Our Top Tips to Keep Your Data Safe

“It won’t happen to me”. Believe me, it probably will, so don’t be a target. We’re all at risk, no matter how vigilant we are, however the more vigilant you are the less likely you are to fall victim to a cyber-attack. The stakes are high, and you have a responsibility to protect your company’s […]

FilesL0cker Ransomeware

SonicWall Capture Labs are reporting that a new variant of the FILESLOCKER ransomware is actively spreading.  FilesL0cker RAN$OMWARE (aslo known as FilesLocker) is a ransomware that encrypts files on your computer, effectively locking you out. As with all ransomware the cybercriminals will demand a ransom, payable in bitcoin, to allow you access your own files.  […]

Latest Email Scams

Unfortunately the scammers aren’t going away and I think it’s fair to say that this is going to get worse before it gets better and that’s if it gets better at all. The fact is that despite the efforts of the many security companies to stay ahead of the cyber-criminals, it can be extremely difficult to stop […]

How to check if your Twitter Account has been hacked

How to Check if Your Twitter Account has been Hacked Have you ever wondered if your Twitter account has been hacked and who may have gained access to it? While a bit late to the party, after Google and Facebook, Twitter now lets you know any and all devices that have logged into your account. […]

HERMES 2.1 Ransomware Advisory

It has come to our attention via CSIRT-IE that there is current wave on Ransomware attacks taking place and urge everyone to be vigilant when in receipt of unsolicited emails. If you are unsure or suspicious as to the content of an email make sure you contact your IT department or IT Support Company. Opening […]

Invoice Redirect Fraud

Invoice Redirect Fraud Invoice Redirect Fraud Gardai are warning businesses of all sizes to be vigilant of a new wave of invoice fraud, sweeping the country. Invoice Redirect Fraud is a scam targeting businesses working with suppliers and who regularly perform online financial transactions. This has been widely reported in the media over this past week including […]

Google are now marking HTTP sites as “Not Secure”

Google are now marking HTTP sites as “Not Secure”

Google are now marking HTTP sites as “Not Secure” At the start of July Google released the Chrome 68 update and since then they have been marking all HTTP sites as ‘not secure’.Google has been giving gentle nudges to users for a number of years to encourage them encrypt their sites with HTTPS starting in […]

Email is the Number One Threat Vector

Email is the Number One Threat Vector

The greatest threat to your organisation is sitting in the inboxes of your employees. Email is still the number one threat vector and a major weak link in your IT security. The truth of the matter is that many of us have become complacent and just want to get through the many emails that clog […]

Disaster Recovery as a Service (DRaaS) Explained

When you hear the phrase “Disaster Recover” your are probably thinking of inhospitable environments or locations that suffer from extreme weather events. Did you know that most “Disaster” events occur from system failures, human error or cyber-attack? Your data is your most valuable assets and the loss of data can have a detrimental effect on […]

Double Up On Your Displays and Never Go Single Again.

You may have noticed that there is an increasing adoption of dual or multiple display set ups in business and even homes. I’ve been using a dual display both in work and at home for over a year now and I honestly don’t know how I ever managed with a single monitor. There are six […]

Download The Social Engineering Guide

Fill in your details below and hit download.