Richard is the Support Business Development Manager at Fusion. His primary focus is on expanding the IT support service offering at Fusion, providing top quality support to clients, underpinned by the internationally recognised ISO 9001 and ISO 27001 Quality and Security standards.
With over 20 years of IT experience working with Value-Added Resellers and Managed Service Providers, Richard has a range of skills across finance, marketing, consulting and IT solutions, he has made significant contributions to several successful start-up IT businesses.
Richard holds several IT based qualifications, including Veeam Certified Sales and Technical Sales Professional and Fortinet Network Security Associate 1 & 2.
Microsoft Graph Connectors with Microsoft Copilot: Enhancing Third-Party Application Utility Based on my recent blog, I wanted to explore further the synergy between Microsoft Graph Connectors and Microsoft Copilot and how its stands out as a transformative development for Users. Microsoft Graph Connectors serve as a bridge, integrating a vast array of third-party applications and…
MSP vs. One-Man-Band/Self Employed Technician: The Best IT Solution for SMEs Small and medium-sized enterprises (SMEs) often face the dilemma of choosing between a Managed Service Provider (MSP) and a One-Man-Band/Self Employed Technician. Both options offer unique benefits, but for businesses looking to scale and require robust IT support, MSPs generally provide a more comprehensive…
How much should you be spending on IT? Earlier this week I came across this post on LinkedIn, which made me smile and that I can certainly identify with. As a result, I was curious to see if there was any empirical research out there, which indicates how much SME businesses should typically be spending…
The Importance of Immutable Backups in Ransomware Prevention Following an interview with a freelance journalist from Transport News magazine last week and a cyber security consultancy webinar I attended today on behalf of a client, I thought it might be useful to write a blog regarding immutable backups and how they can form part of…
Exploring the Integration of Third-Party Applications with Copilot In recent blog posts I have given a taste of how Copilot can assist Users of Microsoft applications within the confines of their Microsoft 365 tenancy and SharePoint deployments. However, there is also the opportunity to utilise the power of Copilot with third-party applications. The integration of…
Can You Spot a Deepfake? Deepfakes have taken the world by storm in recent years, with searches for the term emerging in early 2018. We’ve heard the term banded around a lot in the media, and the UK Government has even taken steps to improve the public’s knowledge surrounding deepfake videos. Understanding how deepfakes are…
Quarterly Cyber Security Research! One of the advantages of being a leading Managed Services Partner in West Yorkshire is the access we receive to the latest quarterly research in our industry. Last week I attended webinars provided by two of the leading brands we promote, namely Sophos and Proofpoint, with reference to the hot-topic of…
Guide to Cyber Insurance for Small Businesses Navigating the complexities of cyber insurance can be a daunting task for many organisations. However, the implementation of robust cyber controls can significantly enhance your cyber insurance standing. This comprehensive guide delves into the intricacies of the cyber insurance landscape, offering valuable insights into: Unlock the full potential…
Free Cyber Security Training! The NCSC has recently focused on engaging small to medium-sized enterprises (SMEs), charities, as well as the legal and accountancy sectors, shedding light on a crucial issue facing these organisations. In summary, the abundance of cybersecurity advice can overwhelm individuals, making it challenging to determine where to begin. Some organisations struggle…
The Convergence of IT and OT – Navigating The Cybersecurity Landscape Earlier this week my colleague – Jim Houston, Client Strategy Director – passed me this article regarding the experiences of Clorox and why Cyber Security needs to be taken seriously and the ‘fallout’ that can happen when a breach occurs. 7 Key Takeaways Having…