# LLMs.txt - Sitemap for AI content discovery # IT.ie > Managed IT Services --- ## Pages - [Copilot Agent Test](https://it.ie/copilot-agent-test/): There is no excerpt because this is a protected post. - [IT.ie Charity Challenge](https://it.ie/charity-challenge/): Charity Fitness Challenge 2025 2 challenges 2 Charities 1 Month Donate here Facebook Twitter Youtube about the challenges https://it. ie/wp-content/uploads/2025/03/Battle-Cancer-Event.... - [NIS2 Compliance Information](https://it.ie/nis2-compliance-information/): NIS2 NIS2 Compliance Information The European Union’s NIS2 Directive is reshaping the cybersecurity landscape, raising the bar for organisations to... - [Test](https://it.ie/test-2/): The Ultimate Cyber Security Solution for Modern Businesses CyberProtect CyberProtect provides businesses with seamless IT management, enterprise-grade security, and reliable... - [CyberProtect](https://it.ie/cyberprotect/): CyberProtect CyberProtect is brought to you by IT. ie. The ultimate Endpoint & User Cybersecurity bundle for your business or... - [Giggle Bytes](https://it.ie/giggle-bytes/): Contact Us Giggle Gallery 1 of 221 – + 1. IT. ie Giggle Bytes at The Laughter Lounge. Photo: Peter... - [SOC Managed Endpoint Protection and Response (EDR)](https://it.ie/managed-endpoint-protection-and-response-edr/): Endpoint Detection & Response SOC MANAGED EDR Endpoint Detection and Response (EDR) that’s fully managed by our 24/7 Security Operations... - [Data Protection Policy](https://it.ie/data-protection-policy/): Data Protection Policy 1 Purpose of Policy The purpose of this Data Protection Policy is to inform employees of their... - [VoIP Telecoms Terms and Conditions](https://it.ie/voip-telecoms-terms-and-conditions/): VoIP Telecoms Terms & Conditions GENERAL VoIP TELECOMS TERMS AND CONDITIONS (hereinafter referred to as “Terms and Conditions” or “Terms) Date: 04 July 2024... - [Terms and Conditions](https://it.ie/terms-and-conditions/): - [Cookie Policy (UK)](https://it.ie/cookie-policy-uk/): - [Privacy Statement (UK)](https://it.ie/privacy-statement-uk/): - [Business Connect](https://it.ie/business-connect/): VoIP Telecoms Business Connect Anytime, Anywhere Live Chat Contact Us VoIP Telecoms What is VoIP for Business Before going into... - [Business Growth](https://it.ie/business-growth/): VoIP Telecoms Business Growth Scalable VoIP Solutions Designed for Your Growing Business Live Chat Contact Us Scalable VoIP Solutions Designed... - [Testimonials](https://it.ie/testimonials/): Testimonials Contact Us Client Testimonials “Client testimonials are more than just endorsements. They are a mirror reflecting the strengths of... - [St Canice's Clevertouch Transformation: A Case Study](https://it.ie/st-canices-clevertouch-transformation-a-case-study/): Case Study St Canice’s Clevertouch Transformation Get in Touch Live Chat Download the PDF Overview St Canice’s Girls National School,... - [Accounts Assistant Vacancy](https://it.ie/accounts-assistant-vacancy/): Accounts Assistant Vacancy Details Click to Apply on Careers Page Job description Join our team at IT. ie, Ireland’s premier... - [Disclaimer](https://it.ie/disclaimer/): - [Privacy Statement (EU)](https://it.ie/privacy-statement-eu/): - [Cookie Policy (EU)](https://it.ie/cookie-policy-eu/): - [News & Media](https://it.ie/news-media/): IT. ie In the News Contact Us https://it. ie/wp-content/uploads/2023/12/Red-and-Blue-Modern-Breaking-News-Video-Background. mp4 Online Publications Print Publications Press Releases Interviews Feature Article 43%... - [SonicWall Next Generation Firewall](https://it.ie/managed-business-firewall/sonicwall-next-generation-firewall/): SonicWall Next Generation Firewall Protect your small business or branch location from intrusion, malware and ransomware with an easy-to-use, integrated... - [Palo Alto Next Generation Firewall](https://it.ie/managed-business-firewall/palo-alto-next-generation-firewall/): Managed Business Firewall Palo Alto Next Generation