The latest mobco news

Myth Busting NIS2 and the Road to Compliance

Myth Busting NIS2 and the Road to Compliance

The number, magnitude, sophistication, frequency, and impact of cyber-attacks are increasing, and present a major threat to organisations around the globe. Cybersecurity preparedness and effectiveness are therefore more essential than ever before. To make European...

Security Awareness With Microsoft

Security Awareness With Microsoft

The fundamentals of phishing haven’t changed over time. As research from Microsoft shows, approximately 90 percent of phishing attacks involve social engineering. With humans remaining the primary risk vector in social engineering attacks and phishing attack...

How To Protect Your Business Against 99% of Cyber Attacks

How To Protect Your Business Against 99% of Cyber Attacks

Cybersecurity is a major concern for businesses of all sizes and sectors. According to a report by IBM, the average cost of a data breach in 2023 was $4.4 million, [1] and the average time to identify and contain a breach was over 280 days. Moreover, cyberattacks are...

Talking NIS2 with Microsoft

Talking NIS2 with Microsoft

Keen to step up your knowledge on the Network and Information Systems Directive 2.0?   Tune into CWSI’s Clients Solutions Director, Paul Conaty, interviewing with Nikoleta Gamanova, Partner Strategy and GTM at Microsoft and Tomás Casasco, Data Security Go to...

What is DORA?

What is DORA?

The Digital Operational Resilience Act is a new, critical act within the EU financial regulation. It is designed to improve the cybersecurity and operational resiliency of the financial service entities primarily around the ICT (information and communication...

How Secure is your Data?

How Secure is your Data?

The average company’s data footprint keeps growing exponentially. Imagine this: people create 2.5 quintillion bytes of data and send 333.2 billion emails every single day.1 And with more than 300 million people working remotely all over the world, data security...

Five Best Practices for CISO’s Adopting XDR

Five Best Practices for CISO’s Adopting XDR

Extended Detection and Response, also known as XDR, has become a hype over the last few years. As research from IBM shows, 31% of organisations have adopted XDR, and of those, 76% agree that adopting XDR has strengthened their organisation’s cyber resiliency. When...

Six Cyber Treats To Watch

Six Cyber Treats To Watch

As the world becomes more connected, cybersecurity is becoming more complex. As an experienced cybersecurity expert, we know how challenging it can be to prioritise where to focus your efforts. Keeping up with today’s threats means securing every area of...

The Glossary of a Cyber Security Operations Centre

The Glossary of a Cyber Security Operations Centre

The technology sector has always been awash in acronyms. For reasons such as efficiency, clarity, and standardisation, that's no different in cybersecurity. To help you navigate the acronyms used for Cyber Security Operation Centres (CSOC), here's an overview of the...

Principles of Zero Trust Security

Principles of Zero Trust Security

In today’s world, cyber-attacks are increasingly prevalent, with the number of such incidents continually rising. These attacks can result in significant losses of time, money, and damage to an organisation’s reputation. It is not only large companies that are...