knowledge center

Exploring Cloud Security with Microsoft

Exploring Cloud Security with Microsoft

Moving to the cloud offers solid business value to organisations that juggle operating costs with outdated applications, security updates and the need for distributed work.   Organisations wishing to move on from outdated and increasingly inefficient legacy...

How To Protect Your Business Against 99% of Cyber Attacks

How To Protect Your Business Against 99% of Cyber Attacks

Cybersecurity is a major concern for businesses of all sizes and sectors. According to a report by IBM, the average cost of a data breach in 2023 was $4.4 million, [1] and the average time to identify and contain a breach was over 280 days. Moreover, cyberattacks are...

Talking NIS2 with Microsoft

Talking NIS2 with Microsoft

Keen to step up your knowledge on the Network and Information Systems Directive 2.0?   Tune into CWSI’s Clients Solutions Director, Paul Conaty, interviewing with Nikoleta Gamanova, Partner Strategy and GTM at Microsoft and Tomás Casasco, Data Security Go to...

What is DORA?

What is DORA?

The Digital Operational Resilience Act is a new, critical act within the EU financial regulation. It is designed to improve the cybersecurity and operational resiliency of the financial service entities primarily around the ICT (information and communication...

Actionable Insights Microsoft Digital Defence Report 2023

Actionable Insights Microsoft Digital Defence Report 2023

According to Microsoft’s 2023 edition of the Digital Defence Report, 80% to 90% of successful ransomware attacks occur on unmanaged devices. As the cyber threat landscape continues to evolve at lightning speed, organisations need to be more innovative in how they...

How Secure is your Data?

How Secure is your Data?

The average company’s data footprint keeps growing exponentially. Imagine this: people create 2.5 quintillion bytes of data and send 333.2 billion emails every single day.1 And with more than 300 million people working remotely all over the world, data security...

Five Best Practices for CISO’s Adopting XDR

Five Best Practices for CISO’s Adopting XDR

Extended Detection and Response, also known as XDR, has become a hype over the last few years. As research from IBM shows, 31% of organisations have adopted XDR, and of those, 76% agree that adopting XDR has strengthened their organisation’s cyber resiliency. When...

Six Cyber Treats To Watch

Six Cyber Treats To Watch

As the world becomes more connected, cybersecurity is becoming more complex. As an experienced cybersecurity expert, we know how challenging it can be to prioritise where to focus your efforts. Keeping up with today’s threats means securing every area of...

Not every emergency has to be a disaster

Not every emergency has to be a disaster

In an increasingly interconnected world, the threat of cybercrime looms larger than ever. High time thus to take action and increase your organisation's cyber resilience. But where to start? To help you navigate the treacherous landscape of cyber threats, Sir David...

mobco academy

No event found!

mobco events

No event found!

mobco whitepapers

Samsung DeX whitepaper

Samsung DeX whitepaper

Samsung DeX White Paper With Samsung Dex the workplace is being revolutionised. Employees want to work anywhere and any time, now empowered by a single device providing the computing power: from mobile to desktop experience. The DeX White Paper describes the evolution...