Blog

Microsoft Defender for Endpoint (ATP) Vs. Third Party Security

Security Around Office 365 Has Changed Over the Years… In the face of ever-evolving threats, protecting against phishing, malware, and ransomware is a critical concern for organisations all over the world. 91% of cyber-attacks start with an email, and with over 230 million active business users now using Microsoft Office 365, advanced security for 365…
Read more

How to Fully Adopt and Adapt to Microsoft 365 – E-ZU FastTrack

What Does Technology Adoption Really Mean? OK so you may have heard that ADOPTION is critical when introducing new technology in the workplace, and (as Adoption Specialists) we completely agree, but to help understand why… what does adoption actually mean? Technology Adoption: The acceptance, integration, and all round utilisation of new technology within the workplace.…
Read more

“Flexibility is the Key to Stability” – The True Spirit of Microsoft CSP

John Wooden is basketball’s Sir Alex Ferguson. Or Steve Jobs. Or any other true visionary you can think of in their chosen field of work. He was a nicknamed the “Wizard of Westwood” after winning ten NCAA national championships in a 12-year period. As one of the most revered coaches in the history of sports,…
Read more

5 Reasons to Choose E-ZU as Your Preferred Microsoft CSP

Whether your organisation is right at the beginning of your journey to Microsoft Office 365, or perhaps you’re already well under way and now it’s about which direction enables you to make the most of Microsoft 365 on your ongoing voyage in the Modern Workplace, it can be difficult to know what makes a good…
Read more

What is a Microsoft CSP (Cloud Solution Provider)?

What is the Microsoft CSP Program? Simply put, Microsoft describes its Cloud Solution Provider (CSP) Program as delivering the best cloud solutions to fit customers’ business needs, by means of deeper engagement and added value. Buying through the CSP Program means that an organisation purchases a ‘pay as you go’ consumption arrangement with a trusted…
Read more

Avoiding The Risks of Cyber-Crime in the Public Sector

Public Sector organisations are under an increasing number of attacks from cyber-criminals, often being specifically targeted by fraudsters who perceive them to be “easier targets”, mostly due to older infrastructures and less-than-robust cyber security awareness training. This article highlights the risks involved, and more importantly what you can to to counter them, whilst introducing the…
Read more

How E-ZU Can Help Ease the Financial Burden of Covid-19

Release Capital by Recouping Cash from Your Upfront IT Purchases As the Coronavirus lockdown begins to lift here in the UK, the financial effects of the pandemic are still in full swing, and could continue to be for the medium to long term. There’s no doubt that the economy has been hit hard, and the…
Read more

A Beginner’s Guide to… Phishing

A Beginner’s Guide to… Phishing According to the Wall Street Journal; 97% of all cyber-attacks start with Phishing. When you think about it, there’s no wonder really when you consider that most of us are using Email on a daily basis for both Personal and Business use. In fact, I think it’s safe to say…
Read more

4 Reasons Why eLearning Helps Mitigate Cyber-Attacks

4 Ways eLearning Can Help Mitigate Cyber-attacks Proofpoint’s yearly report, The Human Factor, has revealed that 95% of malicious cyber-attacks “incorporate social engineering to trick users into installing malware”, as well as the astonishing realisation that more than 99% of cyber-attacks need human interaction to succeed. The increase in Social Engineering attacks is a testament…
Read more

95% of Cyber Security Breaches are due to Human Error

End-users: The weakest link OR the last line of defence? When it comes to cyber security, end-users are often described as the weakest link. This might seem a little harsh, but when you think about the fact that 95% of cyber breaches are due to human error (according to a study by IBM), it becomes…
Read more