A well-managed IT system allows you to spot problems and pitfalls, before they impact upon your business, and identify areas of improvement that can instantly revolutionise the way you work.
Time is Ticking – Are You Prepared for Google and Yahoo’s Imminent DMARC Requirements? If you’re a Gmail or Yahoo user, you’ve likely experienced the frustration of a cluttered inbox filled with unsolicited and potentially fraudulent emails. If you’ve ever wondered why these companies aren’t doing more to block such messages and make your inbox…
Phishing has evolved from simple scams to complex schemes leveraging AI, posing a significant risk to businesses worldwide.
Five Ways Copilot Can Benefit Small Business Over the past year, Artificial Intelligence (AI) has really taken centre stage, becoming a game-changer for businesses by boosting growth, efficiency, and smart decision-making. And now, with Copilot making its debut and recently becoming available to users with non-enterprise M365 plans, like Microsoft 365 Business Standard and Microsoft…
Adopting Copilot With the recent announcement from Microsoft that the availability of Copilot is being expanded to Users of Microsoft 365 Business Standard, Microsoft 365 Business Premium, Office 365 E3 and Office 365 E5, it seemed sensible to provide some pointers on how Copilot should (or could) be adopted into an organisation. This blog is…
Sensitivity Labels! In most organisations, individuals collaborate with both internal and external partners to accomplish their tasks. This implies that content is no longer confined within a firewall but can freely traverse various devices, applications, and services. When content moves across these platforms, it’s crucial to ensure that it does so securely and in accordance…
What’s your RTO and RPO? So last week Fusion were contacted by a client asking for some assistance with a Disaster Recovery (DR) Plan. The client wanted us to help them define ‘who to speak, what to do, what files/hardware to recover, what process we need to undertake, etc’ in the event of a disaster…
Is your print management solution cutting it? This week, my colleague Matt Gledhill and I attended a catch-up meeting with a newly acquired client operating in the Legal Sector. The client expressed their need for a comprehensive print management solution that covers both Multifunctional Peripheral (MFP) devices and print management software. Their goal is to…
Have you sprung a leak! Continuing my series of articles regarding Internal Threat Management referenced in ‘The Enemy Within’ post, this next piece looks at the security technique know as Data Leakage Prevention (also often known as Data Loss Prevention) or DLP for short. Data leakage prevention (DLP) is an essential aspect of data security that…
You’re not on the list, you’re not coming in! In one of my previous blogs ‘The Enemy Within’, I referenced the use of a security technology called Conditional Access to guard against insider threats. This next piece puts more flesh on the bones and explains what this looks like for the typical organisation and User.…
The Enemy Within In many of my previous blogs I have discussed the threats to IT Systems from external sources, but often risks come from internal sources and that’s when it is important to adopt Insider Threat Management (ITM). Insider Threat Management (ITM) is the practice of identifying, assessing, and mitigating the risks posed by…