Our Voice
Category: Our Voice
Edit this archive in archive.php
Our Voice
Passwordless Authentication: The Future of Identity Security
Our Voice
Meet the New Galaxy XCover7 Pro & Tab Active5 Pro
Our Voice
What’s New for Cyber Essentials 2025
Our Voice
Crosscall and mobco unite to deliver durable sustainable modern workplace solutions
Our Voice
The Ultimate Guide to a Strong Security Culture
Our Voice
Microsoft Purview: A Guide to Compliance & Data Security
Our Voice
The Growing Threat of Insider Risks: Why Controls Are Essential to Mitigate Corporate Espionage in the Age of AI
Our Voice
A Guide to Distributed Denial of Service (DDoS) Attacks
Our Voice
The Complete Guide to Account Takeovers (ATOs)
Our Voice
Identity Security and the Rise of Social Engineering
Our Voice
A Guide to the Responsible Adoption of AI: Building a Secure Foundation with ISO
Our Voice
Say Hello to the Samsung Galaxy Tab S10 Series, Galaxy S24 FE and Galaxy Ring
Our Voice
Introducing the iPhone 16e, a powerful addition to the iPhone 16 family
Our Voice
A Guide to Phishing Attacks in 2025
Discover our comprehensive guide to the latest phishing attacks in 2025 and learn effective strategies to defend against them.
Our Voice
Galaxy Unpacked 2025: Samsung’s Latest Innovations for Business
Our Voice
How does Microsoft Security Copilot Integrate with Microsoft Purview to Enhance Data Security?
Learn how Microsoft Security Copilot integrates with Purview to enhance data security through AI-driven insights, real-time threat detection & compliance tools.
Our Voice
Ransomware Trends to Watch Out for in 2025
Our Voice
The Evolution of Cyber Fraud: Trends to Watch in 2025
Our Voice
Effective Strategies to Understand and Govern Your Data
Our Voice
A Step-by-Step Guide to Safeguarding Your Corporate Data with Microsoft Purview
Our Voice
What is Data Classification?
Discover the fundamentals of data classification, why it’s essential for secure information management, and how to implement it effectively in your organisation.
Our Voice
A Smarter, More Secure OS with the Best of Google AI
Our Voice
Navigating Zero Trust in the Cloud-First World
Our Voice
What Is Unified Endpoint Management?
Explore Unified Endpoint Management (UEM), its advantages, and how mobco streamlines endpoint security for businesses. Read our comprehensive guide to learn more.
Our Voice
mobco and ChromeOS Join Forces to Power the Future of Hybrid Work
Our Voice
What is Microsoft Defender for Endpoint?
Our Voice
Best Practices in Mobile App Security: Secure Your Customers Data
Our best practices for mobile device security. Learn how to protect your organisation from mobile threats with secure authentication, app management, and more.
Our Voice
From Data to Defence: How the Threat Intelligence Lifecycle Strengthens Cybersecurity and Compliance
Discover how the threat intelligence lifecycle can help you strengthen your organisation’s cybersecurity and compliance capabilities in this detailed guide.
Our Voice
What is Cloud Transformation? The Complete Guide
Discover what cloud transformation means, its benefits, and how mobco helps businesses modernise IT systems and drive innovation through cloud solutions.
Our Voice
The Complete Guide to Advanced Persistent Threats
Learn everything you need to know about Advanced Persistent Threats in this guide by mobco. Get in touch today for more information.
Our Voice
Samsung XCover7 & Tab Active5: Durable, Productive, Secure
Our Voice
The Complete Guide to Cyber Threat Actors: Understanding and Defending Against Digital Threats
Our Voice
What is Microsoft Intune? A Detailed Guide
Discover what Microsoft Intune is, in this detailed guide from mobco. We outline the benefits of this solution and how it can benefit your business.
Our Voice
How to Navigate the NIS2 Regulation with Paul Conaty
Our Voice
Enhancing Device Security with Knox Suite, a Comprehensive Overview
Our Voice
Streamlining Device Deployment with Knox Suite, A Comprehensive Guide
Our Voice
Reimagining Device Management with Knox Suite
Our Voice
Turning Data to Decisions: How Knox Suite’s Advanced Analytics Drive Performance
Our Voice
Unveiling the Power of Samsung Knox Suite: A Deep Dive into Its Solutions
Our Voice
Elevating enterprise mobility and security with Samsung Knox Suite: A deep dive into the four key pillars
Our Voice
It’s Glowtime: Here are the new iPhone 16, Apple Watch Series 10, AirPods 4, and more
Our Voice
The Advantages of Partnering with a Member of Microsoft’s Intelligent Security Association (MISA)
Discover 6 key benefits of partnering with a member of Microsoft’s Intelligent Security Association (MISA), in this detailed blog from mobco.
