Researchers Recently Discovered A New Mysterious Malware Strain

Researchers at the cybersecurity firm Anomali have discovered a completely new type of malware that’s disturbing on several levels. Worse is the fact that the researchers aren’t quite sure what it does. The new strain has been dubbed ‘IPStorm’ by its creators, who at this point, remain unknown. Of interest is the fact that it […]

If You Use Evernote Your Data May Have Been Exposed

Do you use Evernote Web Clipper for the Chrome web browser? If so, be advised that the developer recently reported that a critical flaw in the extension could allow hackers to access user information from third party online services. Online security company Guardio discovered the flaw and had this to say: “Due to Evernote’s widespread […]

Critical Flaw Found In Medical Device Pump Software

Researchers have recently discovered a pair of critical vulnerabilities in Alaris Gateway Workstations. These bring us closer to the tragic day when a hacker will actually be able to kill someone with code. Alaris workstations are used to deliver fluid medications. Given the severity of the flaws, a determined hacker could take full control over […]

Protect your data in files, apps, and devices, within and across an organization

Mobility has become a staple of the modern workplace, offering flexibility to employees and greater productivity to employers. However, this flexibility often requires that employees use their own devices to work when out of office. So how can you protect your data without losing the benefits of “bring your own device?”

Tools such as Azure Active Directory and Microsoft Intune can help you manage access to your data and company networks without invading employee privacy.

At Fusion Technology Solutions, we want you to get the most out of what technology has to offer. Contact us to learn more.

Undelivered Mail Notification Could Be A Phishing Scam

Hackers are always on the lookout for new ways to freshen up time-tested techniques. Where time-tested techniques are concerned, few are older than the humble phishing email. In one form or another, it seeks to trick an unsuspecting user to innocently hand over sensitive information, like usernames and passwords that the hacker can then use […]

Customer Story: BP deploys Microsoft 365 to improve user experience and security

In an ever-changing security landscape, how do you keep users, devices, and data across 80 countries protected? For BP, they use Windows Defender Advanced Threat Protection that can compile information and identify possible threats more effectively than ever before. So effective in fact, that they put it on all 30,000 Windows 10 devices they have deployed across the world.

And this is just one of the many security tools from Microsoft 365 Enterprise E5 that BP is relying on to remain secure as they continue to transform their company. Learn more about their security journey in this video.