Intelligent security for the modern workplace

Imagine if you could:

Identify sensitive information automatically.

Eliminate passwords entirely in favor of biometrics or pins.

Identify, quarantine, and wipe a compromised endpoint all from a single location.

Quantify your security position and gain insights on how to improve it.

All of this and more is possible with Azure Advanced Threat Protection, just one of four valuable tools included in Microsoft 365 Enterprise E5. Interested in what other tools are available to you? Fusion Technology Solutions has the answers to your questions. Contact us to learn more.

Chrome Will Offer More Ways To Control Web Tracking

Google announced a pair of important security features of upcoming versions of its Chrome browser at this year’s I/O Developer Conference. Both changes are designed with the same goal in mind: To give users some additional tools to block or at least mitigate the threat of online tracking. The first of the two new features […]

Some Dell Systems Are At Risk Of New Hacks

Do you use Dell equipment at home or in your office? If so, then the recent discovery made by independent security researcher Bill Demirkapi should give you pause. Recently, Mr. Demrikapi discovered a flaw in the company’s SupportAssist utility that comes pre-installed on most Dell systems. If you have an older Dell, know that SupportAssist […]

Security Is Now A Concern For Open Source Software

This year’s Open Source Security and Risk Analysis Report analyzed the anonymized data of more than 1,200 commercial codebases from 2018. According to the report, managing open source risk continues to pose a significant challenge for industry. The Synopsys Cybersecurity Research Center produces the report, and found that 96 percent of the code bases they […]

Stolen Personal And Medical Information Was Found Online

Jeremiah Fowler, a researcher with Security Discovery recently found an unprotected Elasticsearch databased owned by a company called SkyMed on the internet.  According to his findings the database was configured such that it was open and visible to any browser. This allows anyone who stumbles across it to edit, download, or even delete data without […]

Google Giving More Flexibility To Private Data Removal

Tech giant Google recently unveiled the next step in its plan to put more power in the hands of users when it comes to their own data.  The most recent change involves the introduction of a new auto-delete feature tied to your Google account. It will allow you to set your Location History, Web data […]

Scammers Now Use Google Ads To Steal Information

There’s a new scam afoot that involves using Google Ads. We’re frankly surprised that it’s working, but apparently, it’s drawing some unsuspecting customers in. It appears to be an organized campaign. The unknown scam artists are creating ads with phrases like: “Amazon.com – Best place to get dream products. Best deals – Best support – […]

Don’t let Cloud security fall through the cracks

Security is a group effort. This collective aspect is what has allowed us to achieve effective systems that keep organizations protected as technology and its associated threats continue to evolve.

However, this shared effort also creates a shared responsibility when security breaches do happen. To what extent can your organization be held responsible for breaches in security? Check out this article to learn more about your responsibilities as an organization.

At Fusion Technology Solutions, we want to ensure your organization is properly protected at every level. Contact us to learn more.

Customer Story: Kier Group PLC

When Keir adopted Microsoft 365 E5, the visibility it provided immediately allowed them to detect hackers across the globe using compromised credentials to gain access to Keir’s systems. They stopped over 90,000 intrusion attempts in the first month alone.

Innovative systems, visibility, and ease of use enable Keir to reduce their response times to such attacks from weeks to mere hours, allowing them to spend more time growing and improving their business.

What new security insights are waiting for you? Fusion Technology Solutions is ready to help you find out.

Email Providers Found To Have Signature Vulnerabilities

A team of security researchers have uncovered a serious flaw in several major email clients you need to be aware of. The flaw allows hackers to fake verified signatures, which gives their phishing and other email-based attacks the appearance of legitimacy.   According to research conducted by the team, the following email clients are vulnerable […]