Firewall Securing Your Network with Next-Generation Firewall Hardware Contact Us Live Chat Palo... - [Fortinet Next Generation Firewall](https://it.ie/managed-business-firewall/fortinet-next-generation-firewall/): Managed Business Firewall Fortinet Next Generation Firewall FortiGate is the only NGFW with unified management for hybrid mesh firewall Contact... - [IT Service Desk Specialist](https://it.ie/it-service-desk-specialist/): IT Service Desk Support Vacancy Details Click to Apply on Careers Page Job description IT. ie are seeking an IT Graduate... - [Phoenix BCDR](https://it.ie/phoenix-bcdr/): Business Continuity and Disaster Recovery Phoenix BCDR Moving Beyond Backup – to Full Business Availability and Data Protection Contact Us... - [Inside IT Sales](https://it.ie/inside-it-sales/): Inside Sales (Grad) Vacancy Details Click to Apply on Careers Page Job description IT. ie are seeking a dynamic individual... - [IT Support Field - Galway](https://it.ie/it-support-field-galway/): IT Support Field – Office Galway Vacancy Details Click to Apply on Careers Page Job description We are looking to... - [IT Helpdesk Support Vacancies](https://it.ie/it-helpdesk-support-vacancies/): Helpdesk Support Vacancy Details Click to Apply on Careers Page Job description We are looking to hire new Helpdesk L2/L3... - [The IT Room](https://it.ie/the-it-room/): The IT Room Welcome to The IT Room by IT. ie — your video hub for everything IT. From useful... - [Zero Trust Security](https://it.ie/zero-trust-security/): Cyber Security | IT. ie Zero Trust Security Building Trust, Reducing Risks Get in Touch Live Chat Cyber Security Zero... - [Broadband Failover](https://it.ie/broadband-failover/): IT. ie Broadband Broadband Failover  Streamline Your Business with Expert Insights Get in Touch Live Chat 15+ Experience Due Diligence... - [Microsoft Teams Room](https://it.ie/microsoft-teams-room/): Microsoft 365 Microsoft Teams Room Transform Your Meetings with Microsoft Teams Room Get in Touch Live Chat Microsoft Teams Room... - [IT Due Diligence](https://it.ie/it-due-diligence/): Manged IT Services IT Due Diligence  Streamline Your Business with Expert Insights Get in Touch Live Chat 15+ Experience Due... - [SOC As a Service](https://it.ie/soc-as-a-service/): SOC As a Service MANAGED SOC Stop attackers in their tracks with our managed cybersecurity detection and response solution backed... - [Case Studies](https://it.ie/case-studies/): IT. ie CaseStudies Live Chat Get in Touch Clevertouch Transformation Clevertouch Transformation St Canice’s GNS transforms education with Clevertouch Interactive... - [McCormack Family Farms' Transformation with Proactive Managed IT Services](https://it.ie/mccormack-family-farms-transformation-with-proactive-managed-it-services/): Case Study McCormack Family Farms’ Transformation with Proactive Managed IT Services Get in Touch Live Chat Download The PDF Overview... - [IT Support for Manufacturing & Supply Chain](https://it.ie/it-support-for-manufacturing-supply-chain/): Managed IT Services IT Support for Manufacturing & Supply Chain Expert IT solutions for the manufacturing and supply chain industry... - [Human Risk Management Case Study Construction Industry](https://it.ie/human-risk-management-case-study-construction-industry/): Case Study Human RiskManagement Construction Industry Get in Touch Live Chat Customer Objectives Identify which employees are at high risk... - [Shomera's Digital Transformation Journey with IT.ie: A Case Study](https://it.ie/shomeras-digital-transformation-journey-with-itie-a-case-study/): Case Study Shomera’sDigital Transformation Get in Touch Live Chat Download the PDF Overview Shomera are the largest provider of House... - [Meeting Room Booking](https://it.ie/digital-signage/meeting-room-booking/): Meeting Room Booking Sedao Live Rooms Download Brochure Request a Quote Live Rooms – Easy and versatile room booking Live... - [Mailchimp MIT](https://it.ie/mailchimp-mit/): Mailchimp MIT List Managed IT Clients Please add all new and updated MIT contacts to Mailchimp List  Subscribe * indicates... - [Assessing Cyber Threats and Mitigating Measures for SME's in Ireland](https://it.ie/assessing-cyber-threats-and-mitigating-measures-for-smes-ireland-2023/): Assessing Cyber Threats and Mitigating Measures for SME’s in Ireland. The aim of this survey is to gather valuable insights... - [Resources](https://it.ie/resources/): IT. ie Guides & Resources Download our free PDF guides and resources.   