john.grennan

Home/John Grennan

About John Grennan

This author has not yet filled in any details.
So far John Grennan has created 18 blog entries.

The Importance PCI DSS Compliance

With the ongoing threat from cybercriminals using both high and low tech methods of identity theft, your data is your most prized possession. Like it or not you are no longer a person with a single identity. As we rely more and more on digital means to make our professional and personal lives more

2017-08-13T19:58:26+00:00 August 13th, 2017|Data Protection, E-Commerce, Ransomware, Scams, Security|Comments Off on The Importance PCI DSS Compliance

CEO Fraud Scam

Over the last few weeks we have seen a significant increase in reports of companies being targeted by a particular type of email scam that has been doing the rounds for a couple of years now. CEO Fraud is a scam in which cybercriminals spoof company email accounts and impersonate executives to try and fool

2017-08-02T07:57:41+00:00 July 30th, 2017|Data Protection, Scams, Security|Comments Off on CEO Fraud Scam

GDPR and Your Business

A new regulation relating to data that can be used to identify an individual comes into force in May next year. All customer organisations need to be aware of the rules or risk huge penalties. In this special feature, we look at the essentials of GDPR and help our clients and friends address the challenges.General

2017-07-23T18:21:34+00:00 July 22nd, 2017|Data Protection|Comments Off on GDPR and Your Business

Enforce a Strong Password Policy with Windows Server

No matter how secure you make a user’s password initially, she will eventually choose her own password. Therefore, you should enforce strong password policies that define a secure password for your systems. Account policies are a subset of the policies configurable in Group Policy. Here’s a look at the key settings you will work

2017-07-18T12:20:39+00:00 July 18th, 2017|Security|Comments Off on Enforce a Strong Password Policy with Windows Server

Beware of fake purchasing order scam

Gardaí are warning businesses of a purchase order scam, following a spate of incidents in Cork recently. In this scam the fraudsters will attempt to order items from suppliers by providing them with a fake purchasing orders purporting to come from a legitimate and trusted buyer. How does it work? You, the supplier will

2017-07-08T20:35:37+00:00 July 8th, 2017|Scams|Comments Off on Beware of fake purchasing order scam

Ransomware – The Complete Survival Guide

In light of the recent global ransomware attacks by the Wannacry virus and the more recent Petrwrap virus, we at IT.ie decided to serialise a number of Blog post to help our clients and friends in business, greatly reduce their chances of a cyber-attack. The piece that follows is a single document constructed from our

2017-07-18T12:24:21+00:00 June 28th, 2017|Data Protection, Ransomware, Scams, Security, Virus|Comments Off on Ransomware – The Complete Survival Guide

Cybercrime Part 4 – Lessons learned

In the final part in this series on cybercrime, I will highlight some other forms of cybercrime that you should be aware of and that have the potential to negatively impact your business operations. I will then finish off by summarising what has been covered throughout the series in a section titled "lessons learned" Other

2017-07-04T19:40:20+00:00 June 21st, 2017|Data Protection, Ransomware, Scams, Security, Websites|Comments Off on Cybercrime Part 4 – Lessons learned

Cybercrime Part 3 – Fighting the Attack

In Part 2 of this series on cybercrime I explained what Phishing is and how a particular form of phishing, known as ransomware has come to prominence and accounts for a reported 97% of all phishing attacks. In this section I will explain the steps we at IT.ie highly recommend that you immediately take

2017-07-04T19:40:45+00:00 June 14th, 2017|Data Protection, Ransomware, Scams, Security, Virus|Comments Off on Cybercrime Part 3 – Fighting the Attack

Cybercrime Part 2 – Prepare for the Attack

In part 1 of this series on cyber crime, I explained its origins and that in its infancy, hacking was a tool used to improve early computer programs and not originally designed with theft in mind. To be fair to hackers, the majority have no interest whatsoever in engaging in illegal activity. In fact many

2017-07-04T19:41:22+00:00 June 6th, 2017|Data Protection, Ransomware, Scams, Security, Virus|Comments Off on Cybercrime Part 2 – Prepare for the Attack

Cybercrime Part 1 – A Brief History

In light of the recent global ransomware attack by the Wannacry virus, I have decided to put together a series of posts to help you, the business owner greatly reduce your chances of a cyber-attack. Before I get into this, let me be very clear - nobody can give a guarantee that you won’t

2017-07-04T19:41:51+00:00 May 30th, 2017|Ransomware, Scams, Security, Virus|Comments Off on Cybercrime Part 1 – A Brief History