Practical security for small teams and growing businesses

Reduce real risk.
Get a defensible security baseline.

I help organisations harden identity and email, close common persistence paths, and build a clear plan that you can execute. Straight answers, documented changes, and measurable outcomes.

Microsoft 365, Entra ID, Defender, Cloudflare Clear deliverables and documentation
Typical outcomes Week 1–2
What you get quickly

A clean baseline and a plan: what’s risky, what’s fixed, what remains, and what to do next.

Identity hardeningSSPR/MFA posture, risky apps, admin hygiene
Email persistence cleanupRules, forwards, OAuth grants, legacy auth
Actionable roadmapPrioritised fixes with effort + impact

Services

Pick a focused engagement or start with a baseline assessment. Everything is scoped, documented, and delivered in plain English.

Baseline1–2 weeks

Security Assessment + Roadmap

Snapshot of your current posture with a prioritised plan you can execute.

  • Identity and email review
  • Misconfigurations + risky access paths
  • Written recommendations
HardeningFast impact

M365 / Identity Hardening

Make compromise harder: lock down admin surfaces and reduce blast radius.

  • MFA + conditional access review
  • Admin roles + privileged accounts
  • Legacy auth and risky app consent
SupportWhen needed

Incident Support

Rapid triage, containment guidance, and clean documentation for next steps.

  • Email compromise recovery
  • OAuth persistence + mailbox rules cleanup
  • Post-incident hardening plan

Approach

Security should be boring in production: measured changes, clear rollback, and evidence you can show later.

How engagements run

  • Kickoff + scope: confirm goals, constraints, access
  • Discovery: identify active risks and easy wins
  • Changes: apply hardening with documentation
  • Delivery: report + roadmap + recommended next steps

What you won’t get

  • Vague findings with no fix path
  • Tool-driven theatre
  • Changes without rollback notes
  • Endless “phase 2” upsell

About

Built for teams who need real improvements now: tighter identity, cleaner email posture, and fewer easy compromise paths.

Want a baseline and a plan?

If you tell me your stack and your biggest concern (phishing, mailbox compromise, admin sprawl, or “we don’t know what we don’t know”), I’ll recommend the smallest engagement that actually solves it.

Contact

Replace the email below with yours. If you prefer, link to a Calendly instead.

Email

contact@logicdigitalsecurity.com

Typical reply time: same day. If it’s urgent, put “URGENT” in the subject line.