The Ultimate Microsoft Copilot Cheat Sheet The... - [Most Popular Google Searches in Ireland for 2022](https://it.ie/most-popular-google-searches-in-ireland-for-2022/): As 2022 draws to a close, Google has revealed the most popular trending searches in Ireland for the year. Covid... - [Modern Workplace - Empowering Digital Transformation](https://it.ie/modern-workplace-empowering-digital-transformation/): Microsoft Modern Workplace – Empowering Digital Transformation Reinvent the workplace experience and embrace Digital Transformation Get in Touch Elevate the... - [Cloud Computing Services](https://it.ie/cloud-computing-services/): Cloud Solutions Cloud Computing Services We help you migrate your business to the cloud and enable you to harness the... - [Microsoft Defender EDR](https://it.ie/microsoft-defender-edr/): Microsoft 365 Microsoft Defender EDR Advanced Threat Protection to Discover and secure endpoint devices across your Organisation. Get in Touch... - [Managed Print Services for Schools and Education](https://it.ie/managed-print-services-for-schools-and-education/): Managed IT Services for Schools Managed Print Services for Schools and Education Save around on your printing costs with our... - [IT Support for Religious Organisations](https://it.ie/it-support-for-religious-organisations/): IT Support for Religious Organisations HELPING RELIGIOUS ORGANISATIONS TO GET MORE FROM THEIR ONGOING IT INVESTMENT Fully Managed IT Support... - [IT Support Tipperary](https://it.ie/it-support-tipperary/): Managed IT Services IT Support Tipperary Welcome to IT. ie. The home of Managed IT Services in Tipperary and nationwide.... - [IT Support Westmeath](https://it.ie/it-support-westmeath/): Managed IT Services IT Support Westmeath Welcome to IT. ie. The home of Managed IT Services in Co Westmeath and... - [IT Support Monaghan](https://it.ie/it-support-monaghan/): Managed IT Services IT Support Monaghan Welcome to IT. ie. The home of Managed IT Services in Co Monaghan and... - [IT Support Cavan](https://it.ie/it-support-cavan/): Managed IT Services IT Support Cavan Welcome to IT. ie. The home of Managed IT Services in Cavan and nationwide.... - [IT Support Waterford](https://it.ie/it-support-waterford/): Managed IT Services IT SUPPORT WATERFORD Welcome to IT. ie. The home of Managed IT Services in Waterford and nationwide.... - [IT Support Wexford](https://it.ie/it-support-wexford/): Managed IT Services Wexford IT Support Wexford Exceptional Customer Experience We offer Managed IT Services to companies who want an... - [IT Support Carlow](https://it.ie/it-support-carlow/): Managed IT Services IT Support Carlow Welcome to IT. ie. The home of Managed IT Services in Carlow and nationwide.... - [IT Support Kildare](https://it.ie/it-support-kildare/): IT Support Kildare Kildare’s Trusted B2B IT Support & Managed Services Partner Support Request Get in Touch Live Chat Welcome... - [IT Support Kilkenny](https://it.ie/it-support-kilkenny/): Managed IT Services kILKENNY IT SUPPORT KILKENNY Exceptional Customer Experience Welcome to IT. ie. The home of Managed IT Services... - [IT Support Wicklow](https://it.ie/it-support-wicklow/): Managed IT Services IT Support Wicklow Welcome to IT. ie. The home of Managed IT Services in Co Wicklow and... - [IT Support Louth](https://it.ie/it-support-louth/): Managed IT Services IT Support Louth Welcome to IT. ie. The home of Managed IT Services in Co Louth and... - [IT Support Meath](https://it.ie/it-support-meath/): Managed