Woman seated at a table using her laptop to view a business site

IT Post‑Acquisition Checklist: Stabilize, Secure, Standardize

After an acquisition closes, IT has to protect the business before it can perfect the integration. This checklist gives executives, IT leaders, and operations teams a practical way to stabilize the acquired environment, secure identities and data, and standardize systems without slowing the business down.

  • 16 minute read
Stabilize first Confirm access, backup, monitoring, vendors, licensing, and support coverage before large-scale change.
Secure the transition Reduce identity, endpoint, third-party, and shadow IT risk while teams learn the new environment.
Standardize with control Move toward common tools, policies, tenants, and operating rhythms through gated waves.

The first 90 days after an acquisition are not just an IT clean-up period. They are a risk window. The acquired company may bring unknown administrator accounts, unmanaged endpoints, duplicated Microsoft 365 licensing, different backup assumptions, undocumented integrations, stale firewall rules, unsupported hardware, untested incident response procedures, and business users who simply need work to continue.

Use this IT post-acquisition checklist to answer three questions quickly: What could break? What could be exploited? What should be standardized first?

Need a safe IT handover after an acquisition?

MSP Corp helps Canadian organizations stabilize newly acquired IT environments, reduce security risk, and build a practical roadmap for standardization across users, cloud, devices, vendors, and support operations.

Why post-acquisition IT gets risky so quickly

Most acquisitions create a temporary state where two businesses are expected to operate as one while their technology still behaves like two separate companies. That creates friction for employees and exposure for the business. Microsoft notes that mergers, acquisitions, divestitures, and similar events often require Microsoft 365 tenant-to-tenant migration planning, with decisions around architecture, design, and migration flow.1

Security pressure also increases. Verizon’s 2025 Data Breach Investigations Report found that third-party involvement in breaches doubled to 30%, while credential abuse and exploitation of vulnerabilities remained leading initial attack vectors.2 In a newly acquired environment, “third party” can mean old vendors, legacy remote access, abandoned SaaS tools, unmanaged integrations, or outsourced IT providers that still have access.

The goal is not to force every system into the parent company’s standard stack on day one. The goal is to make the environment stable enough to run, secure enough to trust, and documented enough to integrate.

The mistake to avoid

Do not start by migrating everything. Start by identifying what keeps the business running, who has privileged access, what data is sensitive, what is exposed to the internet, what is not backed up, and what would stop revenue if it failed.

The post-acquisition IT checklist at a glance

This checklist is designed around a practical operating sequence: stabilize, secure, standardize. The order matters because standardization without stabilization creates outages, and stabilization without security leaves the business exposed.

Workstream First objective Key questions Evidence to collect
Governance Name owners and decision gates. Who approves changes, risks, downtime, spend, and exceptions? RACI, escalation list, integration board cadence, risk register.
Identity and access Secure admin and user access. Who has privileged access, where is MFA enforced, and what access is external? Admin inventory, Conditional Access export, guest access list, break-glass accounts.
Endpoints and servers Know what is connected and unsupported. Which devices are unmanaged, unpatched, encrypted, monitored, and protected? Asset inventory, EDR status, encryption status, patch posture, warranty and lifecycle data.
Network and remote access Reduce unknown pathways. Which VPNs, firewall rules, exposed services, VLANs, and third-party connections exist? Firewall config, VPN users, public IP inventory, network diagrams, remote access logs.
Microsoft 365 and cloud Decide coexistence, consolidation, or separation. Which tenants, domains, workloads, retention policies, licenses, and integrations are in scope? Tenant assessment, domain map, workload inventory, license report, migration wave plan.
Backup and recovery Confirm recoverability before change. What is backed up, how often, who can restore it, and when was it tested? Backup policy, restore test results, RTO and RPO targets, immutable or offline backup proof.
Applications and data Map business-critical dependencies. Which applications run payroll, ERP, CRM, finance, operations, customer service, and production? Application inventory, data owners, integration map, API keys, contract and renewal list.
Support and operations Keep users productive during transition. Where do users get help, what SLAs apply, and what recurring issues already exist? Ticket export, user groups, VIP list, known issues log, support process map.

Key takeaway: the checklist should produce evidence, not just opinions. Every major integration decision should be backed by an inventory, policy export, log review, owner, or test result.

Phase 1: Stabilize the acquired environment

Stabilization is the short-term discipline of keeping the acquired business running while IT replaces assumptions with evidence. This is where you identify the people, systems, vendors, and dependencies that cannot fail during the transition.

