Cloud computing has transformed the way we use technology and enabled new possibilities for innovation and growth.
The concept of ‘cloud’ goes back to 1963, when the Defense Advanced Research Projects Agency (DARPA) gave the Massachusetts Institute of Technology (MIT) a $2 million grant for Project MAC. They asked MIT to create a way that two or more people can use a computer simultaneously, sharing its resources and processing power.
Fast forward to 2006 and the launch of Amazon Web Services (AWS)’s Elastic Compute Cloud (EC2) service – a move which laid the foundations for numerous cloud platforms that we are familiar with today.
Microsoft offers a good definition of what cloud computing is: “The delivery of computing services - including servers, storage, databases, networking, software, analytics, and intelligence - over the internet ("the cloud") to offer faster innovation, flexible resources, and economies of scale”.
There are three core elements: infrastructure, platform, and software.
Infrastructure as a service (IaaS) provides the basic computing resources, such as servers, storage, and networks. Users can rent these resources on demand and pay only for what they use.
Platform as a service (PaaS) provides the tools and frameworks for developing and deploying applications on the cloud. Users can focus on their business logic and leave the management of the infrastructure to the cloud provider.
Software as a service (SaaS) provides the applications that run on the cloud. Users can access these applications through a web browser, or a mobile app. SaaS eliminates the need for installing or updating software on the user's device.
Cloud environments fall into four broad categories:
This is a dedicated cloud environment used solely by one organisation. It can be hosted on-premises or in a third-party data centre. The organisation has complete control over resources and can tailor them to suit its unique requirements. Private clouds ensure strong security, privacy, and compliance with regulations. However, they entail substantial initial investment and ongoing maintenance expenses.
A shared cloud environment owned by a third-party provider (CSP) that offers cloud services to the public. It provides low cost, scalability, and flexibility, with access to a wide range of services. However, it has limited control, potential security risks, and compliance issues.
Hybrid cloud combines private and public clouds, allowing organisations to use private cloud for sensitive data and applications, while utilising public cloud for less sensitive or scalable ones. It offers security and control of private cloud along with the cost-effectiveness and flexibility of public cloud. However, challenges include complexity, compatibility issues, management overhead, and network latency.
A multi cloud is an environment using multiple public clouds from different CSPs. It allows organisations to select the optimal cloud service for their data and applications based on performance, functionality, cost, and location. Multi clouds offer redundancy, availability, and access to diverse services. However, they come with drawbacks like complexity in integration, governance, and optimisation.
Cloud computing has become so important because it offers many benefits for businesses and individuals. Here are a few:
Scalability and flexibility - Cloud computing allows businesses to scale their resources up or down based on demand. It provides the flexibility to quickly adapt to changing business needs without the need for significant infrastructure investments.
Cost savings - Instead of investing in costly hardware, businesses can use cloud services on a pay-as-you-go basis, paying only for the resources they use. This eliminates the need for upfront capital expenditures and reduces maintenance costs.
Data storage and backup - Cloud storage enables businesses to securely store and access their data without relying on physical servers. It offers scalable storage options and automated backup, ensuring data availability and protection.
Application hosting and development - Cloud platforms provide infrastructure and tools for hosting and developing applications. Businesses can deploy their applications in the cloud, taking advantage of the platform's scalability, performance, and global reach.
Collaboration and remote work - Cloud-based collaboration tools, such as document sharing, project management, and video conferencing, enable teams to work together efficiently, regardless of their location. Cloud computing facilitates remote work by providing access to business applications and data from anywhere with an internet connection.
Disaster recovery and business continuity - Cloud services offer robust disaster recovery solutions, including data replication and backup across multiple geographically dispersed servers. In the event of a system failure or disaster, businesses can quickly restore their operations and minimize downtime.
Data analytics and machine learning - Cloud platforms provide powerful analytics and machine learning capabilities. Businesses can leverage these tools to gain insights from their data, make data-driven decisions, and develop predictive models for various applications, such as customer behaviour analysis and demand forecasting.
