Blog

The Anatomy of a Cyber Attack - and how it can drain your bank account

Anyone who has sat through security awareness training knows the standard slide: a suspicious email, a too-good-to-be-true link, and a reminder not to click. All fair enough, yet phishing and business email compromise still cost organisations billions every year. The truth is, the criminals behind these attacks don’t fire off random spam. They plan, they […]

Read More

Governance matters, and how!

DIONE VELLA, Chief Service Excellence & Compliance Officer at BMIT, talks governance and why it is so much more than a box-ticking exercise. Let’s talk about governance. It’s not always the most exciting topic, but it’s absolutely vital for any business, wouldn’t you agree? Absolutely, and I get it. Governance doesn’t exactly spark excitement at […]

Read More

Moving to the Cloud: Choosing the most suitable model

Most organisations already use the cloud in some form. Whether it started with moving emails to Microsoft 365, running a website on AWS or Azure, or using a private cloud for sensitive data, cloud has become part of the day-to-day. However, not every cloud setup fits every business, and the model you choose can affect […]

Read More

Beyond Firewalls and Passwords: Building a Business That Can Withstand Attack

Cyber resilience today is less about stopping every threat and more about surviving them. Networks will be probed, systems will fail, but what matters is whether your business keeps going when they do Most organisations have long focused on prevention. That still matters. But cyber resilience, the ability to respond to incidents and recover quickly, […]

Read More

Spotting the Cracks Before They Grow 

Every business relies on technology, but how often do we stop to check if it’s as secure as we think? Making assumptions on how secure our networks are is a dangerous and costly game to play!  A cybersecurity risk assessment isn’t about ticking boxes or indulging in worst-case scenarios (though the latter exercise could prove […]

Read More

Multi-Cloud Strategies: An option worth exploring?

“The future of cloud computing is no longer about choosing a single provider – it’s about strategically leveraging multiple providers to achieve business objectives.” There has been a shift in thinking over the last few years from Which cloud should we use? to How can we maximise the potential of multiple clouds? SEAN COHEN, Chief […]

Read More

BMIT Technologies Posts Record Year as Transformation Strategy Gains Pace

BMIT Technologies today reported record financial results for 2024, marking a year of strong performance and continued progress on its transformation strategy. The company posted €33.6 million in revenue, up 17.2% year-on-year, while EBITDA rose 26.7% to €12.7 million. The board has approved a net dividend of €4 million, or €0.0189 per share, with a […]

Read More

vCISO: Bringing C-level expertise to the boardroom at a fraction of the cost 

As a business owner or CEO, you know cybersecurity is a critical issue - every headline reminds you of the risks - but justifying hiring a full-time Chief Information Security Officer (CISO) on a tight budget feels out of reach.  Maybe it’s the cost, or maybe you’re unsure if your organisation even needs someone in […]

Read More

The Cybersecurity Imperative – Reframing ‘Secure Enough’

It was a packed room at BMIT’s The Cybersecurity Imperative 2025 event, which brought together security professionals, business leaders, and technologists for a morning of practical insights and honest reflection. Now in its third year, this edition tackled a question that seems straightforward but remains challenging: what does ‘secure enough’ really mean? The keynote from […]

Read More

What the M&S Breach Teaches Us 

The recent breach at Marks & Spencer didn’t stem from a technical failure. It began with a phone call.  Attackers impersonated internal engineers and convinced help desk staff to reset passwords and disable multi-factor authentication. That gave them the foothold they needed to access domain credentials, escalate privileges, and ultimately deploy ransomware. Stores reverted to […]

Read More