Our Voice

What’s New for Cyber Essentials 2025

Learn More
CONTACT US

Edit this archive in archive.php

White Paper

Your Guide to Data Security in the Age of AI

Learn More

Our Voice

Say Hello to the Samsung Galaxy Tab S10 Series, Galaxy S24 FE and Galaxy Ring

Learn More

Our Voice

A Guide to Phishing Attacks in 2025

Discover our comprehensive guide to the latest phishing attacks in 2025 and learn effective strategies to defend against them.

Learn More

Our Voice

Galaxy Unpacked 2025: Samsung’s Latest Innovations for Business

Learn More

Our Voice

How does Microsoft Security Copilot Integrate with Microsoft Purview to Enhance Data Security?

Learn how Microsoft Security Copilot integrates with Purview to enhance data security through AI-driven insights, real-time threat detection & compliance tools.

Learn More

Our Voice

Ransomware Trends to Watch Out for in 2025

Learn More

Our Voice

The Evolution of Cyber Fraud: Trends to Watch in 2025

Learn More

Our Voice

Effective Strategies to Understand and Govern Your Data

Learn More

Our Voice

A Step-by-Step Guide to Safeguarding Your Corporate Data with Microsoft Purview

Learn More

Our Voice

What is Data Classification?

Discover the fundamentals of data classification, why it’s essential for secure information management, and how to implement it effectively in your organisation.

Learn More

Technology Talks

Achieving NIS2 Compliance

Tune into CWSI's Client Solutions Director, Paul Conaty, as he addresses key questions about the new NIS2 directive and its impact on organisations.

White Paper

Android 15 for Enterprise

Discover how Android 15 is revolutionising hybrid work, enhancing security, increasing productivity, and driving innovation in the modern workplace.

Learn More

Our Voice

A Smarter, More Secure OS with the Best of Google AI

Learn More

Our Voice

Navigating Zero Trust in the Cloud-First World

Learn More

Our Voice

What Is Unified Endpoint Management?

Explore Unified Endpoint Management (UEM), its advantages, and how mobco streamlines endpoint security for businesses. Read our comprehensive guide to learn more.

Learn More

Our Voice

mobco and ChromeOS Join Forces to Power the Future of Hybrid Work

Learn More

Our Voice

What is Microsoft Defender for Endpoint?

Learn More

Our Voice

Best Practices in Mobile App Security: Secure Your Customers Data

Our best practices for mobile device security. Learn how to protect your organisation from mobile threats with secure authentication, app management, and more.

Learn More

Our Voice

From Data to Defence: How the Threat Intelligence Lifecycle Strengthens Cybersecurity and Compliance

Discover how the threat intelligence lifecycle can help you strengthen your organisation’s cybersecurity and compliance capabilities in this detailed guide.

Learn More

Our Voice

What is Cloud Transformation? The Complete Guide

Discover what cloud transformation means, its benefits, and how mobco helps businesses modernise IT systems and drive innovation through cloud solutions.

Learn More

Our Voice

The Complete Guide to Advanced Persistent Threats

Learn everything you need to know about Advanced Persistent Threats in this guide by mobco. Get in touch today for more information.

Learn More

Our Voice

The Complete Guide to Cyber Threat Actors: Understanding and Defending Against Digital Threats

Learn More

Our Voice

What is Microsoft Intune? A Detailed Guide

Discover what Microsoft Intune is, in this detailed guide from mobco. We outline the benefits of this solution and how it can benefit your business.

Learn More

Our Voice

How to Navigate the NIS2 Regulation with Paul Conaty

Learn More

Our Voice

Turning Data to Decisions: How Knox Suite’s Advanced Analytics Drive Performance

Learn More

Our Voice

Unveiling the Power of Samsung Knox Suite: A Deep Dive into Its Solutions

Learn More

White Paper

The Next Era of Modern Work

Learn More

Our Voice

It’s Glowtime: Here are the new iPhone 16, Apple Watch Series 10, AirPods 4, and more

Learn More

Our Voice

The Advantages of Partnering with a Member of Microsoft’s Intelligent Security Association (MISA)

Discover 6 key benefits of partnering with a member of Microsoft’s Intelligent Security Association (MISA), in this detailed blog from mobco.

Learn More

Podcast

Microsoft Security Hacks Podcast: Discover the Role of a CSOC

Listen to CWSI’s Mark Mitchell as he joins Microsoft’s Jeroen Jansen on the Microsoft’s Security Hacks Podcast as they discuss the role of a CSOC.

