Tag Archive for: cyber threat

Meet Toby Kirk, MSP Account Manager

Toby Kirk. Planet IT Outsourced Helpdesk Oxford MSP Account Manager

Let’s start with an easy one… tell us a little about yourself Toby

I joined Planet IT in September 2023 having come from a range of working backgrounds. Most recently I was working for a Private Healthcare organisation managing their new clients and their marketing whilst also being solely responsible for their IT systems for a multi-unit franchise.

I’ve always had an interest in the world of IT both inside & outside of work. As soon as the opportunity to combine them in a role at Planet IT I jumped at the chance.


Can you explain your journey to Planet IT? 

I’d been in Planet IT’s ‘orbit’ for some time as a customer. The last 2 organisations I worked for had used Planet IT for everything from hardware purchases to firewalls & security. I’d always been attracted to the excellent service I was receiving as a customer and when a role came up that allowed me to bring my interest and experience in IT to may day to day I had to go for the role!


You’re relatively new to your current role, but you’re excelling! Why do you think it suits you so well?  

I think it’s the fact that having been the IT Manager for a multi-unit SME I have a great understanding of what the customer needs from me as their account manager. I love getting out to my client’s offices and meeting them and their teams in person, and finding out what their organisation is focused on so that I can align their IT technologies alongside their plans to grow and sustain robust IT systems. I always aim to deliver a relationship-led service which has all of my clients at the heart of everything I do.

Toby Kirk. Planet IT 20th Anniversary

What sort of clients do you like working with? 

I have such a wide variety of clients across many different industries. It sounds cliched, but I love working with all of them and understanding what IT systems they need to best support their work. It keeps the job fresh for me, and no day is the same.


What technologies are making the most impact to your client’s businesses?  

Technology moves incredibly fast these days but many of my clients are making the move to Azure and implementing applications such as Intune and Endpoint management applications. I’m also seeing a huge deal of interest in the implementation of Microsoft Copilot which has been an exciting product to get out there also.


What challenges do you face in your role? 

No day is the same but I wouldn’t see it as challenge per say but it keeps me on my toes keeps me learning everyday!


What is it like to work at Planet IT?   

In my short time working at Planet IT I have had the incredible opportunity to meet some amazing people and do some fantastic things with my clients and colleagues. Planet IT is like no other organisation that I have ever worked for, it doesn’t feel like work when I leave in the morning!


What has been your favourite Planet memory so far, and what are you looking forward to?  

It was great to part of the 20th Anniversary celebrations and hear the journey that Planet IT has come on in those 20 years. Still being young on my time here, I look forward to experiencing more of what Planet IT has to offer!

Toby Kirk. IT MSP Manager 

What makes you tick outside work?  

Outside of work I spend a lot of time with my family, I have a wife and 1 year old son who keep me very busy. However, in the odd spare moment I do get I love cooking and if the weather is good you can often find me on the Golf Course.


If you were to give advice to a young person thinking of entering the world of IT – what would it be?

There’s so many areas of IT, try to explore as much as you can and find what you enjoy the most!

Meet Emma Kerin, MSP Account Manager

(Reader, brace yourself 😬!!)

Emma, can you explain your Planet IT journey…?

My journey at Planet IT started in 2009 when I had just come out of college studying IT. Back then my job role was telemarketer, generating leads and writing them down on paper, Yes paper !!

6 months later and unfortunately the job just wasn’t for me, I say it was a mutual decision to leave, but Gav and Sean might think otherwise!

After going into various IT support roles, in 2015 I approached Planet IT as they were starting up their IT support department and I joined to onboard all new clients. Back then there was Mike, Sam B, Nick, Stefan and Rob in our fish bowl. Things were very different in those days, with fewer clients and far fewer staff staff! But it’s great to know I was part of that!

Planet IT were then awarded the contract to replace every device at Buckingham Palace, Windsor Castle and Kensington Palace and it was such a honour to be considered for this role.

I have always been passionate about customer experience and making sure clients are listened to and understood. Now, 9 years later I’m a MSP account manager which has allowed me to take all the knowledge and experience I’ve had over the last 9 years and really deliver the best service possible for our clients.

Planet IT Awards

You are excelling in your current role. Why do you think it suits you so well?

As I mentioned, I think it’s the variety of roles I’ve had and the touch points I’ve had with all the MSP clients.

