Cyber attacks hit fifth of firms as ‘online NCT’ launched

Almost one in five of Ireland’s top companies have experienced significant cyber attacks in the last two years, new data shows

The findings come as national domain registry .IE launches Ireland’s first Digital Trust Mark.

Described as an NCT for your online identity, websites and emails carrying the distinctive wolfhound symbol will give customers confidence that businesses of all sizes are operating to the highest digital standards.

“If you have an online presence, you can now be assessed on DigitalTrust.ie in just a few clicks,” said Louise McKeown Doogan, Chief Growth Officer at .IE.

“Once an organisation applies, their website, email and domain setup is assessed using a proprietary scoring evaluation that checks against industry-defined best practice.

“These checks confirm that digital fundamentals are correctly configured, responsibly managed and set up to support trust and reliability online.

“Once you receive your Digital Trust Score, you will either be entitled to carry the mark or you will have clear next steps to reach the required standard.

“We live in an age where some ransomware companies now have customer care departments, and the online health of the nation needs to improve as a consequence.”

The research found that 17pc of Ireland’s key organisations have experienced a significant cyber attack since 2024.

Conducted by Amárach on behalf of .IE, it surveyed 354 essential Irish firms in January.

It follows last week’s Garda data that fraud-related crimes more than doubled in the last 12 months, up 137pc – mainly due to bank scams, phishing and smishing.

“Our findings are concerning, particularly when we know phishing scams (60pc) and the exploitation of system weaknesses (21.3pc) are the most common ways attackers gain access,” said Ms McKeown Doogan.

“An online presence that appears to function may not always demonstrate the authenticity and trustworthiness customers expect.

“Until now there has been no visible way for consumers to know that a website meets a recognised standard – and no way for businesses or organisations to signal that they do.

“The mark signals that they demonstrate authenticity, responsible digital practice and a trustworthy online experience.

“We hope it will become a digital equivalent of the NCT and an essential part of interacting online in Ireland within the next year.”

The Digital Trust Mark is not just for .ie domains but is open to .com and other domains used by Irish organisations.

Applicants will receive a grade by the next working day and if an A-rating is achieved, businesses can display the mark on their website or in their email signature for the following 12 months.

Domains that do not reach an A-rating will be given a detailed outline of what and how they can improve.

See digitaltrust.ie for more information.

The World of Work in 2026 – How Technology, Talent and Trust Will Redefine the Workplace

2026 will see businesses doubling down their focus on their people. As not only their biggest asset, but also one of their greatest investments – companies are ensuring that their teams are being offered the wellbeing, training, development and new technology-driven learning opportunities that they need to thrive.

With companies increasingly prioritising their employees, they are also recognising that productivity and engagement are driven by how, when, and with whom they collaborate rather than solely where they work.

Organisations of all sizes are embracing flexible and hybrid working models to attract and retain  the best talent. Recent technological advancements will further accelerate this shift, enabling smarter collaboration and more dynamic ways of working as businesses invest in data-driven workplace design and AI-powered personalised experiences. Increasingly, career pathways will be defined by skills rather than traditional degrees, and personalised human-AI collaboration will become an increasingly valuable skill for business success.

In 2026, the attention will now turn from where work happens to focus on a company’s profitability, productivity and the wellbeing of their teams. Businesses will invest in flexible workspace memberships, allowing employees to work closer to home where they will be most productive, avoiding costly, unnecessary commutes. For most, this will mean working from suburban commuter hubs, small towns or emerging 15-minute cities, with work becoming more local, more personal and more intelligent than ever before.

Below, International Workplace Group, the world’s largest platform for work with brands including Spaces and Regus,reveals the top 10 trends that are set to shape global working in 2026.

 

The Rise of AI: Your Work Co-Pilot

In 2026, hybrid teams will more regularly integrate AI copilots into their daily operations. These systems will significantly reduce the need for simple tasks such as admin, knowledge retrieval, and scheduling. Employees will find themselves with more time for creative work, able to tackle complex problem-solving tasks, and develop meaningful relationships. Moreover, this transformation will enable individuals to better manage their work-life balance, ultimately leading to increased productivity and job satisfaction.

This shift is being accelerated by a new wave of intergenerational collaboration. Research from IWG reveals that 62% of Gen Z employees are already coaching older colleagues on how to use AI to boost productivity and efficiency. In turn, 77% of Directors and Senior Directors have said this has boosted productivity levels, while 80% said it unlocked new business opportunities (1). Capitalising on this trend, employers will increasingly use AI and workplace analytics to create “personalised hybrid plans” for each employee, including optimised schedules, ideal collaboration days, and preferred office or coworking locations.

 

Return-to-Several-Offices

Companies of all sizes are moving away from loosely defined hybrid policies, to more structured, multi-location models with teams increasingly empowered to work from more convenient places closer to home. Rather than insisting on a “Return to the Office, it’s a case of a “Return to Several Offices”.

Microsoft recently announced that by 2026 many of its U.S. employees will need to be in their closest Microsoft office at least three days per week while many corporates are empowering their teams to work from a network of coworking or flexible workspace locations.

 

Micro-Certifications as Currency

Hybrid workers will stack “micro-certifications” (bite-sized, skill-focused credentials) instead of relying on traditional degrees or annual performance reviews. Employers will support this by funding on-demand learning platforms, creating more agile talent pools. This trend will change internal mobility, with skills becoming more portable and accessible.