Learn More

Our Voice

A Guide to Microsoft 365 E5 Security and Compliance Add-ons

Explore Microsoft 365 E5 Security with this detailed guide from mobco. We discuss this software in full, as well as its compliance add-ons.

Learn More

Our Voice

What is an E-Skimming Attack?

Discover what an E-skimming attack is in this guide from mobco. We define this type of attack, how they work and what options are available if you are hit by one.

Learn More

Our Voice

Microsoft 365 E5 Licence Explained

Learn More

Our Voice

Understanding Microsoft Purview: A Detailed Guide

Learn More

Our Voice

What Does a Threat Intelligence Analyst Do?

Discover what a Threat Intelligence Analyst does in this guide from mobco. We discuss roles, responsibilities and what they can bring to the table.

Learn More

Our Voice

Unveiling Samsung’s Cutting-Edge New Foldables: Galaxy Z Fold6 and Z Flip6

Learn More

Our Voice

The Difference Between Microsoft 365 E3 and E5

Learn More

Our Voice

The History of Ransomware

Discover the history of ransomware in this detailed guide from mobco. We discuss a range of cyber attacks including the original Trojan attack by Joseph Popp.

Learn More

Our Voice

A Guide to Vulnerability Intelligence

Learn More

Technology Talks

WWDC 2024: Key Highlights

Tune in as CWSI's Wouter Troost and Björn Kemps walk you through the most relevant business novelties announced at Apple's WWDC 2024. From Apple Intelligence over new MDM features to advanced security updates, we have got you covered.

Our Voice

What is Microsoft Azure B2B?

Read our Microsoft Azure B2B blog to learn its impressive benefits for external collaboration.

Learn More

Our Voice

What is Conditional Access? Explained

In this mobco blog discover what Conditional Access is, how it works, why we need it, and much more.

Learn More

Our Voice

Demystifying a Managed SIEM: What Is It and How Does It Reinforce Cyber Resilience?

Explore the depths of managed SIEM in this detailed blog from mobco. We discuss what SIEM’s are, the benefits of using them and much more.

Learn More

White Paper

Apple for Enterprise: Tech Deep Dive 2024

Learn More

Our Voice

mobco Achieves Prestigious Microsoft FastTrack Partner Status

We are delighted to announce that mobco has met the rigorous requirements to become a Microsoft FastTrack Ready Partner.

Learn More

Our Voice

What is Microsoft Sentinel? Explained

Learn More

Our Voice

The History of the Apple iPhone

Explore our detailed Apple iPhone timeline which documents it's 17 year history of revolutionary technological advancements.

Learn More

White Paper

Apple For Enterprise 2024

Discover the latest insights and strategies in our whitepaper, "Apple for Enterprise 2024." Learn how Apple products and services can transform your business.

Learn More

Our Voice

mobco’s SecureGuard Services

Discover mobco's SecureGuard services designed to safeguard our customers critical assets, ensure compliance and enhance overall resilience.

Learn More

Our Voice

What is Microsoft Entra ID? A Comprehensive Guide

Learn More

Our Voice

A Guide to Three Types of Threat Intelligence

Learn More

White Paper

Harnessing macOS for Modern Enterprise

Learn More

Our Voice

Unveiling the Power of a Managed CSOC

Learn More

Our Voice

What is the Difference Between a SIEM and a SOC?

In this blog, we explore the various differences between a CSOC and a SIEM, shedding light on the essential roles these components play within the intricate landscape of modern cybersecurity defences.

Learn More

Our Voice

Five Key Threat Actor Groups 

Discover our blog which dives into the 5 key threat actor groups, empowering organisations to recognise potential cyber threats before they materlise.

Learn More

White Paper

A Playbook for Modernising Security Operations

Our whitepaper acts as a compass for modernising your security operations, offering actionable insights on shaping your next generations CSOC.

Learn More

White Paper

The Directors Guide to NIS2

Read our NIS2 Directors Guide, designed to highlight the senior management consequences of non-compliance and provide you with pivotal questions to access your compliance status.

Learn More

Our Voice

Advancements Within a CSOC in 2024

Read our blog which delves into the shifting landscape of CSOC security, offering insights into upcoming trends to keep you well-prepared for the year ahead

Learn More

Our Voice

NIS2: Changes to Data Compliance

Learn the layers of data security which will be required to successfully achieve NIS2 compliance before the directives October deadline.

