IT SPECIALISTS

Insights

Blogs, resources and industry news

13/6/2024

Despite the rapidly evolving cyber threat landscape, security awareness training is often perceived as a compliance ‘tick box’. However, it should be viewed as a critical, ongoing commitment by businesses to protect their assets and data. One of the most effective ways to enhance security awareness is by fostering a culture of questioning within your team.

Read More

This comprehensive guide is designed to empower businesses to harness the potential of Copilot through strategic adoption.

Download

Dive deep into the world of Artificial Intelligence, exploring its impact and the future ahead.

Download

This guide explores the key insights and strategies we used and the lessons we learned from moving into our new premises.

Download

This summary contains information for staff on how to stay aware of current cyber security risks and the role they play in keeping data safe.

Download

If you believe that you could conduct your meetings in a more efficient, productive way then our Better Meetings Guide will help.

Download

The role of the CIO has evolved over time. This eBook examines an emerging alternative worth considering, the Virtual CIO (vCIO).

Download

Small-to-medium businesses can remain agile by embracing technology to fuel their long-term strategy and lessen the impact of inflation.

Download

6/8/2024

Hackers delivered malware to Windows and Mac users by compromising their Internet service provider and then tampering with software updates delivered over unsecure connections, researchers said.

Read More

6/8/2024

With macOS Sequoia this fall, using apps that need access to screen recording permissions will become a little bit more tedious. Apple is rolling out a change that will require you to give explicit permission on a weekly basis to these types of apps, and every time you reboot your Mac.

Read More

5/8/2024

The Hunters International ransomware group is targeting IT workers with a new C# remote access trojan (RAT) called SharpRhino to breach corporate networks. The malware helps Hunters International achieve initial infection, elevate their privileges on compromised systems, execute PowerShell commands, and eventually deploy the ransomware payload.

Read More

15/7/2024

You might think that a threat actor only having your phone number isn’t dangerous, but it can be, which is why it’s important to learn what hackers can do with it. With just your phone number, hackers can send you phishing texts and calls, flood your phone with spam calls, spoof your phone number, swap your SIM card and even steal your personal information.

Read More

18/7/2024

Microsoft’s AI-powered Designer app is coming out of preview for both iOS and Android users. Microsoft Designer lets you use templates to create custom images, stickers, greeting cards, invitations, and more. Designer can also use AI to edit images and restyle them or create collages of images.

Read More

15/7/2024

Researchers from Cyber Press found 1.1 terabytes of leaked data from Disney’s internal Slack on infamous data leak forums. The data was leaked by an infamous hacking group known as “NullBulge,” which revealed the data that was stolen from the Disney database.

Read More

4/6/2024

Windows Recall takes a screenshot every five seconds. Cybersecurity researchers say the system is simple to abuse—and one ethical hacker has already built a tool to show how easy it really is.

Read More

19/6/2024

With just a few dollars, a little time, and a smart brute-force guessing algorithm, most passwords can be cracked in much less time than you might imagine.

Read More

12/6/2024

Last Ignite we showed our plans for Copilot in Outlook and how the new Outlook for Windows would get the most recent features first. We also know that our customers still rely on the classic version of Outlook for a lot of their work and to improve their Copilot experience we have been rolling out Copilot features into classic Outlook over the last few months.

Read More