 

Reversing The Quiet Crack

Unlike “quiet quitting”, where employees deliberately do the bare minimum, “quiet cracking” describes something subtler: employees who are still performing, but feel mentally and emotionally checked out resulting in burnout, stalled progression, and a lack of purpose.

With 57% of workers saying they’re more likely to disengage when they feel undervalued or micromanaged, companies will put more emphasis on employee wellbeing and flexible work options, to remain competitive and keep people engaged (2). As wellbeing becomes a bigger focus, companies are also expected to move past traditional perks and start using new “well-tech” tools – like stress-tracking wearables, AI mental health reminders, and wellness challenges that gamify healthy habits and make them more engaging.

 

Fractional C-Suite and Executive Talent

As they navigate economic uncertainty, more companies are turning to fractional executives, opting for part-time or contract-based C-suite talent who bring in laser-focused expertise without the cost of full-time appointments.

With nine in 10 (87%) CEOs and CFOs concerned about the impact of ongoing macroeconomic instability and two thirds (67%) already reducing operating costs, businesses are looking for smarter leadership models (3). This flexibility allows companies to secure world-class strategic insight when needed, while enabling experienced professionals to work across multiple organisations.

 

Building 15-Minute Cities from the Ground Up

The 15-minute city concept, where everything from work to leisure is accessible within a short walk or cycle is entering a new phase in 2026. Until recently, this has mainly been a story of adaptation: retrofitting existing neighbourhoods to bring work, living, and recreation closer together. In the year ahead, 15-minute cities will be taking an entirely new form, they will be built  from the ground up, designed to encourage connectivity, sustainability and community.

One standout example is The Ellinikon in Athens, one of Europe’s largest urban regeneration projects, built on the site of the former airport with over $8 billion in funding. Similarly, in the US, The Point in Utah is transforming the site of the former state prison into a model community designed around 15-minute city principles.

Hybrid work is making these urban ecosystems viable, as professionals choose to live and work locally while businesses decentralise their footprints to be closer to where people actually are – saving up to $30,332 a year thanks to the reduced need for lengthy commutes (4).

 

The Local Loyalty Effect

Hybrid work will foster a renewed connection to local communities. Companies may encourage employees to integrate volunteerism, local partnerships, or skill-sharing into their workweek, strengthening employer brands while supporting civic engagement, in the communities where employees live and work.

 

The Hospitality-Infused Office

The workplace will increasingly look and feel like boutique hotels. In 2026, expect concierge-style services, curated food and beverage options, and sensory design that mirrors boutique hotels. Take IWG’s latest partnership with YOO – blending design-led hospitality expertise with IWG’s flexible workspace network, these spaces will fuse work, socialising, and wellbeing together, transforming the office into a lifestyle experience.

 

Rising Day Office Demand

Day offices are set to become a key part of the landscape, providing a professional and productive office space whenever and wherever it is needed. Whether employees are seeking quiet, focus rooms or collaboration spaces for ad-hoc team days, these “on-demand” options eliminate the need for long-term commitments while offering all the amenities of a traditional office.

With wellbeing firmly on the agenda, features such as natural light and on-site wellness amenities will differentiate day offices, helping employees work efficiently, flexibly, and with purpose.

 

The New Workforce Demographic: Why Business Leaders Need to Know What Gen Z Wants at Work

Gen Z is entering the workforce with clear expectations that go beyond pay: they prioritise wellness, mental health, flexible hours and meaningful work that aligns with their core values.

With an aging global population, rising retirements and widening talent gaps, it is critical that business leaders understand and react to these changing priorities in order to stay competitive.

Companies that embrace flexibility, autonomy, and meaningful work will attract and retain the next generation of leaders – those that don’t, risk falling behind.

Mark Dixon, Founder and CEO of IWG, comments:

“Continuous improvements in technology including AI and new approaches to training and development will be significant drivers of productivity, engagement, and loyalty, enabling companies to create a  future-ready workforce and working environment that propels business growth.

We will continue to see a fundamental shift in the geography of work with the centre of gravity moving towards local communities. The remarkable advances in cloud technology and video conferencing software – both vital to enabling effective hybrid working – mean workers no longer need to travel long distances on a daily basis. Innovations in technology will continue to advance in years to come and will radically underline and fuel the flexibility of location.

The rising demand for more localised working has led to the majority of our new IWG centres opening in the heart of local communities, suburbs and rural areas, enabling many people around the world to say farewell to long daily commutes.”

 

(1) Research by IWG in collaboration with Mortar, sampling 1007 UK office workers in June 2025.

(2) Research by IWG in collaboration with Censuswide, sampling 1,005  Office full time/hybrid workers in June 2024

(3) Research by IWG in collaboration with Censuswide, sampling CEOs and CFOs (50/50 split) working at companies that operate a flexible working model in the USA and UK in May 2025.

(4) IWG Hybrid Working Report in collaboration with Arup, June 2025

Building Cyber Resilience in the AI era: Five ways Irish organisations can stay ahead

Artificial intelligence (AI) is rapidly reshaping the cybersecurity landscape across Ireland. While it’s unlocking new efficiencies and accelerating innovation, it’s also giving cybercriminals new evasive tools to launch faster and more sophisticated attacks. Across Ireland, organisations are navigating a new era of cyber risk defined by speed, sophistication, and AI.

