MSP Corner

VPNs: Not as secure as they may seem

Virtual Private Networks (VPNs) are often marketed as the ultimate tool for ensuring online privacy and security. They encrypt internet traffic, hide IP addresses, and promise anonymity. However, recent discussions and research have highlighted several vulnerabilities and misconceptions about VPNs that users should be aware of. This short aims to provide a high level insight[…] Read

Published by Joe Munday, Cybaverse


The good news is: Large companies and banks are getting better at securing their IT systems. To this end, they engage specialised partners, such as Tyneso. The bad news? As a result, cybercriminals are diverting to smaller companies, many with less watertight security or outdated systems and equipment. Therefore, it is becoming increasingly important for[…] Read

Published by Steven Tytgat, Tyneso N.V.

5 Key Cybersecurity Questions You Need to Ask

The essential questions for enterprise leaders regarding cybersecurity Part of forming a cohesive IT infrastructure and cybersecurity is asking the right questions. Introspection does us all a favor, and the same philosophy carries over to data safety. But it’s not enough to ask “are we secure enough?” That’s a little too basic and doesn’t address your unique[…] Read

Published by John Jackson, Bytagig

Exploring the cyber security landscape – The new role of AI

By now, most of us are familiar with artificial intelligence (AI), whether it’s through platforms like ChatGPT or other sources, it’s widely known that AI is rapidly advancing at a pace quicker than any of us imagined. Artificial intelligence (AI) is reshaping the landscape of cyber security, offering several transformative capabilities. By utilising the power[…] Read

Published by Courtney Grice, Cybaverse

Give Your Data Security a Boost with Microsoft Purview

With more than 300 million people around the world working remotely, data security incidents can happen anytime and anywhere. In fact, a report by IBM Security, showed that the global average cost of a data breach in 2023 was USD $4.45 million – a 15% increase over three years. The exponential growth of collective and[…] Read

Published by John Saund, 360 Visibility

Microsoft Copilot: 3 steps before you fly

A mad buzz surrounds Copilot for Microsoft 365. It’s moved on from a software development tool to a productivity aid for people in any size of company. However, there are major pitfalls if you dive straight in – and you don’t want to crash. Organisations that adopt Copilot correctly will undoubtedly have a competitive advantage.[…] Read

Published by Graham Smith, OryxAlign

Why April Marks the Perfect Time to Boost Your Cyber Security Budget

As we enter a new financial year, there has never been a better moment to reassess and bolster your cyber security budget. According to a report by Infosecurity Europe, the tide is turning in favour of increased cyber security investment, indicating that over two-thirds of IT security decision-makers have signalled an intent to allocate greater resources[…] Read

Published by Courtney Grice, Cybaverse

An Insider’s Guide to Optimizing Azure Costs

We all know that diving into the Azure cloud platform brings tons of benefits, but it also means keeping an eye on those spending tabs. So, here’s a breakdown of Azure cost optimization straight from someone who’s been there, done that. When we talk about Azure cost optimization, we’re talking about getting strategic. It’s about[…] Read

Published by John Saund, 360 Visibility

How to be & stay NIS2 compliant without worries?

Is your company affected by the NIS2 requirement or do you provide services to an organisation which has to comply with the NIS2 guideline? In that case, your IT partner must be ISO 27001 certified to demonstrate that they work in accordance with NIS2 legislation.  Talking NIS2 NIS2 is the successor to the original NIS[…] Read

Published by Steven Tytgat, Tyneso N.V.

Unveiling Phishing Emails: A Guide to Manual Analysis and Free Tools

Phishing emails have become increasingly sophisticated, posing significant threats to individuals and organisations alike. But fear not, with the right tools and knowledge, you can decipher and analyse these deceitful messages to safeguard yourself against potential cyber-attacks. Let’s delve into the essentials of manual phishing email analysis and explore some invaluable free tools to assist[…] Read

Published by Silvia Cardascia, Cybaverse