Irish Revenue Phishing Scam

The other day I wrote an article to explain what the term Phishing meant. Somewhere in the middle of the piece I figured that it would be a good idea to use an example of a phishing mail that I myself have received in the past. Having received hundreds maybe thousands, I indexed through over […]

Phishing – Don’t Become Cyber Bait

  What is it? Phishing is the act of sending a fraudulent mail to someone under the disguise of a legitimate name or organisation. The intention is to dupe the recipient of the mail into believing they are accessing a bonifide website when they are in fact unintentionally handing over private and confidential information to […]

Is peer-to-peer software killing your network?

In recent weeks, various customers have reported issues with their broadband connections where it can disconnect intermittingly throughout the day. The problem may only even manifest itself on certain days creating huge difficulties in narrowing down its cause. Obviously this creates a huge strain on the working day and we’ve only recently managed to find the […]

Joining the rest of the Twit – terrers..

Last year I suggested in this article that the over use of social networking for business was a bad idea. I still stand by my assertion that its “all a bit much” and have previously stuck to my own advice insofar as not to embrace every possible social networking trend just because everyone else is… […]

SEO Scam – Marc Shneider

The scams section of the blog is growing fast! Here’s another spam, scam or as I call it ‘mailware’ to add to the list. You’ll most likely see variations of the mail I received (see below).   See scam mail below dotted line. —————————————————————————————————————————- Did you receive the e-mail which I sent to you recently (copied here-below)? Please confirm since I […]

Five Years On…

[fusion_builder_container hundred_percent=”no” equal_height_columns=”no” menu_anchor=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”none” parallax_speed=”0.3″ video_mp4=”” video_webm=”” video_ogv=”” video_url=”” video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” overlay_color=”” video_preview_image=”” border_color=”” border_style=”solid” padding_top=”” padding_bottom=”” padding_left=”” padding_right=”” type=”legacy”][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_1″ background_position=”left top” background_color=”” border_color=”” border_style=”solid” border_position=”all” spacing=”yes” background_image=”” background_repeat=”no-repeat” padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” margin_top=”0px” margin_bottom=”0px” class=”” id=”” animation_type=”” animation_speed=”0.3″ animation_direction=”left” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” center_content=”no” […]

Chinese Intellectual Property Scam on Domain Names

[fusion_builder_container hundred_percent=”no” equal_height_columns=”no” menu_anchor=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”none” parallax_speed=”0.3″ video_mp4=”” video_webm=”” video_ogv=”” video_url=”” video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” overlay_color=”” video_preview_image=”” border_color=”” border_style=”solid” padding_top=”” padding_bottom=”” padding_left=”” padding_right=”” type=”legacy”][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_1″ background_position=”left top” background_color=”” border_color=”” border_style=”solid” border_position=”all” spacing=”yes” background_image=”” background_repeat=”no-repeat” padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” margin_top=”0px” margin_bottom=”0px” class=”” id=”” animation_type=”” animation_speed=”0.3″ animation_direction=”left” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” center_content=”no” […]

Locking down employee internet access

How much time do you think your average employee spends on the Internet during office hours? The answer, if taken from legitimate studies, is an astounding 2 hours per day. That’s 10 hours a week! From updating their Facebook profile, to sending out Twitter alerts, checking personal emails, tracking eBay items, or simple day-to-day internet […]

Best of Luck to Willows Cancer Caring Team!

We would like to wish Richard Greene and the rest of the Willow Cancer Caring team, the very best of luck in their 200km charity cycle for cancer. We were more than happy to purchase a spot on their team jersey and If anyone else would like to sponsor  or make any enquiries to the charity, just let us know . The event […]

The Social Networking Feature Creep.

Today, more than ever, companies are using every conceivable method possible to engage with their customers, to reach new prospective clients and ultimately to expand their reach beyond their present place in the marketplace. We too, have played somewhat into the social networking frenzy with our Business I.T Blog, that in truth, takes more time […]

Download The Social Engineering Guide

Fill in your details below and hit download.