The IT company relied on default Microsoft 365 settings with no centralized security policy, leaving endpoints, email, and identities exposed to common threats like phishing and malware.
There was no single view of security events across devices, mailboxes, and cloud services, making investigations slow and reactive.