IT Services Co Meath IT SUPPORT MEATH Exceptional Customer Experience We offer  Managed IT Support to companies in Co... - [IT Support Galway](https://it.ie/it-support-galway/): MANAGED IT SERVICES GALWAY IT SUPPORT GALWAY IT. ie: The Trusted Irish IT Company providing Managed IT Services and technology... - [IT Support Cork](https://it.ie/it-support-cork/): Managed IT Services cork IT Support Cork Exceptional Customer Experience Hello, we are IT. ie; the home of Managed IT... - [Surface for Business Accessories](https://it.ie/surface-for-business-accessories/): - [Digital Signage](https://it.ie/digital-signage/): Digital Signage CM Series Digital Signage Delivering powerful and clear engagement for every space CM Series is a large format... - [Clevertouch LUX for Enterprise](https://it.ie/interactive-whiteboards-and-displays-for-business/): Interactive Displays & Whiteboards Lux for Enterprise Elevate Your Enterprise Collaboration with Cutting-Edge Technology Welcome to the future of interactive... - [Surface for Business: Hybrid Work](https://it.ie/surface-for-business-hybrid-work/): Get in Touch For any Surface inquiries please email hello@it. ie Contact Page - [Newsletters](https://it.ie/newsletters/): IT. ie News Newsletter Archive Get the latest news and advisories direct to your inbox. Stay in the loop with... - [Cyber Essentials Certification](https://it.ie/cyber-essentials-certification/): Cyber Security Cyber Essentials Certification Cyber Essentials helps you to guard against the most common cyber threats and demonstrate your... - [Penetration Testing](https://it.ie/penetration-testing/): Pen Testing As a Service (PTaaS) Automated Penetration Testing As-a-Service Automate – Test – Secure – Repeat Discover IT. ie’s,... - [Inside Technical Sales Executive](https://it.ie/inside-technical-sales-executive/): IT. ie Careers Inside Technical Sales Executive Apply Now Open the door to a career with IT. ie Job Description... - [Blog](https://it.ie/blog/): IT. ie Blog News & Advisories The IT. ie blog has a bit of everything on IT and cybersecurity. Read... - [Privacy Policy](https://it.ie/privacy-policy/): Policies Privacy Policy 1. 0 Introduction IT. ie is committed to protecting and respecting your privacy. This Privacy Policy sets... - [Microsoft Surface Range](https://it.ie/microsoft-surface-range/): - [Referral Program](https://it.ie/referral-program/): IT. ie Referral Program Refer IT. ie & Reward Yourself! Get in Touch Refer us & Reward Yourself The best... - [IT Support for Charities](https://it.ie/it-support-for-charities/): IT Support for Charities HELPING CHARITIES TO GET MORE FROM THEIR ONGOING IT INVESTMENT Fully Managed IT Support Services and... - [IT Careers](https://it.ie/it-careers/): IT Careers Join Ireland’s Leading Managed IT Services Provider View Positions IT Careers JOIN OUR TEAM Welcome to the IT.... - [Microsoft 365 Backup](https://it.ie/microsoft-365-backup/): IT. ie Managed Services Microsoft 365 Backup Backup for Microsoft Office 365 is more than simply filling gaps. It’s about... - [Microsoft Azure](https://it.ie/microsoft-azure/): Get to Know Microsoft Azure Explore the world of cloud computing and learn what sets Azure apart. Get in Touch... - [Managed Business Firewall](https://it.ie/managed-business-firewall/): Managed Firewall Managed Business Firewalls Your Shield Against Cyber Threats Contact Us Live Chat Next Gen Firewalls (NGFW) Partnered with... - [IT Equipment Leasing](https://it.ie/it-equipment-leasing/): IT. ie Services IT Hardware Leasing Kit out your office with the very latest tech and spread the costs with... - [Managed Print Services](https://it.ie/managed-print-services/): IT Services MANAGED PRINT SERVICES We are dedicated to providing exceptional Managed Print Services to businesses throughout Ireland.   