

Publish Date
30/09/2025
Categories
Blogs Hot Topic
This article was last reviewed and updated for accuracy in October 2025.
AI tools like Microsoft Copilot, ChatGPT, and Gemini are becoming part of everyday workflows, in every business. They help us write faster, analyse data, and brainstorm ideas, but as we all know, AI has introduced new risks, especially when sensitive data is involved.
That’s why Microsoft has created Data Security Posture Management (DSPM) for AI.
DSPM for AI is a feature in Microsoft Purview that helps organisations monitor and manage how AI tools interact with sensitive data. It’s important to note, it’s not about blocking AI, it’s about making sure it’s used responsibly.
Think of it like a set of guardrails: it watches how AI tools are used in your organisation, flags risky behaviour (such as uploading highly sensitive data), and helps your teams to respond before something goes wrong.
AI tools are incredibly helpful, but they don’t always know what’s sensitive or confidential. That’s where it’s up to organisations to take back control. When people use AI without clear guidance or proper safeguards, things can easily slip through the cracks:
DSPM for AI helps spot these moments and gives security teams the tools to act.
Here’s a breakdown of how it works:
To use DSPM for AI, your organisation needs:
Once these pieces are in place, you can begin applying policies, reviewing AI activity, and tailoring controls to fit your organisation’s needs.
That said, it’s not always that straightforward. Setting up DLP policies, sensitivity labels, or insider risk rules can get complex, especially if you’re new to Microsoft Purview or AI governance.
If this sounds like something you’re exploring, our team have worked with a wide range of organisations when it comes to AI readiness, from initial scoping and consultancy, to hands-on setup and long-term planning. Whether you’re just starting out or refining an existing setup, our Microsoft experts are here to support you.
AI isn’t going away anytime soon. And while it might be tempting to ignore the risks (or even ban AI tools altogether), the reality is that employees will still find ways to use them – often on personal devices, outside of company oversight. The benefits of AI are clear, but like any powerful tool, it needs structure and control.
Someone in our business summed it up perfectly: it’s controlled AI vs uncontrolled AI. And if you’re not actively managing how AI is used, you’re leaving the door open for data to be exposed or mishandled.

Publish Date
05/06/2025
Categories
Blogs
This article was last reviewed and updated for accuracy in June 2025.
If you’re using Microsoft 365 through GoDaddy, you’re likely hitting roadblocks: limited admin access, delayed features, and restricted scalability. You’re not alone. Thousands of UK businesses are choosing to move to Microsoft 365 Direct – and when they do, they trust Cobweb to lead the transition.
As one of the top 0.3% of Microsoft Partners globally and holding all six Microsoft Solutions Partner designations, Cobweb is uniquely positioned to deliver not just a migration, but a transformation.
No – and that’s exactly the problem. GoDaddy resells a heavily restricted version of Microsoft 365. You’re not getting the full experience or value.
Common issues with GoDaddy Microsoft 365:
What does Microsoft 365 Direct offer?
If you’re scaling, improving your security posture, or simply want more control – this move is not just recommended, it’s essential.
Migrating from GoDaddy to Microsoft involves a few key steps. First, you’ll need to unlock your domain in your GoDaddy account and request an authorisation code (EPP code). Then, set up a Microsoft 365 subscription directly through Microsoft or a certified partner like Cobweb. You’ll initiate the domain transfer using the code and update your DNS records (MX, CNAME, SPF, etc.) to point to Microsoft’s servers. If your emails are hosted with GoDaddy, you’ll also need to migrate your mailboxes and data – a process that can become quite technical.
While it’s possible to do this on your own, the process involves several technical layers and potential pitfalls – especially around email continuity, data integrity, and DNS configurations.
Even though the migration process can be done manually, doing it right the first time is critical. One misstep can result in email downtime, lost data, or interrupted workflows. That’s why many businesses choose Cobweb as their trusted migration partner.
At Cobweb, we don’t just move your data – we design a strategic migration plan tailored to your business. Our team handles everything from domain transfers and DNS changes to mailbox migrations and user training. We ensure there’s zero downtime, and we don’t disappear post-migration. We continue to support your team with UK-based experts and strategic guidance, helping you maximise the value of Microsoft 365.
If GoDaddy’s Microsoft 365 is holding you back, it’s time to take control.
At Cobweb, we guide you through every step of the move and continue supporting you long after migration day. Our team becomes an extension of yours – resolving issues before they impact your business.
Let’s talk. Contact us here to book a free discovery call today and find out how we can unlock the full power of Microsoft 365 for your business.

