Is MDR becoming the new MFA for Cyber Security?

Is MDR becoming the new MFA for Cyber Security?

Certain insurance firms in the market are starting to view Managed Detection and Response (MDR) as the new checkbox equivalent of Multi-factor Authentication (MFA), offering reduced premiums and serving as compliance benchmarks for a company’s commitment to enhancing its risk management culture. Could this trend signify the next phase of evolution in business compliance? Here at CSP, we believe so!

That’s why we’ve dedicated considerable effort over the past few years, starting with the early launch of Microsoft Sentinel in 2019, to craft a tailored and cost-effective solution, designed with the SME sector in mind. The enthusiastic feedback we’ve received from many of our clients regarding the enhancements we’ve made to their cybersecurity stance, compliance adherence, and early threat detection capabilities has truly fuelled our momentum and affirmed that we’re on the right track!

In Australia, businesses are confronted with increasingly sophisticated cyber threats targeting their most valuable assets: finances, data, and reputation. Critical business components such as bank accounts, email systems, and various devices, including computers and mobile devices, are all susceptible to compromise.

The Australian Signals Directorate’s (ASD’s)Australian Cyber Security Centre (ACSC) recently released a report on the cyber security of Australian Small Businesses. Some of the stats are telling:

  • – Australian Cyber Security Centre (ACSC) receives 1 report every 10 minutes
  • – Estimated annual losses to cybersecurity are $300M
  • – 1 in 5 are unaware of the term Phishing
  • – Half of SMBs reported they spend less than $500 oncyber security per year.
  • – Only 20 percent are properly equipped with cyberinsurance.
  • – Average cost of cybercrime has risen from $39,000 to $46,000.

These statistics serve as a source of encouragement for us at CSP as we remain committed to ensuring that our Managed Detection and Response (MDR) surpasses mere detection capabilities. At the heart of our approach lies a philosophy of nurturing partnerships through knowledge sharing and elevating your security posture in a rapidly evolving landscape.

Traditionally, Security Operation Centers (SOCs) would offer recommendations, leaving IT departments, Chief Information Security Officers (CISOs), CEO’s, and IT sysadmins grappling with the implementation of complex technical changes. We frequently encounter organizations puzzled by questions such as: 

  • – What exactly is Zero Trust?
  • – How do we implement Conditional Access policies to deal with a semi-remote workforce?
  • – What does effective device management entail?
  • – How can we identify all our assets and assess associated risks?
  • – What is our risk profile?
  • – How do we consolidate disparate cybersecurity solutions that are costing us a fortune?

Recognizing the need for clarity and guidance, we have built answers to these queries into our service offerings. This approach sets us apart as a truly unique service provider.

Not only do we deploy a Microsoft Teams integrated platform that provides full visibility into our services, showcasing our incident management, early warning detection capabilities, and Threat Intelligence, but we also address digital hygiene and compliance questions that SMEs have struggled to navigate.

“Outsourcing may lead to gaps in the owner’s cybersecurity knowledge about which security measures are being implemented to protect their business. Data shows that for many SMBs opting to outsource, their outsourced provider did not necessarily implement all of the Essential Eight”

–     ACSC Small Business report

As ACSC alludes to in their report – some service providers have not followed through on their promises, especially when it comes to Essential Eight alignment, something we’ve witnessed first-hand. At CSP, we implement all eight mitigation strategies as well as present evidence in a comprehensive report, and best of all, it’s built directly into your platform. When service providers claim to align with ES8 the best proof is in the pudding. Evidence should be part of any compliance effort. You do not want to find out these controls do not exist while lodging an insurance claim. 

For additional insurance and business continuity, we’ve cultivated relationships with trusted insurance brokers who can enlighten SMEs on the benefits of cybersecurity policies in today’s landscape. By aligning with a managed cybersecurity service provider like us, which assists with technology aspects covered in insurance questionnaires, SMEs can realize significant cost savings on premiums—a testament to our commitment to going above and beyond.

This year, we’re thrilled to unveil our forthcoming interactive guided tours and our Lighthouse MXDR trial. These initiatives will empower organizations with a comprehensive understanding of their operational activities and provide actionable insights on reducing costs while maintaining a robust cybersecurity posture. We look forward to announcing the release on our website soon.

If you want to find out more book a free demo with us here.

The Evolving Landscape of Cybersecurity and CSP’s Guiding Light

The Evolving Landscape of Cybersecurity and CSP’s Guiding Light

In the dynamic and ever-evolving digital landscape, the realm of cybersecurity stands as a sentinel against an array of threats that continuously mutate and adapt. As technology advances, so do the tactics employed by cyber adversaries, creating a shifting battleground where organizations must stay ahead to protect their digital assets. In this landscape, CSP emerges not just as a cybersecurity provider but as a guiding light navigating organizations through the complexities of the modern cybersecurity terrain.