A key part for me is having a partnership with my clients, I thrive on delivering and working together to get the best outcome.

What sort of clients do you like working with?

I like working with all types of clients, having a partnership and not just being their IT company. I like to have conversations and understand what makes them tick and not just talk about IT.


What technologies are making the most impact to your clients businesses?

Right now, Azure, Intune and sharepoint are making the biggest impact.

Emma and the Planet team in Dubai

What challenges do you face in your role?

I wouldn’t say there are many challenges, but the industry is constantly changing and sometimes it’s hard to keep up and make sure we are giving the client the right advice.

What is it like to work at Planet IT?

Planet IT is full of opportunities and there are always different paths to take if you show how passionate you are.

When things don’t go to plan we all work together to get through it.


You’ve been here quite a while, what is your favourite Planet memory?

Iceland Christmas party, I would never have experienced what I did without Planet IT.

Planet IT Support Team in Iceland

What makes you tick outside work?

Going to the gym, holidays and walking.

I also love having a good time and a drink or two…


If you were to give advice to a young person thinking of entering the world of IT – what would it be?

Do it! There are so many different areas and opportunities within IT. You don’t have to be in one role forever.

How IT Can Save Your Business Money and Make It Work Better

How IT Can save your business money

Technology is an essential part of any modern business, but it can also be a source of frustration, inefficiency, and risk if not managed properly. You need a reliable, trustworthy IT partner to help create and implement a strategic IT roadmap that aligns with your business goals and needs.

We know that IT is essential for modern work, to communicate via email, messaging, video conferencing and apps such as Excel, Adobe and others to enable our businesses. But an IT roadmap is so much more than that. It can allow your business to improve, drive forward, and save you money while doing it.

Let’s explore how…


Artificial intelligence (AI) is the ability of machines to perform tasks that usually require human intelligence, such as reasoning, learning, and decision-making. AI can help your business improve productivity, quality, and customer satisfaction by automating repetitive and complex tasks, enhancing data analysis and insights, and providing personalised and intelligent services. For example, you can use AI to:

Streamline your workflows and processes. 

Use chatbots, virtual assistants, and robotic process automation (RPA) to handle customer inquiries, bookings, invoices, and other administrative tasks.

Optimise your operations and performance. 

Utilise machine learning, deep learning, and natural language processing (NLP) to analyse large and diverse data sets, generate forecasts and recommendations, and detect anomalies and patterns.

Innovate your products and services. 

Tools such as computer vision, speech recognition, and natural language generation (NLG) to create interactive and engaging experiences, such as face recognition, voice assistants, and content creation.

Used correctly and responsibly, AI can save your business money by reducing labour costs, increasing efficiency, and minimising errors. It can also make your business better by enabling you to offer faster, more innovative, and more personalised solutions to your customers and stakeholders.

The next big thing in AI? – Microsoft Copilot. Those lucky enough to use it this early have already seen how it can revolutionise our work. And this is just the start. Copilot is just going to get better.


Cloud Technology

Cloud technology delivers computing services, such as servers, storage, databases, networking, software, analytics, and intelligence, over the internet (the cloud). The Cloud can help your business improve scalability, flexibility, and collaboration by allowing you to access and share resources on demand, from anywhere, and on any device. For example, you can use cloud technology to:

Expand your capacity and capabilities. 

Use cloud infrastructure, platform, and software as a service (IaaS, PaaS, and SaaS) to host your applications, data, and systems on the cloud without investing in and maintaining your hardware and software.

Enhance your agility and responsiveness. 

Cloud orchestration, automation, and integration can help manage and coordinate your cloud resources, workflows, and processes and adapt to changing business needs and demands.

Empower your team and partners.

By using cloud collaboration, communication, and productivity tools, you can work together, exchange information, and deliver results regardless of location, time zone, and device.

Cloud technology can save your business money by reducing capital and operational expenses, optimising resource utilisation, and leveraging economies of scale. It can also improve your business by enabling you to access and leverage the latest technologies, innovations, and best practices in the cloud.

Our cloud platform of choice is Microsoft Azure. Azure provides 1000’s of products and cloud services, including the latest in AI. This allows businesses to choose the tools and frameworks that best fit their needs. Whether developing new applications, managing existing workloads, or exploring cutting-edge technologies, Azure offers a flexible cloud-based ecosystem.


IT can save you money


Cybersecurity can help your business improve reliability, reputation, and compliance by ensuring your IT assets and information’s confidentiality, integrity, and availability.

