Blog

Home/Blog/

Beware of fake purchasing order scam

2017-07-08T20:35:37+00:00 July 8th, 2017|Scams|

Gardaí are warning businesses of a purchase order scam, following a spate of incidents in Cork recently. In this scam the fraudsters will attempt to order items from suppliers by providing them with a fake purchasing orders purporting to come from a legitimate and trusted buyer. How does it work? You, the supplier will

Comments Off on Beware of fake purchasing order scam

Ransomware – The Complete Survival Guide

2017-07-18T12:24:21+00:00 June 28th, 2017|Data Protection, Ransomware, Scams, Security, Virus|

In light of the recent global ransomware attacks by the Wannacry virus and the more recent Petrwrap virus, we at IT.ie decided to serialise a number of Blog post to help our clients and friends in business, greatly reduce their chances of a cyber-attack. The piece that follows is a single document constructed from our

Comments Off on Ransomware – The Complete Survival Guide

Cybercrime Part 4 – Lessons learned

2017-07-04T19:40:20+00:00 June 21st, 2017|Data Protection, Ransomware, Scams, Security, Websites|

In the final part in this series on cybercrime, I will highlight some other forms of cybercrime that you should be aware of and that have the potential to negatively impact your business operations. I will then finish off by summarising what has been covered throughout the series in a section titled "lessons learned" Other

Comments Off on Cybercrime Part 4 – Lessons learned

Cybercrime Part 3 – Fighting the Attack

2017-07-04T19:40:45+00:00 June 14th, 2017|Data Protection, Ransomware, Scams, Security, Virus|

In Part 2 of this series on cybercrime I explained what Phishing is and how a particular form of phishing, known as ransomware has come to prominence and accounts for a reported 97% of all phishing attacks. In this section I will explain the steps we at IT.ie highly recommend that you immediately take

Comments Off on Cybercrime Part 3 – Fighting the Attack

Cybercrime Part 2 – Prepare for the Attack

2017-07-04T19:41:22+00:00 June 6th, 2017|Data Protection, Ransomware, Scams, Security, Virus|

In part 1 of this series on cyber crime, I explained its origins and that in its infancy, hacking was a tool used to improve early computer programs and not originally designed with theft in mind. To be fair to hackers, the majority have no interest whatsoever in engaging in illegal activity. In fact many

Comments Off on Cybercrime Part 2 – Prepare for the Attack

Cybercrime Part 1 – A Brief History

2017-07-04T19:41:51+00:00 May 30th, 2017|Ransomware, Scams, Security, Virus|

In light of the recent global ransomware attack by the Wannacry virus, I have decided to put together a series of posts to help you, the business owner greatly reduce your chances of a cyber-attack. Before I get into this, let me be very clear - nobody can give a guarantee that you won’t

Comments Off on Cybercrime Part 1 – A Brief History

Get The Most Out Of Microsoft Office 365

2017-05-22T10:34:05+00:00 May 21st, 2017|Microsoft, Office 365|

So, I’ve purchased a Microsoft Office 365 subscription for my business. Great  Ok, so I have Word, excel and PowerPoint etc. in the cloud. Got that.   I can use it across and download on several devices. All good. But, what makes it so different from the old Microsoft Office package   Office 365 is

Comments Off on Get The Most Out Of Microsoft Office 365

The Battle Between HDD and SSD – And The Winner Is?

2017-07-04T19:42:16+00:00 May 9th, 2017|Data Management|

It is highly likely that the computer system you are using today is still equipped with the traditional spinning Hard Disk Drive (HDD) and while there is no urgent rush to change them, just as VHS was replaced by DVD, HDD drives are slowly being replaced by Solid State Drives (SSD). How do they differ?

Comments Off on The Battle Between HDD and SSD – And The Winner Is?

Ransomware Market Share

2017-07-04T19:42:26+00:00 May 4th, 2017|Ransomware|

Yes, this is a thing now! I can’t believe I’m writing a post about the leader in Ransomware. But it is 2017 and we’re now entering the formative years of this relatively new threat… Cerber, has been one of the most active malware families over the past year and has increased its share of the

Comments Off on Ransomware Market Share

Web Browsing at Work – Is it Secure?

2017-07-04T19:43:25+00:00 April 29th, 2017|Data Protection, Ransomware, Security, Virus|

To the Cyber-criminal, your browser is their gateway to your personnel information. There is a treasure trove of information available on your browser, be it credit card details, emails, browsing history, passwords, bank details etc. You can never be 100% secure when browsing the web. There are however several common-sense steps you can take

Comments Off on Web Browsing at Work – Is it Secure?