Unified Billing: Simplifying Your Technology Expenses

As a business owner, you’re always looking for ways to simplify various business processes. When we engage with a potential new client, we always ask them about the challenges and frustrations they are facing with the existing providers of their various technology solutions. One area that often stands out more than any other is the […]
Protecting Your Business from CEO and Invoice Fraud

Protecting your business from financial fraud has become more critical than ever before, with all to frequent reports of unsuspecting businesses falling victim to criminals. CEO fraud and invoice fraud are two common types of scams that have cost small firms in Ireland millions of euros. The Banking and Payments Federation Ireland’s (BPFI) via FraudSMART […]
New BEC Campaign Uses AiTM Attacks to Steal Millions from Corporate Executives via Microsoft 365 Accounts

A recent Business Email Compromise (BEC) campaign has been identified that is using advanced spear-phishing techniques with Adversary-in-the-Middle (AiTM) attacks to target Microsoft 365 accounts belonging to corporate executives. The campaign, which researchers from Mitiga discovered during an incident response case, is now widespread and is targeting transactions worth several million dollars each. The phishing […]
Cloud Computing: Unleash the Power of Cloud Technology

The advent of cloud computing has revolutionised the way modern businesses function. This technology not only provides numerous advantages, such as scalability, flexibility, cost-effectiveness, and enhanced collaboration, but is also eco-friendly. Cloud computing is a crucial element of digital transformation, empowering organisations to harness technology’s potential to achieve their objectives more efficiently. Given the increasing […]
Pig Butchering Scams – What are they and how to avoid them

From business email compromises to romance scams, criminals are raking in billions by using one powerful tool: social engineering. They lure their victims into making mistakes that could cost them everything – whether it’s trusting someone they shouldn’t or sending their hard-earned money into a black hole. But just when we thought we’d seen it […]
Email Remains The Number One Threat Vector

Attention all businesses: Are you aware of the dangerous threat lurking in your employees’ inboxes? Back in 2018 we warned that the greatest threat to your organisation Is sitting in the inboxes of your employees. Despite advancements in cyber defence, this is still the case and it’s becoming easier for bad actors to target your […]
Press Release: IT.ie commits to being carbon-neutral by 2030 as part of Techies Go Green movement

Dublin, 07/02/2023 – IT.ie, today announces that it has joined Techies Go Green, a movement of IT and tech-oriented companies who are committed to decarbonising their businesses. Established in 2004 IT.ie delivers managed IT Services and technology solutions to hundreds of enterprises across Ireland. IT.ie joins the community of organisations who are aiming to become […]
Data Privacy – Understanding its Importance and How Everyone Has a Role in Protecting It

Data privacy is a critical issue that affects every individual in today’s digital age. With the rise of the internet and social media, personal information is being collected, analysed, and shared at an unprecedented rate. This has led to the emergence of what has been called “surveillance capitalism,” where companies monetise personal data for profit. […]
Reduce your Energy Costs by Migrating to the Cloud

Cloud computing isn’t just about convenience and scalability – it can also help you reduce energy costs and go green. On-premises servers may seem like a convenient option, but they can rack up a hefty energy bill with their constant power needs and heat generation. All that energy usage adds up, and for small and […]
Phishing Prevention Guide

By now, most people who have access to email (which is a lot of people) are aware of phishing and may have even fallen victim to or encountered a phishing attempt. Phishing is a type of online fraud in which attackers send fake emails or texts, or create fake websites, in an attempt to trick […]