The right protection can save your business money by avoiding or reducing the costs and losses associated with cyberattacks, such as downtime, data breaches, fines, lawsuits, and reputational damage. It can also improve your business by enabling you to build and maintain trust and confidence with your customers and stakeholders.

A 24/7/365 Managed Detection and Response (MDR) service covering your organisation keeps you protected by a team of experienced threat hunters and saves you the cost of hiring your own managed Security Operation Centre (SOC). As a bonus, your Cyber insurance costs will be dramatically reduced as MDR satisfies many of their policy requirements.


Unified Endpoint Management (UEM)

UEM or Device management is the administration and control of your IT devices, such as laptops, tablets, smartphones, and printers, used by your staff and users to access and use your IT resources and services. UEM can help your business improve security, efficiency, and user experience by ensuring your IT devices’ proper configuration, maintenance, and support. For example, you can use device management to:

  • Secure and protect your devices using encryption, remote wipe, and lock to prevent unauthorised access and data loss in case of theft, loss, or compromise.
  • Manage and update your devices using inventory, provisioning, and patching to keep track of your device assets. You can assign and distribute devices to your staff and users and install and update software and firmware.
  • Support and troubleshoot your devices by using device monitoring, diagnostics, and helpdesk to monitor the performance and status of your devices, identify and resolve issues and problems, and provide assistance and guidance to your staff and users.

Device management can save your business money by reducing device downtime, waste, and theft and optimising device performance and lifespan. It can also make your business better by enabling you to provide a consistent and seamless device experience to your staff and users.

At Planet IT, we use Intune to manage our devices and recommend them to most clients. If you want to know more about Unified Device Management, check out our detailed article here: https://www.planet-it.net/uem-unified-endpoint-management/ 

IT Strategy

Software Licensing Management

Software licensing management can help your business improve compliance, quality, and value by ensuring the proper acquisition, deployment, and usage of your software assets and solutions.

Comply with software laws and regulations. 

Software license management can make auditing and reporting easier by verifying and documenting your software entitlements, installations, and consumptions and avoiding software piracy, infringement, and penalties.

Optimise your software investments.

Use software licensing to optimise, consolidate, and negotiate. Evaluate and select the best software license models, types, and terms for your business needs and budget to reduce software costs and complexity.

Enhance your software capabilities.

Managing complex software license subscriptions, renewals, and upgrades is a fine art. You can access and benefit from the latest software features, functions, and improvements and maintain software compatibility and interoperability.

Software licensing can save your business money by avoiding or reducing software over-licensing, under-licensing, and non-compliance and maximising software utilisation and value. Furthermore, it can improve your business by enabling you to leverage the best software solutions for your business processes and outcomes.

By working with a high-level partner like Planet IT, we can secure you better licensing pricing than most other IT companies.


IT processes, systems and methodology can save your business money and improve it in many ways. However, managing IT can be challenging and complex, especially in today’s dynamic and competitive business environment. That’s why you need a trusted and experienced IT support provider to help create and implement a strategic IT roadmap that aligns with your business goals and needs.

Speak with James Dell today to find out how we can help you transform your business with IT – [email protected] or reach out on LinkedIn: https://www.linkedin.com/in/delljames/

Meet Maciej Owsiany. What exactly is a Principal Technical Architect?

Technical Architect

Let’s start with an easy one… what exactly is a Principal Technical Architect?

Well… I’ll do my best to describe that title as we all know it is comprehensive and contains many small bits and pieces.

In a few words, a Technical Architect helps businesses understand how the technology works that they might commit to buying and implementing within their company.

There are a few types of Technical Architect. One is a pre-sale Technical Architect, which is precisely what I do in my role. I often engage in conversations with businesses before the sales process. In the typical jargon, I use simple terminology to speak to executives about existing or new technologies. I often change technical language to something more straightforward for the client to understand so they can more comfortably decide to implement a solution within their organisation.

A big part of my role as Principal Technical Architect is to create IT roadmaps, where we look at the overall existing infrastructure for the business and project changes within a specific timeline to achieve better outcomes, essentially acting as your IT Director or CTO, providing that long-term technical vision for the business.

How does that fit within the Managed IT Support Area of Planet IT?

