IT.ie Logo

Cyber Insurance Checklist: 10 Essential Security Controls

Cyber Security Checklist

The never-ending threat of a cyberattack is leading more and more businesses to take a serious look at cyber security insurance to help them recover some of the financial losses that would result from an attack or incident. While a continuing rise in attacks is making cyber insurance more attractive, so too, is it making […]

Build a security-savvy workforce through ongoing Human Risk Management

Cyber Security

With Verizon reporting that the ‘human element’ plays a part in 85% of cyber security breaches, your business can be compromised by just one well-crafted and well-researched phishing email landing in an employee’s inbox. The fact is, common attacks like phishing have rapidly evolved over the past few years, and businesses have been slow to […]

Switching is Easy with IT.ie

Switching IT Support

How many of us are guilty of sticking with the same service providers simply because it’s “better the devil you know”? There can be a lot to consider when you are thinking of switching from one IT Support provider to another and it can seem like a daunting process. However, it does not have to […]

IT.ie Intern Selina Wymann – My Experience in Ireland

Selina Wymann

back to all Start of Internship My name is Selina Wymann and I’m from Switzerland. I’m seventeen years old, and I enjoy doing things with my loved ones. I love seeing and experiencing new things and that’s why I’m here for an internship in Ireland. I’m staying with a family near Phibsborough and working at […]

The Benefits of a VoIP Telephone System

Benefits of VoIP

“Mr Watson, come here – I want to see you” were the first words spoken over a telephone line by Alexander Graham Bell on the 7th of March 1876. Since then, the world has become a much smaller place with the telephone allowing people to communicate in real-time across the globe.

What is Multi-Factor Authentication and What are the Benefits?

multi factor authentication

Multi-Factor Authentication or MFA is a security measure that requires you to provide two separate pieces of information before you are granted access to an online service. In the past, it has been far too easy for hackers to obtain credentials and access your online services. By implementing MFA you are telling the online service that you are in fact, who you claim to be.

Understanding The Cyber Kill Chain

An advanced persistent threat is when a malicious actor gains access to a network and remains undetected for weeks, months and even years. Lockheed developed the Cyber Kill Chain with the idea that if we identify threats early enough, this will reduce the possibility of an advanced persistent threat. The cyber kill chain is an adaptation of the military’s kill chain, which is a step-by-step approach that identifies and stops the enemy activity.

4 Common Business Challenges That MSPs Can Help Solve

IT Solutions for Common Business Challenges

Challenges are not only inevitable in business, but as it turns out, necessary. Commerce exists because of them, with almost every business predicated on the need to address the challenges of others and in turn, requires others to address theirs. The growth of information technology over the last 30+ years has created opportunities not previously thought possible. It has also brought with it, new challenges.

The Sustainability Journey of a Small Irish Business

The path to Sustainability for IT.ie

There are many ways to interpret sustainability with the word itself being described as impossibly ambiguous by Kent Porter in his 2015 book “Sustainability”. The best definition or explanation for sustainability, I believe comes from the United Nations Brundtland Commission, who in 1987, described sustainability as “meeting the needs of the present without compromising the […]

Do you really need a UPS?

So, Eamon (our director) asked me to put together a client mailer on Uninterruptible Power Supply (UPS) and my response was to ask if there is much of a requirement for a UPS today? I was thinking that, with more and more businesses moving from on-prem servers to the cloud, is there any real need […]