I started my career as most people do – at the bottom. After leaving college I went straight into an IT position at a Huddersfield based Chartered Accountants. It wasn’t long before they expanded overseas, giving me the perfect opportunity to develop my career. Whilst there, I also completed a computing qualification at the University of Leeds and polished my skills in Microsoft, Cisco, Lotus, Checkpoint, Citrix, A+ and Novell.
Guide to Cyber Insurance for Small Businesses Navigating the complexities of cyber insurance can be a daunting task for many organisations. However, the implementation of robust cyber controls can significantly enhance your cyber insurance standing. This comprehensive guide delves into the intricacies of the cyber insurance landscape, offering valuable insights into: Unlock the full potential…
Free Cyber Security Training! The NCSC has recently focused on engaging small to medium-sized enterprises (SMEs), charities, as well as the legal and accountancy sectors, shedding light on a crucial issue facing these organisations. In summary, the abundance of cybersecurity advice can overwhelm individuals, making it challenging to determine where to begin. Some organisations struggle…
The Convergence of IT and OT – Navigating The Cybersecurity Landscape Earlier this week my colleague – Jim Houston, Client Strategy Director – passed me this article regarding the experiences of Clorox and why Cyber Security needs to be taken seriously and the ‘fallout’ that can happen when a breach occurs. 7 Key Takeaways Having…
World Backup Day – Easter Sunday 31st March This Sunday is an important date in the Calendar – not only is it Easter Sunday, but it’s also World Backup Day! World Backup Day, observed on March 31st, is an initiative to raise awareness about the importance of regular data backups. It serves as a reminder…
Introduction In my recent blogs on Copilot Prompting and the foundations that need to be in place for Adopting Copilot, I highlighted the power that Copilot can not only bring to the User, but also the pivotal role that security plays in ensuring any ‘output’ generated does not breach the organisation’s data security regulations. In…
Introducing “The Ultimate Guide to Phishing Prevention in 2024” No longer sporadic incidents but pervasive threats, phishing attacks present one of the most pressing cybersecurity risks right now — with 79 per cent of UK businesses facing a breach in 2023, and 59 per cent considering this attack vector the most disruptive. A lack of…
Windows BitLocker – Enhancing Data Security in Windows 11 Introduction In my recent blog Windows 10 End of Life. Long live Windows 11, I referenced the need to migrate/upgrade to Windows 11 due to improved security. One such enhanced security feature is Windows BitLocker. With the increasing reliance on digital technology, data security has become…
Using AI to fight Cybercrime! Senior members of Fusion IT visited the Imperial War Museum in Manchester last month, where they met with many fellow Sophos partners and shared the latest news and insights on Sophos MSP solutions at the Sophos MSP Get Together. As you probably, know Sophos MSP products are designed to protect…
Windows 10 End of Life Windows 10, the well-regarded operating system released by Microsoft in 2015, is approaching its End of Life (EOL) phase with support officially ending on 14th October 2025. This means that Microsoft will no longer provide technical support, software updates, or security patches for Windows 10, which could leave users vulnerable…
Smishing Secrets Revealed: Staying Safe Over SMS In the modern digital age, communication happens at the tap of a finger. The threat of cybercrime lingers still, with malicious actors hell-bent on capturing your sensitive information like login credentials or personal details. One menace that has gained prominence in recent years is “smishing” – a deceptive…