The New Microsoft Office App Looks Like A Winner

In November of 2019, Microsoft made an announcement and gave users an early look at a new unified Office app designed specifically for Android and iOS devices. The purpose, of course, was to provide the essential functionality of Office in a faster, leaner, and lighter package that was better suited for use on mobile devices. […]

Protect your business: Recognize the top three security threats, plus one you may not know about

Security threats take many forms. You may know about the three most common types of cyberattacks (viruses, phishing, and ransomware), but do you know about the internal security threats your company faces?

Awareness is the first step in security and prevention. If you’re unsure of how to protect your company from cyberattacks, we can help. Check out this e-book and give us a call to get started.

Prevent data leaks

The global average cost of a data breach is $3.6 million. Is your company prepared to deal with the fallout from a cyberattack?

With our security solutions from Microsoft 365 Business, you can take advantage of the latest data-loss protection policies to ensure that your sensitive data is always protected. With a simple, cost-effective security solution that’s easy to use, you can’t go wrong.

Contact our team at Fusion Technology Solutions to learn how you can prevent data leaks with our #Microsoft365Business solutions.

Mobile Flash Storage Getting Faster To Accommodate 5G Rollout

Are you ready for the world of 5G? Even if you are, the available storage you have on your favorite devices may not be as robust as you’d like it to be. Anticipating this problem, Western Digital has announced a new bit of technology that will be available on the next generation of devices. The […]

Mandatory Two Factor Authentication Coming To Ring Devices

Finally, a smart device manufacturer is taking device security seriously, and that’s great news indeed. You may recall reading about a serious issue with Ring security systems recently. The news was that the security issue allowed hackers to commandeer user systems and spy on them. The hackers were sending the users messages and making disturbing […]

Google Docs Gets Smarter With Smart Compose Feature

Google continues to increase the versatility and usefulness of the G-Suite. This time they are adding the much anticipated Smart Compose feature to Google Docs, and it is now available to all G-Suite users. The new feature launched in beta in November of 2019 and was well-received. The technology relied on Google’s extensive AI expertise […]

New Dangerous Malware Is Disguising Itself As Fortnite Launcher

LokiBot burst onto the scene in 2015, and has earned a reputation as being a powerful. This fearsome trojan is being distributed in a new way that poses a very real threat to targets of all shapes and sizes. The latest campaign emulates the launcher for Epic Games, which is the developer behind the game […]

Dashlane Password Manager Removed From Google For Privacy Issues

Do you use the Dashlane Chrome web extension to help you manage your passwords? If so, you’re not alone. The extension has more than three million users based on download stats. Unfortunately, Google recently announced that they took the extension down from the store temporarily because of issues with the “Use of Permissions and User […]

Security Is Not Privacy

Do you know the difference between security and privacy? Although these terms are often used interchangeably, they’re quite different—and both are crucial to the prosperity of your company.

Check out this infographic to learn more about how to make sure your company data stays private and is always secured. And contact our team at Fusion Technology Solutions to help you get started.

Old School Virus Called KBOT Is Hitting Networks

There was a day when worms were once common, terrifying threats on the internet. In the early days of the world wide web, there were a number of famous attacks that were considered highly advanced for their time. Time and technology have moved on of course, and these days, modern malware is significantly more advanced. […]