Blog

Enhancing Compliance in the Era of Cyberthreats: The Role of ICT

As cyber threats become more sophisticated and frequent, the Digital Operational Resilience Act (DORA) represents a critical step forward in fortifying the financial sector against digital disruptions. Understanding DORA and Its Implications DORA, which will be enforced as of January 2025, aims to enhance the digital operational resilience of financial entities within the EU. It […]

Read More

Interview: SOC 2 Explained

BMIT Ltd recently received SOC 2 Type 1 attestation. Dione Vella, Chief Digital and Compliance Officer explains why this is an important achievement for the company. He was talking to David Kelleher.  What does achieving SOC 2 Type 1 attestation mean for BMIT?  The SOC 2 (Service Organisation Control 2) or ISAE 3000 report is […]

Read More

Zero Trust: A proactive approach to security

Traditional security models based on perimeter defence and implicit trust are no longer effective. The notion that what is inside the organisation’s network is trusted and everything outside as untrusted is no longer supported. Instead, organisations are adopting a more proactive and holistic security strategy that does not trust any user, device, or application, regardless […]

Read More

Insider threats: Battling a security unknown

There exists a subtler and potentially more damaging danger lurking in your business – the insider threat. Insider threats are one of the most serious and costly cybersecurity risks for any organisation. This phenomenon involves individuals exploiting their privileged access to compromise security from within.  An insider threat could be a current or former employee, […]

Read More

Beware & Buy - Avoiding Cyber Traps During Holiday Sales

Black Friday and Cyber Monday are the busiest shopping days of the year. According to Bitdefender, consumers spent $9 billion online last year, up by 22% on 2021. In 2022, Cyber Monday generated a whopping $11.3 billion in revenue alone. Unfortunately, the boom in retail business comes with a matching risk: cybercrime. Cybercriminals, consistently active […]

Read More

BMIT launches Cybersecurity Awareness Programme for businesses

More and more business leaders are recognising the importance of cybersecurity. They are also acknowledging that a strong first line of defence, starting with their employees, can considerably reduce the risk of a breach or data leakage. However, achieving this requires employees to be well-informed and proficient in identifying and mitigating cyber threats. While certain […]

Read More

What to expect from a security training programme

The importance of cybersecurity has grown exponentially. As individuals, businesses, and organisations we have become increasingly reliant on digital tools and platforms, however the risks associated with cyber threats have intensified as well. The first line of defence against these threats is not a matter of implementing security solutions alone, but rather a well-informed and […]

Read More

Cybersecurity Awareness Month - 9 areas your business should focus on

October is celebrated worldwide as Cybersecurity Awareness Month, a time to refocus our attention on safeguarding digital assets and promoting cybersecurity best practices. In this blog, we look at nine important things that businesses can do during Cybersecurity Awareness Month to enhance their cyber defences and foster a safer digital environment. Conduct a Cybersecurity Discovery […]

Read More

Top 9 Cybersecurity Risks in the Hybrid Workplace

Technology has transformed the concept of the workplace. The hybrid workplace, a blend of remote and on-site work, offers unparalleled flexibility and productivity. However, it has also created a new set of cybersecurity challenges that organisations must confront to safeguard sensitive information, maintain operational continuity, and protect their reputation. Let’s look at nine threats and […]

Read More

Developing a robust data backup strategy: Some considerations

Data is the lifeblood of every organisation. Protecting this invaluable asset is essential for business continuity and maintaining a competitive edge but equally important is the ability to recover the data in the event of data leakage or a breach. Data backup is a fundamental component of an organisation’s cybersecurity and disaster recovery plan. Data […]

Read More