As Dell Technologies continues to work closely with Irish businesses to modernise their digital infrastructure, it’s clear that cybersecurity must evolve in tandem, as a strategic enabler of trust and resilience. Threat actors are using AI to enhance ransomware, zero-day vulnerabilities, Distributed Denial of Service (DDoS) all making advanced spear-phishing much harder to identify, outpacing conventional security measuresAccording to the latest Dell Technologies Innovation Catalyst Study, 84% of Irish organisations view security as a key part of their business strategy, yet many continue to struggle with balancing innovation and security.

Almost all respondents (96%) admitted that integrating security into wider business strategies is proving difficult. These figures highlight that organisations must rethink their cybersecurity strategies to adopt proactive, intelligent, and resilient approaches that keep pace with the evolving threat environment.

Here are five ways to stay resilient against cyber threats:

1.Adopt zero trust for AI Security 

As threat actors use AI to scout, steal credentials and adapt attack techniques, traditional perimeter-based defenses fall short.

That’s why more Irish organisations are adopting a Zero Trust model built on the principle of “never trust, always verify” ensuring that every user, device, and application is continuously authenticated, regardless of location.

The benefits are clear, latest Innovation Catalyst Study revealed a 100% increase in confidence levels among Irish organisations that have adopted zero trust principles, underscoring its growing value as a security framework. By implementing zero trust principles organisations can help reduce risk by continuously verifying every access request and implementing strict authentication processes. Using role-based access controls (RBAC) and network segmentation, organisations can minimize the risk of an attack and reduce the impact radius if an attack occurs.

Zero trust is more than a security philosophy. It’s a unified and adaptive strategy for identity and access management. Through a zero trust approach, organisations not only reduce their attack surface, but also strengthen their ability to detect, respond to and contain threats.

2.Reduce the attack surface

In an environment where AI-powered threat actors are constantly probing for weaknesses, reducing the attack surface is a critical line of defense. Every exposed endpoint, unsecured API, or overlooked supply chain vulnerability represents an opportunity for adversaries to infiltrate systems, deploy malware and exfiltrate sensitive data.

To mitigate these risks, Irish organisations should begin with assessing and understanding their attack surface and related vulnerabilities. From there, they should have a layered defense strategy focused on securing entry points and minimising exposure. This includes strengthening authentication, encrypting data, regularly testing for vulnerabilities and actively monitoring endpoints. Keeping systems patched and devices hardened further limits risks.

By reducing the attack surface, organisations make themselves a harder target, thereby decreasing the likelihood of an attack.

3.Continuously detect and respond to threats

AI-powered attacks are capable of mimicking legitimate behavior and evading traditional security tools, and organisations need to combine advanced threat detection with rapid response capabilities.

Leveraging AI and machine learning, organisations can monitor operational data, detect anomalies, and trigger automated responses in real time.

This AI-powered threat intelligence system builds upon itself, making it smarter and better able to identify and address attacks.

For many Irish organisations who need assistance scaling threat detection and response. Partnering with a trusted third-party provider offers round-the-clock monitoring, faster reaction times, and support in managing complex security operations. Dell Technologies continues to invest in AI-driven security solutions that help Irish organisations stay ahead of emerging threats while simplifying operational complexity.

4.Plan an incident response and recovery plan

While prevention is often the first step to a cybersecurity strategy. A strong cybersecurity strategy includes not only prevention, but also a well-defined plan for response and recovery.

Organisations here in Ireland need to create and routinely practice a robust Incident Response and Recovery (IRR) plan that outlines how to detect, contain, communicate and recover from cyber incidents. The plan should outline departmental roles and responsibilities, internal and external contacts and partners, communication protocols and include regular testing. Preapproved messaging templates and routine plan updates are also essential to maintaining operational continuity during a crisis.

Backing up critical data and applications offline or separated from production workloads helps guard it against ransomware attacks and ensures business continuity.

By preparing for disruption, Irish organisations can restore critical functions with resilience, speed, and confidence.

5.Empower employees as a first line of defense

Technology alone isn’t enough; employees remain the most critical line of defense.  Organisations here in Ireland needs to create a culture of vigilance through employee awareness programmes that integrates continuous education, open communication, real-world simulations, and a culture of shared accountability. For example, incorporating attack simulations that reflect AI-specific threats like advanced phishing and deepfakes helps equip employees to recognise and respond to evolving threat actor tactics.

Collaboration across the technology ecosystem also plays a vital role in strengthening cyber resilience. Dell Technologies, together with partners like NVIDIA, is helping organisations better understand how AI-driven attacks evolve.

NVIDIA’s new AI Kill Chain Framework reimagines the traditional Cyber Kill Chain for the AI era, outlining how adversaries target AI systems through stages such as Recon, Poison, Hijack, Persist, and Impact — often cycling through these stages to adapt and escalate their tactics. This framework offers valuable insights into how attackers’ probe, manipulate, and maintain access within AI ecosystems, helping defenders anticipate and disrupt evolving threats before they lead to broader compromise.

As threat actors evolve using AI to launch increasingly sophisticated attacks, organisations must respond with equal force and foresight. Traditional defenses alone are insufficient. A modern cybersecurity strategy demands a proactive, layered approach that integrates advanced technologies, incident response planning, and a vigilant workforce.

As we mark Cybersecurity Awareness Month, it’s an important reminder that AI is transforming both the opportunities and the risks facing Irish businesses, making it more critical than ever to invest in continuous vigilance, awareness, and adaptation. By embedding resilience at every level of their cybersecurity strategy, Irish organisations can better safeguard their operations and lead with confidence in an increasingly AI-driven world.

