M365 Copilot basics webinar: 20th March

Hot on the heels of our successful recent webinars, by popular demand we’re running another!

Copilot aims to boost productivity and streamline work by providing AI-generated suggestions and content within Microsoft 365 apps. Join us to learn what it is, key use cases, and perhaps most importantly, some of the latest updates from Microsoft that are coming thick and fast!

Do you have your flight plan ready?

Join one of our Microsoft Copilot basics webinars, and our Copilot expert Scott Brunton, solution engineer from our partners Arrow ECS UK will outline the following:

  • An overview of what Copilot is
  • How to build an effective information management strategy
  • Securing your data and applications ready for Copilot
  • Last but by no means least, we’ll have a Copilot Q&A session

Register now

📅 Wednesday 20 March | ⏲ 10:00 GMT | Register now.

These links take you to our Microsoft Teams registration forms. Thank you for your interest, and we look forward to welcoming you to an enjoyable and productive session. You can connect with Scott on LinkedIn in advance of the session, or let us know any questions in the meantime.

 

 

A CISO’s guide to the role of AI in cybersecurity

Pop quiz – it’s the year of the Suez Crisis, the start of the transatlantic cable service, and Japan’s ascension to the UN. What year is it?

To avoid an immediate spoiler, the answer is at the bottom of this page! But to bring us back into the present day, the mystery year is also the year that the field of computer science began seeking to create intelligent machines that can replicate or exceed human intelligence. In other words, it was the year that AI as we now describe it was conceived.

Historical segways aside, today’s digital landscape is evolving at an unprecedented pace, and the rapid emergence of generative artificial intelligence (GenAI) marks a distinct shift in how we perceive and use the capabilities of AI. That’s great, but it’s also causing some concerns in terms of cyber security.

This e-book from Barracuda is specifically tailored to senior IT security and risk professionals seeking to navigate the complex landscape of cybersecurity and shed light on how AI is shaping the future of cyber defence. It covers:

  • The evolution of AI
  • How AI is changing the threat landscape
  • The ways cybercriminals are using AI
  • How AI is being used to improve security

Want to learn more?

Complete IT Systems have a team of Barracuda specialists on hand to demo the solution, discuss business benefits and help you understand how the technology works for your organisation.

To get in touch or request a demo please contact us.

 

❓ Drumroll – if you guessed the year 1956, well done to you! There’s no prize, but there is more fascinating reading in the guide.

10 reasons to rethink your maintenance contract management

Procuring and managing multiple OEM maintenance contracts in a complex infrastructure environment can chew up a lot of time.

What’s so painful? Searching for information on OEM maintenance support, waiting endlessly on customer service lines only to discover that your issue cannot be resolved, and being transferred to different departments are not productive ways to spend a day.

It’s rare to find a single solution or provider to meet all your IT asset maintenance needs, which means that managing a multi-vendor environment with different contracts and providers is commonplace.

So here’s 10 ways to rethink your maintenance contract management.

  • Cost savings: Streamlined agreements reduce administrative overhead and legal fees.
  • Clarity: Clear terms enhance understanding and prevent disputes.
  • Efficiency: Faster contract negotiations and approvals.
  • Risk mitigation: Fewer ambiguities mean fewer disagreements.
  • Scalability: Easily adapt to changing needs.
  • Transparency: Simplified language promotes trust.
  • Client satisfaction: Simplicity fosters positive relationships.
  • Time management: Less time spent on contract intricacies.
  • Focus on business: Minimised distractions allow focus on core activities.
  • Longevity: Simplified contracts increase hardware lifespan

Find out more

M365 Copilot basics webcast

Need some help launching Copilot in your business, or understanding and managing the potential risks?

In the ever-evolving landscape of technology, Microsoft Copilot emerges as a game-changer. This webinar, hosted by Chris Charlesworth of Complete IT Systems and Scott Brunton of Arrow ECS, delves into the intricacies of Copilot’s capabilities within the Microsoft 365 ecosystem.