  1. Set up an IT integration command structure Name an executive sponsor, IT workstream lead, security lead, business owner group, change approver, and communications owner. Give the team a daily cadence during the first two weeks, then move to weekly checkpoints once urgent risk is under control.
  2. Freeze high-risk change unless it protects the business Pause non-essential firewall changes, SaaS integrations, endpoint tooling swaps, server moves, and domain changes until you know what depends on them. Emergency security fixes should still proceed through an expedited approval path.
  3. Create a critical services map Identify the systems required for revenue, payroll, invoicing, email, customer support, production, legal commitments, and executive communications. For each system, document the owner, hosting location, authentication method, vendor contact, backup status, and recovery path.
  4. Capture the current-state inventory Build a working inventory of users, devices, servers, SaaS tools, cloud workloads, domains, DNS zones, SSL certificates, network devices, backup jobs, admin accounts, vendor contracts, and licenses. The Canadian Centre for Cyber Security recommends that organizations define which systems and assets are in scope and understand the value and potential injury tied to confidentiality, integrity, and availability.3
  5. Protect business continuity before migration Confirm that critical systems are backed up and restorable before moving domains, changing identity providers, consolidating tenants, replacing endpoints, or terminating old vendor access. Microsoft emphasizes that recovery from ransomware or accidental and malicious deletion depends on the ability to restore data quickly to a healthy state, not just the existence of a backup.4
Two professionals reviewing an IT integration plan on a laptop in a modern office
Post-acquisition IT integration works best when technical decisions are tied to business continuity, support impact, and security risk before large-scale standardization begins.
Stabilization deliverable

By the end of stabilization, you should have a critical services map, asset inventory, admin access inventory, backup verification, integration risk register, change freeze rules, communications cadence, and a user support path.

Phase 2: Secure identities, endpoints, data, and access

Identity is usually the fastest path into a newly acquired environment. Before you standardize platforms, secure the controls that determine who can sign in, what they can access, and how privileged actions are monitored.

1. Review privileged access immediately

  • Find every admin account. Review Global Administrator, Exchange Administrator, SharePoint Administrator, Teams Administrator, Intune Administrator, domain admin, firewall admin, backup admin, and third-party admin roles.
  • Remove or contain stale access. Disable or transfer accounts belonging to former employees, prior vendors, unused service accounts, and shared admin identities. Keep a documented break-glass process for emergency access.
  • Separate daily work from privileged work. Administrative accounts should be used only for administrative activity. This aligns with Canadian Centre for Cyber Security guidance to restrict administrator privileges and avoid using admin accounts for regular user activities.3

2. Move beyond basic MFA

MFA is important, but it should not be the only access control. Microsoft describes Conditional Access as its Zero Trust policy engine because it combines identity-driven signals, conditions, and access controls to enforce policy decisions.5 For an acquired environment, the first Conditional Access review should answer:

  • Are legacy authentication protocols blocked?
  • Are administrators required to use phishing-resistant authentication where possible?
  • Are unmanaged devices restricted from sensitive applications?
  • Are risky sign-ins challenged or blocked?
  • Are guest users and cross-tenant users controlled by explicit policy?
  • Are emergency access accounts excluded from policies only where necessary and monitored?

Microsoft Entra ID Protection can feed user risk and sign-in risk into Conditional Access, allowing organizations to require controls such as MFA, password change, reauthentication, or access blocking based on risk.6 If your acquisition includes a Microsoft 365 environment, this should be part of the first security baseline review.

3. Control cross-tenant collaboration

During integration, users may need to collaborate across two Microsoft Entra tenants before consolidation. Microsoft cross-tenant access settings allow organizations to manage inbound and outbound B2B collaboration, including whether to trust MFA and device claims from another tenant.7 This is useful, but it should be configured intentionally. Do not leave collaboration rules undocumented simply because users need quick access.

Security baseline for acquired identities

At minimum, confirm MFA coverage, administrator roles, emergency access, service accounts, legacy authentication, risky sign-in policy, guest users, cross-tenant collaboration settings, password reset flow, and audit log retention.

4. Triage vulnerabilities based on exploitation risk

Not every patch has the same urgency. CISA maintains the Known Exploited Vulnerabilities catalog as an authoritative source of vulnerabilities known to be exploited in the wild and recommends that organizations prioritize remediation of those vulnerabilities.8 After an acquisition, use KEV status, internet exposure, business criticality, and compensating controls to prioritize remediation.