Digital Wills vs. Traditional Wills: Which Is More Secure?

Understanding why you need a will is only part of the picture — for many people, the bigger question is how to make one. And in today’s digital world, that question brings new options to the table. 

Traditional wills, written on paper and signed in ink, have long been the norm. But now, digital wills are gaining popularity, offering convenience, speed, and cloud-based peace of mind. So, which option is more secure? And how do you know which is right for your situation?

What Is a Traditional Will?

A traditional will is a legal document, usually drafted with the help of a solicitor, then printed, signed, and witnessed in person. It outlines how your assets should be distributed after your death and who should manage your estate.

Traditional wills must meet certain legal criteria:

  • Written clearly and voluntarily
  • Signed by the testator
  • Witnessed by two independent adults (not beneficiaries)

If any of these steps aren’t followed correctly, the will could be invalid.

What Is a Digital Will?

A digital will usually refers to a will created using an online service or software. It may be stored in the cloud, printed and signed later, or — in some jurisdictions — signed electronically.

Digital wills are designed to be more accessible, particularly for those who find legal jargon intimidating or who want to avoid in-person meetings. Some platforms offer guided templates or AI-based drafting tools.

However, in England and Wales, a digital will must still be printed, signed, and witnessed in the traditional way to be legally valid. As of now, completely electronic wills (signed and stored digitally without printing) are not legally recognised.

Are Digital Wills Safe?

It depends. A digital will created on a reputable platform can be a helpful first step, but it comes with risks:

  • You might miss important legal nuances
  • It may not reflect complex family arrangements
  • If improperly witnessed, it may be invalid
  • There’s a risk of forgery or dispute without proper safeguards

Security also involves access. Traditional wills can be lost or damaged. Digital versions can be accidentally deleted or stored on a forgotten hard drive. Ideally, your will should be stored securely and shared with your executors — whether digitally or physically.

For more information on making a will, visit this resource provided by GOV.UK.

Why Traditional Wills Still Dominate

Most solicitors still recommend a traditional will for several reasons:

  • Legal robustness
  • Proper witnessing procedures
  • Trusted storage with the solicitor or WillSafe

You also get professional advice to ensure your wishes are realistic, tax-efficient, and hard to contest. This is especially crucial for blended families, business owners, or anyone with international assets.

Can You Combine the Two?

Absolutely. Many law firms now use digital tools to draft and update wills, but still follow traditional processes for signing and storage. You can:

  • Start with an online questionnaire
  • Hold virtual meetings with your solicitor
  • Receive a printed will by post

This hybrid approach blends convenience with legal reliability.

Consider the Risks of Getting It Wrong

An invalid will can leave your loved ones facing delays, legal disputes, or unfair outcomes. If you die without a valid will, the rules of intestacy will decide who gets what — and it might not reflect your wishes.

A will isn’t just a formality. It’s peace of mind. And cutting corners with a free online template can cost your family far more later.

So, Which Is More Secure?

In legal terms, traditional wills — properly signed and stored — remain the most secure option in England and Wales. Digital platforms can support the process, but they can’t replace the legal steps needed to make your will binding.

That said, the law may evolve. Other countries, including parts of the US, are starting to recognise electronic wills. The UK may follow, but for now, paper still rules.

What Should You Do Next?

  • Decide who you want to benefit from your estate
  • Think about who should manage your affairs (executor)
  • Make a list of your assets and any specific wishes

Then speak to a solicitor who can guide you through it. It doesn’t have to be complicated. But it does need to be correct.

A good solicitor will:

  • Make sure your will is valid
  • Keep it safe and accessible
  • Help reduce inheritance tax liabilities
  • Prevent family disputes before they start

 

Final Thoughts: It’s Not Just About the Format

Whether you go digital, traditional, or a bit of both, what matters most is doing it properly. The goal is clarity, security, and protecting your loved ones when they need it most.

Don’t let uncertainty stop you. With the right support, you can make a will that gives you confidence — and gives your family one less thing to worry about.

Legal Disclaimer: This article is for general information only and does not constitute legal advice. For tailored advice on writing or updating your will, please consult a qualified solicitor.

Key Concepts and Benefits of Zero Trust Network Access

The way organizations secure their networks has undergone significant changes in recent years. The traditional idea of a perimeter, where everything inside a corporate network could be trusted, is no longer valid. Cloud-first strategies, hybrid work models, and the widespread use of personal devices have blurred that boundary. As a result, businesses can no longer rely on firewalls and VPNs alone to keep their assets safe.

At the same time, the cyber threat landscape has become more sophisticated. Remote work has introduced new risks, and insider threats have grown more prominent. Cybercriminals now utilize advanced tools to exploit even the smallest vulnerabilities. This is why enterprises are moving toward a Zero Trust approach. Zero Trust Network Access (ZTNA) is at the forefront of this shift, offering a model where trust is never assumed but always verified. It is rapidly becoming the new standard for secure connectivity in modern IT ecosystems.

What Is Zero Trust Network Access (ZTNA)?

ZTNA is a security model designed to ensure that users and devices are verified before being granted access to applications or data. Unlike older approaches that trusted users inside a network, ZTNA operates on the principle of “never trust, always verify.” This means that every access attempt, whether from an employee in headquarters or a contractor working remotely, must be authenticated and authorized before any resources are made available.