Our Voice
A Guide to Microsoft 365 E5 Security and Compliance Add-ons
Explore Microsoft 365 E5 Security with this detailed guide from mobco. We discuss this software in full, as well as its compliance add-ons.
Our Voice
What is an E-Skimming Attack?
Discover what an E-skimming attack is in this guide from mobco. We define this type of attack, how they work and what options are available if you are hit by one.
Our Voice
Microsoft 365 E5 Licence Explained
Our Voice
Understanding Microsoft Purview: A Detailed Guide
Our Voice
What Does a Threat Intelligence Analyst Do?
Discover what a Threat Intelligence Analyst does in this guide from mobco. We discuss roles, responsibilities and what they can bring to the table.
Our Voice
Unveiling Samsung’s Cutting-Edge New Foldables: Galaxy Z Fold6 and Z Flip6
Our Voice
Samsung Galaxy Watch Ultra & Watch7: Your AI-Driven Personal Assistant
Our Voice
The Difference Between Microsoft 365 E3 and E5
Our Voice
The History of Ransomware
Discover the history of ransomware in this detailed guide from mobco. We discuss a range of cyber attacks including the original Trojan attack by Joseph Popp.
Our Voice
A Guide to Vulnerability Intelligence
Our Voice
What is Microsoft Azure B2B?
Read our Microsoft Azure B2B blog to learn its impressive benefits for external collaboration.
Our Voice
What is Conditional Access? Explained
In this mobco blog discover what Conditional Access is, how it works, why we need it, and much more.
Our Voice
Pioneering Progress: How iPads Empower Enterprises to Reach New Levels of Success
Our Voice
Demystifying a Managed SIEM: What Is It and How Does It Reinforce Cyber Resilience?
Explore the depths of managed SIEM in this detailed blog from mobco. We discuss what SIEM’s are, the benefits of using them and much more.
Our Voice
mobco Achieves Prestigious Microsoft FastTrack Partner Status
We are delighted to announce that mobco has met the rigorous requirements to become a Microsoft FastTrack Ready Partner.
Our Voice
What is Microsoft Sentinel? Explained
Our Voice
The History of the Apple iPhone
Explore our detailed Apple iPhone timeline which documents it's 17 year history of revolutionary technological advancements.
Our Voice
mobco’s SecureGuard Services
Discover mobco's SecureGuard services designed to safeguard our customers critical assets, ensure compliance and enhance overall resilience.
Our Voice
What is Microsoft Entra ID? A Comprehensive Guide
Our Voice
Securing Your AI Future with the Samsung Galaxy Book4 Edge
Our Voice
A Guide to Three Types of Threat Intelligence
Our Voice
Unveiling the Power of a Managed CSOC
Our Voice
What is the Difference Between a SIEM and a SOC?
In this blog, we explore the various differences between a CSOC and a SIEM, shedding light on the essential roles these components play within the intricate landscape of modern cybersecurity defences.
Our Voice
Five Key Threat Actor Groups
Discover our blog which dives into the 5 key threat actor groups, empowering organisations to recognise potential cyber threats before they materlise.
Our Voice
Let Loose: Revolutionising the Workplace with new Apple iPads & Accessories
Our Voice
Advancements Within a CSOC in 2024
Read our blog which delves into the shifting landscape of CSOC security, offering insights into upcoming trends to keep you well-prepared for the year ahead
Our Voice
NIS2: Changes to Data Compliance
Learn the layers of data security which will be required to successfully achieve NIS2 compliance before the directives October deadline.
Our Voice
NIS2 and Microsoft: How Can Microsoft Help With the New NIS2 Requirements
Discover how Microsoft and NIS2 go hand in hand. Learn the various ways in which Microsoft can help you prepare for the new NIS2 requirements.
Our Voice
Galaxy A55 5G and A35 5G: Transformative Business Innovations
Our Voice
Breaking Barriers: Mickaella Glynn, CPO at CWSI, on Gender Equality in the Workplace
Mickaella Glynn, Chief People Officer at CWSI Group, offers invaluable insights into how organisations can foster inclusivity and empower women in leadership roles.
Our Voice
Breaking Barriers and Fostering Inclusion: An Interview with CWSI’s CPO, Mickaella Glynn
Discover our exclusive interview with our CPO, Mickaella Glynn, who explores this year's International Women's Day theme #InspireInclusion.
Our Voice
Zero Trust and NIS2: Is it the Answer?