Learn More

Our Voice

NIS2 and Microsoft: How Can Microsoft Help With the New NIS2 Requirements

Discover how Microsoft and NIS2 go hand in hand. Learn the various ways in which Microsoft can help you prepare for the new NIS2 requirements.

Learn More

Our Voice

Breaking Barriers: Mickaella Glynn, CPO at CWSI, on Gender Equality in the Workplace

Mickaella Glynn, Chief People Officer at CWSI Group, offers invaluable insights into how organisations can foster inclusivity and empower women in leadership roles.

Learn More

Our Voice

Breaking Barriers and Fostering Inclusion: An Interview with CWSI’s CPO, Mickaella Glynn

Discover our exclusive interview with our CPO, Mickaella Glynn, who explores this year's International Women's Day theme #InspireInclusion.

Learn More

Our Voice

Zero Trust and NIS2: Is it the Answer?

Discover how adopting a Zero Trust Architecture can help you deliver on your NIS2 compliance posture.

Learn More

Our Voice

The Use of AI to Tackle Supply Chain Risk

In this blog we delve into the use of emerging technologies in Artificial Intelligence to transform your security systems.

Learn More

Our Voice

Achieving Data Security with Microsoft

Read our blog where we dive into how Microsoft Purview enables companies to govern and protect their data across multiple estates, whilst adhering to compliance regulations.

Learn More

Our Voice

Enterprise AI Adoption: What Risks to Be Aware Of

Discover the risks of enterprise AI adoption in this detailed guide from mobco. We discuss AI and data, accuracy, plagiarism and copyright plus much more.

Learn More

Our Voice

Implications of NIS2 in Europe and Beyond

To help your organisation navigate the path to NIS2 compliance, this blog sheds a light on the implications of NIS2 across the European borders.  

Learn More

White Paper

Are You Ready for NIS2?

To take your first step towards NIS2 compliance, we have composed a whitepaper to help you gain a greater understanding of the NIS2 regulations.

Learn More

Our Voice

Key Requirements for NIS2 Compliance 

Kickstart your NIS2 compliance journey, and discover five key requirements of the directive with actionable insights on how to address them.   

Learn More

Our Voice

Password Based Attacks (Identity Attacks)

An identity-based attack is a cyberattack that targets and compromises the digital identity of individuals, organisations, or entities.

Learn More

Our Voice

Unleashing the Power of AI for Cyber Security.

Within this blog, we explore the synergies between cyber security and AI, delving into how AI technologies can empower IT teams to automate and augment critical aspects of cyber security operations.

Learn More

Our Voice

How to Protect your Organisation Against Evolving Phishing Attacks

Learn More

Our Voice

Business Email Compromise (BEC) Attacks

Business Email Compromise (BEC) is a devious and sophisticated scam that targets businesses and individuals who execute transfers of funds.

Learn More

Our Voice

Phishing in 2024: Five Modern Tactics

Learn More

Our Voice

Microsoft Intune Introduces MAM for Edge on Windows

Learn More

Our Voice

Security Tips to Keep Your Organisation Safe During the Holiday Season

To help you protect your business over Christmas and get the New Year off on the right foot, here are some tips to stay one step ahead of cybercriminals.    

Learn More

Our Voice

mobco Joins Microsoft’s Cyber Security Investment Programme

mobco are excited to have joined Microsoft Cyber Security Investment (CSI) programme, a programme which enables mobco to provide specific funded engagements to customers across three key areas – threat protection, data security, and the Microsoft Sentinel suite.

Learn More

Our Voice

How Can Businesses Protect Against 99% of Cyber Attacks?

There is a way to protect against 99% of these attacks, the answer is Cyber Hygiene. Cyber hygiene is the practice of following basic security principles and habits to reduce the risk of cyberattacks.

Learn More

Our Voice

Uncover Microsoft’s Digital Defence Report

Microsoft's Digital Defence Report has a unique stance and can share wider insights on how the threat landscape has evolved and discuss the shared opportunities and challenges we all face in securing a resilient online ecosystem which the world can depend on. 

Learn More

Our Voice

Exploring Cloud Security with Microsoft.

Hear from CWSI’s Client Solution Director, Paul Conaty as he interviews Microsoft Azure expert, Raymond Mulligan, on the best practices to follow when organisations are migrating to cloud

Learn More

Our Voice

What is DORA?

The Digital Operational Resilience Act is a new, critical act within the EU financial regulation. It is designed to improve the cybersecurity and operational resiliency of the financial service entities primarily around the ICT area.