Get... - [Microsoft 365 Business Premium](https://it.ie/microsoft-365-business-premium/): Microsoft 365 Microsoft 365 Business Premium If you’re looking for a comprehensive business package that will help you work more... - [Cyber Security Awareness Training](https://it.ie/cyber-security-awareness-training/): Human Risk Management CYBER SECURITY AWARENESS TRAINING Empower, Protect, Secure – Your Cyber Safety Journey Starts Here Get in Touch... - [Managed Online Backup](https://it.ie/managed-online-backup/): Managed Online Backup Phoenix File Protect Take the heat off your team with our fully managed backup service. We take... - [Data Backup and Replication](https://it.ie/data-backup-and-replication/): Data Security Phoenix Backup & Replication Advanced Data Protection & Recovery Contact Us Live Chat Data Security Replication for Ultimate... - [Managed Email Security](https://it.ie/managed-email-security/): Microsoft 365 Managed Email Security Email Security for M365 is powered by a collaborative AI engine that continuously learns from... - [IT Support for Engineering](https://it.ie/it-support-for-engineering/): Managed IT Services IT Support for Engineering & Construction Leading IT Support for Engineering & construction Companies Get in Touch... - [Microsoft 365](https://it.ie/microsoft-365/): Microsoft Microsoft 365 for Business Microsoft 365 is a suite of apps that help you stay connected and get things... - [Managed Email Signature](https://it.ie/managed-email-signature/): OUTLOOK / MICROSOFT 365 Email Signature Management All staff get automatic email signatures for desktop, web, mobile.  Easy to set... - [Mobile Device Management](https://it.ie/mobile-device-management/): Managed IT Services Mobile Device Management Devices propel the modern workplace. Delight employees with IT automation. Get in Touch IT.... - [Business Endpoint Protection](https://it.ie/business-endpoint-protection/): Cyber Security Business Endpoint Protection To secure businesses, you need endpoint protection that’s stronger and smarter than traditional business antivirus.... - [Business Broadband](https://it.ie/business-broadband/): Business Broadband IT. ie Business Broadband We have partnered with Ireland’s leading broadband providers to offer your business the connectivity... - [Remote Working Solutions](https://it.ie/remote-working-solutions/): IT Services Remote Working Solutions Get supported no matter where you are located.   Get in Touch Remote Working Without... - [VoIP Solutions for Business](https://it.ie/voip-solutions-for-business/): VoIP Telecoms VoIP Telecom for Business Anytime, Anywhere Live Chat Contact Us VoIP Telecoms What is VoIP for Business Before... - [Contact](https://it.ie/contact/): Get in Touch If you would like further information on any of our services or simply have a question, then... - [Managed IT Support](https://it.ie/managed-it-support/): Expert IT Support Ireland Managed IT Support Elevate your business with tailored IT support, cyber security, and technology solutions. Benefit... - [Cyber Security](https://it.ie/cyber-security/): Managed Services Cyber Security Solutions Our Managed Cyber Security Services encompass prevention, detection, and remediation. This robust multi-layered approach means... - [Managed IT Services](https://it.ie/): Managed IT Services Ireland EXPERT MANAGED IT SERVICES Exceptional Customer Experience We offer Managed IT Services to companies who want... - [Microsoft New Commerce Experience (NCE)](https://it.ie/microsoft-new-commerce-experience/): Microsoft New Commerce Experience (NCE) Today we are sharing some important information about the new  Cloud Solution Provider (CSP) subscription purchasing... - [Cookies Policy](https://it.ie/cookies-policy/): IT. ie Cookies Policy ‍Cookies Policy for IT. ie This is the Cookie Policy for https://it. ie What Are Cookies... - [About Us](https://it.ie/about-us/): About IT. ie exceptional customer experience is our promise Get in Touch Download our Company Profile At IT. ie, we... - [Interactive Displays for Schools](https://it.ie/interactive-displays-for-schools/): Interactive Whiteboards Interactive Displays for