
Highlights
Vorboss is committed to achieving gender parity across our workforce by 2028, with a specific goal of 50/50 representation in technical roles by 2027. Our Diversity, Equity & Inclusion strategy prioritises an inclusive culture for all, setting us ahead in the telecom industry.
Why wouldn’t we have a diverse workforce? Why shouldn’t inclusivity be the goal of the telecoms industry?
We’ve published our Diversity, Equity & Inclusion Strategy, and a core part of that is our commitment to reach gender parity across the company by 2028.
A major step towards achieving this breakthrough for the telecoms industry will be our commitment to reach 50/50 representation within technical and engineering positions by 2027. We’re currently at more than a third representation of women in those roles.
That puts us ahead of others in the telecommunications industry thanks to creating an inclusive culture where everyone can thrive.
Inclusion wasn’t an afterthought for us – we aimed for an inclusive approach and a diverse workforce right from the start.
And diversity isn’t limited to gender, so our policies are focused on ensuring inclusion for all people from all walks of life – and particularly those that have long been excluded from our industry.
Diversity works. It works for us, and it’s essential if the telecom industry is going to keep working.

By Rikshita Khela, Chief People Officer.
Tell us about yourself so we can serve you best.
Got a question?
More articles
.png)
Internet connectivity is the lifeblood of modern businesses, powering operations, communication, and growth. But not all “fibre” connections are created equal.
All connections use fibre at some level, but performance, reliability, and guarantees vary depending on the underlying network. Choosing the right type of connection now can save downtime, frustration, and cost in the future.
In this guide, we'll explore key factors when selecting the ideal business internet provider to keep you connected and thriving.

Understand the connection types
Here’s a quick comparison of the three main fibre-based connections available to businesses:
FTTC and FTTP may work for small teams or low-risk work, but DIA is the only connection built for business-critical reliability, speed, and consistent performance.
Ask yourself these questions
Before comparing providers, clarify your internal needs:
- How critical is uptime for your business operations?
- Which teams rely heavily on cloud apps, video conferencing, or large file transfers?
- How much bandwidth do we need now, and how much will we need in 2–5 years?
- Are upload speeds as important as download speeds for our workflows?
- Would temporary downtime cause financial or reputational damage?
This self-assessment helps you match connection types to your business requirements.
.jpg)
Generative Pre-trained Transformers (GPTs) like OpenAI's ChatGPT are revolutionising industries across the board. From writing emails to creating educational content, they're powerful tools built to understand and generate human-like text. But the same tech that makes GPTs useful also makes them risky, particularly for cybersecurity.
In February 2024, Microsoft and OpenAI spotted several state-backed hacking groups from Russia, North Korea, Iran, and China using GPTs to improve their exploitation tactics. The Strontium group, linked to Russian military intelligence, has been found using large language models (LLM’s) to understand satellite communication protocols, radar imaging technologies, and other sensitive miliatry information.
But GPTs can also be misused in everyday cybercrime and by employees or contractors who have access to sensitive data.
How GPTs can be weaponised in everyday cybercrime
- Phishing: GPTs can generate convincing phishing emails that mimic real writing styles, making it more difficult to spot and harder for filters to block.
- Social engineering: these models can be used in live chats, like customer support, to trick people into giving up sensitive information. Connected to text-to-speech tools, they could also be used in voice scams.
- Malware code generation: even with filters in place, attackers can trick GPTs into writing malicious code.
- Data leakage: when employees input sensitive company information into these models, that data gets stored and could be leaked back to others.
- Misinformation: GPT’s can 'hallucinate', which means they present false information portrayed as fact. When spread, this can lead to real-world consequences such as political confusion or interference during a crisis.