Within the MSP business, the Technical Architect role is a glue between a client and the infrastructure team. That’s looking after that business on a day-to-day basis. We all try to work together to achieve one goal, and that is, first of all, to make the client’s life easier by implementing technology which works for them first but at the same time makes the infrastructure team happy as they will have to then look after that solution and support the client after it has all been implemented.

A big part of my experience that massively helped me within my role was being a technical liaison. I was a part of the helpdesk and onsite team, assisting clients within the MSP business for over ten years. I saw the major struggles that companies were going through and often had to work under pressure to resolve those problems. I always say that I have been on the other side of the fence and not only seeing technical issues from one side of the monitor 😊.


What sort of clients do you like working with?

In our role here at Planet IT, we help over 90 support clients from various sectors, such as pharmaceutical, manufacturing, and consulting. We also manage highly demanding organisations like schools, hospitals, and critical care businesses, where technology has to be delivered on point as those clients are highly dependent on it. Working with companies with a straight mission and vision for their business is much easier as we can focus on longer-term goals rather than short patches. Those kinds of companies often stick to the plan and implement changes that Technical Architects put in the IT Strategies.


What technologies do you like working with?

This might sound like a broken tape, and as we hear more about the security solutions, most of us probably think…. oh, not again!

Unfortunately, the world we live in has pushed us to focus even more on the security aspect of every business.

We often work in a hybrid mode, which always makes technical departments very busy, and every aspect of security behind the hybrid working solution requires addressing accordingly.

I am not even sure where to start, as we can talk about it for hours, but mainly these days, we do not work from one secure parameter, such as the office. We do not use only one device to access business data. As everybody knows, and I am sure that most of you agree, we tend to use many devices, such as laptops, mobile phones, and tablets, to access our data.

From a technical perspective, it is our main goal here at Planet IT, and I am sure many other companies, too, secure that data and the devices from which it is accessible. In the technical department, we regularly speak about new technologies that can help secure the data and make sure that in the event of losing a single device, which, let’s face it, is not really hard these days, mitigating the risk of accessing it by someone who should not is achievable as quick as possible.

Using the right technologies, such as Microsoft Intune, is something that we work on daily here at Planet IT, and I can happily say that it makes me almost very proud that many businesses are deciding to make the right move and shift towards it.


What technologies are you looking forward to seeing in the future?

Virtual reality and all the AI-facing technologies that we can hear about are things that everybody is talking about at the moment. Many big companies are introducing solutions that can help us with our daily tasks, whether at work or at home, and some of them we might have seen in futuristic movies a long time ago. We all know for a fact that this is happening. We are testing some of these solutions here in Planet IT that might help businesses internally.


What challenges do you face in your role?

As I have mentioned, in participating in the Security Summit conversation regarding bridging gaps between technology professionals and executives, the challenge often is to try to convince the senior management team to invest in IT. I have been on many calls when I heard someone saying my system is not broken, so why must we make those changes?

Our job is to ensure that clients understand the importance and often the urgency of the changes that need to be made. Surprisingly, today, we still see many businesses that have not moved from their onsite server operating system, which is not supported anymore, and that is just one example. That may be because they are using bespoke and legacy applications, and the migration might not be that easy, but as long as there is someone who is willing to start a conversation with us and is open to a change, I call it a success as we can then have a discussion and try to face and resolve the current situation.


You were recently named the Planet IT MVP – Tell us about that. How did it feel?

That is a huge privilege, and I have to say that I am very grateful to be chosen by Planet IT team and voted for an MVP award, which I think stands for the most valuable player (I have been watching those basketball playoffs for a long time, and I know what that is 😉).

This all happened while I was climbing Kilimanjaro. I remember that my friend happened to catch the internet signal in the middle of nowhere for just 1 hour during our 7-day trip! I wanted to see what happened in the big world, and when I found out about winning…!! We then lost internet access, so I could not even say how happy I was. I feel like this is a team achievement, and although I was lucky enough to get awarded the MVP title, I cannot thank the entire Planet IT team who stands behind it enough!!!


What makes you tick outside work?

I love overall physical activity, whether walking, hiking, or training… I love it all!!! Why…? It is probably because during those, I don’t have to think about anything else, and I don’t need to analyse any solutions 😉.