Schools Designed by teachers, for teachers, Clevertouch are more than just interactive touchscreens. They deliver... - [IT Support Holiday Cover](https://it.ie/it-support-holiday-cover/): IT Support Holiday Cover If you would like to talk to us about temporary IT Support cover just fill in... - [Single IP Broadband Failover](https://it.ie/single-ip-broadband-failover/): Business Broadband Single IP Broadband Failover Protected uptime for connected businesses Get in Touch Single IP Broadband Failover IT. ie... - [IT Support for Accountants](https://it.ie/it-support-for-accountants/): Managed IT Services IT Support For Accountants IT. ie provides managed services and IT support for accountants, ranging from on-site... - [IT Support for Recruitment Agencies](https://it.ie/it-support-for-recruitment-agencies/): Managed IT Services IT Support for Recruitment Agencies Recruit an IT Support company you can trust Get in Touch T... - [IT Support for Estate Agents](https://it.ie/it-support-for-estate-agents/): Managed IT Services IT Support For Estate Agents And Property Sector Leading IT Support the Property Industry Get in Touch... - [IT Support for Medical Practices](https://it.ie/it-medical-practices/): Managed IT Services IT Support for Medical Practices Your IT health is our priority GP’s and healthcare professionals are essential... - [Business Total Talk](https://it.ie/business-total-talk/): VoIP Telecoms Business Total-Talk (unlimited calls on a per-user basis) – Starting from €22 per user per month. ) Our... - [Hosted VoIP Call Centre Solution](https://it.ie/hosted-voip-call-centre-solution/): VoIP Telecoms Hosted VoIP Call Centre Grow their business using advanced call centre performance metrics and insights – Boost productivity... - [VoIP for Teams](https://it.ie/voip-for-teams/): VoIP Telecoms VoIP for Teams Integrate your phone system with Microsoft Teams Live Chat Contact Us VoIP Telecoms What is... - [Hosted PBX Phone](https://it.ie/hosted-pbx-phone/): VoIP Telecoms Business Cloud Telecom Get your business communications ready for the 21st-century workplace and save up to 50% versus... - [Thank You](https://it.ie/thank-you/): Thank You We’ll get right back to you While you’re here, why don’t you sign up to our newsletter and... - [Secure Hard Drive Destruction](https://it.ie/secure-hard-drive-destruction/): IT. ie Services Certified Hard Drive Destruction When disposing of old equipment, do you consider the sensitive data held on... - [Switch IT Support](https://it.ie/switch-it-support/): Join IT. ie Switch Today Trusted by 100’s of businesses nationwide Get in Touch Switch in 4 Easy Steps Switching... - [IT Support for Freight Transport and Logistics](https://it.ie/it-support-for-freight-transport-and-logistics/): Managed IT Services IT Support For Freight Transport And Logistics Leading IT Support for the Freight, Transport & Logistics Industry... - [Office 365 Backup](https://it.ie/office-365-backup/): Microsoft 365 Backup Backup your Microsoft 365 data to the cloud Backup for Microsoft Office 365 is more than simply... - [Managed It Support for the Hospitality Sector](https://it.ie/managed-it-support-for-the-hospitality-sector/): Managed IT Services IT Support For The Hospitality Sector Leading IT Support for the Hospitality Sector Get in Touch IT... - [IT Support for Legal Services](https://it.ie/it-support-for-legal-services/): Managed IT Services IT Support For The Legal Sector Specialist IT Support for Legal Practices and Law Firms Get in... - [IT Support for Professional Services](https://it.ie/it-support-for-professional-services/): Managed IT Services IT Support For Professional Services Leading IT Support for the Professional Services Sector Get in Touch Managed... - [IT Support for the Financial Services and Insurance Sector](https://it.ie/it-support-for-the-financial-services-and-insurance-sector/): Managed IT Services IT Support For The Financial And Insurance Sectors Leading IT Support for the Financial