🚀 Key takeaways:

  • Generative AI demystified: See how it creates content, whether it’s text, images, or music.
  • Large Language Models (LLM): The brains behind Copilot. These models, like OpenAI’s ChatGPT and Microsoft’s Copilot, are the driving force behind generative AI.
  • Prompt engineering: Explore how prompt engineering influences Copilot’s responses.
  • Vector search: Discover the relevance of vector search in Copilot’s capabilities.
  • Responsible AI: Delve into ethical considerations and responsible usage of AI.

Watch the recorded session from February 2024

Click here to download the slide deck

Connect with Scott on LinkedIn.

Find out more

If you would like to speak to a member of our team, please contact your account manager or call the office on 01274 396 213 and we will be able to help you.

 

Why IT should care about DSARs – join us in Glasgow to find out!

Data Subject Access Requests (DSARs) were first introduced in 1998, and digital technology has made requesting them easier over time. Why should IT care about them?

In short, companies and organisations of all sizes need to know what they are, and what to do if you receive one.

The problem is that incoming DSARs can become a hot potato and bounce around HR, legal, IT, data protection, compliance and even marketing departments without clear accountability or ownership.

The Information Commissioner’s Office (ICO) publishes a useful guide on preparing for subject access requests, with one of the requirements being that you carry out a “reasonable search for the requested information”. On top of that, the timeline to respond is one month.

So even if the Data Protection Officer (DPO) is ultimately accountable for the request, without the right processes or tools in place, finding the requested information can be a minefield. No prizes for guessing the first point of call to get that information!

Enter IT!

And that’s usually where IT teams become involved in order to locate the personal data, while ensuring that other legal obligations are not infringed in doing so.

According to Kingsley Napley, “technical support is frequently required to identify and review data, and legal input may be needed.” For example, if an ex-employee asks to see all emails and correspondence they were copied on over a two year period, this could be hundreds of thousands of emails, not to mention direct chats and team collaborations in platforms such as Microsoft Teams or Google Workspaces.


How else can IT get sucked in?

As well as the normal jobs of keeping the lights on, ensuring that everyone has working devices, the network is secure, all files are safely backed up, and everything else that goes on in a day, there’s worse news for IT teams.

That’s because these kinds of data requests may not even be limited to DSAR cases. IT are increasingly being asked to help with locating data for internal complaints or enquiries such as:

  • One employee is accused of sexually harassing another via their organisation’s Microsoft Teams chats.
  • Instances in which an organisation’s emails are being sent to an unusual address.
  • A director suddenly starts getting lots of unsolicited calls from recruiters.
  • A firm’s customers start being approached by its rival’s salespeople
  • An industry news outlet gets hold of sensitive proprietary information about a company’s new product.
  • After one company acquires another, ensure employees aren’t still using old terminology from the acquired business.

Join us in Glasgow on 2nd May to find out more

Join Complete IT Systems and experts from Cryoserver for an afternoon in the centre of Glasgow for some interesting discussions on how already overstretched IT teams can get on the front foot with these kinds of issues. We’ll also play a bit of golf on the driving range and enjoy some good food and company. Find out how to quickly respond to requests and solve situations such as:

  • Searching through conversations for keywords or information, and provide to your Legal team to use as evidence in a tribunal.
  • Find out if an employee is sharing sensitive data (a breach of GDPR) with an unauthorised individual.
  • Discover if an employee has emailed the director’s number to multiple contacts.
  • See if the company’s confidential customer contact list has been attached to an employee’s email.
  • Find evidence of information being leaked by a particular employee.
  • There’s a claim of sexual harassment and you’re tasked with finding the emails in question
  • HR has to come to you to find emails from a specific employee
  • And many more cases!

These issues might not be fully IT’s responsibility, but it’s in your interest to find the services and technology elements to help when incidents do arise, and limit the organisation’s exposure in the process.

In a collaborative workshop environment, we’ll share some live examples, and encourage you to do the same to see how easy it can be to make a difficult task much simpler – and make IT look great in the process!

 

📅 Thursday 2nd May, 2024      ⏲ 3pm to 7:30pm     📍 Topgolf Glasgow

 

Lunch and refreshments will be provided, and we’ll also test our handicap at Top Golf Glasgow. See their short video below 👇

We hope you can join us for a fun and informative day! Please contact us if you have any questions about the event, or need a hand with your business case for joining,

Kind regards,

The Complete IT Systems Glasgow Team

Phone: 0141 468 8330

Are your staff ‘crouching chargers’?