5. Confirm backup and restore coverage

Backups are often misunderstood in acquired environments. Microsoft 365 retention, recycle bins, native resiliency, backup products, and third-party backups are not interchangeable. Microsoft 365 Backup, for example, supports restore of OneDrive accounts, SharePoint sites, and Exchange mailbox content from prior points in time, but restore capabilities and limitations vary by workload and configuration.9

Before touching production systems, verify backup coverage for Microsoft 365, endpoints, servers, cloud workloads, SaaS data, databases, file shares, domain controllers, networking devices, and line-of-business applications. The Canadian Centre for Cyber Security recommends backing up essential business information, restricting access to backups, encrypting backups, and verifying restore mechanisms.3

Turn the checklist into a managed transition plan

If your acquisition has multiple tenants, vendors, devices, support models, and security tools, MSP Corp can help you prioritize what to stabilize now, what to secure next, and what to standardize over time.

Phase 3: Standardize systems without breaking the business

Standardization is where the acquisition starts to feel like one company. It also carries operational risk. A good standardization plan moves users, devices, data, applications, and policies in waves with clear go and no-go criteria.

Microsoft 365 tenant consolidation

If both organizations use Microsoft 365, you will need to decide whether to maintain two tenants, consolidate into one, or use a longer coexistence model. Microsoft’s tenant-to-tenant migration model is designed to help organizations evaluate architecture approaches for mergers, acquisitions, divestitures, and similar scenarios, including single-event, phased, and split flows.1

For Microsoft 365 consolidation, standardization usually includes:

  • Domain ownership, DNS, and mail flow planning.
  • User identity mapping and duplicate account resolution.
  • Mailbox migration, calendar coexistence, and delegated access review.
  • OneDrive, SharePoint, Teams, and file permission migration.
  • Conditional Access, MFA, security defaults, and audit policy alignment.
  • Retention, sensitivity labels, eDiscovery, and data lifecycle decisions.
  • License optimization and contract rationalization.
  • Decommissioning of legacy tenants, groups, and apps after validation.

Microsoft’s cross-tenant mailbox migration guidance notes that users must be correctly represented in the target tenant and that certain conditions, such as mailboxes on hold, can block migration.10 Microsoft’s cross-tenant OneDrive migration guidance also notes the need to precreate users and groups, assign licenses, establish trust between tenants, and account for OneDrive size and path limits.11 These are not last-minute details. They belong in the wave design.

Useful next step

If Microsoft 365 tenant consolidation is in scope, build a dedicated plan for consolidating multiple tenants without downtime and a separate migration plan for cutover versus phased data migration.

Endpoint and device standardization

Acquired endpoints often vary by operating system version, encryption status, warranty, endpoint detection coverage, local admin rights, and management tool. Your goal is to bring devices into a common endpoint management and security model without interrupting users.

  • Classify devices into waves. Separate executive, finance, production, field, shared, kiosk, and general office devices.
  • Define the endpoint baseline. Standardize encryption, EDR, update rings, device compliance, local admin rules, browser policy, application control, and remote wipe.
  • Replace unsupported assets. Treat end-of-life operating systems, unsupported firewalls, unpatched servers, and unmanaged mobile devices as business risk, not just IT debt.

Network and firewall standardization

Network changes can break operations quickly. Standardize with evidence. Start with diagrams, firewall exports, VPN users, public IP addresses, segmentation, wireless networks, circuits, DNS, DHCP, certificates, and monitoring. For network device lifecycle risk, the UK National Cyber Security Centre warns that insecure acquisition, staging, management, or disposal of network devices can create future compromise paths.12

Prioritize rules and routes that create the most exposure: open inbound ports, stale VPN accounts, any-to-any firewall rules, vendor access, remote desktop exposure, flat networks, unsegmented guest Wi-Fi, and unmanaged site-to-site tunnels. For a deeper operational review, use a firewall rule review before replacing edge devices or collapsing networks.

Application and data standardization

Application standardization should be driven by business process, not tool preference. Identify which tools overlap and which systems cannot be retired because they support contracts, legal holds, production data, regulated workflows, historical records, or integrations.

Microsoft Purview Data Lifecycle Management supports retention and deletion for Microsoft 365 workloads such as Exchange, SharePoint, OneDrive, Teams, and Viva Engage, which matters when integrating acquired data into a governed environment.13 Before migrating data, decide who owns it, what must be retained, what can be archived, what is sensitive, and what should be defensibly disposed of.

