IT.ie | Unit 35, Finglas Business Centre, Jamestown Road, D11 EP86 | Phone: (01) 8424114 ||hello@it.ie

john.grennan

Home » Blog » Archives for John Grennan

About John Grennan

This author has not yet filled in any details.
So far John Grennan has created 50 blog entries.

Our Top Tips to Keep Your Data Safe

“It won’t happen to me”. Believe me, it probably will, so don't be a target. We're all at risk, no matter how vigilant we are, however the more vigilant you are the less likely you are to fall victim to a cyber-attack. The stakes are high, and you have a responsibility to protect your company’s

2018-11-15T13:13:59+00:00November 13th, 2018|Data Protection, Ransomware, Scams, Security|Comments Off on Our Top Tips to Keep Your Data Safe

FilesL0cker Ransomeware

SonicWall Capture Labs are reporting that a new variant of the FILESLOCKER ransomware is actively spreading. FilesL0cker RAN$OMWARE (aslo known as FilesLocker) is a ransomware that encrypts files on your computer, effectively locking you out. As with all ransomware the cybercriminals will demand a ransom, payable in bitcoin, to allow you access your own

2018-10-25T12:43:09+00:00October 25th, 2018|Data Protection, Ransomware, Security|Comments Off on FilesL0cker Ransomeware

Latest Email Scams

Unfortunately the scammers aren't going away and I think it's fair to say that this is going to get worse before it gets better and that's if it gets better at all. The fact is that despite the efforts of the many security companies to stay ahead of the cyber-criminals, it can be extremely difficult to stop

2018-09-25T10:25:19+00:00September 25th, 2018|Data Protection, Scams, Security|Comments Off on Latest Email Scams

How to check if your Twitter Account has been hacked

Have you ever wondered if your Twitter account has been hacked and who may have gained access to it?While a bit late to the party, after Google and Facebook, Twitter now lets you know any and all devices that have logged into your account. Twitter has also rolled out a new security feature for its

2018-09-13T15:22:11+00:00September 13th, 2018|Data Protection, Mobile Devices, Scams, Security, Social Networking|Comments Off on How to check if your Twitter Account has been hacked

HERMES 2.1 Ransomware Advisory

It has come to our attention via CSIRT-IE that there is current wave on Ransomware attacks taking place and urge everyone to be vigilant when in receipt of unsolicited emails. If you are unsure or suspicious as to the content of an email make sure you contact your IT department or IT Support Company.

2018-09-04T19:40:50+00:00August 20th, 2018|Ransomware, Scams, Security, Virus|Comments Off on HERMES 2.1 Ransomware Advisory

Invoice Redirect Fraud

Gardai are warning businesses of all sizes to be vigilant of a new wave of invoice fraud, sweeping the country. Invoice Redirect Fraud is a scam targeting businesses working with suppliers and who regularly perform online financial transactions. This has been widely reported in the media over this past week including The Independent, and Extra.ie   How

2018-09-04T19:39:58+00:00July 29th, 2018|Scams, Security|Comments Off on Invoice Redirect Fraud

Google are now marking HTTP sites as “Not Secure”

At the start of July Google released the Chrome 68 update and since then they have been marking all HTTP sites as ‘not secure’.Google has been giving gentle nudges to users for a number of years to encourage them encrypt their sites with HTTPS starting in 2015 when they began to down-rank unencrypted sites.Site

2018-07-22T18:00:40+00:00July 22nd, 2018|Data Protection, Domain Registration & Hosting, Hosting, Security, Website Development|Comments Off on Google are now marking HTTP sites as “Not Secure”

Email is the Number One Threat Vector

The greatest threat to your organisation is sitting in the inboxes of your employees. Email is still the number one threat vector and a major weak link in your IT security. The truth of the matter is that many of us have become complacent and just want to get through the many emails that

2018-09-04T19:39:28+00:00July 5th, 2018|Data Protection, Marketing, Ransomware, Scams, Security|Comments Off on Email is the Number One Threat Vector

Disaster Recovery as a Service (DRaaS) Explained

When you hear the phrase "Disaster Recover" your are probably thinking of inhospitable environments or locations that suffer from extreme weather events. Did you know that most “Disaster” events occur from system failures, human error or cyber-attack? Your data is your most valuable assets and the loss of data can have a detrimental effect on

2018-05-21T19:12:58+00:00May 20th, 2018|Data Management, Data Protection, Ransomware, Security|Comments Off on Disaster Recovery as a Service (DRaaS) Explained