The Macnamara Blog

Making Sense Of Information Security
Best practices

Making Sense of Information Security – Online Course

In this series of 5 short tutorials, ‘Making Sense Of Information Security’, Ciaran delivers a step by step guide on getting to grips with this at times tricky concept. Aimed at office managers, we cover areas such as how to get senior management buy-in, how to undertake a risk assessment, how to approach treatment of those risks, your responsibilities to data subjects under the GDPR, and more.

Read More »
copilot-logo
Cloud Services

Enhance Productivity with Microsoft 365 Copilot

AI tools are transforming how people approach their work, but online ‘free’ tools such as ChatGPT are not secure for businesses to use, and you should never enter any confidential or personal information into free online AI Services. This information can be used to train the AI and make it available to other users, and may constitute a data breach.

Read More »
3D rendering. Abstract background concept of cyber security and attack, system crash.
Security

The 7 Most Common Attack Vectors in 2024

With the rapid onset of new technological capabilities, cyberattacks are a very real threat to any modern business. After all, as more businesses implement new technologies into their business, cyber attackers gain more new targets to try their hand at.

Read More »
ISO27001
Macnamara News

ISO 27001 From The People Who Implemented It

Achieving ISO27001, the gold standard of information security, is no mean feat. We’re incredibly proud of the achievement but we could have only done it with the help and engagement of everyone on the team.

Read More »
ISO27001
Macnamara blog

ISO 27001 – We Are Now Certified!

We are exceptionally pleased to announce that as of 14th October 2024 we are now fully and officially ISO27001 certified, a process we started a little over a year ago. We’ve always taken information security seriously, and have been certified with Cyber Essentials and other standards from IASME since 2015. But it’s always been an ambition to go for the internally recognised Gold Standard.

Read More »
Cyber Essentials 2023
Best practices

Is Your IT Support Cyber Essentials Certified?

Cyber Essentials is the minimum security baseline that all companies should aim to achieve. It checks to ensure that the very basics are covered, such as MFA on all Cloud service accounts, no admin rights for day-to-day use, and that security updates are installed promptly. If you are seeking to certify your own organisation, you should definitely ensure that your IT Support – who likely have far more access and control over your company data than you do – has at least this basic benchmark certification.

Read More »
Microsoft Authenticator
How-To

How to Setup MFA for Microsoft 365

Multi-Factor Authentication is (or should be) enabled by default for your Microsoft 365 account, and provides an important additional layer of protection on your account. In this short post we guide you through the steps to set it up.

Read More »
DLP Icon
Best practices

Data Loss Prevention Policies in M365

Data Loss Prevention (DLP) policies in Microsoft 365 (M365) are useful security measures designed to monitor or prevent legitimate, inadvertent or malicious sharing of sensitive information outside of an organisation. As companies have moved away from on-premises servers for file storage towards M365 SharePoint and OneDrive, more and more are using it to save all their company data. But many business are not using the full range of functionality and background security features that make M365 a truly powerful modern tool for work and collaboration.

Read More »
New Outlook
How-To

How To Add a Shared Calendar to the New Outlook

The “New Outlook” for Windows introduces a range of exciting features, intelligent assistance capabilities, and a sleek, simplified design to enhance your email and calendar experience. With these updates, you can tailor the app to fit your unique style and boost your productivity like never before.

Read More »
New Outlook
How-To

How To Schedule and Snooze Your Emails with the New Outlook

Microsoft’s New Outlook is a modern, streamlined version of the popular email client, designed to enhance productivity and provide users with a more experience. Featuring a sleek interface and improved functionality, New Outlook integrates seamlessly with other Microsoft 365 applications.

Read More »
New Outlook
How-To

How To Locate Shared Mailboxes in New Outlook

The New Outlook is being rolled out and Microsoft have made some changes to the way you find and view your shared mailboxes. This short How To guide will show you how to locate these shared mailboxes, ensuring you don’t miss those important emails!

