Developing an Effective Cyber Incident Response Plan: A Guide for Small Businesses

In the evolving digital landscape, cybersecurity has become a critical concern for businesses of all sizes. With over 75% of targeted cyberattacks beginning with an email, the stakes are higher than ever (RoundRobin, 2020). Cybercrime is increasingly used as a tool of political warfare, leading to a surge in attacks on both large and small […]
Enhancing Data Security: The Advantages of Microsoft Purview Exact Data Match

When configuring Microsoft Purview Data Loss Prevention (DLP) policies or Microsoft Purview Information Protection auto-labelling policies, leveraging Sensitive Information Types (SITs) is crucial. SITs play a pivotal role in identifying sensitive data by recognising specific patterns within text. These patterns are supported by evidence such as keywords, character proximity, and confidence levels When considering the […]
Leveraging Existing Auto-classification Technologies to Prepare for Copilot

I see a lot of excitement among clients about the possibilities of what Copilot can do for their Purview data governance and information protection journeys. It is important not to forget to think about what you can do for Copilot, in anticipation. There are a number of things you can do with your existing investments […]
4. Microsoft Project – The PM Toolkit

Welcome back to The Project Management Toolkit series. So far we’ve explored Employee Recognition!, Collaborating with Clients and Onboarding a new Project Manager. This series breaks down the essential components of how Project Managers can take their leadership to the next level. Up next, we’ll take a deep dive on advances in a core project […]
Enhancing Governance Through Insightful Reporting with i-ARM

Power BI stands as a transformative force in the realm of data analytics, and its application in Infotechtion’s -ARM solution magnifies its impact. Through dynamic reports, Power BI brings to life the granular details of data governance, security, and compliance. For organizations utilizing i-ARM, these reports are more than just figures and charts—they are a […]
Zero Trust: A Holistic Approach to Data Security

What Is Zero Trust? At its core, Zero Trust is a paradigm shift—a departure from the old guard of cybersecurity. It rejects the notion of inherent trust, whether bestowed upon users, devices, or applications. Instead, it champions a relentless pursuit of verification. This transformative concept emerged from the cybersecurity community in an age where trust […]
Are you an information hoarder?

In a recent workshop with one of our clients, I learned that they had to increase their storage limits for OneDrive several times already. This got me thinking: since information should be a shared corporate asset, why do employees hoard so much data in their personal workspaces? This situation reminded me of the TV series […]
How to pilot Copilot for Microsoft 365

A Guide for Application Technical Professionals Introduction Copilot for Microsoft 365 is a generative AI tool that helps users be productive by providing suggestions, corrections, and enhancements based on natural language understanding and deep learning. Copilot can assist users with various tasks, such as writing emails, reports, proposals, presentations, summaries, and more. Interest in Copilot […]
On Board with CoPilot | Are you Modern Workplace Ready?

On Board with CoPilot | Are you Modern Workplace Ready? If you haven’t been living under a rock, chances are you’ve come across the buzz around CoPilot in the tech community, sparking curiosity, discussion, and even concerns about perceived risks. When you think about it, a solution that’s effective, quick and promises an immense productivity boost—what’s not to […]
Recognizing phishing; Best practices

Phishing attacks continue to be a significant threat to organizations worldwide. According to this report by Egress, 94% of firms were hit by phishing attacks in 2023. As this statistic demonstrates, phishing remains a persistent threat that organizations cannot afford to ignore. Cybercriminals use deceptive tactics to trick users into revealing sensitive information, compromising security, […]