Security

Home/Security

Enforce a Strong Password Policy with Windows Server

No matter how secure you make a user’s password initially, she will eventually choose her own password. Therefore, you should enforce strong password policies that define a secure password for your systems. Account policies are a subset of the policies configurable in Group Policy. Here’s a look at the key settings you will work

2017-07-18T12:20:39+00:00 July 18th, 2017|Security|Comments Off on Enforce a Strong Password Policy with Windows Server

Ransomware – The Complete Survival Guide

In light of the recent global ransomware attacks by the Wannacry virus and the more recent Petrwrap virus, we at IT.ie decided to serialise a number of Blog post to help our clients and friends in business, greatly reduce their chances of a cyber-attack. The piece that follows is a single document constructed from our

2017-07-18T12:24:21+00:00 June 28th, 2017|Data Protection, Ransomware, Scams, Security, Virus|Comments Off on Ransomware – The Complete Survival Guide

Cybercrime Part 4 – Lessons learned

In the final part in this series on cybercrime, I will highlight some other forms of cybercrime that you should be aware of and that have the potential to negatively impact your business operations. I will then finish off by summarising what has been covered throughout the series in a section titled "lessons learned" Other

2017-07-04T19:40:20+00:00 June 21st, 2017|Data Protection, Ransomware, Scams, Security, Websites|Comments Off on Cybercrime Part 4 – Lessons learned

Cybercrime Part 3 – Fighting the Attack

In Part 2 of this series on cybercrime I explained what Phishing is and how a particular form of phishing, known as ransomware has come to prominence and accounts for a reported 97% of all phishing attacks. In this section I will explain the steps we at IT.ie highly recommend that you immediately take

2017-07-04T19:40:45+00:00 June 14th, 2017|Data Protection, Ransomware, Scams, Security, Virus|Comments Off on Cybercrime Part 3 – Fighting the Attack

Cybercrime Part 2 – Prepare for the Attack

In part 1 of this series on cyber crime, I explained its origins and that in its infancy, hacking was a tool used to improve early computer programs and not originally designed with theft in mind. To be fair to hackers, the majority have no interest whatsoever in engaging in illegal activity. In fact many

2017-07-04T19:41:22+00:00 June 6th, 2017|Data Protection, Ransomware, Scams, Security, Virus|Comments Off on Cybercrime Part 2 – Prepare for the Attack

Cybercrime Part 1 – A Brief History

In light of the recent global ransomware attack by the Wannacry virus, I have decided to put together a series of posts to help you, the business owner greatly reduce your chances of a cyber-attack. Before I get into this, let me be very clear - nobody can give a guarantee that you won’t

2017-07-04T19:41:51+00:00 May 30th, 2017|Ransomware, Scams, Security, Virus|Comments Off on Cybercrime Part 1 – A Brief History

Web Browsing at Work – Is it Secure?

To the Cyber-criminal, your browser is their gateway to your personnel information. There is a treasure trove of information available on your browser, be it credit card details, emails, browsing history, passwords, bank details etc. You can never be 100% secure when browsing the web. There are however several common-sense steps you can take

2017-07-04T19:43:25+00:00 April 29th, 2017|Data Protection, Ransomware, Security, Virus|Comments Off on Web Browsing at Work – Is it Secure?

The Internet of Things (IoT)

At some point, you’ve probably heard of the phrase “Internet of Things" or IoT but find yourself scratching your head trying to figure out what that is. IoT refers to the connection of devices, other than computers and smartphones to the internet. Kitchen appliances, lighting and even cars can now all be connected through

2017-07-04T19:43:39+00:00 March 28th, 2017|Security, Uncategorized|Comments Off on The Internet of Things (IoT)

Confidentiality Agreements

We're an IT Support & Services company who deals with confidential & sensitive client information on a daily basis. We treat the protection of this data as paramount to the successful relationship between IT.ie and its' clients.  Did you know.. We offer all clients an electronically signed confidentiality agreement! Please email info@it.ie to receive

2017-07-04T19:46:06+00:00 March 19th, 2017|Data Protection, Security|Comments Off on Confidentiality Agreements

Online Backup v Online Storage

It can be tricky understand the difference between online backup services vs cloud storage service. Both services effectively store your information in the cloud but offer a very different feature set. Knowing the difference between the two is vital to helping you understand what you can expect when you look to the cloud for

2017-07-04T19:44:23+00:00 March 1st, 2017|Ransomware, Scams, Security, Virus|Comments Off on Online Backup v Online Storage