A practical 30-60-90 day roadmap

Every acquisition is different, but most post-acquisition IT programs benefit from a structured 30-60-90 day roadmap. The timeline below assumes the business needs continuity, user support, security improvement, and a credible path to standardization.

Timeline Primary goal Core actions Exit criteria
Days 0 to 10 Protect the business. Establish governance, freeze risky change, collect admin access, confirm backup coverage, review critical vendors, validate support process, and begin external exposure review. Named owners, emergency contacts, critical services map, privileged access list, backup status, risk register, and support path.
Days 11 to 30 Stabilize operations. Build asset inventory, triage vulnerabilities, review MFA and Conditional Access, document applications, assess remote access, confirm monitoring, and communicate support expectations. Operational baseline, risk-ranked remediation plan, support dashboard, monitoring gaps, and first executive status report.
Days 31 to 60 Secure and prepare migration. Reduce stale admin access, harden identity, standardize backup policy, design tenant or domain coexistence, create migration waves, confirm data owners, and pilot changes. Approved security baseline, pilot users, migration design, rollback plan, stakeholder communications, and validated restore tests.
Days 61 to 90 Standardize in waves. Execute low-risk migrations, consolidate support tooling, rationalize licenses, remediate network rules, onboard endpoints, and formalize recurring IT operations. Wave results, issue backlog, decommission list, license savings opportunities, operational cadence, and next-quarter roadmap.

Key takeaway: the 90-day mark should not mean “everything is migrated.” It should mean the environment is controlled, measurable, and ready for broader standardization.

The detailed IT post-acquisition checklist

Governance and decision-making

  • Name the integration owners. Assign accountable owners for IT operations, cybersecurity, cloud, data, applications, procurement, legal, privacy, HR, finance, and communications.
  • Create a decision matrix. Define who approves downtime, user impact, vendor changes, system retirement, budget, risk acceptance, and exceptions.
  • Create a risk register. Track risk, impact, owner, mitigation, deadline, status, and evidence. Review it weekly in the first 90 days.
  • Define change windows. Protect revenue, payroll, month-end close, customer service, manufacturing, healthcare delivery, and other business-critical windows.

Identity and access

  • Export privileged roles. Include cloud admins, domain admins, local admins, backup admins, firewall admins, SaaS admins, and vendor admins.
  • Disable stale accounts safely. Validate former employees, shared accounts, vendor accounts, service accounts, and ownerless accounts before removal.
  • Review MFA and Conditional Access. Align MFA, device compliance, location, risk-based controls, legacy authentication, and break-glass exclusions.
  • Review guest and external access. Identify external users, B2B collaboration, cross-tenant access settings, shared channels, partner access, and unmanaged file sharing.
  • Plan identity convergence. Decide whether users will keep separate identities temporarily, use cross-tenant collaboration, or migrate into the parent tenant.

Security operations

  • Confirm monitoring coverage. Validate endpoint detection, SIEM, MDR, firewall logging, Microsoft Defender, Microsoft Sentinel, identity alerts, and backup alerts.
  • Build an incident response bridge. Make sure both companies know who responds to ransomware, business email compromise, account takeover, server failure, vendor compromise, and data exposure.
  • Test escalation paths. Use a simple tabletop exercise to confirm who can isolate a device, revoke sessions, reset credentials, block domains, restore files, and notify leadership.
  • Prioritize exploited vulnerabilities. Use CISA KEV, external exposure, business criticality, asset value, and compensating controls to rank remediation.

Incident response should be planned before a real incident occurs. NIST SP 800-61 Revision 3 states that incident response should be integrated across organizational operations and aligned with the six functions of the NIST Cybersecurity Framework 2.0.14 For practical internal planning, pair this checklist with an incident response plan template, an incident triage workflow, and a business continuity plan template.

Network and infrastructure

  • Map networks and sites. Document offices, warehouses, production sites, cloud networks, circuits, wireless networks, VPNs, VLANs, public IP addresses, and network dependencies.
  • Review remote access. Confirm who uses VPN, ZTNA, remote desktop, vendor portals, jump boxes, and third-party remote support tools.
  • Review segmentation. Identify whether finance, operations, guest Wi-Fi, servers, identity infrastructure, backups, and production networks are separated.
  • Review firewall rules. Find overly broad rules, stale vendors, risky inbound services, duplicate NAT rules, and undocumented exceptions.

If the acquired company depends heavily on VPN, plan whether a ZTNA versus VPN migration strategy is appropriate before collapsing access models. If offices will be consolidated, an office network redesign checklist can help prevent Wi-Fi, VLAN, and segmentation issues.

