Businesses
-
Blog
Application security risk: How leaders can protect their businesses
The increasingly complex nature of software combined with pressure to develop and rollout new features quickly makes application security a growing challenge. Application development infrastructure is full of significant security risks, according to research by Legit Security. The issue is widespread – the researchers found high or critical risks in the developer environments of every company it examined. And there…
Read More » -
Blog
‘States don’t do hacking for fun’: NCSC expert urges businesses to follow geopolitics as defensive strategy
Business leaders need to stay up to date with geopolitics to keep their cybersecurity strategies up to date and mitigate the risks posed by state-backed hacker groups. This is the message that Paul Chichester, director of operations at the UK’s National Cyber Security Centre (NCSC), delivered to attendees at a keynote session of Infosecurity Europe 2025. The call to action…
Read More » -
Blog
How businesses can make their IT operations more sustainable in 2025
Although sustainability is becoming a top priority for businesses, relatively few are looking to their IT department as a driving force for environmental change. This was illustrated in a recent report by Kyndryl and Microsoft, which found that just 21% of organizations are using technology to achieve sustainability goals, despite 84% placing high strategic importance on them. This is down…
Read More » -
Blog
Wifi network attacks: The risk to businesses
Attacks designed to exploit weaknesses in Wi-Fi networks are on the rise, with hackers increasingly targeting vulnerabilities in Wi-Fi infrastructure to gain unauthorized access, intercept sensitive data and launch further attacks. The main area of concern is the deauthentication attack; a form of denial of service (DoS) attack that takes advantage of a basic flaw in the 802.11 Wi-FI protocol…
Read More » -
Blog
Will genAI businesses crash and burn? – Computerworld
I don’t know about you, but I’m already tired of all the generative AI (genAI) hype. I’ve been using the technology for a while now, and I’ve found ways it can be helpful — primarily as a search engine replacement — but it’s not everything it’s supposed to be. This isn’t just cranky, cynical old me. In a recent IBM…
Read More » -
Blog
96% of businesses have low cyber-readiness, claims Cisco
Businesses worldwide are still unprepared for a myriad of cyber attacks, according to the latest Cisco Cybersecurity Readiness Index. The networking specialist categorizes companies’ cyber readiness as Mature, Progressive, Formative, and Beginner based on what it considers to be the five most important pillars of cybersecurity for businesses today. These include: Identity Intelligence Machine Trustworthiness Network Resilience Cloud Reinforcement AI…
Read More » -
Blog
What are digital nomads and how easy is it for businesses to cater for them?
The rise of digital connectivity and the affordability of portable devices has meant that employees realize they are no longer shackled to their desks. There is an emerging trend within the workforce for employees to abandon traditional approaches and travel the world whilst working remotely. Digital nomads are typically (but not exclusively) younger people who like to travel. Their reliance…
Read More » -
Blog
Why cybersecurity matters for small and medium-sized businesses – Computerworld
Online threats are prevalent and technology is advancing at a rapid pace, making cybersecurity an urgent requirement in safeguarding the digital assets of small and medium-sized businesses (SMBs). By protecting vital data, sensitive customer information, and core business operations, SMBs are able to not only defend against cyber-attacks but also harness secure internet connections as a catalyst for growth and competitiveness within…
Read More » -
Blog
Malware-free attacks: The threat to businesses
Attackers often use malware to target business systems. But recently, ‘malware-free’ attacks – which see adversaries instead abuse existing tools to target devices – are growing in popularity. The figures are concerning. According to CrowdStrike’s 2025 global threat report, cyber attacks leveraging trusted services to conduct malicious activities are becoming the norm. In fact, the shift towards malware-free attack techniques…
Read More » -
Blog
Software deployments are plagued by delays: Rampant skills shortages and underinvestment are slowing down processes – and it’s costing businesses big
UK software deployments are running an average of four months beyond schedule, new research shows, with delays affecting more than eight-in-ten businesses. According to a new study by Gearset, deployments were 26% more likely to be delayed than delivered early, with these delays costing organizations an average of £107,000 per year. The average organization doesn’t deploy all that often –…
Read More »