A well-managed IT system allows you to spot problems and pitfalls, before they impact upon your business, and identify areas of improvement that can instantly revolutionise the way you work.
Sensitivity Labels! In most organisations, individuals collaborate with both internal and external partners to accomplish their tasks. This implies that content is no longer confined within a firewall but can freely traverse various devices, applications, and services. When content moves across these platforms, it’s crucial to ensure that it does so securely and in accordance…
What’s your RTO and RPO? So last week Fusion were contacted by a client asking for some assistance with a Disaster Recovery (DR) Plan. The client wanted us to help them define ‘who to speak, what to do, what files/hardware to recover, what process we need to undertake, etc’ in the event of a disaster…
Is your print management solution cutting it? This week, my colleague Matt Gledhill and I attended a catch-up meeting with a newly acquired client operating in the Legal Sector. The client expressed their need for a comprehensive print management solution that covers both Multifunctional Peripheral (MFP) devices and print management software. Their goal is to…
Have you sprung a leak! Continuing my series of articles regarding Internal Threat Management referenced in ‘The Enemy Within’ post, this next piece looks at the security technique know as Data Leakage Prevention (also often known as Data Loss Prevention) or DLP for short. Data leakage prevention (DLP) is an essential aspect of data security that…
You’re not on the list, you’re not coming in! In one of my previous blogs ‘The Enemy Within’, I referenced the use of a security technology called Conditional Access to guard against insider threats. This next piece puts more flesh on the bones and explains what this looks like for the typical organisation and User.…
The Enemy Within In many of my previous blogs I have discussed the threats to IT Systems from external sources, but often risks come from internal sources and that’s when it is important to adopt Insider Threat Management (ITM). Insider Threat Management (ITM) is the practice of identifying, assessing, and mitigating the risks posed by…
Do you have control of your Microsoft 365 and Office 365 data? There is a common misconception that Microsoft backs up all your data on your behalf as part of your Microsoft 365 or Office 365 plan/subscription, but this is FALSE. Whilst Microsoft provides a great service for its customers their primary focus is on…
IT solutions bring major changes to the way the legal sector operates. Over the last two years significant change has occurred in the way legal firms operate and the most notably, hybrid working and remote communications appear to be at the forefront. In a recent survey of 1000 legal professionals and 1000 general consumers (clients…
We are a Managed Service Provider (MSP) and we deliver technology to our clients via 2 data centres. We provide multiple services to our clients from these data centres by utilising high end equipment with multiple levels of redundancy. A massive component of delivering highly available services is power, whilst in this country in the…
Most people believe their emails to be secure, they will happily transact very important conversations wholly believing they are talking to the intended recipient. Man in the middle attacks are being used more and more, people hack into a users email using various means and then start to intercept certain emails. This might not be…