Microsoft 365 and productivity

  • Inventory tenants and domains. Include accepted domains, DNS dependencies, mail routing, MX records, SPF, DKIM, DMARC, Teams settings, SharePoint sites, OneDrive accounts, and Power Platform environments.
  • Review administration cadence. Confirm weekly, monthly, and quarterly Microsoft 365 admin tasks, including license reviews, secure score improvements, access reviews, retention, and audit checks.
  • Review Copilot and AI readiness. Identify sensitivity labels, overshared files, external sharing, retention, licensing, and AI governance requirements before expanding AI usage.
  • Plan migration waves. Group users by business unit, data complexity, executive impact, shared mailboxes, delegated access, and application dependencies.

If AI is already in use across the acquired company, do not treat it as a separate innovation project. IBM’s 2025 Cost of a Data Breach research found that 63% of organizations lacked AI governance policies and that ungoverned AI systems are more likely to be breached and more costly when breached.15 Review AI governance for IT teams and a Microsoft 365 Copilot readiness checklist before enabling broad AI access.

Data protection and compliance

  • Identify sensitive data stores. Map personal information, financial records, customer data, regulated data, HR files, legal data, contracts, intellectual property, and production data.
  • Review retention and holds. Confirm retention policies, litigation holds, eDiscovery requirements, archive systems, and records ownership before migrating or deleting data.
  • Review data sharing. Identify anonymous links, external sharing, shared mailboxes, Teams guest access, cloud storage tools, unmanaged SaaS, and personal file-sharing tools.
  • Validate recoverability. Perform restore tests for critical Microsoft 365, server, SaaS, and database workloads before cutover.

Procurement, licensing, and vendors

  • Build a vendor inventory. Include MSPs, telecom, cybersecurity, cloud, SaaS, hardware, software, backup, printer, website, domain, and support vendors.
  • Review renewal dates. Find upcoming renewals, termination clauses, contract minimums, data exit obligations, and duplicate services.
  • Review license overlap. Compare Microsoft 365, security, endpoint, backup, CRM, ERP, collaboration, and project management licensing across both companies.
  • Control vendor access. Remove vendors that no longer need access and move required vendors to named accounts, MFA, logging, and least privilege.

CISA describes ICT supply chain risk as spanning hardware, software, managed services, third-party vendors, suppliers, service providers, and contractors throughout the lifecycle of design, development, deployment, maintenance, and disposal.16 In acquisition work, vendor access should be treated as a security workstream, not just a procurement task.

User support and communications

  • Define where users get help. Clarify helpdesk channels, hours, SLAs, escalation paths, VIP support, after-hours support, and urgent incident reporting.
  • Publish a transition FAQ. Explain what is changing, what is not changing, who to contact, when migrations happen, and how users can spot suspicious communications.
  • Prepare for phishing risk. Acquisition periods create confusion, and attackers can exploit unfamiliar login screens, new domains, new helpdesk messages, and urgent change requests.
  • Track recurring issues. Use ticket data to find patterns before standardization. Common examples include slow devices, mailbox problems, VPN issues, password resets, printer outages, and application access gaps.

For support scoping, review what is typically included in 24/7 IT support and confirm which responsibilities stay internal, move to MSP Corp, or remain with a vendor during transition.

What to standardize first

Standardization should be sequenced by risk and business value. The best first targets are usually the controls that reduce exposure without disrupting the user experience.

First: identity security

Standardize MFA, Conditional Access, admin roles, guest access, break-glass accounts, service accounts, and joiner-mover-leaver processes. Identity controls protect nearly every other system.

Second: endpoint visibility

Bring endpoints into a common inventory, EDR, encryption, patching, and compliance model. You cannot manage what you cannot see.

Third: backup and recovery

Standardize backup policies, restore testing, privileged access to backups, and recovery ownership before any high-impact migration wave.

Fourth: support operations

Standardize ticket intake, escalation, after-hours support, user communications, asset tagging, and known issue tracking so users do not feel the integration as chaos.

Post-acquisition red flags that need immediate attention

Some findings should move straight into urgent remediation. They indicate either elevated compromise risk or an operational failure waiting to happen.