Testing and development environments - Cloud environments offer on-demand resources for testing and development purposes. Businesses can quickly provision and configure virtual machines and infrastructure, reducing setup time and costs associated with traditional testing and development environments.
Internet of Things (IoT) integration - Cloud computing supports the integration and management of IoT devices and data. Businesses can collect, analyse, and process data from connected devices, enabling them to derive insights and deliver value-added services.
Enhanced security and compliance - Cloud service providers invest heavily in security measures to protect data and infrastructure. They often offer advanced security features, such as encryption, identity management, and access controls. Additionally, many cloud providers comply with industry standards and regulations, assisting businesses in meeting their compliance requirements.
The challenges and risks - Not all that glitters is gold and this holds true for cloud as well. Cloud computing faces several challenges and risks that need to be addressed by both cloud providers and cloud users.
Data security and privacy - This is the biggest challenge, as users cannot view where their data is processed or stored, and risks of data loss, leakage, theft, breaches, and hijacking can happen. Cloud providers need to ensure that they have robust security measures and encryption mechanisms to protect their customers' data. Cloud users need to be aware of their data protection rights and responsibilities and choose cloud services that comply with relevant regulations and standards.
Cloud management and governance - This involves monitoring, controlling, and optimizing the performance, availability, and costs of cloud resources. Cloud management can be complex and challenging due to the dynamic and distributed nature of cloud environments. Cloud providers need to offer tools and services that enable cloud users to manage their cloud resources effectively. Cloud users need to define clear policies and procedures for cloud usage, allocation, and optimization.
Cloud integration and interoperability - This refers to the ability of cloud services to work seamlessly with other cloud or on-premises systems. Cloud integration can be difficult due to the heterogeneity and diversity of cloud platforms, architectures, and standards. Cloud providers need to ensure that their cloud services are compatible and interoperable with other cloud or on-premises systems. Cloud users need to evaluate their existing systems and requirements before choosing cloud services that can integrate with them.
Internet connectivity and bandwidth - This is a prerequisite for accessing cloud services. Lack of sufficient internet bandwidth is a common problem when transferring large volumes of information to and from cloud data servers. Internet connectivity can also be unreliable or unavailable in some areas or situations. Cloud providers need to ensure that their cloud services are resilient and responsive to network fluctuations. Cloud users need to consider their internet connectivity and bandwidth needs before adopting cloud services.
Moving to the cloud is a decision based on a clear strategy that looks at the long-term costs, data security, compliance, resilience, and business needs. Once the strategy is in place, a cloud environment could help a business achieve its goals and address its IT challenges.
Find the right IT partner is critical to a successful cloud deployment. Talk to our experts at BMIT who can advise you on the cloud environment that best meets your business requirements and setup.
Cloud computing has profoundly changed the way we do business. Although cloud cost optimisation has become a top priority for organisations (Cloudwards.net), the cloud is still an attractive prospect for many. According to Gartner, enterprise IT spending on cloud computing will overtake spending on traditional IT in 2025.
That doesn’t mean that cloud adoption does not have its challenges and concerns for business. It is true that embracing cloud can help businesses improve their agility, scalability and managed costs better, but it is not always a simple or straightforward process, particularly in sectors that have invested heavily in on-premises environments, operate in highly regulated industries or have many legacy applications with complex dependencies and security requirements.
Moving partly or fully to the cloud is a double-edged decision with implications for the business. Not surprisingly, some businesses are hesitant to migrate. The beauty of Cloud computing today is that businesses do not have to choose between only on-premises or only cloud.
They can opt for a hybrid IT architecture. This involves integrating and managing a mix of resources, including physical servers, virtualised systems, private clouds, public clouds, and possibly even edge computing devices.
(Note hybrid cloud focuses specifically on the combination of public and private cloud environments. Multi cloud environments combine multiple providers - Azure, AWS or Google Cloud using multiple private or public cloud setups.)
