In late 2024, RMI’s IT and leadership teams were concerned about:
Increased phishing attempts and impersonation attacks targeting executives and operations staff
Growing use of untracked third-party apps (Google Drive, Splashtop, WebEx)
Poor endpoint patching coverage
Limited automation in threat remediation
Key metrics from December 2024:
194 malicious emails flagged (payment scams, impersonation attempts)
16,003 spam emails filtered
66 of 106 endpoints missing patches
51 endpoints running Google Drive without formal authorization
10 open data protection risks tied to Office 365 and OneDrive
High-value targets identified across executive and operations roles
Despite existing tools (EDR, NDR, deception, storage control), RMI lacked automated remediation workflows and unified response dashboards.
Benchmarked conducted a full assessment and remediation roadmap, aligned with COBIT and NIST CSF, structured into three focus areas:
Mapped 5 high-risk threat categories:
Payment fraud phishing
Credential harvesting
Executive impersonation
Obfuscated malware
Vendor spoofing
Identified 8 high-risk users receiving >10 targeted emails monthly
Created a remediation matrix ranked by effort and potential impact
“RMI now has clear visibility into our cyber exposure — and, more importantly, a plan we can act on with confidence.”
— Global Head of IT, RMI
RMI operates in high-risk sectors with distributed leadership. Attackers often target executives, operations staff, and high-value workflows to steal credentials or execute payment fraud.
Using Microsoft 365 telemetry, Intune policies, and endpoint audits, Benchmarked mapped all active applications, detected unapproved tools like Google Drive on endpoints, and assessed associated risk.
By combining EDR/NDR insights, email hardening, and targeted training, RMI reduced high-risk flags from 18+ to under 5, blocked thousands of spam emails, and established response workflows for suspected phishing.
Executive dashboards for real-time visibility
Standardized incident response reporting
Board-level reporting for prioritization and budgeting
Policy enforcement to maintain long-term security hygiene
Yes. The architecture is modular and ready for Defender XDR, Sentinel integration, and automated threat response, ensuring continuous monitoring, mitigation, and reporting.
Benchmarked delivers end-to-end practical solutions: from risk assessment and remediation to governance, automation, and reporting — enabling organizations to operate securely without slowing down business operations.
We embed ourselves in your operations, implement the changes with you, and guide your team through what matters, what to prioritize, and where the trade-offs lie—so compliance actually improves your security, not just your paperwork.
IT cost optimization isn’t about cutting corners — it’s about making sure every dollar spent serves a purpose.
Chief Executive Officer, Sidra Medicine
QHSE Manager
Sales Director (B2B)
Many thanks Mat. Really appreciate your team's hard work over the last few months. This has not been an easy task.
RMI being ISO 27001 and 14001 certified. These certifications are a testament to the hard work, dedication, and collaborative efforts of everyone.
Thank you for your outsdanding work without any setbacks.
Gap Analysis & Readiness Review
Policy Development & Documentation
Infrastructure Review & Hardening
Staff Training & Awareness
License & Vendor Optimization
Quick Wins (low-effort savings initiatives)