Development arm of Fusion
Microsoft Graph Connectors with Microsoft Copilot: Enhancing Third-Party Application Utility Based on my recent blog, I wanted to explore further the synergy between Microsoft Graph Connectors and Microsoft Copilot and how its stands out as a transformative development for Users. Microsoft Graph Connectors serve as a bridge, integrating a vast array of third-party applications and…
Exploring the Integration of Third-Party Applications with Copilot In recent blog posts I have given a taste of how Copilot can assist Users of Microsoft applications within the confines of their Microsoft 365 tenancy and SharePoint deployments. However, there is also the opportunity to utilise the power of Copilot with third-party applications. The integration of…
Legal Tech Trends! Fusion IT has a firm foothold in providing IT Solutions and Services to the Legal Sector and so we like to keep our finger on the pulse when it comes to Legal Tech Trends. Following on from our post last year, please read on for predictions as to what technological developments are…
Cyber security is a vital issue for the road transport and logistics industry Here at Fusion IT we have a strong customer base spread across numerous sectors, but we do have a particular focus on the Road Transport and Logistics industry and the protection of such organisations’ data. Cyber security is a vital issue for…
Adopting Copilot With the recent announcement from Microsoft that the availability of Copilot is being expanded to Users of Microsoft 365 Business Standard, Microsoft 365 Business Premium, Office 365 E3 and Office 365 E5, it seemed sensible to provide some pointers on how Copilot should (or could) be adopted into an organisation. This blog is…
BETA to be safe than sorry! Protecting Yourself from Cybercriminals – The Dangers of Mobile Beta-Testing Applications In a world increasingly reliant on mobile technology, cybercriminals are finding new ways to exploit unsuspecting Users. The US Federal Bureau of Investigation (FBI) has recently issued a stark warning about a specific threat – Cybercriminals are targeting…
Enhancing Customer Service with Power BI and Wildix. In a world where customer expectations are higher than ever before, businesses need to continually find innovative ways to improve their customer service offerings. One potent combination that has been gaining popularity is the integration of Microsoft Power BI, a robust business intelligence tool, with Wildix, a…
Legal Technology and Deontology There is currently an ongoing debate within the Legal Sector regarding the use of Legal Technology and Deontology. What on earth is Deontology? Deontology is a moral philosophy or ethical theory that focuses on the concept of duty or obligation. It emphasises the inherent nature of certain actions or principles, rather…
Are you on trend? Here at Fusion I like to keep my eye on the latest trends and research reports with reference to the use of IT in the Legal Sector. Following previous posts on IT solutions bring major changes to the way the legal sector operates and Legal Tech Trends 2023 , I came…
The Enemy Within In many of my previous blogs I have discussed the threats to IT Systems from external sources, but often risks come from internal sources and that’s when it is important to adopt Insider Threat Management (ITM). Insider Threat Management (ITM) is the practice of identifying, assessing, and mitigating the risks posed by…