loading

Blog

Fusion Technology Solutions News

  • How the Lotus F1 Team uses Office 365

    How the Lotus F1 Team uses Office 365

      With speeds of over 200 mph and danger hiding behind every turn, the Lotus Formula 1 Team needs reliable IT infrastructure.   Office 365 enables the Lotus Formula 1 Team More...
  • Testing, Testing 1,2,3 - Pen-Tests & Vulnerability Testing

    Testing, Testing 1,2,3 - Pen-Tests & Vulnerability Testing

    "All of your confidential information is extremely vulnerable, we know this because...”   This may be bad news, but whatever follows determines just how bad.   Consider two scenarios: 1 More...
  • 3 Responses to a Ransomware Attack

    3 Responses to a Ransomware Attack

    If you are unfortunate enough to be the victim of a ransomware attack, there are basically only three options open to you. Ransomware is a type of computer virus that kidnaps More...
  • 4 Cybersecurity Red Flags to Watch Out For

    4 Cybersecurity Red Flags to Watch Out For

    As someone running a SMB, you probably have a lot on your plate. You are the core decision maker, responsible for growing your business, keeping your clients happy and getting all More...
  • Whaling, Smishing & More - Lou Archbold on the Cyberlandscape 2018

    Whaling, Smishing & More - Lou Archbold on the Cyberlandscape 2018

    Kicking off National Cybersecurity Awareness month, the Fusion Technology Solutions team attended the September 28th Cybersecurity conference hosted by the NBBJ. The highlight of the conference was a presentation by Lou More...
  • Seven Ways Office 365 Improves Productivity

    Seven Ways Office 365 Improves Productivity

    In this ebook, you’ll learn seven ways Office 365 can help you improve communication and teamwork to make your business more effective, collaborative, and successful. Click below so that we can More...
  • Stupid or Irresponsible? -  Victims of Cyberattacks

    Stupid or Irresponsible? - Victims of Cyberattacks

    When you fall victim to a cyberattack through no fault of your own, will they call you stupid…or just irresponsible? It’s extremely unfair, isn’t it? Victims of all other crimes – More...
  • 5 Steps to Protect Your Data from Ransomware

    5 Steps to Protect Your Data from Ransomware

    Here are 5 steps you can take right now to protect yourself from ransomware:  1) Utilize the latest security infrastructure  Always run a good anti-virus utility and keep it updated.  More...
  • What is Ransomware?

    What is Ransomware?

    WannaCry and NotPetya, two types of ransomware, have been in the global headlines recently for causing cybercrime victims millions of dollars of damage.  These types of ransomware attacks are proliferating More...
  • Get the Most out of Office 365 - Free Seminar

    Get the Most out of Office 365 - Free Seminar

    Staying on top of best practice technologies is important to enable your team to do their best work possible and your business to stay competitive.  Maybe your company is still More...
  • Men at Work

    Men at Work

    Ever wonder what goes into making your computer systems talk to each other? It starts with a good foundation  Just like a house, and a dedicated and talented staff. Here More...
  • Why Move to VoIP?

    Why Move to VoIP?

    Yes, today’s blog is about office phone systems. You have one. They are dull, necessary, and no one wants to deal with them. They need to be re-configured for new employees More...
  • How to Evaluate Your IT Support

    How to Evaluate Your IT Support

    You pay for your IT service and trust that your provider does their best for you. But how can you really tell if you are receiving best-in-class or substandard service? How More...
  • The Cloud: 4 Benefits of Replacing On-Site Resources

    The Cloud: 4 Benefits of Replacing On-Site Resources

    There has been a lot of media reporting about using off site computing resources and storage to supplement or even replace the use of on-site/in-house resources. Instead of buying hardware and More...
  • How the Cloud Saves Smaller Companies Money

    How the Cloud Saves Smaller Companies Money

    So, you pay someone to store all of your data in the cloud, as opposed to keeping it on your own server and backing it up... And then you pay on More...
  • The Cloud: Are there Security Issues?

    The Cloud: Are there Security Issues?

    For many, the idea of offloading their data to another physical/virtual location can seem like a security risk.  It seems counterintuitive that moving data away from " home” is More...
  • Committed Partnership Ensures Business Continuity: Bouchaine Vineyards

    Committed Partnership Ensures Business Continuity: Bouchaine Vineyards

    With technology crucial to communications and daily business, Bouchaine Vineyards needed to be fully connected at all times, but certain areas of their IT environment were lacking. Thankfully, Fusion Technology Solutions More...
  • Disaster Recovery Plans: Do You Have One?

    Disaster Recovery Plans: Do You Have One?

    Disaster Recovery Plans: Do You Have One? Here in California, we constantly face the threat of wildfires that can destroy our homes, offices and business infrastructure. Disaster recovery and business continuity More...
  • Free Disaster IT Assistance

    Free Disaster IT Assistance

    As we enter the Holiday season, the Fusion team would like to send our condolences to those still dealing with the aftermath of the Northern California fires. We would like to More...
  • Coming together to build a better solution when disaster strikes

    Coming together to build a better solution when disaster strikes

    Hey Everyone, We’re reaching out to those effected by the Northern California Wildfires. If you’re in Sonoma, Napa, or Mendocino county and need assistance finding your data, hardware replacement, building a More...

(888) 380-3580

info@fusiontechnologysolutions.com