Search the blog:
Microsoft’s latest announcements around Copilot, its new flagship AI solution, suggest the technology giant has big plans for this technology. But what does it mean for users? And is it something your organisation should be deploying?
Most people within your organisation will use at least one web browser. They are ubiquitous. Some will use them to access essential business apps. Some will be using them to access webmail accounts. Others will use them simply to browse the Internet. Yet web browsers are amongst the most insecure...
In the fast evolving world of technology, business owners and managers like you are always on the lookout for the next big thing to give them a competitive edge. Have you considered how AI tools might be able to help?
Microsoft Power Automate puts easy-to-use but powerful tools for automating workflows into the hands of even the smallest businesses. But where should you start? Which processes in your business could be ripe for automation?
We hear a lot about the need to back up your important business data and business applications. However, there’s an equally important backup you need to be making. The Grant McGregor team explains.
How can your teams use technology to help drive productivity? The Grant McGregor team considers a few opportunities to boost productivity in your organisation.
SharePoint is more than a file storage solution. It’s also the basis of many a company Intranet. The Grant McGregor team takes a look at some of the best ways to leverage this commonly used Microsoft solution as the basis on which to build your company Intranet.
The threat from state-sponsored criminal cyber activity has grown rapidly as global tensions have escalated in recent years. Espionage activity is heavily focused on disruptive actions and financial gains. High risk sectors and companies of all sizes are targeted because of the data or intellectual...
Malicious cyber activity can take many guises. One attack vector that the UK’s National Cyber Security Centre warns against is a watering hole attack. But what is a watering hole attack? And how can you protect your organisation from them?