IT SPECIALISTS

Insights

Blogs, resources and industry news

Small-to-medium businesses can remain agile by embracing technology to fuel their long-term strategy and lessen the impact of inflation.

Download

The role of the CIO has evolved over time. This eBook examines an emerging alternative worth considering, the Virtual CIO (vCIO).

Download

14/4/2025

Cybersecurity researchers are calling attention to a new type of credential phishing scheme that ensures that the stolen information is associated with valid online accounts. The technique has been codenamed precision-validating phishing by Cofense, which it said employs real-time email validation so that only a select set of high-value targets are served the fake login screens.

Read More

23/4/2025

The recent DeepSeek security breach has once again highlighted the significant vulnerabilities in artificial intelligence (AI) systems and raises alarming questions about where the exposed data may have ended up. Shortly after DeepSeek's release, security researchers uncovered extensive vulnerabilities in the system's infrastructure. Publicly exposed sensitive user data and proprietary information like this often makes its way to the Dark Web — a thriving underground market where stolen data is routinely traded, sold, and exploited.

Read More

2/5/2025

After supporting passwordless Windows logins for years and even allowing users to delete passwords from their accounts, Microsoft is making its biggest move yet toward a future with no passwords. Now it will ask people signing up for new accounts to only use more secure methods like passkeys, push notifications, and security keys instead, by default.

Read More

20/11/2024

The CrowdStrike catastrophe that took down 8.5 million Windows PCs and servers in July has left many of Microsoft’s biggest customers looking for answers to make sure that such an event never happens again. Now, Microsoft has some answers in the form of a new Windows Resiliency Initiative that’s designed to improve Windows security and reliability.

Read More

11/11/2024

Cybersecurity researchers have discovered a new phishing campaign that spreads a new fileless variant of known commercial malware called Remcos RAT. Remcos RAT "provides purchases with a wide range of advanced features to remotely control computers belonging to the buyer," Fortinet FortiGuard Labs researcher Xiaopeng Zhang said in an analysis published last week.

Read More

8/11/2024

End-to-End Encryption (E2EE) is a method of transferring data securely from your device to another person’s device while protecting information from any third parties. Continue reading to learn more about what E2EE does, how it works and the benefits of using E2EE to secure your data.

Read More

25/10/2024

The BlackBasta ransomware operation has moved its social engineering attacks to Microsoft Teams, posing as corporate help desks contacting employees to assist them with an ongoing spam attack.

Read More

29/10/2024

Microsoft is finally adding threaded conversations to its Microsoft Teams communications app. Threaded conversations in Teams won’t arrive until mid-2025, but ahead of that, Microsoft is also combining its separate chats and channels UI inside Teams into a single view.

Read More

9/10/2024

Search any of the Gmail support forums online, from social media platforms such as the Gmail subreddit or the official Gmail community help from Google itself, and one question comes up time and time again: my Gmail account has been hacked, how can I recover it?

Read More