The fundamental concept of ZTNA differs significantly from traditional VPNs and perimeter-based models. VPNs typically grant users broad access to the corporate network once they are authenticated, creating opportunities for attackers to move laterally if their credentials are compromised. In contrast, ZTNA provides application-level access, limiting exposure and making it much harder for threats to spread. This distinction is why ZTNA is increasingly viewed as the safer, smarter option for organizations looking to protect sensitive systems.

For enterprises adopting hybrid work strategies, ZTNA is a critical model for remote access security, as it enables secure, identity-based connections that adapt to context, devices, and policies. By focusing on granular access control and continuous verification, businesses can minimize risks while enabling flexible, productive remote work environments.

Key Concepts of ZTNA

Identity-Centric Security

Identity sits at the core of ZTNA. Before a user can connect, the system verifies their identity. Multi-factor authentication (MFA), combined with integration into identity providers, ensures that stolen passwords alone are not enough for attackers to gain entry. This focus on identity strengthens defenses against the most common entry points for cyberattacks.

Least-Privilege Access

ZTNA enforces the principle of least privilege, granting users only the specific permissions needed to perform their tasks. This reduces the potential attack surface by limiting exposure to it. If a single account is compromised, the damage is contained because the attacker cannot access more than what was explicitly granted.

Continuous Verification

Unlike older systems, where access is checked once and then trusted, ZTNA continuously monitors user activity to ensure ongoing trust. Authentication decisions adapt to risk levels, such as changes in device posture or unusual behavior. For example, if a user logs in from a new location or device, additional verification can be required before granting access.

Application-Level Segmentation

ZTNA enables organizations to segment applications, restricting access to specific resources rather than the entire network. This segmentation not only limits the blast radius of potential breaches but also helps organizations meet compliance standards by ensuring sensitive systems are isolated and better protected.

Core Benefits of ZTNA for Organizations

Reduced Attack Surface

By exposing applications only to authenticated and authorized users, ZTNA minimizes the number of entry points that attackers can target. Resources remain invisible to the public internet, lowering the likelihood of discovery and exploitation.

Stronger Remote and Hybrid Workforce Security

ZTNA is designed for today’s work environment, where employees, contractors, and third parties often access systems remotely. It ensures consistent security regardless of where users connect from, making it far more effective than VPNs in protecting distributed teams.

Improved User Experience

Traditional VPNs often slow down connections and frustrate users. ZTNA, by contrast, delivers faster and more seamless access to applications, without unnecessary overhead. This improves productivity while maintaining high levels of security.

Simplified IT and Policy Management

Centralized policy management enables IT teams to easily oversee access across diverse environments easily. Instead of dealing with complex network-level configurations, administrators can manage access policies at the application level, simplifying operations significantly.

Regulatory and Compliance Alignment

ZTNA helps organizations align with data protection and privacy regulations such as GDPR, HIPAA, and PCI DSS. By enforcing least-privilege access and logging every interaction, ZTNA provides the transparency and control required for compliance.

ZTNA in Action – Industry Applications

ZTNA is versatile and applies to multiple industries. In finance, it helps secure sensitive transactions and customer data while minimizing the risk of fraud. In healthcare, it plays a vital role in safeguarding telehealth platforms and connected medical devices that handle patient data. For educational institutions, ZTNA ensures that both students and faculty can access learning platforms securely from anywhere, providing a secure and seamless learning experience. In manufacturing, ZTNA protects IoT devices and industrial control systems that are increasingly being targeted by cybercriminals.

Industry insights from organizations such as the National Institute of Standards and Technology (NIST) underscore the importance of Zero Trust principles for critical sectors. Their published guidance emphasizes the use of adaptive and context-aware controls to protect both IT and OT systems.

Challenges in Adopting ZTNA

Despite its benefits, ZTNA adoption comes with challenges. Integrating it with legacy systems can be complex, especially in industries that rely heavily rely on outdated infrastructure. User resistance is another hurdle; employees may initially find the verification process inconvenient compared to familiar VPN setups. Vendor lock-in also poses a risk, as businesses may become too dependent on a single provider, limiting their flexibility. These challenges can be managed with careful planning, phased rollouts, and clear communication about the long-term benefits.

Best Practices for Successful ZTNA Implementation

A successful ZTNA strategy starts with identifying the most critical applications and systems, then extending Zero Trust protections to those first. Integrating ZTNA with existing identity and access management tools ensures seamless user experiences while strengthening security. Deploying in phases allows IT teams to test and refine policies without disrupting operations. Continuous monitoring and policy refinement help organizations adapt to evolving threats.

Additional resources from the Cybersecurity & Infrastructure Security Agency (CISA) highlight the importance of ongoing monitoring and security hygiene in Zero Trust deployments, reinforcing the need for constant vigilance.

The Future of ZTNA

ZTNA continues to evolve in tandem with the broader Zero Trust ecosystem. Artificial intelligence and machine learning will increasingly play a role in adaptive access control, enabling real-time adjustments to policies based on context and behavior. Deeper integration with Secure Access Service Edge (SASE) frameworks will unify networking and security into a seamless cloud-delivered service. Moreover, small and medium-sized businesses are expected to adopt ZTNA at higher rates as cost-effective, scalable cloud-based solutions become widely available.

Reports from Gartner predict that ZTNA adoption will become a default requirement for enterprises moving to cloud-native architectures, with more organizations shifting away from VPNs entirely.

Conclusion

Zero Trust Network Access is no longer just a trend; it has become an essential part of modern cybersecurity strategies. By reducing the attack surface, providing stronger remote workforce security, simplifying policy management, and aligning with compliance needs, ZTNA empowers businesses to thrive in the digital era.

