Founder expertise
Gyorgy Bolyki | M365 Security Consultant
Founder profile for Gyorgy Bolyki: Microsoft 365 security, Entra ID, Intune, Defender, Cyber Essentials Plus readiness and UK SME consultancy.
Working style
Review the control, fix the priority, leave a trail.
The consultancy work is practical Microsoft 365 (M365) security: Entra ID, Conditional Access, Intune, Defender, endpoint control, Exchange, SharePoint and Cyber Essentials Plus readiness for UK teams that need clear remediation.
Outputs are written so a buyer, internal IT owner or existing supplier can see what changed, why it changed and what still needs ownership. That is useful for audit, board reporting and day-to-day handover.
Gyorgy Bolyki is a Microsoft 365 security consultant and founder of Magrathean UK. The work focuses on UK SME security: identity, endpoint control, Defender, Intune, Exchange, SharePoint and Cyber Essentials Plus readiness.
Areas of work
- Microsoft 365 security cleanup
- Microsoft Entra ID
- Conditional Access
- Microsoft Intune
- Windows Autopilot
- Microsoft Defender for Endpoint
- Exchange Online
- SharePoint and OneDrive governance
- Cyber Essentials Plus readiness
- AI adoption support
Trust notes
- Readiness and remediation support only; certification is handled by authorised Certification Bodies.
- Public proof only uses details that are safe to publish.
- Recommendations are written so internal IT or incumbent suppliers can carry them forward.
Review work
Tenant reviews focus on the controls that usually create business risk: admin roles, MFA, Conditional Access, sharing, endpoint state, Defender and evidence.
Remediation work
Remediation is scoped around approved changes, rollback notes and evidence. The aim is not noise; it is a smaller, safer control set someone can own.
Handover work
Handover notes explain what changed, what remains, where evidence lives and how internal IT or an existing supplier should keep the controls running.
Useful for supplier checks
Buyers usually need to know whether the work is consultancy, managed service, assessment support or software delivery. For the IT route, the focus is scoped Microsoft 365 security review, remediation and handover for UK teams.
The best first message explains the current setup, the control problem, the people who own Microsoft 365, and any audit, client assurance or Cyber Essentials Plus deadline attached to the request.
Useful supplier checks usually ask for scope, access handling, evidence, output format and handover owner. Those are the details that decide whether a security review becomes operationally useful.
For Microsoft 365 work, the strongest early signal is whether a supplier can explain ownership after the fix. Controls only stay useful when someone knows how to review them again.
This profile exists to make that route easier to check before a conversation: what the work covers, how it is handed over, and which channels are public.
It also keeps the page focused on real procurement and delivery questions: expertise, contact routes, public profiles, control areas and practical output. Those are the facts a buyer needs before sharing tenant context. They keep the first call concrete and useful.