The goal of hybrid IT is to create a flexible and scalable infrastructure that leverages the benefits of both on-premises and cloud-based solutions. Businesses adopting hybrid IT typically have control over their infrastructure, allowing them to choose the most suitable deployment model for their applications and workloads.
Every business has unique requirements. On-premises setups give companies full control over their servers, data, security and compliance. The downside is that it is expensive to build, secure and maintain. Cloud environments provide flexibility and allow businesses to scale their infrastructure, but data security, compliance and connectivity concerns mean businesses are cautious about adopting a fully cloud-based solution.
As organisations grow and their requirements become more complex, a hybrid IT approach is emerging as a viable solution that combines the best of both worlds.
Hybrid IT enables businesses to leverage the benefits of both environments while addressing their specific requirements. For example, sensitive data or applications can be kept on-premises to meet compliance regulations, while non-sensitive workloads or productivity apps can be hosted on the public cloud for scalability and cost-efficiency.
Businesses gain several advantages when adopting this strategy.
Scalability: You can scale up or down your computing resources as needed, without the need for costly hardware or software investments. With hybrid IT, you can utilise the public cloud to handle peak demand or seasonal fluctuations while keeping your core applications and data on-premises or in a private cloud, ensuring better performance and security for critical operations.
Security: Hybrid IT empowers you to meet your security and compliance requirements effectively. By leveraging the hybrid model, you can store and process sensitive data on-premises or in a private cloud, while leveraging the public cloud for less critical tasks. Public cloud providers offer robust security features such as encryption, firewalls, identity and access management, and threat detection, further strengthening your security posture.
Cost-effectiveness: The hybrid cloud enables you to optimise your IT spending by paying only for the resources you utilise. This eliminates the upfront costs associated with purchasing and maintaining hardware and software, as well as the operational expenses of power, cooling, and maintenance. Additionally, leveraging the economies of scale and competitive pricing provided by public cloud providers for specific workloads can result in significant cost savings for your organisation.
Speed: With a hybrid IT, you can accelerate your time to market and foster innovation by gaining faster and easier access to new technologies and services. Utilising the public cloud allows you to swiftly test and deploy new applications or features without concerns about compatibility or integration challenges. Moreover, you can leverage the expertise and support of public cloud providers to enhance your IT operations and efficiency, enabling you to focus on driving innovation and achieving your business objectives.
Hybrid IT architectures also pose some challenges and limitations that need to be addressed.
Hybrid IT is not a one-size-fits-all solution, but a carefully planned and managed approach to maximise the potential of on-premises and cloud resources. Your business should assess its current and future business needs, existing IT capabilities, and constraints when formulating a hybrid cloud strategy.
Microsoft has announced that Azure Active Directory (Azure AD) is becoming Microsoft Entra ID.
The company said the name change “represents the evolution and unification of the Microsoft Entra product family, and a commitment to simplify secure access experiences for everyone".
Microsoft insists that customers do not need to take any action, and Azure AD users can continue to use the service without interruption. “All existing deployments, configurations, and integrations will continue to function as they do today without any action from you”.
Only the name changes. Licensing, terms, service-level agreements, product certifications, support and pricing remain the same. All features and capabilities are still available in the product.
Service plan names will change on October 1, 2023 as per the diagram below (source: Microsoft)
Other changes include:
Microsoft Entra protects all identities and secures network access everywhere. The expanded product family has:
Building resilience and a strong security posture require time and investment. Unfortunately, tight budgets and a lack of appetite to focus on security, particularly cybersecurity due to its complexity, leave businesses open to attack.
The Maltese government recognises the challenges local businesses face when implementing security measures and recently launched an initiative – the Cyber-ALT Grant Scheme - designed to empower them to digitally transform their operations and invest in cybersecurity solutions.
This is a fantastic opportunity, and at BMIT we are excited to help you leverage the benefits of the CYBER+ALT Grant Scheme. We specialise in enabling businesses to maximise their potential, implement state-of-the-art IT solutions, and guide them in securing the financing needed to transform their operations.
