Developing an Effective Cyber Incident Response Plan: A Guide for Small Businesses

Loading

In the evolving digital landscape, cybersecurity has become a critical concern for businesses of all sizes. With over 75% of targeted cyberattacks beginning with an email, the stakes are higher than ever (RoundRobin, 2020). Cybercrime is increasingly used as a tool of political warfare, leading to a surge in attacks on both large and small […]

Enhancing Data Security: The Advantages of Microsoft Purview Exact Data Match

Loading

When configuring Microsoft Purview Data Loss Prevention (DLP) policies or Microsoft Purview Information Protection auto-labelling policies, leveraging Sensitive Information Types (SITs) is crucial. SITs play a pivotal role in identifying sensitive data by recognising specific patterns within text. These patterns are supported by evidence such as keywords, character proximity, and confidence levels When considering the […]

Leveraging Existing Auto-classification Technologies to Prepare for Copilot

Loading

I see a lot of excitement among clients about the possibilities of what Copilot can do for their Purview data governance and information protection journeys. It is important not to forget to think about what you can do for Copilot, in anticipation. There are a number of things you can do with your existing investments […]

4. Microsoft Project – The PM Toolkit

Loading

Welcome back to The Project Management Toolkit series. So far we’ve explored Employee Recognition!, Collaborating with Clients and Onboarding a new Project Manager. This series breaks down the essential components of how Project Managers can take their leadership to the next level. Up next, we’ll take a deep dive on advances in a core project […]

Enhancing Governance Through Insightful Reporting with i-ARM

Loading

Power BI stands as a transformative force in the realm of data analytics, and its application in Infotechtion’s -ARM solution magnifies its impact. Through dynamic reports, Power BI brings to life the granular details of data governance, security, and compliance. For organizations utilizing i-ARM, these reports are more than just figures and charts—they are a […]

Zero Trust: A Holistic Approach to Data Security

Loading

What Is Zero Trust? At its core, Zero Trust is a paradigm shift—a departure from the old guard of cybersecurity. It rejects the notion of inherent trust, whether bestowed upon users, devices, or applications. Instead, it champions a relentless pursuit of verification. This transformative concept emerged from the cybersecurity community in an age where trust […]

Are you an information hoarder?

Loading

In a recent workshop with one of our clients, I learned that they had to increase their storage limits for OneDrive several times already. This got me thinking, knowing that information should be a shared corporate asset, why do employees hoard much data in their personal workspaces? This situation reminded me of the TV series […]

How to pilot Copilot for Microsoft 365

Loading

A Guide for Application Technical Professionals Introduction Copilot for Microsoft 365 is a generative AI tool that helps users be productive by providing suggestions, corrections, and enhancements based on natural language understanding and deep learning. Copilot can assist users with various tasks, such as writing emails, reports, proposals, presentations, summaries, and more. Interest in Copilot […]

On Board with CoPilot | Are you Modern Workplace Ready?

Loading

On Board with CoPilot | Are you Modern Workplace Ready? If you haven’t been living under a rock, chances are you’ve come across the buzz around CoPilot in the tech community, sparking curiosity, discussion, and even concerns about perceived risks. When you think about it, a solution that’s effective, quick and promises an immense productivity boost—what’s not to […]

Recognizing phishing; Best practices

Loading

Phishing attacks continue to be a significant threat to organizations worldwide. According to this report by Egress, 94% of firms were hit by phishing attacks in 2023. As this statistic demonstrates, phishing remains a persistent threat that organizations cannot afford to ignore. Cybercriminals use deceptive tactics to trick users into revealing sensitive information, compromising security, […]

Job application.

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorestandard dummy text ever since.

Please fill the form

Job application.

Join Infotechtion for an impactful career filled with passion, innovation, and growth. Embrace diversity, collaboration, and continuous learning. Discover your potential with us. Exciting opportunities await!

Please fill the form

By submitting the form, you confirm that you do not require a visa sponsorship to work in the country of application.