Yusra Shaeik

SharePoint workflow end-of-life: what you need to do

On 2nd April 2026, Microsoft SharePoint Online workflows will be retired. That sounds a little way off. But if you use this handy automation tool in your business, figuring out what to do about SharePoint workflow end-of-life is something you need to do sooner rather than later. Here is everything you need to know about

Migration to Microsoft 365: top 3 cybersecurity tips

Migration to Microsoft 365 is a smart move for your business if you want to protect yourself and be ready to grow in future. But migrating to Microsoft 365 from another platform calls for more than just transferring a bunch of data across. You will also need to learn how to protect that data. Your

How to set up Microsoft 365 Advanced Threat Protection

Working out how to set up Microsoft 365 Advanced Threat Protection is one of the most effective ways to protect your business from email-based cyber attacks. This is vital. Because phishing is the most common type of cyber crime. Email impersonation and spoofing, CEO fraud, malware delivered through dodgy links and the like – all

What is IASME Cyber Assurance (and who needs it)?

If you’re looking for a higher cybersecurity standard for your business – something to help you reassure investors and attract new clients – IASME Cyber Assurance could be it. But what is IASME Cyber Assurance exactly? Who needs it? And what sort of business is it the right choice for? Because, from the outside, cybersecurity

What is ISO 27001 (and who needs it)?

ISO 27001 is a key Information Security standard. For businesses that regularly hold onto sensitive data about their clients and want to demonstrate the highest standards of security, it can be an important standard to meet. Because the cybercrime risk to everything from financial information to Intellectual Property to patient safety can be huge. It

Phishing vs. Spear Phishing (and how to prevent both)

Data protection has never been more important for businesses of every size. This is because of the massive rise in costly (£160 000 on average) cyber attacks. Of these attacks, phishing and spear phishing are among the most common – and effective. Roughly 2 out of 3 SMEs suffered some degree of cyber attack last

Cybersecurity and User Experience – how to strike a balance with Microsoft 365

If your cybersecurity and user experience aren’t in balance in your installation of Microsoft 365, you’re setting yourself up for trouble. This is for two interlocking reasons: One, cybersecurity has an (often undeserved) reputation for making life more difficult. However, skipping good cybersecurity costs businesses millions of pounds every year. Second, the more that something

How can I speed up my Outlook?

“Why is my Outlook running so slowly?” It’s a question that regularly echoes around offices throughout the land. If figuring out how you can speed up your Outlook is an ongoing issue, fear not – this article is for you. Here’s why your mail client is running slowly: It’s probably all about your email cache…

What is Business Email Compromise? (And why is it so dangerous?)

Business Email Compromise attacks are on the rise. This kind of sophisticated cyber attack uses legitimate-seeming emails to convince you or a member of your team to send money or sensitive data. The best BEC attacks are nowhere near as easy to detect as you might imagine. And for thousands of businesses around the world