The CYBER+ALT Grant Scheme is a Maltese government initiative that provides financial support to small and medium-sized businesses to implement cybersecurity solutions.
Eligible businesses can receive funding of up to €60,000, covering a maximum of 80% of the initial investment. This financial support can be used to cover a wide range of cybersecurity projects, including:
We understand the unique challenges faced by local businesses when seeking financing through various schemes like the CYBER+ALT Grant Scheme. BMIT’s extensive experience, expertise and excellence in servicing and providing local business with best-in-class solutions, make us the ideal partner to guide you through the grant application process. Expertise in Grant Application: Our experienced tech professionals are well-versed in the requirements and intricacies of the CYBER+ALT Grant Scheme. We will assist you in crafting a compelling application that maximises your chances of success.
Tailored Solutions: Every business is unique, and therefore, requires a personalised approach. Our experts will work closely with you to understand your specific needs and design a custom solution that aligns with your objectives.
Cybersecurity Strengthening: We will show you how to identify gaps in your enterprise IT setup and recommended the right solutions to build your cybersecurity defences. We have developed our own easy tool to help you do this in an effective way. Additionally, we will also train your staff on cybersecurity and how to become the business’s first line of defence.
Ongoing Support and Maintenance: We do not just offer a solution. We optimise it for you and provide continuous support and proactive maintenance. We let you focus on your core business.
The CYBER+ALT Grant Scheme is a great opportunity to finance your cybersecurity plans. All applications are handled on a first come first served basis, and the scheme will close on 29 December 2023.
Now is the time to act. Contact BMIT today to schedule a consultation meeting and start your journey to build a resilient business.
Microsoft 365 is a cloud-based subscription service that offers a suite of productivity tools and applications for businesses and individuals.
It includes popular programs such as Word, Excel, PowerPoint, Outlook, OneNote, Teams, SharePoint, and more. Last year, Microsoft said it had 345 million Office users with 270 million Teams users (FY22 Q2 results).
But what makes Microsoft 365 so appealing and why has it gained so much in popularity?
First and foremost, M365 is a suite of productivity tools that can help modernise a business’s infrastructure and streamline daily operations. This allows it to focus on its core goals: revenue and growth.
With M365, businesses get a considerable upgrade from Office 365 in that you get a range of additional tools such as cloud storage and security, data analytics, customer support and email management. A major bonus for businesses that have multiple locations or are dependent on remote workers, is that they can benefit from all the features on any device, anywhere, anytime as long as there is an internet connection.
Let’s look at some of the benefits in more detail:
Microsoft 365 offers a suite of tools and applications designed to improve productivity and facilitate collaboration. Additionally, cloud-based file storage and sharing through OneDrive and SharePoint encourage real-time collaboration among team members, making it easier to work together on projects regardless of location or device.
As a subscription-based service, businesses can scale their usage and pay only for the number of users they need. This scalability is particularly advantageous for growing businesses that require flexibility in terms of adding or removing employees from the service. Additionally, Microsoft 365 is accessible from various devices and operating systems, including Windows, Mac, iOS, and Android, providing employees with the freedom to work from their preferred device.
Microsoft has focused a lot on security and continues to invest heavily in security measures to protect user data and ensure compliance with industry regulations. Microsoft 365 includes built-in security features such as data encryption, threat detection, and multi-factor authentication to safeguard sensitive information. Moreover, it provides businesses with tools to meet various compliance requirements, making it suitable for organisations dealing with sensitive data.
Businesses benefit from continuous updates and access to the latest features and innovations. With regular updates, security patches, and feature enhancements to its applications, users have access to the most up-to-date tools and functionalities. This eliminates the need for manual software upgrades and ensures access to the latest technology and capabilities to improve operations.
Microsoft 365 seamlessly integrates with other Microsoft products and services, creating a cohesive ecosystem for businesses. Microsoft 365 supports compatibility with various third-party applications, ensuring businesses can leverage their existing software investments while benefiting from the productivity suite.
