Our Top Tips to Keep Your Data Safe
“It won’t happen to me”. Believe me, it probably will, so don’t be a target. We’re all at risk, no matter how vigilant we are, however the more vigilant you are the less likely you are to fall victim to a cyber-attack. The stakes are high, and you have a responsibility to protect your company’s […]
FilesL0cker Ransomeware
SonicWall Capture Labs are reporting that a new variant of the FILESLOCKER ransomware is actively spreading. FilesL0cker RAN$OMWARE (aslo known as FilesLocker) is a ransomware that encrypts files on your computer, effectively locking you out. As with all ransomware the cybercriminals will demand a ransom, payable in bitcoin, to allow you access your own files. […]
Latest Email Scams
Unfortunately the scammers aren’t going away and I think it’s fair to say that this is going to get worse before it gets better and that’s if it gets better at all. The fact is that despite the efforts of the many security companies to stay ahead of the cyber-criminals, it can be extremely difficult to stop […]
How to check if your Twitter Account has been hacked
How to Check if Your Twitter Account has been Hacked Have you ever wondered if your Twitter account has been hacked and who may have gained access to it? While a bit late to the party, after Google and Facebook, Twitter now lets you know any and all devices that have logged into your account. […]
HERMES 2.1 Ransomware Advisory
It has come to our attention via CSIRT-IE that there is current wave on Ransomware attacks taking place and urge everyone to be vigilant when in receipt of unsolicited emails. If you are unsure or suspicious as to the content of an email make sure you contact your IT department or IT Support Company. Opening […]
Invoice Redirect Fraud
Invoice Redirect Fraud Invoice Redirect Fraud Gardai are warning businesses of all sizes to be vigilant of a new wave of invoice fraud, sweeping the country. Invoice Redirect Fraud is a scam targeting businesses working with suppliers and who regularly perform online financial transactions. This has been widely reported in the media over this past week including […]
Google are now marking HTTP sites as “Not Secure”

Google are now marking HTTP sites as “Not Secure” At the start of July Google released the Chrome 68 update and since then they have been marking all HTTP sites as ‘not secure’.Google has been giving gentle nudges to users for a number of years to encourage them encrypt their sites with HTTPS starting in […]
Email is the Number One Threat Vector

The greatest threat to your organisation is sitting in the inboxes of your employees. Email is still the number one threat vector and a major weak link in your IT security. The truth of the matter is that many of us have become complacent and just want to get through the many emails that clog […]
Disaster Recovery as a Service (DRaaS) Explained
When you hear the phrase “Disaster Recover” your are probably thinking of inhospitable environments or locations that suffer from extreme weather events. Did you know that most “Disaster” events occur from system failures, human error or cyber-attack? Your data is your most valuable assets and the loss of data can have a detrimental effect on […]
Meltdown and Spectre

What is Meltdown and Spectre We’re only at the start of 2018 and already we have two security risks to contend with. Meltdown and Spectre are two security vulnerabilities discovered in modern microprocessor chips that may allow attackers to exploit the chips common features and puts your personal data, including passwords, at risk. People are […]