2. Collaborating with Clients – The Project Management Toolkit

Introduction We hope you enjoyed our first post in The Project Management Toolkit series on Employee Recognition! This series breaks down the essential components of how Project Managers can take their leadership to the next level. Up next, we’ll discuss another pivotal aspect of project management: Collaborating with Clients. In the realm of project management, […]
Protect Your Business with Microsoft 365 Purview Insider Risk Management (IRM)

Protecting your organization from external threats is only one piece of the puzzle. You also must protect your organization from the inside out, another facet of “assume breach” in your Zero Trust approach. Insider risks can be malicious or inadvertent, but they all impact one of your organization’s most important assets: your data. In the […]
The NIS 2 Directive: What is it and how can Infotechtion help your company comply?

NIS 2 is the new EU Cybersecurity directive that will come into effect from October 2024 onwards, affecting all member states. It covers 18 sectors and 180,000+ companies. The purpose of this is to establish a baseline security for digital service providers and operators of essential services, to mitigate risks against cyber-attacks, and to improve […]
Unlocking Efficiency and Security with Purview Retention, Microsoft 365 Backup and Archive

In the dynamic landscape of digital content, managing data efficiently and securely is a priority for any organisation. Recognizing this, Microsoft is introducing two solutions at the next Microsoft Inspire event: Microsoft 365 Backup and Microsoft 365 Archive Microsoft Purview Retention: Managing Retention, Preservation, and Disposal Microsoft retention refers to the set of policies and […]
Mitigating Barriers in Adoption

Introduction There is often resistance within an organization whenever there´s talk about making changes, and this is especially true pertaining to changes in digital tools or services. That is of course understandable, as changes will disrupt employees´ routines that may have been developed over years. This type of resistance to change is one of many […]
M365 Licensing Options for Maximizing Records Management Compliance for Law Firms

In today’s digital age, law firms must be able to manage large volumes of information, including client files, case documents, and legal research more effectively. Like most law firms, you have probably made the important next steps, moving to M365, in being able to effectively manage information while you are conferring with a client on […]
Understanding Phishing Emails: How to Spot and Avoid Them

Phishing emails are a common form of online threat that can be difficult to identify. Cybercriminals use sophisticated tactics to trick users into divulging personal information or clicking on malicious links. To protect yourself from phishing attacks, it’s important to understand how to identify and report suspicious emails. APWG Report The Anti-Phishing Working Group’s (APWG) […]
What do you do when your client doesn’t think the tools suit their needs?

I have been a consultant in the fields of records management and information governance for approximately 15 years and I have yet to meet a client that we (I never did it alone!) could not help. That being said, there have been challenges along the way and clients who are “non-believers”. So, what do you […]
How to Build the Right Microsoft Purview RM PoC

This blog posts reflects our recent experience with a variety of large clients in the development of Proofs of Concept (PoC) that use Microsoft 365 (M365) and Microsoft Purview (Purview) to achieve enterprise records management (RM) at scale. These clients are all using E5 tenants with at least the E5 Information Protection and Governance (IP&G) […]
Discover and manage shadow IT with App governance add-on to Microsoft 365 Defender for Cloud Apps

When IT admins are asked how many cloud apps they think their employees use, on average they say 30 or 40, when in reality, the average (in large enterprises) is over 1,000 separate apps being used by employees in your organization. Shadow IT helps you know and identify which apps are being used and what […]