No matter what kind of business you operate, Microsoft 365 likely has tools that can help one or more facets of your operation. The breadth of services means that your operational and security posture are addressed as the business grows in size, complexity and need for security and risk management.
In December 2022, the European Union approved the final text of a new legislative framework called the Digital Operational Resilience Act or DORA for short.
Covering the financial services industry, DORA comes into force in January 2025 and imposes stringent requirements in relation to ICT and risk management.
While DORA is specific to one industry, the framework can be applied to any industry and business. After all, every business should do its utmost to be resilient when faced with challenging and unexpected events such as a data breach incident or a ransomware attack
What do we mean by ‘resilient’ and how do you build a resilient business?
Resilience building refers to the process of developing the ability to withstand and recover from various challenges, disruptions, and uncertainties. It involves creating a strong and adaptable organisational structure that can effectively respond to and bounce back from unexpected events or crises.
Simply put, it means doing everything possible to get back on your feet when you’re down for the count.
However, to build resilience you need to know what you’re up against, what the risks are (internal and external) and what gaps exist in those defences.
With the increasing reliance on technology and digital platforms, businesses are more vulnerable to cybersecurity threats than ever before. A cyberattack can have a devastating impact on a business's growth and success.
The first step in resilience building is to assess the business’s security posture.
A security posture is the overall state of its cybersecurity readiness and resilience. It reflects how well a business can identify and protect its assets, data, and operations from cyber threats, as well as how quickly and effectively it can detect, respond and recover from cyber incidents.
A business's security posture is not static, but dynamic and evolving. It changes as the business grows, expands, innovates, and adapts to new challenges and opportunities. It also changes as the cyber threat landscape evolves, with new types of attacks, vulnerabilities, and actors emerging constantly.
When you assess your business’s security posture you are identifying its strengths and weaknesses in cybersecurity, as well as gaps and opportunities for improvement. Cybersecurity alone will not build your business’s resilience, but its importance cannot be understated given that most threats come from cyberattacks.
A security posture assessment is an opportunity to measure its performance against the business’s goals and objectives, as well as industry standards and best practices. It can guide the business on which actions and investments it needs to prioritise to enhance its security posture and reduce exposure to cyber risks.
It is also a strategic issue. Your security posture impacts the business’s reputation, trustworthiness, competitiveness, profitability, and sustainability. It also affects its stakeholders, such as customers, partners, suppliers, regulators, investors, and employees. Therefore, a business's security posture is not only needed but must be aligned with the business’s vision, mission, values, and culture.
A business's security posture is not a one-time project, but an ongoing process. It is a necessity. It is an obligation. It is not a burden. It is a benefit.
The starting point is to carry out a security discovery risk assessment. This assessment is typically based on one of several security frameworks such as NIST CSF or the CIS Framework. BMIT’s Cybersecurity Discovery Tool uses the 18 CIS v8 framework.
With over 200 checks, the cybersecurity discovery tool looks at 18 areas that cover cybersecurity from asset and inventory management to backup and disaster recovery strategies.
Any security posture assessment is influenced by many factors, such as the type of complexity of your IT infrastructure and network, the volume of data, how critical / sensitive it is; whether the business is required to comply with legislative frameworks; and budgets. The assessment should be seen as an investment not a cost, but at the end of the day it is a cost of doing business.
The assessment is also influenced by the business’s growth. A high-growth business with a high-risk profile will need regular assessments to ensure that its security posture is maintained.
The security assessment is step one in a long journey towards building resilience. The report that is generated from the assessment offers detailed recommendations and insights that will need to be addressed using different tools, systems, processes and frameworks.
A company should address IT Security governance, including the policies that govern the technology. It is useless, for example, to implement a tool to capture unauthorised assets when you do not have a governing process to review any findings. Here are more points to consider:
A business's security posture is not a static or one-time thing. It requires continuous improvement and adaptation to the changing threat landscape and business environment. By investing in your security posture, a business can enhance its competitive advantage and customer trust.