  • Unknown Global Administrators or domain admins. Especially shared, vendor-owned, inactive, or non-MFA accounts.
  • Unmanaged internet-facing systems. Includes remote desktop, old VPN appliances, exposed management portals, unsupported firewalls, and forgotten test systems.
  • Backups that have not been restored recently. A backup that has not been tested is an assumption, not a recovery plan.
  • Multiple helpdesks with unclear ownership. Users need one path for urgent issues, security reports, and executive escalations.
  • Flat networks with sensitive systems mixed in. Finance, servers, backups, guest Wi-Fi, production systems, and user devices should not all share the same trust level.
  • Old vendor access with no named owner. Third-party access should be assigned, justified, monitored, and removed when no longer required.
  • Overshared Microsoft 365 data before Copilot rollout. AI readiness depends on data governance, permissions, and sensitivity controls, not just licensing.
  • No incident response owner. If no one knows who can revoke sessions, isolate devices, restore data, or notify leadership, response time will suffer.

If these red flags sound familiar because the acquired company had an underperforming outsourced provider, MSP Corp’s guide on when to switch MSPs can help frame the transition risk, governance requirements, and handover steps.

How MSP Corp helps after an acquisition

MSP Corp supports post-acquisition IT by combining security-first managed IT, Microsoft expertise, local service, and national reach. The practical outcome is a safer transition: fewer unknowns, clearer ownership, stronger security controls, and a roadmap your executive team can understand.

Discovery and current-state assessment

We help identify critical services, users, devices, vendors, Microsoft 365 tenants, cloud workloads, licensing, applications, security tools, and support gaps.

Security stabilization

We help prioritize identity hardening, vulnerability remediation, endpoint visibility, backup validation, monitoring coverage, and incident response readiness.

Microsoft 365 and cloud integration

We help plan tenant coexistence, migration waves, access controls, data governance, Microsoft 365 administration, Copilot readiness, and cloud standardization.

Managed IT transition

We help create a safe handover from inherited vendors, internal teams, or prior MSPs while keeping users supported and operations stable.

For organizations that need continued operational support, MSP Corp’s managed IT services can provide the structure, support, and accountability needed to move from acquisition chaos to a stable operating model.

Frequently asked questions

What should IT do first after an acquisition closes?

Start by stabilizing access, support, backups, and critical services. Identify privileged accounts, critical applications, backup coverage, vendor access, user support paths, and urgent security exposures before beginning major migrations or standardization work.

How long should post-acquisition IT integration take?

The stabilization phase usually starts immediately and should produce a usable risk and operations baseline within the first 30 days. Full standardization can take longer depending on the number of users, tenants, applications, sites, regulatory obligations, and data migration complexity.

Should we consolidate Microsoft 365 tenants right away?

Not always. Consolidation should follow discovery, identity mapping, data ownership review, security baseline alignment, migration wave design, and rollback planning. Some organizations need a coexistence period before users, mailboxes, OneDrive, SharePoint, Teams, and domains are moved.

What is the biggest security risk after an acquisition?

Identity and third-party access are often the most urgent risks. Unknown admins, stale vendor accounts, weak MFA coverage, unmanaged remote access, and guest access can all create exposure before the parent company fully understands the acquired environment.

How can we reduce downtime during IT integration?

Use phased migration waves, pilot users, clear rollback plans, backup validation, change windows, stakeholder communications, and support surge coverage. Do not combine too many high-risk changes into one cutover.

Stabilize, secure, and standardize with MSP Corp

Whether you are integrating one acquired company or building a repeatable acquisition playbook, MSP Corp can help you reduce risk, protect users, and create a practical managed IT roadmap.

References

  1. Microsoft Learn, Microsoft 365 tenant-to-tenant migrations.
  2. Verizon, 2025 Data Breach Investigations Report announcement.
  3. Canadian Centre for Cyber Security, Baseline cyber security controls for small and medium organizations.
  4. Microsoft Learn, Overview of Microsoft 365 Backup.
  5. Microsoft Learn, What is Conditional Access?.
  6. Microsoft Learn, Microsoft Entra ID Protection risk-based access policies.
  7. Microsoft Learn, Cross-tenant access settings for B2B collaboration.
  8. CISA, Reducing the Significant Risk of Known Exploited Vulnerabilities.
  9. Microsoft Learn, Restore data in Microsoft 365 Backup.
  10. Microsoft Learn, Cross-tenant mailbox migration.
  11. Microsoft Learn, Cross-tenant OneDrive migration.
  12. National Cyber Security Centre, Acquiring, managing, and disposing of network devices.
  13. Microsoft Learn, Microsoft Purview Data Lifecycle Management.
  14. NIST, SP 800-61 Revision 3 incident response announcement.
  15. IBM, Cost of a Data Breach Report 2025.
  16. CISA, Information and Communications Technology Supply Chain Risk Management.