As enterprises face increasing threats and shifting work models, adopting ZTNA proactively is not just about protecting systems-it is about enabling innovation and resilience. Organizations that embrace ZTNA will be better positioned to safeguard their future in a constantly evolving cyber landscape.

FAQs

  1. How does ZTNA improve security compared to VPNs?

ZTNA offers application-specific access rather than network-wide access, reducing the potential for lateral movement and minimizing risks compared to VPNs.

  1. Is ZTNA suitable for small businesses?

Yes, cloud-based ZTNA solutions make it affordable and scalable for small and mid-sized businesses, not just large enterprises.

  1. Can ZTNA help with compliance requirements?

Absolutely. By enforcing least-privilege access, logging all activity, and segmenting applications, ZTNA supports compliance with GDPR, HIPAA, PCI DSS, and other regulatory frameworks.

68% of IT leaders believe AI reduces staff stress levels

Storm Technology, a Littlefish company, today announces new findings from its survey* which found that 68% of IT leaders believe the use of AI by staff reduces stress levels.

The research – involving 200 IT decision-makers and leaders across Ireland and the UK (100 respondents per market) – found that 60% think AI will help reduce burnout in their organisation, with almost three quarters (72%) of respondents of the opinion that AI would help employees to achieve a better work life balance.

Meanwhile, some 66% think AI would allow employees to reduce manual repetitive tasks and focus on more meaningful work, with 57% revealing employees are optimistic about the potential impact of AI on their day-to-day routine.

Showing the influence of AI and the current level of uptake across businesses in Ireland, some 69% of IT leaders in this market would prefer to work for a company that is more advanced in terms of AI adoption.

The research found that 70% of respondents in Ireland are in organisations which already permit the use of AI and 68% are using the technology to assist with their own work. In fact, over half (51%) use AI on a daily basis for work purposes and only 2% never use it at all.

However, the research found that barriers remain when it comes to AI adoption, the most cited one being a lack of understanding within the wider organisation about potential applications or benefits – selected by 31% of all respondents.

Backing this up, almost three quarters (73%) of IT leaders agree that user adoption is a concern when it comes to AI implementation. Furthermore, almost a third (30%) do not believe senior management in their organisation understand the potential of AI.

The other top barriers to AI adoption were the management of data, privacy and security (28%), lack of trust in AI (27%), employee resistance (27%), and a lack of AI skills in the organisation (27%).

On the topic of AI skills, 40% of IT leaders do not believe their team currently has the technical skills or knowledge to implement or adopt AI. Perhaps unsurprisingly then, 70% think employees expect to receive AI training and enablement.

John Tallon, M365 Productivity & Adoption, Azure Application Innovation and Azure Data & AI Practice Director, Storm Technology, said: “AI is creating a predicament for people and businesses. On the one hand, it is seen as a means of reducing workload stresses, supporting creativity, and productivity. However, on the other hand, there is reluctance to adopt AI, stemming from a gap in understanding and the necessary skills required. Businesses will need to bridge this knowledge gap to capitalise on the benefits of AI. Empowering people will drive the biggest impact across the whole business.”

Digital News Report Ireland 2025

A majority of Irish people are either extremely or very interested in news, according to the annual Digital News Report Ireland 2025, published today by Coimisiún na Meán. Research for the Digital News Report is undertaken by the Reuters Institute for the Study of Journalism at the University of Oxford and analysis of the Irish data is provided by the DCU Institute for Future Media, Democracy and Society (FuJo).

The Irish Report, which is in its eleventh year, shows that most people in Ireland (56%) across all age groups are interested in news. This represents the highest level of interest in news since 2022, up 3 points from last year, but down from a peak of 70% in 2021, during the Covid pandemic. This enthusiasm for news puts Irish audiences ahead of their UK (39%) and US (51%) counterparts and ahead of the European average (45%).

When asked about trusted sources of news, RTÉ News (72%), local radio news (72%) and local newspapers (71%) emerge as the most trusted brands, underlining the continued importance of both national and local news sources for Irish audiences.

Rónán Ó Domhnaill, Media Development Commissioner at Coimisiún na Meán said: ‘’Coimisiún na Meán is delighted to offer our continued support to the Digital News Report Ireland, which reflects our commitment to a media landscape that consumers can trust, by supporting access to high-quality sources of news and information.

Whether watching, listening, streaming, or reading, the Digital News Report shows that most Irish people can’t get enough of news. It is encouraging to see that interest in news remains high in Ireland when compared internationally, even as the formats used to consume news continue to change. We are heartened to see the continuing trend of the Irish public’s unique and longstanding relationship with radio, which remains a cornerstone of Ireland’s media landscape. It is also important to see the trust Irish people place in local news sources, with local radio and local newspapers among the most trusted brands for Irish audiences.

While the Report gives us cause for optimism about the Irish news sector, considering the public’s strong appetite for news, we recognise that An Coimisiún’s ambition of developing and shaping a media landscape that reflects who we are as a society requires ongoing and sustainable levels of funding for media outlets to support high-quality journalism, and news that people can trust.’’

Key findings from this year’s Report include:

Interest in news – Interest in news in Ireland remains robust compared to other countries. 22% of Irish people say they are ‘extremely interested’ in news, with 34% saying they are ‘very interested’ and 33% saying they are ‘somewhat interested’. Just 3% say they are ‘not at all interested’ in news.