Securing Tomorrow: Navigating Cybersecurity in 2024 (Amidst the Rise of Generative AI)

AI & Cybersecurity in 2024

As we plunge deeper into the digital era, the evolution of technology continues to shape the landscape of cybersecurity. 2023 has been a landmark year for the uptake and integration of Artificial Intelligence into our business, lives and technologies. However, now it’s time to look at cybersecurity in 2024

2024 will mark a significant milestone. The widespread adoption of generative AI technologies propelling us into uncharted territories. Not only are we learning about how to use these technologies and leverage them to make our business more effective and our work lives that little bit easier, but at the same time we are trying to understand how this technology should be legislated, managed and secured. While these advancements bring unprecedented opportunities, they also usher in new challenges. Especially with the escalating risks posed by malicious actors utilising AI to launch smarter, more efficient cyber-attacks. In this article, we delve into the future of cybersecurity and explore crucial measures businesses should undertake to fortify their defences against AI-driven threats.

2023 has been a year of seismic change in the IT landscape. Most of this initial change has been driven in part by the wave of generative AI products that have come to the market. Starting with the introduction of ChatGPT from OpenAI and then the race to get GenAI into every business and every consumer as quickly as possible. This is not the only change that has dramatically affected the market but it is the starting point from which most of the other shifts have occurred.

Because of this, when looking at what 2024 looks like, we need to consider these rapid changes. We can’t just look at today’s landscape. We need to consider what is the risks of the following 12 months are going to look like

The Proliferation of Generative AI:

Generative AI technologies, fuelled by machine learning algorithms, have demonstrated remarkable capabilities in various domains, from content creation to problem-solving. However, with great power comes great responsibility (“Ben Parker – Spiderman (just before he dies [SPOLIERS]”), and in the realm of cybersecurity, the advent of generative AI presents a double-edged sword. While businesses and individuals can leverage GenAI to increase their productivity, remove manual tasks or understand complex situations, Cybercriminals are increasingly leveraging these technologies to automate and enhance the sophistication of their attacks.

AI Cybersecurity event

AI-Driven Threats: A New Frontier:

The integration of generative AI in cyber attacks introduces a new level of complexity and efficiency. AI-driven threats can adapt in real-time, learning from defensive measures and continuously evolving to exploit vulnerabilities. From intelligent phishing schemes to adaptive malware, businesses now face a formidable adversary that can circumvent traditional security protocols with unprecedented agility. This enables bad actors to push RaaS (Ransomware as a Service) and enable less skilled individuals to trigger and deploy increasingly complex attacks on businesses with little to no knowledge of what the attack does or how it is written.

So how do we move forward? As a business what should you be doing to protect yourselves, your staff and your business from the wave of GenAI that isn’t hear to help you out? I have collated Five steps that I called the Business Imperatives for Cybersecurity in 2024:

Investing in AI-Powered Defence Systems:

To counter the rising tide of AI-driven threats, businesses must invest in cutting-edge, AI-powered defence systems. These systems should not only detect known patterns but also employ advanced machine learning algorithms to identify anomalous behaviour indicative of potential attacks. Your £10 a year subscription to a nearly free Antivirus or Antimalware platform is no longer enough, the companies who are not innovating in this space and failing behind and they are doing so quickly. In 2024, EDR/XDR – Endpoint Detection and Response or (X)Extended Detection and Response are now a minimum, for nearly all businesses from SME/SMB to Blue Chip a managed SoC (Security Operations Centre) or Managed Detection and Response (MDR) service is a must. The level of protection on your client devices has never been more important especially as the edge of the network dissolves and users and businesses embrace remote working.

Continuous Training and Skill Development

The human element remains crucial in the fight against cyber threats. Regular training and skill development programs are imperative to equip cybersecurity teams with the knowledge and expertise needed to combat evolving AI-driven attacks effectively.

When looking at what we do moving forward we have to start with the human aspect of protection “The Human Firewall” as I like to call it. Training your end users has and always will be the most critical line of defence a business has. Now I have said this before and I will undoubtedly say it again in one of these articles or at a keynote. If you fail to train your end users to not only use the technology in front of them or understand the risks they pose as users to the data and information security of the business you will undoubtedly risk a catastrophic failure. Users are the most risky part of your business, they move, they are forgetful and they tend to be overly sharing even when you have specifically told them not to be. What we will need to do as we step into 2024 is train end users to understand the risks of AI, what it does/doesn’t/can/cannot do with data.