A business's security posture is not a static or one-time thing. It requires continuous improvement and adaptation to the changing threat landscape and business environment. By investing in your security posture, a business can enhance its competitive advantage and customer trust. Contact us and one of our experts will reach out and guide you accordingly.
Cybersecurity is a critical concern for every business though not everyone accepts the facts and by then it is usually too late.
Businesses need to understand how important it is for them to protect sensitive data, intellectual property, and the overall reputation of the business.
Investing in cybersecurity is a cost of doing business but it is a long-term investment in safeguarding against myriad threats.
There are no two ways about it. You need to dedicate a budget to cybersecurity but that does not mean breaking the bank.
Take our free lite cybersecurity assessment
There is no denying that cyber threats are real. In fact, the reality is that cyber threats can hurt your small business. 46% of cyber-attacks are targeted at businesses with less than 1,000 employees.
The costs after a security breach are very high. Cyberattacks cost businesses nearly $3 billion in 2020. A lot of that damage could have been prevented if those affected had taken basic steps to prevent attacks in the first place. In many cases, basic cybersecurity awareness and staff training can mitigate some attacks, especially phishing attempts that target employees.
What many businesses do not realise, until it is too late, is that if they experience a cyberattack or a breach, it is going to be extremely expensive to remedy the problem.
Employees can be the first line of defence against cyber threats but they're also the weakest link in the cybersecurity chain. Educating employees about cybersecurity best practices, training them on how to recognise and avoid phishing scams, the importance of strong passwords, and how to handle sensitive data securely, can be done with a very limited budget. There are training platforms that are cost-effective with subscription-based plans for small businesses.
Even if you don’t have a vulnerability management program in place, it does not cost your IT team to keep operating systems, software applications, and security software up to date with the latest security patches and updates. If not centrally managed, set up automatic updates on individual machines to ensure critical security fixes are not missed.
Encourage employees to use strong, unique passwords that are at least eight characters long and include a mix of letters, numbers, and symbols. Additionally, enable multi-factor authentication wherever possible. This extra layer of security can prevent unauthorised access even if a password is compromised.
It's crucial to back up your data regularly and store backups securely. In the event of a data breach or other disaster, you can restore your data quickly and minimise the impact on your business. There are backup-as-a-service solutions that are not expensive and reduce the need for investment in hardware and other resources.
There are other facets of cybersecurity that could be considered but points 1-4 are a good start if your business has limited budgets or personnel. It’s important to note that just because your business is small, you should not be helpless against cyberthreats. Practical changes requiring minimal effort and cost can help you on the journey towards securing your business.
Do you want to learn more about keeping your business safe in a cost-effective manner? BMIT can help tailor your cybersecurity needs based on your budgets. Take our free lite cybersecurity assessment survey to receive a personalised report with our recommendations and feedback, right in your inbox.
Multi Factor Authentication now required for all users
Microsoft has announced that as part of its efforts to boost security of its cloud services, it will be turning on the security defaults setting for all Azure tenants. This includes multi factor authentication (MFA).
Microsoft’s security defaults are a set of preconfigured security settings that are available to everyone at no extra cost. Security defaults are intended for organisations who want to increase their security posture but don’t know how or where to start, or for organisations using the free tier of Azure Active Directory licensing. This does not apply to organisations that already use stricter controls such as Conditional Access.
When signing up for Managed Services from BMIT, these fundamental features are deployed as part of our security baseline. However, we can take your cybersecurity posture to the next level, help you safeguard your employees' identities and protect your data while enhancing your employees' experience.
Microsoft will be automatically enabling the setting after June 27. Before then, admins will be encouraged to proactively enable security defaults.
After the setting is turned on, every user in the tenant will need to register for multi factor authentication. Microsoft is strongly advising admins to advise and prepare users for this change.
When users sign into their account, they will be asked to install the Microsoft Authenticator App. Instructions on how to set up the app on their mobile device can be found here.
