Blog

The Cybersecurity Imperative – Reframing ‘Secure Enough’

It was a packed room at BMIT’s The Cybersecurity Imperative 2025 event, which brought together security professionals, business leaders, and technologists for a morning of practical insights and honest reflection. Now in its third year, this edition tackled a question that seems straightforward but remains challenging: what does ‘secure enough’ really mean? The keynote from […]

Read More

What the M&S Breach Teaches Us 

The recent breach at Marks & Spencer didn’t stem from a technical failure. It began with a phone call.  Attackers impersonated internal engineers and convinced help desk staff to reset passwords and disable multi-factor authentication. That gave them the foothold they needed to access domain credentials, escalate privileges, and ultimately deploy ransomware. Stores reverted to […]

Read More

BMIT finalises acquisition of 51% stake in 56Bit Limited

BMIT Technologies today announced it has finalised the acquisition of a 51% stake in 56Bit Limited, with the option to increase its shareholding over the next five years, subject to the company’s performance. This strategic move strengthens BMIT Group's position as Malta’s leading provider of hybrid IT and cloud services and significantly enhances it's cloud […]

Read More

BMIT announces 3 new security-focused solutions

Packages are more than just a collection of services  Do you think cybersecurity is just an IT issue? It’s not. It’s a business issue and one that could have a lasting impact on the company’s future. Security is often considered (and treated) as a collection of tools rather than a strategic advantage that builds customer […]

Read More

Making the Most of Security Awareness Programmes 

Cyrille Aubergier, Senior Compliance (GRC) Specialist at BMIT talks about making a success of security awareness training and to be wary of the pitfalls. Security awareness training is gaining a lot of traction in organisations, yet we continue to see incidents stemming from basic errors. What do you think is the biggest reason for this […]

Read More

Nick Mercieca’s Paralympic Journey Gains Momentum

BMIT Technologies backs Maltese para powerlifting talent on road to 2028 Nick Mercieca, the Maltese para powerlifting athlete, has set his sights on the 2028 Paralympic Games in Los Angeles, and his preparations have been boosted by new backing that will help him take on a rigorous international schedule in the years ahead. BMIT Technologies […]

Read More

Why your business needs a security policy

A security policy is a formal set of rules that defines how your organisation protects its information assets and systems. It outlines the necessary actions to prevent unauthorised access, use, disclosure, modification, or destruction of data and infrastructure. If your business handles sensitive data - such as customer information, financial records, intellectual property, or confidential […]

Read More

Q&A: Cloud Security

Q: What is cloud security? A: Cloud security is a combination of technologies, policies, processes, and user education designed to protect data, applications, and systems operating in a cloud environment. Just as you wouldn’t leave your wallet or purse unattended in a busy public space, you should not leave your digital assets unattended. Effective cloud […]

Read More

Cybersecurity: Everyone and everything is a target

Cybersecurity challenges are a reality everywhere. They are immediate, and they are affecting organisations of every size and type. Whether you are running a public authority, managing a growing business, or supporting national infrastructure, the threat landscape is shifting. Attacks are becoming more frequent, more sophisticated, and more disruptive. This is a shared reality. Whether […]

Read More

Hybrid IT: The Right Questions to Ask Before You Begin

Hybrid IT is rapidly becoming the norm for organisations striving to find the right balance between on-premises infrastructure and cloud services. However, adopting the cloud is not a decision to be made lightly. It requires a well-defined strategy that is rooted in technical necessities while aligning with the company's broader goals. Without this clarity, complexity […]

Read More