Once they understand this you will need to wrap true security awareness training around this. The training will need to be broad but also deep to ensure that users do not fall into the trap of not knowing the breadth of the risks but also don’t end up receiving such high-level input they never really understand how deep that rabbit hole can go.

microsoft intune

Zero-Trust Security Architecture

Adopting a zero-trust security architecture is paramount in the age of AI-driven threats. Rather than relying solely on perimeter defences, businesses should implement robust identity verification, continuous monitoring, and strict access controls to mitigate the risk of unauthorized access. We need to build systems, services and business with Zero Trust at the core. When my team is asked to work on a solution for a customer or migration to the cloud, this is where we begin the days of trusting the perimeter of the network to defend us are gone. We need robust Zero Trust across every system, platform and service. If you don’t have Zero Trust you have too much trust!

Collaboration and Information Sharing

Cybersecurity is a collective effort, and businesses should actively participate in information sharing and collaborative initiatives. At Planet IT, I make this a core of what we do with regular information-sharing sessions, events and webinars (including this blog!). Building a strong network of industry peers and sharing threat intelligence can enhance the collective ability to thwart sophisticated AI-driven attacks. If you don’t know where to start with this reach out to [email protected] and we will get you connected with like-minded individuals across the UK and EMEA and help you build your network of peers.

Regulatory Compliance and Ethical AI Usage

Beyond technological solutions, fostering a cybersecurity culture within an organisation is paramount. Employees should be educated about the potential risks associated with AI-driven threats and encouraged to adopt best practices, such as vigilant email scrutiny, regular password updates, and reporting suspicious activities promptly. This starts from the first day they join your business and should be a continued journey throughout their time with you. The days of training once worrying later are gone. We must be keeping our staff as up-to-date as we are, bringing the business with you is the hardest part of the battle with AI and Cyber Security in 2024.

As we stand on the precipice of a future dominated by generative AI, the importance of robust cybersecurity measures cannot be overstated. Businesses must proactively adapt to the evolving threat landscape by embracing advanced technologies, fostering a cybersecurity-conscious culture, and collaborating with the broader industry. By doing so, they can not only defend against the rising tide of AI-driven threats in 2024 but also pave the way for a more secure digital future. Just remember, AI is Amazing but if you fail to understand it, properly protect it or secure it then it’s a disaster waiting to happen!

If you want to talk to one of our experts about how we can help you with your security and understanding of AI then please call 01235 433900 or you can email [email protected] or if you would like to speak to me directly you can reach out to me via DM or at [email protected].

AI & Cybersecurity in 2024


How to create and implement a cloud strategy

How to Create and Implement a Cloud Strategy

Cloud-based solutions are helping organisations achieve greater agility, efficiency, and innovation, and even increasing end-user satisfaction. That said, moving to the cloud is not always just as simple as clicking a few boxes and pressing go. It can be a drawn-out or complex process. Any cloud migration strategy requires careful planning and execution to ensure a successful outcome and avoid the typical major pitfalls. 

In this article, we will explain what your cloud strategy should include, why you need one, and how to create and implement one for your organisation.  

We will also share some tips and best practices from our experience as a Microsoft Solutions Partner specialising in Microsoft Azure, Microsoft 365 and cloud migration specialist. 


What is a cloud strategy? 

A cloud strategy is a concise viewpoint on the role of cloud computing in your organisation. It defines what you want to achieve with the cloud, how you will get there, and how you will measure your progress and results. 

A cloud strategy is different from a cloud implementation plan, which offers the “how” rather than the “what” and “why”. A cloud implementation plan details the specific steps, actions, and resources needed to execute your cloud strategy. 

You need a cloud strategy because it helps you: 

  • Align your cloud solutions with your business goals and user needs. 
  • Communicate your vision and direction to your stakeholders and partners. 
  • Identify and mitigate the potential challenges and risks of cloud adoption. 
  • Optimise your costs and benefits of using the cloud. 
  • Monitor and evaluate your performance and outcomes. 

Cloud Strategy

What if you don’t prepare for the cloud properly? 

Without a clear and coherent cloud strategy, you may end up with: 

  • A complex and expensive technology estate that does not meet your expectations or requirements. 
  • A lack of coordination and collaboration among your teams and departments 
  • A loss of control and visibility over your data and processes 
  • A reduced ability to respond to changing market conditions and customer demands. 

So, where do you start? 

If you have to ask that question, then you probably need a helping hand.  

Feel free to call one of our Cloud Specialist Architects to get the plan rolling. Call 01235 433900 or email [email protected] and ask about a Free Cloud Readiness Assessment.  