According to Microsoft, enabling MFA can help block more than 99.9% of identity attacks to compromise accounts. When enabled:
With MFA, you are helping to increase the organisation’s security posture and in so doing, you are:
Protecting against password-based attacks: By enabling MFA, even if an attacker manages to obtain or guess a user's password, they would still need an additional factor, such as a mobile device or a biometric verification, to gain access.
Preventing phishing and social engineering attacks: Phishing attacks remain a prevalent threat. MFA adds an extra layer of protection by requiring users to provide a second factor that is typically not easily replicable, such as a one-time password (OTP) generated on a mobile device. Even if a user unknowingly falls victim to a phishing attack, the attacker would still require the second factor, thus preventing unauthorised access.
Strengthening Identity and Access Management (IAM): By enabling MFA, businesses can enforce strong authentication policies and ensure that only authorised individuals with the necessary credentials can access sensitive data and systems.
Enhancing Security in Remote Work Environments: MFA helps protect remote access to cloud-based applications and services by requiring additional verification, regardless of the user's location. This ensures that only authorised users can access critical resources, even when working from outside the corporate network.
Are you a BMIT customer or need assistance? Get in touch with us today.
Data protection and cyber resilience have become paramount for businesses across the globe. The growing reliance on technology and the increasing sophistication of cyber threats have made it crucial for organisations of any size to prioritise the security of their data.
Recently, BMIT had the privilege of organising along with The Malta Chamber an event that shed light on the importance of data protection and the role of cyber resilience in safeguarding valuable information.
The keynote speaker was the Commissioner for Data Protection, Ian Deguara, who spoke about the work being done in Malta to enhance the level of awareness and latest developments in the field.
Sean Cohen, BMIT Head of Technical Operations, gave a presentation on the technologies and technical implementation strategies that businesses can adopt to safeguard their data.
BMIT’s Chief Customer Success Officer, Nick Tonna, introduced the topic of the event explaining why resilience and digital fortitude played an important role in helping businesses to protect their data.
A very engaging and interesting discussion followed with The Malta Chamber CEO, Marthese Portelli, MPS’s Chris Mifsud and Gabriel Sultana CTO from Apcopay, joining Nick Tonna and the Data Protection Commissioner on the panel.
You can watch a recording of the event here.
We are thrilled to announce that BMIT Technologies is the winner of the prestigious IT Supplier of the Year award at this year's EGR B2B Awards, held in London on 9th June 2023.
The EGR B2B Awards celebrate and recognise the finest service providers in the online gaming industry, spanning various domains such as software development, payments, recruitment, safer gambling tools, IT infrastructure, and more. This victory not only reflects the remarkable achievements of BMIT but also highlights our commitment to delivering exceptional services and innovative solutions to our valued clients.
“We are incredibly honoured to receive the prestigious IT Supplier of the Year award at the EGR B2B Awards, solidifying our position as one of the top IT suppliers in the online gaming world and the only Maltese tech company to win at these awards. This recognition highlights the remarkable efforts of our team at BMIT Technologies in delivering innovative solutions and exceptional service to the online gaming industry,” Christian Sammut, CEO of BMIT, said after the event.
He added the company is “proud to be a leading player in helping shape the future of online gaming and will continue to push boundaries, drive innovation, and exceed expectations. This award is a testament to our ongoing commitment to excellence and our dedication to providing cutting-edge technology solutions to our global clients."
This award would not have been possible without our incredible clients, partners, and employees who have played a pivotal role in achieving this prestigious award. Their collective contributions have been instrumental.
Being awarded the IT Supplier of the Year award clearly shows the prominent role BMIT has had, and continues to have, in shaping the future of online gaming. By pushing boundaries and driving innovation, we aim to set new benchmarks for service providers in the industry.
As we move forward, BMIT Technologies remains committed to developing our presence in online gaming, driving innovation, and delivering unparalleled technology solutions to our clients.
Congratulations to everyone at BMIT on this well-deserved recognition!