Publish Date
04/06/2025
Categories
Blogs Hot Topic
This article was last reviewed and updated for accuracy in June 2025.
Whether you’re wrangling complex data in Excel or crafting a research-heavy report in Word, Microsoft’s Copilot suite is here to help. Copilot Analyst turns your spreadsheets into insight machines, while Copilot Researcher helps you find, summarise, and cite information faster than ever. In this guide, we’ll explore their features, differences, and how to make the most of them in your workflow.
Copilot Analyst is an AI-powered assistant built into Microsoft Excel and Power BI. It helps users analyse data, generate insights, identify trends, and create visualisations using natural language prompts — no advanced formulas or coding required.
Copilot Researcher assists with gathering and summarising information, drafting content, and compiling references. It integrates with Microsoft Word and other Microsoft 365 apps to help users write well-researched documents faster.
While both tools use AI, Copilot Analyst focuses on data analysis and insights within Excel and Power BI, whereas Copilot Researcher is geared towards content creation, summarisation, and structured research in Word and other documentation tools.
Yes, Copilot Analyst can help identify inconsistencies, detect duplicates, and suggest transformations to prepare your data for analysis — especially within Excel spreadsheets and Power BI datasets.
Yes, Copilot Researcher can summarise long-form content, including academic articles and reports, and even suggest references and citations (depending on data access permissions and tools enabled).
Copilot Analyst features are gradually being integrated into Power BI, enabling users to query datasets using natural language, build visuals, and generate dashboards with AI assistance.
Copilot Researcher may pull publicly available data if permitted, but it primarily relies on sources Microsoft 365 has access to. It is not a full web search engine but can generate summaries based on embedded or linked content.
Some versions of Microsoft 365 (particularly Microsoft 365 Copilot for Enterprise) include access to Copilot features, but availability varies by plan and region. UK users may need to check licensing or upgrade options.
Microsoft Copilot services are built with enterprise-grade security, including data residency, encryption, and compliance with major standards like GDPR. Your data stays within your Microsoft environment and is not used to train the AI.
Yes. When summarising information or drafting reports, Copilot Researcher can include properly formatted references. It supports citation styles like APA, MLA, and Chicago depending on the tool you’re using.
As of 2025, Copilot for Microsoft 365 typically costs around £25–£30 per user/month per seat.
If you’d like assistance with using Copilot in your business, feel free to reach out to our team at hello@cobweb.com.



Publish Date
25/07/2024
Categories
Blogs Hot Topic
The recent CrowdStrike failure was indeed an unfortunate event, causing significant disruption across many organisations. However, it also provided a stark illustration of the potential consequences when critical systems are compromised. Unlike a cyber attack, this outage demonstrated how even non-malicious failures can have far-reaching impacts.
Downtime, regardless of its cause, can have devastating effects on a business. These range from loss of revenue and inaccessible data to diminished customer confidence and, ultimately, loss of business.
In the case of ransomware attacks, the impact can be even more severe, comparable to the dreaded “blue screen of death” experienced worldwide last week. While a blue screen may have straightforward solutions, ransomware attacks often leave organisations without viable workarounds. This leads to significant operational disruptions, data loss, and financial repercussions. Essentially, a ransomware attack is like a blue screen of death—for all the data in your business.
The CrowdStrike outage affected a vast number of users, highlighting the vulnerability of even the most robust systems. The incident underscored the critical need for businesses to have strong cybersecurity measures in place, not only to prevent attacks but also to ensure quick recovery from unforeseen failures.
The financial impact of IT downtime is staggering. According to a report from MSN, companies are losing billions every year due to IT downtime. This loss is not just due to ransomware but also from unexpected system failures, like the one experienced by CrowdStrike. Despite these recurring issues, many organisations are not improving their ability to fix such problems promptly.
However, the facts show that the chance of downtime is increasing, with the ‘it’s not if, it’s when’ mantra commonplace amongst cyber security experts.
According to the Hiscox Cyber Insurance Readiness Report 2023:
These statistics emphasise the critical need for robust cybersecurity measures and quick incident response protocols.
This recent event has served as a wake-up call for businesses to reassess their IT strategies. It is crucial to invest in robust protective measures, proactive threat detection, and swift incident response protocols. Many organisations operate under the false assumption that “it won’t happen to us” until it does. The CrowdStrike outage is a powerful reminder that downtime can strike any business, at any time.
Who is Responsible?
It’s essential to have clear accountability within your organisation for managing cybersecurity risks. Typically, the IT Lead is responsible for the overarching cybersecurity strategy. However, every employee has a role to play in maintaining security protocols and reporting suspicious activities.
As Microsoft advises,
“In the event of an outage or disruption to the Service, you may temporarily not be able to retrieve Your Content. We recommend that you regularly backup Your Content and Data that you store on the Services or store using Third-Party Apps and Services.”
This highlights the importance of regular data backups and having a well-defined disaster recovery plan in place.
Lessons Learned and Moving Forward
The disruption experienced during the CrowdStrike failure serves as a sobering reminder of the critical need for robust protective measures. To mitigate the risks associated with IT downtime, businesses should consider the following steps:
Conclusion
In conclusion, the CrowdStrike outage has provided valuable lessons on the cost of downtime. No one thinks it will happen to them—until it does. By learning from these experiences and taking proactive measures, businesses can better safeguard their operations and minimise the financial and operational impact of future disruptions.
As a Managed Service Provider (MSP), we are committed to providing and maintaining secure and resilient IT infrastructures. If ever there was a wake-up call required around the impact of downtime, last week provided a stark reminder. If you are interested in mitigating the risk of downtime, and want a no obligation discussion around email security, backup & disaster recovery, or security awareness and testing for staff, please fill in this form.
Stay Secure.


