I started my career as most people do – at the bottom. After leaving college I went straight into an IT position at a Huddersfield based Chartered Accountants. It wasn’t long before they expanded overseas, giving me the perfect opportunity to develop my career. Whilst there, I also completed a computing qualification at the University of Leeds and polished my skills in Microsoft, Cisco, Lotus, Checkpoint, Citrix, A+ and Novell.
Double Win at Snetterton! In an exhilarating display of skill and determination, the FormEvo, Expedite Law, Fusion IT, Enabl AI sponsored Porsche 997 left spectators and competitors in awe during a thrilling race day at Snetterton on Sunday 17th September. Battling ever-changing weather conditions, the Simon Clark Racing team emerged victorious, claiming an impressive haul…
The Business Email Compromise (BEC) Surge The incidence of business email fraud is on the rise, as reported by the Federal Bureau of Investigation (FBI), with over 21,000 complaints and adjusted losses exceeding a staggering $2.7 billion. Notably, Microsoft has detected a surge in the sophistication and tactics employed by threat actors who specialise in…
Polishing Chrome! Last month we reported on the imminent update to the default Office theme and now it would appear it’s Google’s turn for material refresh. Basically Google Chrome is celebrating its 15th birthday with a significant redesign, although it’s as substantial as one can expect for a browser window to the vast Internet. Google…
Why is the Legal Sector targeted by Cyber Criminals? Background The United Kingdom boasts a robust and varied legal sector, encompassing a wide spectrum of entities, ranging from small local solicitors’ practices to large multinational corporations, as well as independent barristers and barristers’ chambers. Legal services constitute a pivotal component of the UK’s economy. As…
Six reasons to choose Veeam for robust data backup and recovery Any business that has experienced the horror of data loss knows the impacts can be far-reaching. As well as risking access to sensitive information, it can disrupt business-critical operations, compromise trust among customers and stakeholders, and cause sometimes irreversible financial setbacks. For SMEs who…
BETA to be safe than sorry! Protecting Yourself from Cybercriminals – The Dangers of Mobile Beta-Testing Applications In a world increasingly reliant on mobile technology, cybercriminals are finding new ways to exploit unsuspecting Users. The US Federal Bureau of Investigation (FBI) has recently issued a stark warning about a specific threat – Cybercriminals are targeting…
Move over Calibri here comes Aptos! Microsoft 365’s All-New Default Office Theme Set to Debut Next Month! Big changes are on the horizon as Fusion IT announces Microsoft’s plan to launch a new look for the default Office theme. This update will be available for all Microsoft 365 subscribers next month, aiming to make the…
Trust me, please enter your PIN! In the ever-evolving world of cybercrime, certain cybersecurity trends tend to dominate the headlines while others quietly persist beneath the surface. Ransomware attacks, supply-chain breaches, and dark web exploits have taken center stage in recent years, overshadowing an older yet still potent threat – card skimmers. This article delves…
The Silent Risks of Sound It never fails to amaze me the length hackers will go to obtain User credentials and passwords. But this week I came across something new (to me anyway) on the Naked Security by Sophos podcast. What is it I hear you ask? Well, let’s just say it relates to the…
Is your print management solution cutting it? This week, my colleague Matt Gledhill and I attended a catch-up meeting with a newly acquired client operating in the Legal Sector. The client expressed their need for a comprehensive print management solution that covers both Multifunctional Peripheral (MFP) devices and print management software. Their goal is to…