Subscribe to GEN
Login to GEN
Add a Comment
I feel compelled to write this because whilst many people were enjoying the holiday period, the team at GEN took on a new client who was desperate for help after their Microsoft 365 tenancy was compromised.
The initial compromise appears to have occurred earlier, but the criminals waited for the quiet period to apply pressure: they leveraged social engineering, gained access to banking, emptied accounts, siphoned data from OneDrive and SharePoint, and then locked the business out. This is not a small organisation (around 120 staff across two sites). They were left with no systems, no cash, no clear picture of what had happened, and no meaningful escalation route.
Weeks earlier we saw a similar pattern with another new client, this time on Google Workspace. Their Google account was compromised and subsequently terminated. In practical terms that meant the business lost email, documents, and access to the identity backbone that tied everything together. In that case we were simply unable to persuade Google to do the right thing because there was nobody to contact. The client lost a small fortune in disrupted work during the week it took to rebuild services, notify customers, update public facing channels, and restore basic operations.
These incidents are not “edge cases”. They are the logical conclusion of putting too much of your business inside a single vendor ecosystem.
Ecosystems are sold as convenience: one login, one portal, one bill, one “platform”. The trade is rarely described as bluntly as it should be. When you buy into an ecosystem, you typically lose:
Yes, there are benefits:
The problem is that the benefits are operational convenience, while the costs are strategic and existential.
“Lock‑in” is when a vendor makes it economically, technically, or operationally painful to leave. Not “impossible”, just painful enough that most customers won’t do it.
Lock‑in happens through a combination of:
Once you understand that, a lot of ecosystem behaviour makes sense. It also makes the right response clear: reduce coupling, increase portability, and design for exit.
The goal is not to create a fragile collection of random tools. The goal is to build a deliberate stack where each component can be changed without collapsing the entire business.
A practical “de-ecosystemed” approach often looks like this:
This gives you something ecosystems actively work against: failure isolation. If one system is breached, suspended, or experiences an outage, it should not automatically take everything else with it.
Multi-factor authentication is essential, but it is not the whole story. Ecosystems tend to create single points of failure because identity becomes the universal key. When that key is copied (through phishing, token theft, consent attacks, SIM swaps, or compromised endpoints), the attacker can move laterally at speed.
Architectural controls that materially reduce risk include:
For many organisations, the most painful discovery is not technical. It is organisational: when an incident happens, there is no meaningful escalation route.
That gap is what created the modern “MSP middleman” industry: not because pushing buttons in portals is complicated, but because customers need a human being to answer the phone when things go wrong.
However, if your architecture makes one vendor the only real gatekeeper of your business, your MSP (or internal IT team) can become helpless in the moment that matters. The answer to that is not “a better MSP”. It is to stop making your business dependent on a single third party’s goodwill and queue length.
Across the industry we are seeing a growing appetite for more controllable systems: private cloud, sovereign hosting, on‑prem where it makes sense, and best-of-breed combinations that preserve optionality.
This is happening for several reasons:
Microsoft in particular has been steadily embedding its ecosystem deeper into Windows: sign-in flows nudging users into Microsoft accounts, aggressive OneDrive prompts, default browser steering, and “helpful” integrations that are difficult to disentangle later.
That is not accidental. If the operating system is the distribution channel, the ecosystem becomes the default. And if the ecosystem is the default, leaving becomes “unusual” — and therefore harder.
Most “cloud” services are built on straightforward principles: virtualisation, redundant storage, networking, backups, monitoring, and good operations. At a technical level, there is nothing mystical about this.
For many organisations, a private cloud (or hosted private cloud) can be:
At GEN we provide building blocks for this approach (enterprise email, UK hosted private virtual cloud, managed security, and real human support), but the broader point is simple: you have options.
Ecosystems are marketed as simplicity. In reality, they are concentration risk. If your email, files, identity, and devices all belong to one provider, then one compromise, one suspension, or one support failure can become an existential event.
The alternative is not chaos. It is deliberate separation: best tools for each job, open standards where possible, independent backups, and a provider ecosystem that includes people you can reach when you need them.
In 2026, resilience is not a feature you “add later”. It is architecture, and it starts by refusing to hand your entire business to a single vendor stack.
--- This content is not legal or financial advice & Solely the opinions of the author ---