Services & Insurance... - [IT Support for the Healthcare Industry](https://it.ie/it-support-for-healthcare/): Managed IT Services IT Support for the healthcare and Pharmaceuticals Industry Leading IT Support for the Healthcare Industry Get in... - [Corporate Social Responsibility](https://it.ie/corporate-social-responsibility/): Corporate Social Responsibility THINK GLOBALLY, ACT LOCALLY Corporate Social Responsibility Our CSR At IT. ie we believe in being good... - [Sonicwall Cyber Threat Report 2019](https://it.ie/sonicwall-cyber-threat-report-2019/): While there has been a drop in ransomware attacks in 2019, overall malware attacks are on the rise with 194,171... - [Email Security for Microsoft 365](https://it.ie/email-security-for-office-365/): Microsoft 365 Email Security With 258 million corporate users, Microsoft 365 is the #1 target for cyberattacks. Get in Touch... - [Interactive Whiteboards and Displays](https://it.ie/interactive-whiteboards/): Communication and Collaboration at its best Interactive Whiteboards & Digital Signage Transform your boardroom or classroom into a collaborative space... - [IT Support Dublin](https://it.ie/it-support-dublin/): IT Support Dublin The home of managed IT services in Dublin.   We offer Managed IT Services to companies who... - [Online Data Backup](https://it.ie/online-data-backup/): Secure online backup and recovery Get Started Company Data is paramount to every business. “Backup is cheap, but recovery is... - [Comms Cabinet Cleanup](https://it.ie/comms-cabinet-cleanup/): IT. ie Services Comms Cabinet Cleanup When a communications rack falls into disarray, it’s probably time to get it cleaned... - [Network Support](https://it.ie/network-support/): Network Support & Maintenance We provide support and maintenance for your network infrastructure.   Get in Touch Network Support From... - [IT Support For Schools](https://it.ie/it-support-for-schools/): IT Services IT SUPPORT FOR SCHOOLS We’ve been providing IT Support and services to schools and the wider education sector... - [Direct Debit e-Mandate](https://it.ie/direct-debit-emandate/): IT. ie Accounts eMandate Click on the button to be taken to our eMandate Page Sign eMandate What are the... - [Sign up to Our Newsletter](https://it.ie/sign-up-to-our-newsletter-here/): Newsletter Get great articles direct to your inbox. Stay in the loop with our monthly round-up of news updates. Our... - [Maintenance Mode](https://it.ie/maintenance-mode/): Maintenance Mode Avada includes blank pages so you can build all kinds of awesome stuff, like a maintenance mode page!... ## Posts - [The Ultimate Microsoft Copilot Cheat Sheet](https://it.ie/the-ultimate-microsoft-copilot-cheat-sheet/): Microsoft Copilot is changing the way we work—bringing the power of generative AI directly into the tools you use every... - [The Drive to 75: Finding the Perfect Balance in Microsoft Secure Score](https://it.ie/the-drive-to-75-finding-the-perfect-balance-in-microsoft-secure-score/): Cyber threats are evolving at an alarming rate, and businesses of all sizes are in the crosshairs. Measuring your organisation’s... - [Press Release: 43% of office workers say they could cause a cybersecurity breach this year](https://it.ie/press-release-43-of-office-workers-say-they-could-cause-a-cybersecurity-breach-this-year/): Dublin, 12 March 2025 – IT. ie, a leading Irish IT managed services company, today announces the results of new... - [Invoice Scams Are Costing Businesses Millions – Here’s How to Stay Safe](https://it.ie/invoice-scams-are-costing-businesses-millions-heres-how-to-stay-safe/): Invoice fraud continues to be a serious concern for businesses, leading to substantial financial losses and operational disruptions. Cybercriminals are... - [What is Microsoft Entra ID? A Guide to Microsoft Identity Security](https://it.ie/what-is-microsoft-entra-id-a-guide-to-microsoft-identity-security/): What is Microsoft Entra ID? Microsoft Entra ID is a cloud-based identity and access