Powered by ZigaForm version 4.5.9.2

News

Investing in training & development

Investing in training & development

In many sectors, it seems that Malta has long had a culture of poaching of staff. Recent reports on the media by leaders in the hospitality sector, air their complaints of the scarcity of labour now that many foreign workers have left Malta following the COVID-19...

The Guidelines are Clear – P1

The Guidelines are Clear – P1

(This is Part 1 of a three part analysis to be continued in the forthcoming issues) In June 200 the Malta Financial Services Authority released a publication that provided a clear indication of what sort of upgrading was expected of the financial services sector in...

Clear corporate policies on the use of personal equipment

Clear corporate policies on the use of personal equipment

Over the years we have seen an increased popularity in the bring-your-own-devices (BYOD) to enable staff to access enterprise and data systems. The BYOD policies allows and sometimes even encourages staff to access corporate and data systems using their personal...

The benefits of business solution customisation

The benefits of business solution customisation

The COVID-19 pandemic and its aftermath have demonstrated just how dependant all companies are on the software and platforms that they use in their day-to-day activities. Their supply chain management, their distribution and their internal controls, all depend on the...

Defining the Boutique approach to software development

Defining the Boutique approach to software development

eBusiness Systems was launched in 2000 specifically to leverage evolving web-based solutions for business clients. The boutique aspect of our operations reflects the high degree of customisation and be-spoke development that is involved in comparison to the...

Evolving security challenges

Evolving security challenges

Early this month Tech Republic carried a feature by N.F. Mendoza who reported on the prestigious Gartner Security & Risk Management Summit during which eight critical trends for security and risk-management leaders were identified. One of the fundamental...

Office 365 email Hack Report

Office 365 email Hack Report

A few weeks ago a client who runs a local business suspected their email address could be compromised, and asked us to investigate. The suspicions were correct, a trojan had been downloaded. “A Trojan horse, or Trojan, is a type of malicious code or software that...

Request a Demo

Schedule a free demo with us to see how our products work!