Trending
1Med SA Case Study
1Med SA relies on 4IT Solutions to make its network suitable for a rapidly growing and expanding company, by implementing a secure and scalable infrastructure with Cisco Meraki solutions and a managed service.
4IT Solutions: success for the second edition of Connect25
Lugano, May 22, 2025 – The second edition of Connect25 took place at the Docks in Lugano.
AI in companies: here’s why they can no longer do without it
Artificial intelligence has long ceased to be just a topic for specialists or technology visionaries. Today, it is a concrete lever for growth, efficiency, and innovation within companies.
Outlook gets a makeover: a new unified version for Windows is on the way
Microsoft announces a major shift for one of its most iconic tools. Starting in June 2025, the new version of Outlook for Windows will be released, set to replace the current “classic” apps with a single, unified experience consistent with the one already familiar on Outlook Web.

Phishing simulation: how often you should test your users (without driving them away)
How much is too much? How much is too little?
And most importantly: how can you tell when a simulation is truly teaching… and when it’s just annoying?
16 billion accounts compromised. Are you at risk?
A new, massive data breach puts billions of accounts worldwide at risk.
From security by design to AI agent safety: what EchoLeak teaches us
In the IT world, security by design has been a topic of discussion for years—a principle as simple as it is powerful.

From security by design to AI agent safety: what EchoLeak teaches us
In the IT world, security by design has been a topic of discussion for years—a principle as simple as it is powerful.
Stay up-to-date!
Subscribe to our newsletter and receive exclusive content on technological innovations, industry trends, and practical insights. Every month, we’ll share useful updates to enhance productivity and business security, along with guides to make the most of digital solutions.


Top content
Behavioral cybersecurity: how science drives training
An email from HR. An attachment called “updated\_contract.pdf.” 6:07 PM, end of the day, brain on autopilot. Click.
Phishing simulation: how often you should test your users (without driving them away)
How much is too much? How much is too little?
And most importantly: how can you tell when a simulation is truly teaching… and when it’s just annoying?
Security awareness: the 5 mistakes that undermine training
Everyone talks about security training. Everyone runs courses, simulations, webinars.
16 billion accounts compromised. Are you at risk?
A new, massive data breach puts billions of accounts worldwide at risk.
From security by design to AI agent safety: what EchoLeak teaches us
In the IT world, security by design has been a topic of discussion for years—a principle as simple as it is powerful.
Microsoft strengthens its commitment to privacy in Europe with the launch of the Sovereign Cloud
A cloud infrastructure built to meet the digital sovereignty needs of the European continent.