10 controls to guard against ransomware
Hackers are out to get you. That’s not hyperbole, they really are. And ransomware is one of their most powerful tools. So, it’s essential to guard...
Microsoft Loop – what is it and how to use it
We all seem to use many Microsoft products, from Teams to Word. Well, now, Microsoft is releasing a new tool to increase productivity by linking the...
How to spot phishing emails and avoid scams
How to spot phishing emails and avoid scams
Cybersecurity is the number 1 threat to European business in 2024
The Institute of International Finance (IIF) has conducted a bank risk management with data from 17 European banks – and concluded that the biggest...
What are data centre outages and why do they happen?
According to the Uptime Institute’s latest report, most organisations have experienced a data centre outage, which tends to happen for one of four...
It’s not just Apple’s M-series chips that are vulnerable to attack
A group of academic researchers have discovered a vulnerability in a commonly used processing chip, including Apple’s new M-series chips, which could...
How to deal with IT disruptions: McDonald’s moves on to burger and better things
McDonald’s experienced a global IT failure, which resulted in some restaurants shutting down, while others only accepted cash. Here's what we can...
155,000 vulnerable cyber assets in the UAE – are some of them yours?
The UAE currently hosts 155,000 vulnerable cyber assets, a staggering 40 percent of which are over five years old, according to a new report.
The EU AI Act – what you need to know
The EU AI Act, as it is known, signifies a sea change in official approaches to the rapidly evolving technology, and could affect your business.