 26% reported that their school emails had been spoofed (email
  • 7% reported leaks of confidential email online

Email is the number one choice of Cybercriminals to access your data and systems

This threat is present across every sector, however the education sector remains a key target

* In Microsoft’s service agreement, which you have to agree to to use their products and services, they state:

We strive to keep the Services up and running; however, all online services suffer occasional disruptions and outages, and Microsoft is not liable for any disruption or loss you may suffer as a result. In the event of an outage, you may not be able to retrieve Your Content or Data that you’ve stored. We recommend that you regularly backup Your Content and Data that you store on the Services or store using Third-Party Apps and Services.

Microsoft’s Shared Responsibility Policy also states that:

For all cloud deployment types, you own your data and identities. You are responsible for protecting the security of your data and identities, on-premises resources, and the cloud components you control (which varies by service type).

Our backups cover all eventualities, such as:

  • Deleted data is only retained by Microsoft for so long if it’s not restored.  After a maximum of 30 days, it is gone forever;
  • Data lost by human interaction, whether it’s accidental or malicious;
  • If an employee leaves and their account is deleted, all data is lost.  This could be crucial if it’s a key employee, as they may have critical data you need to retain.