More and more people are working ‘on the go’, and your staff are likely no different!

But productive hybrid working only works when your users have the tools – and charging facilities – they need to be able to effectively walk the walk.

Duracell Rechargeable batteries and chargers can take their mind off battery replacement so they can focus on catching their flight, finding somewhere comfortable to work, and not crouching in the corner of an airport!

 

So how does Duracell help?

 

 

Want to find out more?

As Duracell Suppliers, Complete IT Systems can offer you expert advice on the solutions and how they could be effectively deployed in your business.

To find out more please call us on 01274 396 213 or use our contact form and we’ll arrange a good time to call you back.

 

The role of AI in email security

Email remains the most common initial attack route for cyber criminals. And with employees making more use of AI tools, the problem is about to get worse for IT teams.

Infiltrating an organisation via an email-based attack can happen at any level — phishing is not only targeted at senior directors. Once attackers have got an individual’s credentials then they can gain access. Once inside the network with one set of credentials, attackers can more easily move laterally and gain more permissions and fuller access. Even access to an employee’s mobile can be escalated into wider network access.

Early email fraud messages were often badly written and frankly unbelievable. Criminals relied on a ‘spray and pray’ approach – sending out thousands of messages in the hope that a few would stick. Traditional gateway defences are quite adept at dealing with these high-volume attacks. Barracuda’s own data shows that 16% of all email traffic is this sort of high-volume attack such as spam, malware, and other emails with a malicious payload. You still need gateway defences to stop these attacks as they remain a real danger.

This eBook from Barracuda outlines why traditional security gateways can’t cope, and how AI can keep you safe from phishing attacks.

Want to learn more?

Complete IT Systems have a team of Barracuda specialists on hand to demo the solution, discuss business benefits and help you understand how the technology works for your organisation.

To get in touch or request a demo please contact us.

Need a flight plan for Copilot?

Microsoft has recently made its new AI-powered digital assistant, Microsoft 365 Copilot, available to business of all sizes. 

Originally an enterprise tool, on the 15 January 2024, Microsoft confirmed Copilot is available for organisations of all sizes.

Copilot aims to boost productivity and streamline work by providing AI-generated suggestions and content within Microsoft 365 apps. But what is it, how does it work, and what are the key use cases across Microsoft 365 apps?

Do you have your flight plan ready?

This article from AvePoint gives you the 101 of Copilot, and some handy tips to ensure your organisation gets the most out of it.

Want to find out more?

As an AvePoint Partner, Complete IT Systems can offer you expert advice on the solutions and how they could be effectively deployed in your business.

To find out more please call us on 01274 396 213 or use our contact form and we’ll arrange a good time to call you back.

5 security predictions for 2024

Over the past 12 months, threat actors have deployed generative AI to take threats to new levels, scaling up their attacks and making them more effective.

So as 2024 gets underway, it makes sense to look ahead to the changes, developments, and trends the coming year will bring to the security landscape.

To help you prepare for 2024, here’s some insight from Barracuda executives, each with their own perspective and predictions about what the year has in store for cybersecurity and what businesses need to be aware of to stay protected.

Want to learn more?

Complete IT Systems have a team of Barracuda specialists on hand to demo the solution, discuss business benefits and help you understand how the technology works for your organisation.

To get in touch or request a demo please contact us.

Intelligent storage management that drives efficiencies – and more!

As we’ve been exploring in recent weeks, running virtual environments can be admin, resource and budget-heavy for IT teams. 

Whether you’re looking to reduce IT admin costs, lower storage TCO, or modernise data management, Tintri’s SQL Integrated Storage is an innovative Intelligent Infrastructure solution that delivers unparalleled visibility, automation and control for virtual and physical Microsoft SQL Server databases.

The result? A new era for SQL Server customers, enabling simplified, intelligent storage management that drives efficiencies, empowers DBAs and provides a consistent end-user experience. This short video (1 minute), gives you the lowdown.

Want to find out more?

As a Tintri Partner, Complete IT Systems can offer you expert advice on the solutions and how they could be effectively deployed in your business.

To find out more please call us on 01274 396 213 or use our contact form and we’ll arrange a good time to call you back.