IT SPECIALISTS

Insights

Blogs, resources and industry news

This Incident Response Guide is a practical resource that helps your business prepare for, manage, and recover from cyber incidents quickly and confidently.

Download

This Cybersecurity Practice eBook, offers comprehensive guidance on building and maintaining a strong cyber resilience strategy for businesses.

Download

Unlock the Power of Your IT Ecosystem with this Application Landscape Guide.

Download

This handy operating guide gives you all the tools you need to run your business' own 8-Week Wellbeing Challenge.

Download

In today's fast-paced world, meetings are evolving. Our latest eBook, dives into how technology and innovative practices are transforming the way we collaborate.

Download

This comprehensive guide is designed to empower businesses to harness the potential of Copilot through strategic adoption.

Download

Dive deep into the world of Artificial Intelligence, exploring its impact and the future ahead.

Download

This summary contains information for staff on how to stay aware of current cyber security risks and the role they play in keeping data safe.

Download

If you believe that you could conduct your meetings in a more efficient, productive way then our Better Meetings Guide will help.

Download

25/11/2025

The threat actor known as ToddyCat has been observed adopting new methods to obtain access to corporate email data belonging to target companies, including using a custom tool dubbed TCSectorCopy. "This attack allows them to obtain tokens for the OAuth 2.0 authorization protocol using the user's browser, which can be used outside the perimeter of the compromised infrastructure to access corporate mail," Kaspersky said in a technical breakdown.

Read More

19/11/2025

Microsoft is trying to transform Windows into a “canvas for AI,” with new AI agents integrated into the Windows 11 taskbar. These new taskbar capabilities are designed to make AI agents feel like an assistant in Windows that can go off and control your PC and do tasks for you at the click of a button. It’s part of a broader overhaul of Windows to turn the operating system into an “agentic OS.”

Read More

18/11/2025

The rise of the Tycoon 2FA phishing kit should serve as a global warning siren for every enterprise. This is not a tool for elite hackers. This is a turnkey kit that anyone with a browser can use to bypass the very MFA and auth apps companies depend on. And it is being used at scale. Over 64,000 attacks have already been tracked this year, many targeting Microsoft 365 and Gmail because those platforms represent the easiest, fastest path into an enterprise.

Read More

30/10/2025

There has been a tremendous amount of conversation lately about artificial intelligence and what it means for cybersecurity. Depending on who you talk to, AI is either going to replace every job in the security industry or it is going to fade into the background as just another tool in an already overloaded technology stack. The truth, as usual, lives somewhere in between those extremes.

Read More

24/10/2025

Microsoft is currently working on a new Teams feature that will use Wi-Fi network connections to pinpoint a user's exact location. For context, Teams will automatically update a user's work location when they connect their device to an office Wi-Fi network.

Read More

17/10/2025

Anthropic is integrating its Claude AI assistant with Microsoft 365 services so it can surface content from Word documents, Teams messages, and Outlook emails in conversations with the chatbot. It’s part of a series of updates to Claude to make the chatbot more useful at work.

Read More

30/9/2025

The software maker is launching a new Agent Mode in Excel and Word that can generate complex spreadsheets and documents with just a prompt. A new Office Agent in Copilot chat, powered by Anthropic models, is also launching today that can create PowerPoint presentations and Word documents from a “vibe working” chatbot.

Read More

23/9/2025

A sophisticated malware campaign has emerged that leverages fake online speed test applications to deploy obfuscated JavaScript payloads on Windows systems. These malicious utilities masquerade as legitimate network speed testing tools, manual readers, PDF utilities, and various search frontends to deceive unsuspecting users into installing dangerous code that operates covertly in the background.

Read More

22/9/2025

Attackers are increasingly sending phishing links over non-email delivery channels like social media, instant messaging apps, and malicious search engine ads. This article explores why phishing attacks are moving away from exclusively email-based delivery, and what this means for security teams.

Read More