Intuity Insights June 2024 Issue
Intuity Technologies
Delivering Managed IT, IT Security, & Remote Working Solutions to SME's dispersed teams. 0818 987 900
Welcome to the Intuity Insights Newsletter! A monthly roundup designed to keep you informed and up-to-date with tech news, solutions, and events at Intuity!
In this edition...
The top 10 benefits of Copilot for Microsoft 365 ????
Many of us have heard about Microsoft Copilot for 365, but have you considered the major benefits of adopting this revolutionary AI companion that is transforming the way businesses operate?
Copilot offers a wide range of benefits that streamline workflows, boost productivity, and drive innovation. It provides businesses with a chance to completely rethink and reshape how every team member works and drives positive change.
Copilot for Microsoft 365 is more than a mere AI tool that passively searches the web for generic answers. Instead, it leverages your business data and actively serves as a personal assistant for each user.
Still sceptical? Read our latest blog post to discover the top 10 benefits of Copilot for 365, including increased productivity, enhanced collaboration, time-saving efficiency, and much more...
All Things Bright and Beautiful – Don’t Fall for the Allure: Organising Digitisation in the AI Era
Contributed by Padraic Hayes - Head of Business Solutions
The digital technology landscape is evolving at an astounding pace, driven almost exclusively by the recent breakthrough in Artificial Intelligence (AI) & the transformer-model-based architecture first introduced in Google's 2017 whitepaper, “Attention is all you need”. A standout in this progression is ChatGPT, launched in November 2022, which swiftly captured the attention of global business leaders, achieving pole position as the fastest growth of any platform in history - and for good reason. Let me be clear: GenAI is THE single biggest advancement since the industrial revolution. Promising profound impacts on businesses and society at large, eliminating the mundane towards a more dystopian future of a digital organisation.
HOWEVER - it’s essential to approach AI adoption with careful consideration, before you dive in head-first ask yourself:
If you answered yes, then you’re not ready for AI. In fact, very few organisations are. Instead, you may need a robust Digital Strategy and an executable roadmap that will enable you to achieve specific, measurable, and transformative business outcomes. This could involve leveraging technologies such Business Intelligence (BI) to automate the creation of insightful reports and dashboards using natural language to help with decision-making and spending less time creating the reports, or Robotic Process Automation (RPA)/Hyper Automation tool to automate manual tasks such as downloading files and carrying out analysis. Or, better yet, add-ons such as Co-Pilot & Solgari to transcribe notes from meetings, summarise and create documents, interact with your customers, and sync the data back to your CRM automatically (all of which incorporate AI). Together, these solutions can elevate your organisation’s data maturity and readiness for an AI-defined future.
We are Digital Business Integrators: we have helped many organisations, such as Hen Harrier, get started refining their digital strategy and roadmap and executing their development.
Our business solutions team will partner with you to create a clear plan to guide your organisation towards becoming more digitally-native.
To get started on your digital transformation journey, contact Padraic Hayes and his team of experts.
Something seems phishy... ????
This story is based on a real-life incident experienced by an Intuity customer.
On a typical day in May, an unsuspecting Intuity customer received an email from what appeared to be a familiar and friendly contact. However, our consumer had no idea that this seemingly innocent email was actually a phishing attempt!
Fortunately, the security issue with this email was discovered due to an alert received within our customer's threat detection system. This alert signalled a potential security breach in the email sender's network. As it happens, the ‘friendly’ contact that sent this email to our customer was known to Intuity from the past, and we swiftly notified them that there was a major issue in their network.
The same phishing email was sent to other users within our customer's organisation, but fortunately no one else opened the email due to the late hour of the day.
The profile was protected, and no harm was done to the organisation as the account was immediately remediated.
We can never be 100% sure that nothing was downloaded, but our analysis appears to indicate that the bad actor had not yet begun any activity; no ransomware demand was made THIS TIME!
We are content that the threat was stopped, but we did make some immediate recommendations, including:
The lesson here is: don't take the bait! Just because a contact is familiar to you does not mean you can automatically trust their emails.
REMEMBER cybercriminals might try to impersonate someone in different ways using phishing tactics.
Get in touch with us to learn more about how you can protect your organisation through security awareness training, conditional access, and threat detection software.
Pride Month Celebrations ??
This month, we celebrated Pride at Intuity HQ in association with Belong To - LGBTQ+ Youth Ireland. Our Drag Bingo event was thoroughly enjoyed by all, especially those who won prizes! This event also helped raise vital funds for Belong To's great work! ?????
A huge thank you to our People & Culture Manager, Sarah McCarthy and our Marketing Executive, Nadine Wall , for organising this event.
A simple guide to the core functions of the NIST 2.0 Cybersecurity Framework
Staying ahead of cyber threats is a challenge for organisations of all sizes. Over the past year, 75% of security professionals have observed an increase in cyberattacks. It's more important than ever to use a structured approach to cybersecurity to help protect your organisation.
The National Institute of Standards and Technology (NIST) in the US has created a Cybersecurity Framework (CSF) that remains the global standard for cybersecurity frameworks. It’s designed to help companies manage and reduce their cybersecurity risks. The framework was updated in 2024 and builds upon the success of its predecessor. It offers a more streamlined and flexible approach to cybersecurity. This guide aims to simplify the framework.
Here are the five Core Functions of NIST CSF 2.0.
Identify: This function involves identifying and understanding the organisation’s assets, cyber risks, and vulnerabilities.
Protect: The protect function focuses on implementing safeguards. These protections are to deter, detect, and mitigate cybersecurity risks.
Detect: Early detection of cybersecurity incidents is critical for minimising damage.
Respond: The respond function outlines the steps to take in the event of a cybersecurity incident.
Recover: The recover function focuses on restoring normal operations after a cybersecurity incident.
Need advice about Cybersecurity for your business?
Book a meeting with Seamus Quinn Head of Cybersecurity at Intuity’s specialised cybersecurity subdivision, CyberContego .
Tell us what you think!
Is there something you'd like us to discuss or explain in our Newsletter? Let us know by leaving a comment below!
Intuity Technologies is the official IT Systems & Security Partner of Connacht Rugby.