Invoice Scams Are Costing Businesses Millions – Here’s How to Stay Safe

Invoice Scams Are Costing Businesses Millions – Here’s How to Stay Safe

Invoice fraud continues to be a serious concern for businesses, leading to substantial financial losses and operational disruptions. Cybercriminals are becoming increasingly sophisticated, using deceptive tactics to manipulate companies into transferring funds to fraudulent accounts. This post explores the threat of invoice scams, real-world case studies, and strategies businesses can implement to protect themselves. What […]

What is Microsoft Entra ID? A Guide to Microsoft Identity Security

What is Microsoft Entra ID? A Guide to Microsoft Identity Security

What is Microsoft Entra ID? Microsoft Entra ID is a cloud-based identity and access management (IAM) solution provided by Microsoft. It helps organisations secure and manage user identities, enabling secure access to applications, devices, and resources. Entra ID plays a crucial role in identity protection, authentication, and authorisation for businesses, allowing users to sign in […]

APT groups are increasingly deploying ransomware – and that’s bad news for everyone

APT groups are increasingly deploying ransomware – and that’s bad news for everyone

APT groups are increasingly deploying ransomware – and that’s bad news for everyone The blurring of lines between cybercrime and APT attacks underscores the increasingly fluid and multifaceted nature of today’s cyberthreats. There was a time when the boundary between cybercrime and advanced persistent threat activity was rather easy to discern. Cybercriminals were fuelled solely […]

How to Spot Scams and Keep Your Data Safe This Holiday

How to Spot Scams and Keep Your Data Safe This Holiday

ESET Ireland December 16, 2024 How to Spot Scams and Keep Your Data Safe This Holiday This post was originally published by ESET Ireland on the 29th of November and republished here with their permission.  The holiday season is, for many a time to rest and enjoy their friends and families as well as some good […]

DORA: Understanding Compliance for Financial Institutions 

DORA: Understanding Compliance for Financial Institutions 

John Grennan Eamon Gallagher October 21, 2024 The regulatory landscape in the European Union (EU) has grown increasingly complex as the importance of cybersecurity and operational resilience takes centre stage, particularly in financial services. Two of the most significant regulations designed to protect critical sectors from cyber threats and operational disruptions are the Digital Operational […]

Telekopye scammer network targets Booking.com and Airbnb

Telekopye scammer network targets Booking.com and Airbnb

Guest Post by ESET October 14, 2024 This post, originally published on the ESET blog on October 10 2024, is reposted here with permission.  ESET researchers discovered that the organized scammer network Telekopye has expanded its operations to target users of popular accommodation booking platforms like Booking.com and Airbnb. ESET Research released new findings on Telekopye, […]

Preparing for NIS2: Why a Multi-Layered Cybersecurity Approach is Critical

Preparing for NIS2: Why a Multi-Layered Cybersecurity Approach is Critical

John Grennan, Eamon Gallagher & Wayne Morgan September 9, 2024 As the cyber threat landscape continues to evolve, the sophistication and frequency of attacks are escalating at an alarming rate. This is particularly concerning for small to medium-sized businesses (SMBs), which are often perceived by cybercriminals as easy targets. With the upcoming enactment of the […]

TRANSFORMING YOUR WORKFORCE – The Critical Role of Human Risk Management

TRANSFORMING YOUR WORKFORCE – The Critical Role of Human Risk Management

The Core of Your Cyber Defence: People and Awareness With new threats continually emerging, cybersecurity has become more critical than ever. While employing a robust, multi-layered approach—featuring firewalls and antivirus software—is vital, the true cornerstone of any cyber defence strategy is your people. Fostering a strong culture of cyber awareness can be one of the […]

How To Protect Your Phone and Data Against Face Stealing Scams

How To Protect Your Phone and Data Against Face Stealing Scams

Cybercriminals can now steal facial recognition data and use AI to create deepfakes for authentication. This blog post, originally published by ESET and authored by Roman Cuprik, explores what this means for consumers and businesses, highlighting the increasing popularity of facial recognition technologies for secure authentication and the potential risks associated with them. Recently, facial […]

The Cyber Security Guide for SME’s

The Cyber Security Guide for SME’s

Today, SMEs face unique cyber security challenges that can impact their business continuity and data integrity. Understanding these challenges and implementing effective security measures is not just beneficial; it’s crucial. That’s why IT.ie has crafted an extensive Free Cyber Security Guide, tailored specifically for small and medium-sized enterprises. This guide is an invaluable resource, designed […]