Read More »
Best practices

How To Set Up Signatures In Outlook

Email signatures are important and have a number of purposes. A well designed signature can be a real benefit to your company brand. They also provide all your contact details, can be used to help with marketing campaigns, and if you’re a business, provide important required information about your company registration. Here’s some guidance on adding signatures in Outlook.

Read More »
Outlook
How-To

How To Find The Conflicts Folder in Outlook

In Outlook, the Conflicts folder is like a record of problems when your emails don’t sync well with the mail server. If there’s trouble syncing, you might end up with extra copies of the same email. These issues get listed in the Sync Issues folder. You wouldn’t often need to look in this folder, but over time it can get quite big, so you might occasionally need to see it to empty some space.

Read More »
wifi
Best practices

How To Get Best Experience From Your Wireless Access Point

We all know that Wi-Fi can be much more convenient for your office setup than connecting everything via cable, and as Wi-Fi speeds and connectivity get better, more offices are switching to wireless. However, many people have concerns that wireless is less reliable than cabled, and they worry that they will struggle with weak signals or frequent disconnections. This blog will provide you with all the knowledge you need to get the best wireless experience and keep you at your desk rather than under it, fiddling with cables.

Read More »
copilot-logo
Information Management

Copilot for Microsoft 365

Copilot for Microsoft 365 is here and in general release. This post is a summary (not by Copilot, but by us!) of some introductory documentation from Microsoft Learn on what it is, how it works, and how you can incorporate it into your Microsoft 365 experience.

Read More »
Outlook
How-To

How To Set Your Default Font in Outlook

If you find yourself wanting to change the default font for your Microsoft Outlook emails or perhaps want to unify the style as a part of a broader branding effort, there is a quick way to do it.

Read More »
AI Support 09
Macnamara blog

IT Support vs IT Security – Are You Getting The Service You Deserve?

Small businesses are just as vulnerable – if not more so – as larger organisations to cyberattacks, data breaches, and other IT-related issues (including simply poorly maintained equipment) that can compromise their operations, reputation, and profitability. They also need an occasional helping hand with some of the more everyday helpdesk issues that arise, be they problems, or simply helping to get new staff set up on the systems.

Read More »
copilot-logo
Macnamara blog

Copilot and AI in Windows 11

Over the last 2 years AI has taken the tech world by storm, and for good reason. With the release of AI models such as DALL-E and ChatGPT, we have seen what AI is truly capable of and this is just the beginning.
Microsoft is keen to utilise this breakthrough in technology and is introducing a seamless integration of popular AI features into Windows itself. No more creating accounts on various platforms, or even downloading large models manually and using funky command lines (looking at you Stable Diffusion), it will all be at your fingertips within Windows.

Read More »
Best practices

What is Information Management and Information Security?

Before the cloud, when businesses were primarily working from an office, they knew where their information was, how people could access it, how it was backed up and how it was protected. Now since we’re ever increasingly working in the cloud and from multiple remote locations, it’s less clear. This can cause all sorts of problems and headaches for businesses, including a heightened risk of becoming the victim of fraud through to non-compliance with your legal and regulatory obligations.

Read More »
Unlocked Padlock
Best practices

Why You Shouldn’t Mix Personal and Business Browsing

Using browser profiles is extremely useful. It allows you to sign in on multiple devices and get the same bookmarks, passwords, and history across your devices. BUT, you should never use the same profile for work that you use for your personal browsing, and for good reason.

Read More »
Teams Phone
Microsoft 365 Apps

How To Configure Your Teams Phone Settings

If you use Teams for your phone system, you get quite a lot of control over your own account to set up things like voicemail and forwarding. This is particularly useful if you are going on leave and want to either set all your calls to go to voicemail or redirect them to someone else. You can customise your voicemail greeting in much the same way as you set an Out Of Office auto reply on your emails.

Read More »
Scroll to Top