Trust in news – Overall, Irish audiences trust news more when compared to other countries. When asked if they trust the news most of the time, 50% of respondents in Ireland ‘agreed’ or ‘strongly agreed’, compared to 35% in the UK, 30% in the US and 39% for merged data from Europe.

Trust in brands – Traditional news outlets continue to perform well when Irish audiences are asked about their trust in brands. RTÉ News (72%), local or regional radio (72%), and local or regional newspapers (71%) are the most trusted brands. 70% of Irish respondents described the Irish Times as trustworthy, with the same percentage for BBC News, 68% for the Irish Independent and 66% for each of Newstalk, Today FM and Sky News.

Source of News – When asked which platforms you have used in the last week as a source of news, 58% of Irish respondents said television, with the same percentage (58%) citing online media (excluding social media and blogs). 47% say they have used social media as a source of news in the last week, with 36% saying radio, 22% saying printed newspapers, 12% saying podcasts and 5% citing AI chatbots.

Paying for News – The Report shows that 20% of people in Ireland are now paying for news, up from 7% in 2015 and a 3-point increase from last year. When asked if they have had a paid subscription/membership to a digital news service in the last year, the two frontrunners among Irish audiences are the Irish Independent (36%) and the Irish Times (33%).

Radio and Podcasts – In 2025, 11% of Irish respondents say they use radio as their primary source of news, which is significantly higher compared to the UK (8%), US (3%) or the European average (7%). When asked about the use of radio as a source of any news consumed, this figure increases to 36%. Irish audiences are also on-board with podcasts, with 12% listening to podcasts as a source of news in the last week, higher than in the UK (7%) and the European average (9%) but lower than the US (15%).

Artificial Intelligence – Audiences’ attitudes to the use of AI for news are changing. Last year, those ‘very’ and ‘somewhat’ comfortable with news mainly produced by AI with some human oversight were 15%. This has increased to 19% this year, with under-35s almost twice as comfortable as over-35s when considering the same measure.

 Disinformation and Misinformation – When asked for their thoughts about online news, 68% of Irish respondents say they are concerned about what is real and what is fake on online. All age cohorts show concern about fake information online, with the highest rate (72%) among those aged 65+ and the lowest rate (62%) among those aged 18-24.

Commenting on the Digital News Report Ireland 2025, Dr. Eileen Culloty, Deputy Director of the DCU Institute for Future Media, Democracy and Society (FuJo) said: ‘’Local media enjoy strong public trust, an indication of their deep roots in Irish life. But trust alone doesn’t pay salaries or sustain newsrooms. The big challenge is to convert trust into viable careers in local journalism so that local media can continue informing communities.”

Earlier this year, Coimisiún na Meán awarded €5.7 million through new Journalism Schemes, funded by the Department of Arts, Culture, Communications, Media and Sport and which covered Local Democracy and Courts Reporting. These Schemes have to date facilitated over 100 new or enhanced journalism roles in Ireland. By the end of this year, An Coimisiún will have run the second round of those Schemes, as well as two new Journalism Schemes, covering Digital Transformation and News Reporting.

The Digital News Report Ireland 2025 can be found on the Coimisiún na Meán website.

Building a Zero Trust Architecture: Key Considerations

Cybersecurity has become a major concern for businesses of all sizes. With the rise of sophisticated attacks, you’ve probably heard the term “Zero Trust” being thrown around. It’s not just a trend in the industry. It’s a shift in how we think about protecting our systems and data. The traditional approach, which assumed everything inside the network was safe, is no longer effective. In today’s world, threats can come from anywhere. So, instead of blindly trusting what’s inside, Zero Trust operates on the principle of “never trust, always verify.”

This article explores key considerations when building a Zero Trust architecture and how it can help protect your business in an ever-evolving threat landscape.

1. Understanding the Need for Zero Trust

In today’s threat environment, cyberattacks have become more complex. Organizations can no longer rely on the old method of building a strong perimeter and assuming everything inside is safe. The rise of insider threats and more advanced attack methods demand a more thorough approach.

One reason Zero Trust has gained so much attention is that attackers are increasingly targeting key identity systems. Common attacks on Active Directory (AD), for example, are on the rise. AD holds essential identity information, making it a high-value target for cybercriminals. Attackers often exploit weaknesses in privileged access management to breach systems. Once inside, they move laterally across the network, often gaining full control of the environment. This makes securing Active Directory critical when considering Zero Trust.

By implementing a Zero Trust model, businesses can better protect their identity systems, such as AD, by ensuring that every action, whether it’s a login or access to a resource, is verified continuously.

2. Identity and Access Management (IAM) at the Core

At the heart of any Zero Trust architecture is Identity and Access Management (IAM). IAM ensures that only the right people, devices, and applications can access your systems, and it does so by verifying them continuously, not just once. In the past, a user would log in and, once inside, be trusted until they logged out. Zero Trust changes that by constantly checking if the user should still be granted access.

One critical element of IAM is multi-factor authentication (MFA). MFA requires users to verify their identity through more than one method, such as a password and a mobile app confirmation. Relying on passwords alone is risky, as passwords can be stolen, guessed, or reused across multiple accounts.

Zero Trust takes identity management a step further by ensuring that users only have access to what they need, nothing more. This limits the scope of potential damage in the event of a breach.