Discover how adopting a Zero Trust Architecture can help you deliver on your NIS2 compliance posture.
Our Voice
The Use of AI to Tackle Supply Chain Risk
In this blog we delve into the use of emerging technologies in Artificial Intelligence to transform your security systems.
Our Voice
Achieving Data Security with Microsoft
Read our blog where we dive into how Microsoft Purview enables companies to govern and protect their data across multiple estates, whilst adhering to compliance regulations.
Our Voice
Enterprise AI Adoption: What Risks to Be Aware Of
Discover the risks of enterprise AI adoption in this detailed guide from mobco. We discuss AI and data, accuracy, plagiarism and copyright plus much more.
Our Voice
Implications of NIS2 in Europe and Beyond
To help your organisation navigate the path to NIS2 compliance, this blog sheds a light on the implications of NIS2 across the European borders.
Our Voice
Key Requirements for NIS2 Compliance
Kickstart your NIS2 compliance journey, and discover five key requirements of the directive with actionable insights on how to address them.
Our Voice
Mac Does That … And More
Our Voice
Password Based Attacks (Identity Attacks)
An identity-based attack is a cyberattack that targets and compromises the digital identity of individuals, organisations, or entities.
Our Voice
Unleashing the Power of AI for Cyber Security.
Within this blog, we explore the synergies between cyber security and AI, delving into how AI technologies can empower IT teams to automate and augment critical aspects of cyber security operations.
Our Voice
How to Protect your Organisation Against Evolving Phishing Attacks
Our Voice
Business Email Compromise (BEC) Attacks
Business Email Compromise (BEC) is a devious and sophisticated scam that targets businesses and individuals who execute transfers of funds.
Our Voice
Phishing in 2024: Five Modern Tactics
Our Voice
Microsoft Intune Introduces MAM for Edge on Windows
Our Voice
Security Tips to Keep Your Organisation Safe During the Holiday Season
To help you protect your business over Christmas and get the New Year off on the right foot, here are some tips to stay one step ahead of cybercriminals.
Our Voice
mobco Joins Microsoft’s Cyber Security Investment Programme
mobco are excited to have joined Microsoft Cyber Security Investment (CSI) programme, a programme which enables mobco to provide specific funded engagements to customers across three key areas – threat protection, data security, and the Microsoft Sentinel suite.
Our Voice
How Can Businesses Protect Against 99% of Cyber Attacks?
There is a way to protect against 99% of these attacks, the answer is Cyber Hygiene. Cyber hygiene is the practice of following basic security principles and habits to reduce the risk of cyberattacks.
Our Voice
Uncover Microsoft’s Digital Defence Report
Microsoft's Digital Defence Report has a unique stance and can share wider insights on how the threat landscape has evolved and discuss the shared opportunities and challenges we all face in securing a resilient online ecosystem which the world can depend on.
Our Voice
Exploring Cloud Security with Microsoft.
Hear from CWSI’s Client Solution Director, Paul Conaty as he interviews Microsoft Azure expert, Raymond Mulligan, on the best practices to follow when organisations are migrating to cloud
Our Voice
What is DORA?
The Digital Operational Resilience Act is a new, critical act within the EU financial regulation. It is designed to improve the cybersecurity and operational resiliency of the financial service entities primarily around the ICT area.
Our Voice
Talking NIS2 with Microsoft.
Tune into Paul Conaty, discussing with Microsoft’s Nikoleta Gamanova and Tomás Casasco, the hot topic of upcoming the NIS2 directive that will come into national law on October 17th 2024, bringing a set of common standards that will affect a minimum of 180,000 European organisations across 18 sectors.
Our Voice
How Secure is Your Data?
The average company’s data footprint keeps growing exponentially. Imagine this: people create 2.5 quintillion bytes of data and send 333.2 billion emails every single day.
Our Voice
Five Best Practices for CISO’s Adopting XDR.
Used correctly, an XDR solution can unite multiple isolate security tools and reduce the complexity that hinders fast detection and response. Here are five key best practices that make a strong case for adopting XDR.
Our Voice
Galaxy Tab S9 FE & Buds FE: Packed with all of your favourite features
Our Voice
The Glossary of a Cyber Security Operations Centre.
Here is a quick guide to some of the widely used cyber security acronyms used for security operation centres.
Our Voice
Six Cyber Threats to Watch.
As the world becomes more connected and digital, cybersecurity is becoming more complicated. Here are six cyber security trends you need to know to prevent compromise.
Our Voice
It is time to stop wondering: Here are the new iPhone 15 & Apple Watch 9 Series
Our Voice