Understanding the Shift

The traditional approach to cybersecurity, characterized by perimeter defences and reactive strategies, is no longer sufficient. The digital landscape has undergone a metamorphosis with cloud computing, remote work, and interconnected systems becoming the norm. As a result, the attack surface has expanded and cyber threats have become more sophisticated.

To effectively combat these evolving threats, organizations need a proactive and comprehensive cybersecurity strategy that goes beyond traditional measures. This is where CSP steps in, bringing a strategic and forward-thinking approach to cybersecurity.

CSP’s Approach: Beyond Traditional Measures

Modern SOC – Unifying Defense

CSP embraces a Modern Security Operations Center (SOC) model, a paradigm shift from traditional approaches. The Modern SOC is not just a response unit; it’s a proactive, intelligence-driven defence mechanism. By unifying security tools and leveraging advanced technologies, CSP’s Modern SOC provides real-time threat detection, proactive threat hunting, and streamlined incident response.

Microsoft Security Copilot – A Game-Changer

At the core of CSP’s cybersecurity arsenal is the Microsoft Security Copilot, a groundbreaking innovation that transforms how organizations investigate and respond to security threats. Copilot seamlessly integrates Microsoft Sentinel and Microsoft 365 Defender, creating a unified platform for cybersecurity investigations. This integration eliminates the need for juggling multiple tools, streamlining workflows, and enhancing overall efficiency.

Zero Trust Security Model – Redefining Trust

In a world where traditional notions of trust are challenged, CSP advocates for the Zero Trust security model. This approach assumes that threats may exist both inside and outside the network. With Zero Trust, every user, device, and network flow is treated as potentially untrusted, requiring continuous verification. This model aligns with the modern landscape where traditional perimeters have dissolved, and threats can emerge from any point.

MDR for Swift Response

Managed Detection and Response (MDR) is a cornerstone of CSP’s approach. In a landscape where speed is paramount, MDR ensures swift response to emerging threats. CSP’s MDR combines advanced threat detection technologies with human expertise, providing continuous monitoring and rapid response capabilities.

Navigating Complexity with CSP

CSP serves as a guiding light for organizations navigating the complexities of the modern cybersecurity landscape. Here’s how:

Holistic Defense Strategies

Understanding that cybersecurity is not a one-size-fits-all endeavour, CSP develops holistic defence strategies tailored to each client’s unique environment. By conducting thorough risk assessments, CSP identifies vulnerabilities, designs robust security architectures, and implements defence-in-depth measures.

Proactive Threat Intelligence

Staying ahead of adversaries requires a deep understanding of emerging threats. CSP’s proactive threat intelligence services involve continuous monitoring, analysis of threat landscapes, and timely dissemination of intelligence to strengthen organizations’ cyber defences.

Continuous Training and Awareness

Human error remains a significant factor in cybersecurity incidents. CSP prioritizes continuous training and awareness programs to educate users about evolving threats, phishing tactics, and best cybersecurity practices. An informed workforce becomes an active part of the defence mechanism.

Incident Response and Recovery

Acknowledging that no defence is foolproof, CSP’s incident response and recovery strategies ensure organizations can effectively contain and recover from security incidents. This involves not only technical response but also legal and communication aspects to minimize the impact on the organization’s reputation.

As the cybersecurity landscape continues to evolve, CSP stands as a beacon of innovation, resilience, and expertise. The guiding light provided by CSP extends beyond mere protection; it encompasses empowerment. Empowering organizations to embrace the digital future with confidence, knowing that their cybersecurity partner is not just keeping up with the changes but leading the way. In this ever-changing landscape, CSP’s commitment to staying ahead ensures that its clients are not just secure but are thriving in the digital realm. Partner with CSP, where the future of cybersecurity is not a challenge but a journey of continual transformation and triumph.

Microsoft Security Copilot: Transforming Cybersecurity Investigations

Microsoft Security Copilot: Transforming Cybersecurity Investigations

In an era where cyber threats are becoming increasingly sophisticated and pervasive, organizations must continuously evolve their cybersecurity strategies to stay one step ahead of cybercriminals. Microsoft, a global technology giant, has been at the forefront of developing innovative solutions to address the ever-growing challenges of cybersecurity. One such groundbreaking tool that is transforming the landscape of cybersecurity investigations is the Microsoft Security Copilot.

