i-ARM Reporting Enabling Copilot Adoption and Risk Management

In today’s digital age, where technology rapidly evolves and integrates into every aspect of business operations, adopting advanced tools has become crucial. One such innovative tool is Copilot, designed to streamline various business processes through intelligent automation and data integration. However, with the adoption of such technology comes the need for robust monitoring and management […]
Discovery phase – what is it and why is it so important?

What is the discovery phase? Although it may seem obvious, many seem to be underestimating the importance of conducting a discovery phase before initiating a project. The discovery phase is often used as a pre-project, to gain an initial understanding of the situation as-is today. Creating a consensus of what the reality of the organization’s […]
So you learnt how to crawl, and now you want to run

So, You Think You are Ready to Run… But have you learned to walk yet?If you recall, in March we published a blog titled, “Fixing the Basics: The Importance of Learning to Crawl before Walking and Running,” in which we outlined some of the key foundational elements necessary to reach the goal of having an […]
Revolutionize Your Security: Dynamic Insider Risk Management with Adaptive Protection

Since its inception in 2020, Microsoft Purview Insider Risk Management (IRM) has been the subject of extensive discourse and analysis. For those seeking a concise overview: IRM serves as an advanced analytical tool that synthesises diverse signals to pinpoint potential insider threats, whether they stem from intentional misconduct or inadvertent actions, encompassing intellectual property theft, […]
Developing an Effective Cyber Incident Response Plan: A Guide for Small Businesses

In the evolving digital landscape, cybersecurity has become a critical concern for businesses of all sizes. With over 75% of targeted cyberattacks beginning with an email, the stakes are higher than ever (RoundRobin, 2020). Cybercrime is increasingly used as a tool of political warfare, leading to a surge in attacks on both large and small […]
Enhancing Data Security: The Advantages of Microsoft Purview Exact Data Match

When configuring Microsoft Purview Data Loss Prevention (DLP) policies or Microsoft Purview Information Protection auto-labelling policies, leveraging Sensitive Information Types (SITs) is crucial. SITs play a pivotal role in identifying sensitive data by recognising specific patterns within text. These patterns are supported by evidence such as keywords, character proximity, and confidence levels When considering the […]
Leveraging Existing Auto-classification Technologies to Prepare for Copilot

I see a lot of excitement among clients about the possibilities of what Copilot can do for their Purview data governance and information protection journeys. It is important not to forget to think about what you can do for Copilot, in anticipation. There are a number of things you can do with your existing investments […]
4. Microsoft Project – The PM Toolkit

Welcome back to The Project Management Toolkit series. So far we’ve explored Employee Recognition!, Collaborating with Clients and Onboarding a new Project Manager. This series breaks down the essential components of how Project Managers can take their leadership to the next level. Up next, we’ll take a deep dive on advances in a core project […]
Enhancing Governance Through Insightful Reporting with i-ARM

Power BI stands as a transformative force in the realm of data analytics, and its application in Infotechtion’s -ARM solution magnifies its impact. Through dynamic reports, Power BI brings to life the granular details of data governance, security, and compliance. For organizations utilizing i-ARM, these reports are more than just figures and charts—they are a […]
Zero Trust: A Holistic Approach to Data Security

What Is Zero Trust? At its core, Zero Trust is a paradigm shift—a departure from the old guard of cybersecurity. It rejects the notion of inherent trust, whether bestowed upon users, devices, or applications. Instead, it champions a relentless pursuit of verification. This transformative concept emerged from the cybersecurity community in an age where trust […]