WormGPT: Phishing-as-a-Service the Rise of AI lead Phishing Attacks


Have you been following my latest series of articles on AI and the moving threats of the AI lead wave? If you have, you will have heard me talk about the use of AI to generate content for cyber-attacks, especially their use to increase the effectiveness of Phishing attacks. But have you heard about WormGPT?

Almost as predicted a new AI-lead Phishing service has launched titled WormGPT. Its name is a homage to the AI service ChatGPT which it claims to mirror. The creators call it an equivalent to the natural language engine’s human-like answers to questions.

How does it work?

The way that WormGPT stands out is very simple. All the security measures and protections used to prevent the generation of malicious code or attacks in ChatGPT are removed. WormGPT actively encourages this behaviour. No wonder, it is developed by known hackers and actively promotes malware and other cybercrime on the page.


WormGPT is a subscription-based service on the dark web. Like many of these services, it can be used to promote and enhance phishing attacks. It is another case of Phishing-as-a-service and will only lead to more complex and higher-risk cyberattacks hitting the public.

With this on the rise, all we can recommend is that you stay alert. Stay aware and have the right protections in place to prevent phishing attacks. You should have time-of-click protection enabled on all links in your business. If you need more guidance on this, you should reach out to your Planet IT account manager.

How our Cybersecurity experts can help…

Are you struggling to get your head around how AI affects cybersecurity? Then please call 01235 433900 or you can email [email protected]. Or if you would like to speak to me directly you can reach out to me via DM or at [email protected].

Windows Server 2012 R2 End Of Support – Act Now Or Face The Consequences!

Windows Server 2012 R2 End of Support

If you are an IT professional running Windows Server 2012 or Windows Server 2012 R2 server, you need to be aware that support for these products will end on October 10, 2023. This means that regular security updates, non-security updates, bug fixes, technical support, and online technical content updates will no longer be provided by Microsoft.

This poses a serious risk to your business. You will be exposed to potential security breaches, compliance issues, and performance problems. Alongside several key vendors dropping support for their products as soon as this platform leaves standard support with Microsoft.

You will also miss out on the latest features and innovations that newer versions of Windows Server offer. This includes improved security, scalability, reliability, and efficiency.

Therefore, you need to act now and plan your migration strategy before it is too late. You have two real options and one really bad idea to choose from.

Embrace The Cloud and get all the benefits

Migrate to Microsoft Azure and receive free Extended Security Updates (ESUs) for three years after the end of support. You can move your applications and databases to Azure Virtual Machines and benefit from the cloud’s flexibility, scalability, and cost-effectiveness.

You can also use Azure Arc to manage your hybrid environment and receive automated/scheduled ESU updates and installation. This can simply be a lift and shift for now. Use the three years to get prepared for a newer operating system.

Upgrade your Windows Server

Upgrade to Windows Server 2022 or purchase ESUs for Windows Server 2012. If you prefer to stay on-premises, you can upgrade to the latest version of Windows Server. This will offer enhanced security, performance, and innovation. Alternatively, you can purchase ESUs for Windows Server 2012, which will provide security updates only for up to three years after the end of support. This can only be done if you are on an Enterprise Agreement with Microsoft. For most businesses, this won’t be an option.


…and you’d be really stupid to do this!

Do nothing and wait to join over 50% of UK-based businesses that suffer a major cyber incident each year. With an unsupported product, it will only be a matter of weeks before a major attack is launched by a threat actor against an operating system using unpatched vulnerabilities.

Whichever option you choose, you need to start preparing now and avoid the risks of running unsupported software.

Don’t know which way to turn…. Then reach out to the Technical Architecture team and we will help you understand your options and support you in the drive to move away from 2012 R2.

We are an IT company based in the UK that advises thousands of businesses, IT managers and leaders on all things Tech. We can help you with your migration plan and ensure a smooth transition to the latest Windows Server solutions. Contact us today and let us help you secure your future.

Windows Server 2012 R2 End of Support

Azure AD is becoming Microsoft Entra ID

Microsoft Entra ID

You may not yet be too familiar with Microsoft Entra, but it’s about to become a much bigger part of your Microsoft environment.

Microsoft Azure AD, the cloud-based identity and access management solution that powers millions of organisations, is becoming Microsoft Entra ID.