The Evolution of Cybersecurity Investigations

Traditional approaches to cybersecurity investigations often involve manual processes, relying heavily on the expertise of cybersecurity analysts to detect, analyze, and respond to threats. However, with the sheer volume and complexity of modern cyber threats, these traditional methods are proving to be inadequate.

Enter Microsoft Security Copilot, a solution designed to streamline and enhance the entire cybersecurity investigation process. By leveraging advanced technologies such as artificial intelligence (AI), machine learning (ML), and automation, Microsoft has created a tool that not only accelerates investigations but also improves the accuracy of threat detection. Some of the important features of this tool are:

Automated Threat Detection:

Microsoft Security Copilot employs advanced machine learning algorithms to automatically detect potential threats in real-time. By analyzing vast amounts of data from diverse sources, the tool can identify patterns and anomalies that may indicate malicious activity. This automated threat detection significantly reduces the time it takes to identify and respond to potential security incidents.

Intelligent Analysis and Prioritization:

The copilot goes beyond mere detection by providing intelligent analysis and prioritization of threats. It assesses the severity and potential impact of each threat, enabling cybersecurity teams to focus their efforts on addressing the most critical issues first. This feature is invaluable in a world where time is of the essence in preventing and mitigating cyber attacks.

Collaborative Investigation Platform:

Collaboration is key in cybersecurity investigations, and Microsoft Security Copilot recognizes this by offering a collaborative investigation platform. Security analysts can work together seamlessly, sharing insights, findings, and recommendations in real-time. This collaborative approach not only enhances the efficiency of investigations but also ensures that all relevant stakeholders are on the same page.

Integration with Microsoft 365 Defender:

Microsoft Security Copilot seamlessly integrates with the broader Microsoft 365 Defender ecosystem. This integration enables organizations to benefit from a holistic security approach, where information from various Microsoft security products is aggregated and analyzed cohesively. This interoperability ensures that cybersecurity teams have a comprehensive view of their organization’s security posture.

Real-world Impact

The real-world impact of Microsoft Security Copilot is already evident in organizations that have adopted this transformative tool. One notable aspect is the significant reduction in the mean time to detect (MTTD) and mean time to respond (MTTR) to security incidents. By automating the initial stages of threat detection and providing intelligent prioritization, the copilot empowers cybersecurity teams to respond rapidly to emerging threats.

Moreover, the collaborative nature of the investigation platform has led to improved communication and coordination among security analysts. This not only enhances the overall effectiveness of cybersecurity teams but also contributes to a more proactive and adaptive security posture.

Addressing Challenges in Modern Cybersecurity

The cybersecurity landscape is constantly evolving, and so are the challenges that organizations face. Microsoft Security Copilot addresses some of the most pressing challenges in modern cybersecurity:

Sophisticated Threats:

As cyber threats become more sophisticated, organizations need equally advanced tools to detect and respond to these threats effectively. Microsoft Security Copilot’s use of AI and ML technologies enables it to adapt to evolving threat landscapes, staying ahead of cybercriminals.

Volume of Data:

The copilot tackles the challenge of handling vast amounts of data by automating the initial stages of threat detection. This not only accelerates the investigation process but also ensures that no potential threat goes unnoticed amidst the data deluge.

Human Resource Constraints:

Cybersecurity talent is in high demand, and organizations often face challenges in recruiting and retaining skilled professionals. Microsoft Security Copilot acts as a force multiplier, allowing existing cybersecurity teams to achieve more with their existing resources by automating repetitive tasks and augmenting human capabilities with intelligent insights.

The Road Ahead

Microsoft Security Copilot represents a significant step forward in the realm of cybersecurity investigations, but the journey doesn’t end here. Microsoft continues to invest in research and development to enhance the capabilities of the copilot, ensuring that it remains at the cutting edge of cybersecurity innovation. As cyber threats continue to evolve, organizations must remain vigilant and proactive in adopting advanced tools and strategies to protect their digital assets. Microsoft Security Copilot is a beacon of innovation in this ongoing battle, providing organizations with a powerful ally in their quest for a resilient and secure digital environment.

CSP stands at the forefront of cybersecurity excellence, leveraging state-of-the-art solutions like Microsoft Security Copilot to fortify your digital domain. Our commitment to providing innovative and integrated cybersecurity services reflects our dedication to securing your organization against evolving threats. Partner with CSP to elevate your cybersecurity posture and navigate the complexities of the digital landscape with confidence.

Fortune Favors the Prepared Mind

Fortune Favors the Prepared Mind

The Royal United Services Institute (RUSI) is the world’s oldest and the UK’s leading defence and security think tank. They recently published an extremely interesting paper which you can read in full here: ‘The Scourge of Ransomware: Victim Insights on Harms to Individuals, Organisations and Society‘.