Publish Date
28/05/2024
Categories
Blogs
Keeping your business safe from cyber threats is a top priority in today’s digital landscape. One key aspect of this is ensuring your systems are regularly updated with the latest patches.
Cyber attackers often exploit vulnerabilities left unaddressed by outdated software, leading to potential financial losses and breaches for businesses. Addressing these vulnerabilities through regular patch management is crucial.
In a 2019 survey conducted by Ponemon Institute, 60% of breach victims said they were compromised due to known vulnerabilities they didn’t patch. In 2021, Microsoft found that more than half of known network vulnerabilities were due to missing patches, and a staggering 68% of organisations hit by ransomware lacked effective patch management. Clearly, patching is an absolute necessity for any business when it comes to their cyber security.
Patch management involves the timely deployment of updates by third-party applications to address evolving vulnerability gaps. This ensures that the software remains resilient against potential security breaches, mitigating the risk of exploitation by malicious actors.
By promptly applying updates as they become available, organisations can minimise their exposure to vulnerabilities, reducing the window of opportunity for a breach. Basically, you’re keeping your digital defences up-to-date to ward off potential attacks.
With technology advancing rapidly, cyber threats are becoming more sophisticated, especially with the rise of AI. Attackers can now exploit vulnerabilities faster than ever, meaning developers are having to constantly release patches where there may be a security gap.
While patching manually is possible, it can be time-consuming and prone to delays which is not ideal when it’s neck and neck between you and a potential cyber-attack. In fact, it is estimated it takes 28 days to patch once a high-risk vulnerability is detected on-premises.
On the other hand, automating patch updates streamlines the process, ensuring your systems stay protected without the risk of human error. Just remember to plan out these automatic patch updates so that you have the least amount of disruption for your business as possible. Not only does then mean less downtime for your business, but your IT team will have greater internal availability for other projects.
It may not always be possible with every application to just ‘automatically patch’. But if external management is the route you want to take, you could consider working with a managed service provider (MSP) to ensure seamless patch management.
Integrating patch management into your IT strategy is crucial for maintaining security best practices. Partnering with an MSP that offers automated patch management, along with device management and proactive monitoring, ensures your systems are always protected.
At Cobweb, we provide a comprehensive Microsoft managed service with third-party patch management for over 1500 applications. Our experts will handle the patching process, freeing you to focus on your core strengths and responsibilities. Learn more here about our managed services to keep your business secure and resilient.
Thursday 13th June 2024 @ 3PM

Publish Date
21/05/2024
Categories
Blogs
No longer should IT roles just be ‘behind the scenes’. IT leadership is about driving innovation and creativity for business growth. And yet, only 9% of IT leaders perceive their role as directly contributing to business expansion. Traditionally, this may have been the case, but with how fast the online world changes, you need to keep on top of new technologies and innovative IT to stay ahead of your competitors.
Gone are the days of IT leaders simply ‘keeping the lights on’. Now, they’re expected to be strategic thinkers, innovators, and agents of change. That means focusing on initiatives that align with the organisation’s big-picture goals and finding ways for technology to drive business growth.
Budgets are tight, so IT leaders need to be clever about where they invest their resources. It’s all about finding the right balance between thinking outside the box and staying efficient. Whether it’s investing in cloud technology or data analytics, every penny spent should have a clear impact to the business’s short and long term goals.
Measuring the impact of tech investments can be tricky, but it’s essential for proving their value. That means setting measurable goals and tracking progress every step of the way. Whether it’s improving customer satisfaction or boosting sales, IT leaders need to show that their initiatives are making a difference.
AI and automation are changing the game for IT leaders, offering new ways to boost efficiency and productivity. But it’s not just about implementing the latest technology—it’s about empowering departments to use it effectively. That means investing in training and creating a culture that embraces new ideas for the better of the business.
Due to the nature of business, IT leaders need to keep customers at the front and centre in everything they do. That means working closely with other departments to understand their needs and delivering experiences that exceed expectations. Happy customers mean business growth, plain and simple.
Change is inevitable, especially when it comes to technology. Technology managers and leaders need to be ready to adapt and evolve, constantly looking for new opportunities to drive growth. Your business needs to stand out, look professional and show off that it’s ahead of the game!
Essentially, the role of IT leadership is more critical than ever in driving business growth and innovation. By thinking strategically, making smart investments, showing tangible results, embracing automation, putting customers first, and embracing change and leveraging new technology, IT leaders can help their organisations thrive in today’s fast-paced digital world.
Consider emails, for instance. Typically, we glance over the content before our eyes settle on the conclusion. Which is more memorable? A simple black text signature, or a vibrant, branded e-signature complete with relevant social media and website links? Exclaimer is an innovative strategy to drive business growth through an email signature management platform. With the user-friendly platform, IT leaders can ensure brand consistency, boost productivity, and drive business growth with ease. And this is only one example at a relatively low cost!
Remember, to drive business growth, you need to stand out and be different. You need to leave an impression, and so implementing creative technologies into your business strategy is crucial.
Recent Comments