Learn More

Our Voice

Talking NIS2 with Microsoft.

Tune into Paul Conaty, discussing with Microsoft’s Nikoleta Gamanova and Tomás Casasco, the hot topic of upcoming the NIS2 directive that will come into national law on October 17th 2024, bringing a set of common standards that will affect a minimum of 180,000 European organisations across 18 sectors.

Learn More

Technology Talks

Employee Cyber Awareness Tips & Tricks

Hear some actionable insights from cyber security expert and former cyber awareness trainer, Nick Oosterwijk in our latest Technology Talk. Gain tips and best practices aimed at increasing overall cyber security posture, both personally and professionally!

Technology Talks

Discover the Software Bill of Materials

Listen to our Dutch Country Lead, Thierry Lammers discuss with Data & Compliance Specialist Bastiaan the background and functions of the Software Bill of Materials and that NIS2 requires you to have a responsibility for your enterprise architecture.

Our Voice

How Secure is Your Data?

The average company’s data footprint keeps growing exponentially. Imagine this: people create 2.5 quintillion bytes of data and send 333.2 billion emails every single day.

Learn More

Our Voice

Five Best Practices for CISO’s Adopting XDR.

Used correctly, an XDR solution can unite multiple isolate security tools and reduce the complexity that hinders fast detection and response. Here are five key best practices that make a strong case for adopting XDR.

Learn More

White Paper

An Introduction to Knox Suite

To help IT teams combat the challenges of today’s modern workplace, Samsung designed Knox Suite, an all-in-one solution for enterprise mobility and security. Download our 'An Introduction to Knox Suite' Whitepaper today to find out more.

Learn More

Our Voice

The Glossary of a Cyber Security Operations Centre.

Here is a quick guide to some of the widely used cyber security acronyms used for security operation centres.

Learn More

Our Voice

Six Cyber Threats to Watch.

As the world becomes more connected and digital, cybersecurity is becoming more complicated. Here are six cyber security trends you need to know to prevent compromise. ​

Learn More

White Paper

A Guide to a Cyber Security Operations Centre (CSOC)

A CSOC service proactively monitors an organisation’s estate and receives and analyses large amounts of real-time data to gain visibility of activities across this environment. Download our Guide today to discover the key elements and benefits of a Security Operations Centre.

Learn More

Technology Talks

Cyber Awareness | Navigating the Threat Landscape

Listen to our Chief Operations Officer, Des Ryan as he explains how the recent increase in cybercrime requires IT teams to stay vigilant to protect their organisations from threat actors. Hear Des’ recommendations on best practices to decrease your organisation’s chances of falling victim to the next cyber-attack.

Technology Talks

Discover Connect & Go.

IT departments are suffering from a lack of time and resource to manage the demands of regular roll-outs of devices. Hear from CWSI’s Jesper Schmidt and Thierry Lammers as they discuss our innovative service, Connect & Go, diving into their technical experience from firsthand use cases.

Technology Talks

What is DORA?

Tune in to CWSI’s Client Solutions Director, Paul Conaty as he covers the key areas of the Digital Operations Resilience Act (DORA), which comes into force in January 2025 and must be followed by all European Financial institutes and suppliers. Hear Paul’s recommendations on how best to comply with the act.

Technology Talks

Compliance in the IT Landscape

Listen to Client Solutions Director, Paul Conaty and Dutch Country Lead & OCTO Member, Thierry Lammers as they discuss the key questions surrounding Compliance in the current IT landscape.

Technology Talks

Apple for Enterprise 2023

Listen to Client Solutions Director, Bjorn Kemps as he walks you through the exciting new Apple updates unveiled at this year’s WWDC event, including Software, Hardware and UEM advancements.

Technology Talks

What is Enterprise Application Management?

Enterprise application management is an important factor in a company's ability to innovate. Listen to CWSI’s Thierry Lammers as he discusses the possibilities and challenges around app management with Paul Conaty.

White Paper

The ABC’s Of Threat Hunting

Learn More

Technology Talks

Managed Security Services

Listen to CWSI’s CTO , Mark Mitchell outlining the benefits of implementing a Managed Security Service.

Technology Talks

Bridging The IT Skills Gap

The IT skills gap grows wider each year. 95% of employers who are looking for tech talent encounter huge challenges. Listen to Wouter Troost address some of the common challenges faced by IT Teams managing a mobile fleet.