FluidOne Blog

How IT Managed Services Can Solve Your IT Security Gaps

Written by FluidOne | 06/02/25 09:00

As businesses continue to integrate more technology into their operations, securing their devices and infrastructure has never been more important. However, many organisations fail to implement comprehensive security measures, leading to vulnerabilities that cyber criminals can exploit. Below, our resident experts in three areas of IT—End User Computing, Microsoft 365 (M365), and Azure Infrastructure—will provide solutions for common security gaps, as well as one solution that can solve all such issues.

End User Computing Security Gaps

The Expert

Mark Chinery is FluidOne's Enterprise IT Head of Consultancy and has 20+ years' experience in advising  customers on strategic change including implementation of complex Microsoft infrastructure.​

Mark particularly enjoys solving complex problems in End User Compute (desktop/mobile/security) and server infrastructure.

The Advice

Remote workforce management, Virtual desktop infrastructure (VDI), and Application virtualisation/platforms are all components of End User Computing that have made it a vital part of the modern workplace. However, its widespread use means that fixing security concerns should be high on the list of any IT department.

  1. Third-Party Application Updates
    • Issue: Many third-party applications are left unpatched, creating security risks when new vulnerabilities are discovered.
    • Solution: Use tools like PatchMyPC to automate third-party app updates and ensure that all software is up-to-date.
  2. Client Devices Not Rebooting for Updates
    • Issue: Updates are often applied only after a reboot, and when devices don’t reboot, the updates aren’t implemented.
    • Solution: Enforce reboot policies to ensure updates are properly applied and security patches are installed.
  3. Local Admin Accounts with the Same Password Across Devices
    • Issue: Using the same password for multiple devices can compromise security if the password is exposed.
    • Solution: Disable local admin accounts or use Local Administrator Password Solution (LAPS) to generate unique, secure passwords for each device.
  4. MDM Devices Not Updated
    • Issue: Mobile Device Management (MDM) devices that aren’t updated can pose a risk if vulnerabilities are left unpatched.
    • Solution: Ensure that MDM devices are corporate enrolled and configured with automatic update policies to keep them secure.
  5. MDM Devices Without Security Software Installed
    • Issue: Without security software, MDM devices are vulnerable to malware and other threats.
    • Solution: Install security solutions like Lookout on MDM devices to protect them from malicious attacks.

Microsoft 365 Security Gaps

The Expert

Stephen Hall is a Senior M365 Consultant at FluidOne. He has been a consultant for over 6 years, having worked in support roles both in-house and in MSP environments, giving him an excellent foundation and understanding of how organisations can harness technology to achieve their business objectives.

Stephen specialises in M365 infrastructure, security, identity management, and compliance.

The Advice

M365 may be familiar to the vast majority of computer users, but that does not mean that we know all the ins-and-outs of the software suite.

  1. Not Protecting Sensitive Data from External Sharing
    • Issue: Sensitive company data may be unintentionally shared with external parties, increasing the risk of data breaches.
    • Solution: Implement policies to restrict external sharing and use tools within the Microsoft Purview suite to classify and label sensitive data.
  2. Allowing Personal Devices Unrestricted Access to M365 Resources
    • Issue: Personal devices, often less secure than company devices, can access critical M365 resources without proper safeguards.
    • Solution: Use Conditional Access to restrict access based on the security posture of devices, ensuring only secure devices are granted access.
  3. Third-Party Applications Not Updated on End User Devices
    • Issue: After deploying third-party apps to end user devices, organisations may neglect to keep them updated, creating security vulnerabilities.
    • Solution: Set up automatic updates for third-party apps to ensure they remain secure and compliant with the latest patches. This can be achieved using tools such as PatchMyPC with an Intune integration.
  4. Not Fully Utilising Conditional Access Security Controls
    • Issue: Without fully leveraging Conditional Access, organisations may lack adequate control over who can access M365 resources and under what conditions.
    • Solution: Use Conditional Access to enforce multi-factor authentication (MFA) and ensure that only authorised users and compliant devices can access sensitive data.
  5. Not Adopting a Role-Based Access Model
    • Issue: Without a clear role-based access control (RBAC) model, individuals may have excessive privileges, leading to potential misuse or breach.
    • Solution: Adopt an RBAC model to ensure that users only have the minimum required permissions for their roles, reducing the risk of internal threats.

Azure Infrastructure Security Gaps

The Expert

Rob Walker has been working in technology for more than 25 years and currently serves as a Senior Cloud Infrastructure Consultant at FluidOne. He is an experienced Azure practitioner, working with organisations to implement Azure Virtual Desktop to enhance user experience and collaboration.​

Rob enjoys talking to clients to understand their needs and staying up-to-date with new developments as they are released.

The Advice

The cloud is seen as the future of computing, meaning that we should all get well acquainted with the security gaps that need closing on popular platforms.

  1. Over-Permissioned Identities in RBAC
    • Issue: Users or service accounts with excessive permissions increase the potential for accidental or malicious damage.
    • Solution: Regularly review and apply RBAC to ensure users and services have only the permissions they need.
  2. Network Security Gaps
    • Issue: Gaps in network security can expose your Azure environment to unauthorised access or attacks.
    • Solution: Implement network security groups (NSGs), firewalls, and virtual private networks (VPNs) to protect your Azure environment from external threats.
  3. Unencrypted Data
    • Issue: Data that isn’t encrypted is vulnerable to interception and unauthorised access.
    • Solution: Ensure encryption is applied to both data at rest and in transit to protect sensitive information.
  4. Silent Logs and No Alerts
    • Issue: Without proper logging and alerting, you may miss critical security events, such as unauthorised access attempts.
    • Solution: Set up logging and alerting systems to monitor and notify you of suspicious activities in real-time.
  5. Unprotected Storage Accounts
    • Issue: Storage accounts left unprotected are a prime target for attackers seeking to steal or modify data.
    • Solution: Use access controls and advanced threat protection for storage accounts to safeguard data from unauthorised access and attacks.

How an IT Managed Services Provider (MSP) Can Help

Many businesses struggle to address these security gaps on their own, leading to increased vulnerability. Partnering with an experienced IT managed services provider (MSP) can help avoid these common issues. An MSP provides proactive monitoring, regular patching, and continuous security improvements for all aspects of your IT environment—from end-user devices to cloud infrastructure. They can implement best practices, automate security measures, and ensure compliance with industry standards, leaving you free to focus on growing your business.

By leveraging the expertise of an MSP, businesses can ensure that their security posture is strong, up-to-date, and resilient against the growing number of digital threats. At FluidOne, we work with you to find the IT solutions that you actually need. Whether it is a single service for a one-off project, or a full ongoing MSP service, we are here for you. To find out more, you can contact our Enterprise IT experts to discuss further.