The paper sets out a framework for understanding ransomware and the layers of harm we often overlook. 🔍 Summary of Key Findings:

  • Beyond Financial Loss: Ransomware harms extend far beyond the financial and include physical, psychological, reputational, and social impacts.
  • Downstream: The paper introduces a nuanced framework for ransomware impacts – categorized into first-order, second-order, and third-order harms, based on an existing taxonomy of cyber harms. Downstream from a ransomware attack can be even more challenging than being at the epicentre, as access to information about the attack may be much more limited.
  • Societal and National Security Impact: The effects of ransomware harms can significantly disrupt supply chains, erode public trust in services and law enforcement, and offer advantages to hostile countries that provide safe havens to cyber-criminals.
  • Organisational Risk: For organisations of all sizes, ransomware not only poses financial risks but also threatens their very survival and reputation, especially those handling sensitive data or requiring operational integrity.

These findings convey the broad and deep impacts of ransomware and urge a more surgical approach to cybersecurity.

💡 Why It Matters: As ransomware and other attacks continue to evolve, understanding the levels of harm is crucial for developing effective interventions and strategies, and boosting the resilience or ‘immunity’ of our digital estates. To combat this widespread cyber-disease we need to follow a method……

The CSP Way


For several years, we’ve been following our unique approach to addressing ransomware and other malicious attacks across Australia, drawing inspiration from the history of medical science. Why medicine, you might ask?

Well, there are several compelling reasons why these seemingly distinct fields are more similar than you might think: here are just a few common features:

  1. Diagnosis and analysis: detecting vulnerabilities within the ecosystem and understanding how hackers or ‘digital germs’ exploit them.
  2. Treatment and remediation: after identifying a security issue a remediation effort might be required such as isolating a system, evicting the hacker, or implementing security updates.
  3. Ongoing check-up and maintenance: security is a journey, not a destination, and requires continuous monitoring, updates, and adjustments. Depending on your unique organization or ‘cohort’, the effort and controls will also vary.


Equally, there are many things we can learn from medicine about how not to practice cybersecurity.

First, do no harm – Hippocrates

This principle of ‘first do no harm’, is an oath that every doctor today has to swear to uphold, but was commonly overlooked throughout much of medical history.

Consider bloodletting, a widespread yet wholly ineffective practice that was meant to remove an illness by draining the patient of several litres of blood. It’s a fact, that seeing a doctor throughout most of human history significantly lowered your chances of survival rather than increasing them.

The Latin term ‘iatrogenic’ is a concept that conveys a fundamental truth: every intervention carries potential risks. Thus, unnecessary interventions should be avoided and the costs and benefits of all others carefully weighed up. Greater observation and commitment to ‘first, do no harm’ Is the moral of the story, and a lesson we consider before recommending any cybersecurity controls or initiatives.

Fortune favors the prepared mind – Louis Pasteur

This saying became particularly relevant after the advancements following the germ theory of disease, which more accurately explained how illnesses spread and developed by microbes. This seismic shift in our understanding of medical causes underscored the importance of experimentation and humility, revealing how the medical community, especially those who practiced bloodletting, had been overly confident and extremely unobservant.

This realization highlights the value of acknowledging our limitations and the potential for error. Embedded in our culture at CSP Global are the principles of humility, preparation, and greater observation. We only recommend interventions and controls that make sense to your organization. Plus, we routinely pilot changes against a small sample size to ensure we do not cause unnecessary harm to the health of your operations and productivity.

By continuously seeking feedback and looking for errors, we inform our future strategies and processes, thereby avoiding the traps of being overzealous about one particular procedure. With this knowledge in mind, we established our guiding pillars for bolstering an organization’s immunity against cyber disease:

💰 Eliminate: Complexity and disparate solutions can make attacks harder to detect and add unnecessary inefficiencies. Bringing your capabilities under one roof with Microsoft XDR (protecting every assets i.e devices, apps, emails, servers, and data), and eliminating patchwork solutions, can increase cost savings by up to 60%

🎯 Simplify: Complexity is the enemy of effective cybersecurity. We are dedicated to simplifying the security landscape for our clients, cutting through the jargon, and delivering solutions that enable you to do more with less.

🔍 Protect: Your digital workers are at the heart of everything we do. Our robust and tailored solutions are designed to safeguard your assets and sensitive data against evolving cyber threats. We vastly expand what is detected within an organization and deliver specific playbooks for how to respond, providing you with far greater peace of mind.

If you want to find out how we can apply this method to the lifeblood of your organization, please reach out to us here and book a free cyber-health consultation. 😃