3. Microsegmentation: Controlling Access to Network Resources

Microsegmentation is another key principle in a Zero Trust environment. In simple terms, it means breaking your network into smaller, more secure segments. This way, even if an attacker gains access to one part of your network, they can’t easily move to another part. Each segment acts like a locked room that the attacker would need additional verification to enter.

This approach helps limit lateral movement, a common tactic used by cybercriminals once they’ve breached a network. By limiting what users and devices can access, you make it much harder for attackers to navigate and compromise other parts of your environment.

Microsegmentation also works hand-in-hand with the idea of least-privilege access. Users and systems should only be granted access to the resources they absolutely need to do their job and nothing more. By applying this concept, you reduce the chances of attackers gaining access to critical resources even if they breach a less important part of the network.

4. Monitoring and Logging Everything

In a Zero Trust architecture, monitoring and logging play a critical role. Continuous monitoring allows organizations to track every request, transaction, and action happening on the network. This ensures that nothing goes unnoticed, and any suspicious behavior can be caught and responded to quickly.

Logging is equally important. By keeping detailed logs of all network activity, security teams can trace the steps of an attacker and better understand how they gained access and what they did once inside. This information is invaluable for both preventing future attacks and improving your current security measures.

Advanced monitoring tools can also help by sending real-time alerts when something unusual happens. For example, if a user suddenly tries to access a part of the network they’ve never accessed before, a security team can be notified immediately and take action to verify whether it’s legitimate.

5. Enforcing Least Privilege Access

“Least privilege” is a core principle of Zero Trust. This means that users and systems should only have the access they need to perform their tasks and nothing more. If a user needs temporary access to a resource, they should be given it for the time required and then have that access revoked.

By limiting the scope of access, even if an attacker gains control of an account, they can’t use it to access critical systems or sensitive data. Regularly reviewing access permissions is important to ensure that users aren’t sitting on permissions they no longer need.

Admins are especially important to monitor. Admin accounts often have access to sensitive data and system controls, making them prime targets for attackers. Ensuring that admin privileges are tightly controlled helps minimize the risks of a breach.

6. Protecting the Network Edge

In today’s remote work world, the network edge has expanded beyond the physical office. Employees are accessing company resources from home, cafes, and various other locations. With this in mind, Zero Trust needs to protect not just the internal network but also the devices and users accessing the network from the outside.

This means verifying users and devices every time they connect, no matter where they are. Whether it’s a cloud service, a remote worker, or an external partner, Zero Trust ensures that access is always verified, regardless of the location or device being used.

7. The Role of Automation in Zero Trust

Automation can play a significant role in enforcing a Zero Trust architecture by handling the heavy lifting of continuous verification. In a Zero Trust environment, every action, login attempt, and data access request requires validation. With hundreds or even thousands of users making requests every minute, managing these processes manually is not just inefficient—it’s practically impossible. This is where automation steps in to streamline the workload.

Automation tools can be programmed to enforce security policies consistently, ensuring that no exceptions or mistakes slip through the cracks. For instance, they can instantly revoke access for users exhibiting unusual behavior, preventing potential threats from escalating. Additionally, automated systems can monitor for known attack patterns, like credential stuffing or lateral movement, and block such actions before they cause damage.

Building a Zero Trust architecture may seem like a big task, but it’s one of the best ways to protect your organization in today’s threat landscape. By focusing on identity verification, limiting access, and constantly monitoring activity, you can secure your network without relying on outdated assumptions of trust.

As cyberattacks continue to evolve, so should your approach to security. Zero Trust offers a modern, proactive way to defend against attackers, making it an essential strategy for businesses looking to protect their data and systems effectively.

Trust in Tech: Dargan Forum 2024 Offers Solutions as Ireland’s Confidence Wavers

The 2024 Edelman Trust Barometer Ireland Report reveals a significant lack of trust in institutions and identifies a lack of understanding of new technologies as a key barrier to their implementation. This educational deficit can foster fear and hinder the integration of innovation into Irish society.

Next week’s Dargan Forum 2024 directly addresses these concerns by promoting understanding and trust around innovation while showcasing the positive impact of technology. With the Edelman report showing trust in NGOs, government, business, and media at just 47% in Ireland, the forum’s dynamic program of open and informative discussions is both timely and essential in facilitating conversations that shape a future where innovation benefits all.

Dublin, Ireland – One week from now, thought leaders, entrepreneurs, and change-makers will converge at the Dargan Forum 2024 to explore the intersection of technology, empowerment and community building. Set in venues across picturesque Dún Laoghaire, an historic hotbed for innovation, the Dargan Forum 2024 intends to ignite conversations and inspire innovation, laying a path to digital, green future for Ireland’s communities.

Opening this year’s conference with expert insight into how technology can serve people and places is Bobby Healy, CEO of MANNA Drone Delivery, who will share his company’s inspiring vision for a net zero future for deliveries. Keynote speakers include Dara Calleary TD, Minister of State for Digital Transformation; Allan Mulrooney, CEO of the Western Development Commission; David Curtin, CEO of .ie; and Emma Jones, founder and CEO of Enterprise Nation which recently announced a strategic partnership with the Dargan Forum.

Other key event partners include Irish Rail, Connected Hubs, Søstrene Grene and Fáilte Ireland. Bank of Ireland is also a long-term supporter of the work of the Dargan Institute through the Dargan Hub, Dún Laoghaire.

With only one week to go you can secure your place at this exciting, innovative free event by visiting the Dargan Forum website:

https://www.darganinstitute.ie/dargan-forum