Blog

The Persistent Threat of Phishing

Phishing attacks show no sign of abating and continue to be one of the most pervasive and damaging. Despite new technologies, training and awareness programmes, phishing persists, targeting the most vulnerable element in any security infrastructure: human judgment.  In the Email Security Risk Report 2024 by Egress, nine in 10 organisations said they were the victims of […]

Read More

Multi-Factor Authentication (MFA) is a must-have

Multi-Factor Authentication (MFA) is a powerful security tool that significantly reduces the risk of unauthorised access and protects an organisation’s digital assets and sensitive information. According to Microsoft, more than 99.9% of all compromised accounts do not have MFA enabled. Adoption figures vary according to company size, with larger organisations more likely to have implemented […]

Read More

Building resilience for a more secure world

A lot has changed since the first Cybersecurity Awareness Month initiative began in 2004. The pervasive adoption of technology has been matched by an exponential increase in the number of cyber threats and attacks. Every day we come across new and sophisticated threats. The theme “Secure Our World”, highlights the pressing need for organisations to […]

Read More

Enhancing Cybersecurity with Microsoft Copilot for Security

Microsoft Copilot for Security is an AI-driven tool integrated with Microsoft 365, aimed at enhancing the capabilities of security professionals. Leveraging advanced machine learning models and the vast data resources of the Microsoft Graph, Copilot assists in detecting, investigating, and responding to threats more efficiently and effectively. Key Features Automated Threat Detection and Response Copilot […]

Read More

Enhancing Compliance in the Era of Cyberthreats: The Role of ICT

As cyber threats become more sophisticated and frequent, the Digital Operational Resilience Act (DORA) represents a critical step forward in fortifying the financial sector against digital disruptions. Understanding DORA and Its Implications DORA, which will be enforced as of January 2025, aims to enhance the digital operational resilience of financial entities within the EU. It […]

Read More

Interview: SOC 2 Explained

BMIT Ltd recently received SOC 2 Type 1 attestation. Dione Vella, Chief Digital and Compliance Officer explains why this is an important achievement for the company. He was talking to David Kelleher.  What does achieving SOC 2 Type 1 attestation mean for BMIT?  The SOC 2 (Service Organisation Control 2) or ISAE 3000 report is […]

Read More

Zero Trust: A proactive approach to security

Traditional security models based on perimeter defence and implicit trust are no longer effective. The notion that what is inside the organisation’s network is trusted and everything outside as untrusted is no longer supported. Instead, organisations are adopting a more proactive and holistic security strategy that does not trust any user, device, or application, regardless […]

Read More

Insider threats: Battling a security unknown

There exists a subtler and potentially more damaging danger lurking in your business – the insider threat. Insider threats are one of the most serious and costly cybersecurity risks for any organisation. This phenomenon involves individuals exploiting their privileged access to compromise security from within.  An insider threat could be a current or former employee, […]

Read More

Beware & Buy - Avoiding Cyber Traps During Holiday Sales

Black Friday and Cyber Monday are the busiest shopping days of the year. According to Bitdefender, consumers spent $9 billion online last year, up by 22% on 2021. In 2022, Cyber Monday generated a whopping $11.3 billion in revenue alone. Unfortunately, the boom in retail business comes with a matching risk: cybercrime. Cybercriminals, consistently active […]

Read More

BMIT launches Cybersecurity Awareness Programme for businesses

More and more business leaders are recognising the importance of cybersecurity. They are also acknowledging that a strong first line of defence, starting with their employees, can considerably reduce the risk of a breach or data leakage. However, achieving this requires employees to be well-informed and proficient in identifying and mitigating cyber threats. While certain […]

Read More