Joe Hutchings

Joe Hutchings is TEAM IM's Director of Support Services and Information Technology. Joe has been with TEAM since 2010 and has 35 years of experience in software development and support.

2 min read

Understanding Social Engineering: How to Protect Yourself

Social engineering is a deceptive manipulation technique that exploits human psychology to gain access to confidential information, systems, or physical locations. Unlike traditional hacking methods, social engineering relies on human interaction to...

Read More

2 min read

Why Privacy Matters: Even if You Have Nothing to Hide

In an era where digital footprints are ubiquitous and personal data is often treated as a commodity, the concept of privacy has never been more...

Read More

2 min read

The Significance of Electronic Signatures in Document Management

In today's rapidly evolving digital landscape, businesses of all sizes are embracing technology to streamline operations and enhance productivity....

Read More

2 min read

Exploring the Future with Microsoft Copilot

Introduction In the ever-evolving landscape of artificial intelligence, Microsoft Copilot emerges as a beacon of innovation and a herald of new...

Read More

2 min read

Defending Against Spear Phishing Attacks: Safeguarding Your Organization

Introduction In today's digital age, organizations face a constant threat from cybercriminals seeking to exploit vulnerabilities and gain...

Read More

2 min read

Why Compliance Matters for Information Security?

Introduction In today's digital age, where data is the new gold, protecting sensitive information has become indispensable to every organization's...

Read More

2 min read

AI and Information Security: Balancing Power and Vulnerability

Introduction: In an increasingly digital world, the rapid advancement of artificial intelligence (AI) has brought about significant improvements in...

Read More

3 min read

Modern Authentication for External Mail Connections in M-Files

Applications have used Basic Authentication to connect to servers, services, and API endpoints for many years. Basic Authentication simply means the...

Read More

2 min read

Advantages of ITIL

Service Management Today

Read More

2 min read

Analyze M-Files Event Logs in Excel

We recently had a customer ask our Support Team if we were aware of a reporting capability in M-Files for determining which documents were most...

Read More