This change reflects Microsoft’s vision to provide a unified and comprehensive identity platform that helps you secure your organization, empower your employees, and enable your digital transformation.

With Microsoft Entra ID, you can benefit from the latest innovations in identity protection, governance, and management, as well as seamless integration with Microsoft 365, Azure, and other cloud services.

ID Protection: Prevent account compromise with machine learning.

ID Protection helps you detect and stop identity attacks in real time. It uses advanced machine learning to identify sign-in anomalies and user behaviour that indicate a risk of compromise. For example, it can trigger a Conditional Access policy that requires strong authentication methods for accessing sensitive resources. This way, you can protect your accounts from phishing, malware, and other threats.

Azure AD is becoming Microsoft Entra ID

ID Dashboard: Monitor your identity security posture with insights and recommendations.

ID Dashboard shows you the impact of your identity protections, the most common attack patterns, and your organisation’s risk exposure. You can view metric cards and attack graphs that show risk origins, security posture over time, and types of current attacks. You can also get recommendations based on best practices and industry standards. With these insights, you can further investigate your security posture in other tools and applications.

ID Governance: Automate access governance with workflows and self-service.

ID Governance helps you ensure that only the right identities have the right access at the right time. It automates the employee identity lifecycle to reduce manual work for IT and increase employee productivity. It also provides machine learning-based insights about identities and app entitlements. You can use workflows and self-service to grant and revoke access to cloud and on-premises apps from any provider and custom-built apps hosted in the public cloud or on-premises. This way, you can comply with organizational and regulatory security requirements.

Apple Software – Critical WebKit Vulnerability: CVE-2023-37450

Apple Vulnerability

Apple has recently released a number of security advisories to address a zero-day vulnerability in Safari, iOS, iPadOS, and macOS Ventura. An attacker could exploit this vulnerability (being tracked as CVE-2023-37450) to achieve remote code execution. It has been reported that this vulnerability is being actively exploited, which means that attackers are currently using this security flaw to gain unauthorised access to systems, potentially leading to data theft, system damage, or other malicious activities. It is therefore imperative that you check and apply these patches as soon as possible.

Apple Rapid Security Response

Apple has rolled out a new protocol, termed Rapid Security Responses, to expedite the release of critical security enhancements in between regular software updates for iOS, iPadOS, and macOS. This approach allows for a more immediate response to certain security issues such as this one. Upon the application of a Rapid Security Response, a letter is appended to the software version number, indicating that the update has been implemented.

Who and What is Affected?

The vulnerability affects all devices running: iOS, iPadOS, and macOS Ventura that have not been updated to the latest security patches. This includes iPhones, iPads, and Mac computers. The exploit could be triggered by a vulnerable browser processing specially crafted (malicious) web content, leading to remote code execution.

How Can Attackers Exploit This Vulnerability?

Attackers can exploit this vulnerability by creating a webpage or web content that includes malicious code designed to exploit the vulnerability in Apple WebKit. They then need to trick the victim into opening this malicious webpage. This could be done through a phishing email, a message, or by compromising a website that the victim trusts and visits often. Once the victim opens the malicious webpage on a vulnerable browser, the malicious code is executed.


What Could Happen If This Vulnerability Is Exploited?

With the ability to execute arbitrary code, an attacker could potentially gain control over the victim’s device. This could allow them to install malware, steal sensitive data, create backdoors for future access, and more. In essence, the attacker could gain the same access to the device as the user, leading to a significant breach of privacy and security.

How to Patch This Vulnerability?

Apple has addressed this issue with improved checks in their Rapid Security Response updates. The patches were initially released for macOS Ventura 13.4.1 (a), iOS 16.5.1 (a), iPadOS 16.5.1 (a), and Safari 16.5.2. However, due to a bug in Safari, some of the updates were pulled. Apple has since released new fixes to address this issue.


To patch this vulnerability, users should update their devices to the latest software versions:

iOS 16.5.1 (a) and iPadOS 16.5.1 (a), released on July 10, 2023.

iOS 16.5.1 (c) and iPadOS 16.5.1 (c), released on July 12, 2023.

macOS Ventura 13.4.1 (a), released on July 10, 2023.

To check for updates, go to the settings of your device, select ‘General’, and then ‘Software Update’. If an update is available, tap ‘Download and Install’.

Looking for a technology partner?
Let’s talk

  • This field is for validation purposes and should be left unchanged.