Blog categories:
Day At the Breach: What Happens When Phishing Gets Personal
It started like any other day--calm, routine, and business as usual. But just beneath the surface, something was stirring. A phishing email slipped through unnoticed. One click, that’s all it took. From there, attackers moved silently--creating hidden inbox rules, impersonating trusted contacts, and spreading [...]
SharePoint Alerts are Retiring: What You Need to Know and How to Prepare
Microsoft is continuing its push toward a more modern, secure, and integrated digital workplace. As part of this evolution, SharePoint Alerts will be officially retired by July 2026. This change affects all Microsoft 365 tenants and marks a significant shift in how organizations manage [...]
Fortify Your Microsoft 365 Environment: Webinar Recap
In today’s digital-first world, security isn’t optional—it’s essential. In our latest webinar, Colin Smith, Secure Cloud and Modern Work Practice Lead here at Creospark, walked us through the critical importance of regular Microsoft 365 security assessments and how organizations can proactively defend against evolving [...]
Microsoft 365 Copilot Connectors for People Data: Unifying Identity Across the Digital Workplace
Empowering a Unified View of People in Microsoft 365 In today’s hybrid workplace, people data lives in many places—HR systems, collaboration tools, and identity platforms. But when this data is fragmented, it creates friction: outdated profiles, inconsistent search results, and incomplete context for [...]
Why Does Security Assessment Matter?: The Importance of Keeping Your Data Secure
Security in the Modern Workplace Data security isn’t just a set of policies—it's a critical foundation of trust and resilience for every organization operating in today's digital landscape. As cyber threats evolve, businesses must go beyond traditional defenses, leveraging AI-driven security analytics and insider [...]
A Modern Approach to SharePoint and Viva in the Age of Copilot: Webinar Recap
AI innovation isn’t slowing down, and neither should your workplace. In our latest webinar, Carolyn Gjerde walked through how SharePoint, Viva, and Microsoft Copilot are transforming the way teams collaborate and get work done. With hands-on demos, real-world scenarios, and strategic takeaways, the session [...]
How to Deal With Migration Challenges: Building Successful Migration Practices
Migrating to Microsoft 365 isn’t just a technical move, it’s a full-scale transformation. Whether you're transitioning from Google Workspace or legacy file shares, organizations often face a mix of logistical roadblocks and user resistance that can derail even the best-laid plans. To ensure a [...]
Copilot Agent Flow vs Power Automate Flow: Everything you Need to Know
Copilot Agent Flow vs Power Automate Flow: Everything you Need to Know Microsoft’s latest addition to Copilot Studio amazes yet again. A new kind of automation flow: Agent Flow, enables you to directly integrate backend automations through your AI-driven Copilot. At Creospark, we’re getting [...]
Microsoft Power BI: Dynamically Split Columns Using Text Matches
Imagine you’re working in Power BI and come across a dataset where first and last names are stored in a single column—like “JohnDoe” instead of the more readable “John Doe”. This can make sorting, filtering, and analysis more challenging, especially when you need to [...]
AI Readiness: Optimizing Governance for SharePoint and Teams
AI Readiness: Optimizing Governance for SharePoint and Teams With AI playing an increasingly central role in today’s workplace, having structured governance is no longer optional—it’s essential. Microsoft 365 tools like SharePoint and Teams empower organizations with seamless collaboration, but without proper governance, they [...]
Introducing Microsoft 365 Copilot Chat
Revolutionizing Work with Microsoft 365 Copilot Chat To stay ahead in today's fast-paced business world, leveraging the latest technology is crucial. Microsoft leads in innovation, and its new Microsoft 365 Copilot Chat is a testament to that. Announced on January 15, 2025, this feature [...]
12 Days of Security — Strengthening Your Organization
Over the past 11 days, we’ve shared actionable insights to help you improve your Microsoft Secure Score. This security analytics tool provides a numerical representation of your organization’s security posture, guiding you to strengthen your defenses against evolving cyber threats. In case you missed [...]
Tip #11: Manage Security Policies
In the ever-changing landscape of cybersecurity, managing security policies is crucial for protecting organizational assets. Regularly conducting security assessments and updating policies based on the latest threats helps keep your organization on top of evolving cyber risks. This approach not only helps safeguard sensitive [...]
Tip #10: Restrict Data Access to Verified Publishers
Ensuring that sensitive information is only accessed by trusted applications is critical for data security in today's digital landscape. Limiting access to sensitive information to applications approved by their own IT security team can significantly reduce the risk of data breaches and unauthorized access. [...]
Tip #9: Leverage Safe Links and Safe Attachments
In the digital age, email remains a primary vector for cyberattacks, with malicious links and attachments posing serious threats to organizational security. Microsoft Defender for Office 365 offers powerful features like Safe Links and Safe Attachments to protect against these threats. Enabling these features [...]
Tip #8: Monitor and Respond to Security Alerts
In today’s rapidly evolving cybersecurity landscape, timely detection and response to possible threats are vital for protecting your organization’s assets. Microsoft Defender for Endpoint is a comprehensive security solution that monitors suspicious activity and helps organizations respond promptly to potential threats. By leveraging this [...]
Tip #7: Cloud Application Security
With the quickly evolving technology of today, the use of cloud applications has become universal. However, this widespread adoption also brings significant security challenges. Cloud Application Security is a critical tool that allows organizations to actively monitor app usage and detect suspicious behaviour. By [...]
Tip #6: Data Loss Prevention (DLP)
In today’s digital age, safeguarding sensitive information is crucial for any organization. Data Loss Prevention (DLP) policies are essential tools that help to prevent your organization’s sensitive information from being exposed. By implementing DLP policies, organizations can support the security of confidential data, even [...]
Tip #5: Sensitivity Labels
In the world of data security, sensitivity labels play a vital role in keeping your sensitive information safe. By correctly using sensitivity labels in emails or documents, organizations can automatically enforce encryption and restrict access to ensure that only authorized individuals can view or [...]
Tip #4: Protect Data with Encryption
Protecting sensitive information has become paramount in today’s digital age. One of the best ways to safeguard your data is through encryption. By encrypting your emails and documents, when they are shared outside your organization increases protection. This practice not only secures your sensitive [...]