Businesses

  • Blog

    Application security risk: How leaders can protect their businesses

    The increasingly complex nature of software combined with pressure to develop and rollout new features quickly makes application security a growing challenge. Application development infrastructure is full of significant security risks, according to research by Legit Security. The issue is widespread – the researchers found high or critical risks in the developer environments of every company it examined. And there…

    Read More »
  • Blog

    ‘States don’t do hacking for fun’: NCSC expert urges businesses to follow geopolitics as defensive strategy

    Business leaders need to stay up to date with geopolitics to keep their cybersecurity strategies up to date and mitigate the risks posed by state-backed hacker groups. This is the message that Paul Chichester, director of operations at the UK’s National Cyber Security Centre (NCSC), delivered to attendees at a keynote session of Infosecurity Europe 2025. The call to action…

    Read More »
  • Blog

    How businesses can make their IT operations more sustainable in 2025

    Although sustainability is becoming a top priority for businesses, relatively few are looking to their IT department as a driving force for environmental change. This was illustrated in a recent report by Kyndryl and Microsoft, which found that just 21% of organizations are using technology to achieve sustainability goals, despite 84% placing high strategic importance on them. This is down…

    Read More »
  • Blog

    Wifi network attacks: The risk to businesses

    Attacks designed to exploit weaknesses in Wi-Fi networks are on the rise, with hackers increasingly targeting vulnerabilities in Wi-Fi infrastructure to gain unauthorized access, intercept sensitive data and launch further attacks. The main area of concern is the deauthentication attack; a form of denial of service (DoS) attack that takes advantage of a basic flaw in the 802.11 Wi-FI protocol…

    Read More »
  • Blog

    Will genAI businesses crash and burn? – Computerworld

    I don’t know about you, but I’m already tired of all the generative AI (genAI) hype. I’ve been using the technology for a while now, and I’ve found ways it can be helpful — primarily as a search engine replacement — but it’s not everything it’s supposed to be.  This isn’t just cranky, cynical old me. In a recent IBM…

    Read More »
  • Blog

    96% of businesses have low cyber-readiness, claims Cisco

    Businesses worldwide are still unprepared for a myriad of cyber attacks, according to the latest Cisco Cybersecurity Readiness Index. The networking specialist categorizes companies’ cyber readiness as Mature, Progressive, Formative, and Beginner based on what it considers to be the five most important pillars of cybersecurity for businesses today. These include: Identity Intelligence Machine Trustworthiness Network Resilience Cloud Reinforcement AI…

    Read More »
  • Blog

    What are digital nomads and how easy is it for businesses to cater for them?

    The rise of digital connectivity and the affordability of portable devices has meant that employees realize they are no longer shackled to their desks. There is an emerging trend within the workforce for employees to abandon traditional approaches and travel the world whilst working remotely. Digital nomads are typically (but not exclusively) younger people who like to travel. Their reliance…

    Read More »
  • Blog

    Why cybersecurity matters for small and medium-sized businesses – Computerworld

    Online threats are prevalent and technology is advancing at a rapid pace, making cybersecurity an urgent requirement in safeguarding the digital assets of small and medium-sized businesses (SMBs).  By protecting vital data, sensitive customer information, and core business operations, SMBs are able to not only defend against cyber-attacks but also harness secure internet connections as a catalyst for growth and competitiveness within…

    Read More »
  • Blog

    Malware-free attacks: The threat to businesses

    Attackers often use malware to target business systems. But recently, ‘malware-free’ attacks – which see adversaries instead abuse existing tools to target devices – are growing in popularity. The figures are concerning. According to CrowdStrike’s 2025 global threat report, cyber attacks leveraging trusted services to conduct malicious activities are becoming the norm. In fact, the shift towards malware-free attack techniques…

    Read More »
  • Blog

    Software deployments are plagued by delays: Rampant skills shortages and underinvestment are slowing down processes – and it’s costing businesses big

    UK software deployments are running an average of four months beyond schedule, new research shows, with delays affecting more than eight-in-ten businesses. According to a new study by Gearset, deployments were 26% more likely to be delayed than delivered early, with these delays costing organizations an average of £107,000 per year. The average organization doesn’t deploy all that often –…

    Read More »
Back to top button
close