management (IAM) solution provided by Microsoft.... - [Press Release - 73% of office workers in Ireland say staff get blamed for cybersecurity incidents](https://it.ie/press-release-73-of-office-workers-in-ireland-say-staff-get-blamed-for-cybersecurity-incidents/): DUBLIN, 16 January 2025: IT. ie, a leading Irish IT managed services company, today announces the results of new research,... - [Managed IT Services: Your Guide to Finding the Right Partner](https://it.ie/managed-it-services-your-guide-to-finding-the-right-partner/): Introduction In today’s fast-paced business environment, technology is no longer just a support function—it is the backbone of successful operations.... - [APT groups are increasingly deploying ransomware – and that’s bad news for everyone](https://it.ie/apt-groups-are-increasingly-deploying-ransomware-and-thats-bad-news-for-everyone/): APT groups are increasingly deploying ransomware – and that’s bad news for everyone The blurring of lines between cybercrime and... - [How to Spot Scams and Keep Your Data Safe This Holiday](https://it.ie/how-to-spot-scams-and-keep-your-data-safe-this-holiday/): ESET Ireland December 16, 2024 How to Spot Scams and Keep Your Data Safe This Holiday This post was originally... - [The 12 Scams of Christmas 2024](https://it.ie/the-12-scams-of-christmas-2024/): The holiday season is here once again and before you dive headfirst into the holiday cheer, it’s that time of... - [Achieving the Optimal 75% Microsoft Secure Score: Why It Matters for Your Business](https://it.ie/achieving-the-optimal-75-microsoft-secure-score-why-it-matters-for-your-business/): If your business uses Microsoft 365, you’ve likely come across the Microsoft Secure Score—a powerful indicator of your organisation’s security... - [Stay Cyber-Safe This Holiday Season: Essential Cybersecurity Tips for Your Business](https://it.ie/stay-cyber-safe-this-holiday-season-essential-cybersecurity-tips-for-your-business/): The holiday season is almost upon us, bringing with it a significant increase in online activity. As eager shoppers hop... - [Microlearning for Cyber security Awareness: Small Modules, Big Impact](https://it.ie/microlearning-for-cyber-security-awareness-small-modules-big-impact/): There was a time when cybersecurity was seen as the sole responsibility of the IT department or dedicated cyber experts,... - [DORA: Understanding Compliance for Financial Institutions ](https://it.ie/dora-understanding-compliance-for-financial-institutions/): John Grennan Eamon Gallagher October 21, 2024 The regulatory landscape in the European Union (EU) has grown increasingly complex as... - [Telekopye scammer network targets Booking.com and Airbnb](https://it.ie/telekopye-scammer-network-targets-booking-com-and-airbnb/): Guest Post by ESET October 14, 2024 This post, originally published on the ESET blog on October 10 2024, is reposted... - [Windows 10 End Of Life: Is Your Business Ready?](https://it.ie/windows-10-end-of-life-is-your-business-ready/): John Grennan October 14, 2024 On 14th October 2025, Windows 10, the much-loved operating system will reach its End of... - [The Evolving Role of Managed Service Providers (MSPs) in Business Growth](https://it.ie/the-evolving-role-of-managed-service-providers-msps-in-business-growth/): In the past, Managed Service Providers (MSPs) were often seen as external IT teams – troubleshooters called upon when something... - [Preparing for NIS2: Why a Multi-Layered Cybersecurity Approach is Critical](https://it.ie/preparing-for-nis2-why-a-multi-layered-cybersecurity-approach-is-critical/): John Grennan, Eamon Gallagher & Wayne Morgan September 9, 2024 As the cyber threat landscape continues to evolve, the sophistication... - [Hello, is it me you’re looking for? How scammers get your phone number](https://it.ie/hello-is-it-me-youre-looking-for-how-scammers-get-your-phone-number/): Hello, is it me you’re looking for? How scammers get your phone number Your humble phone number is more valuable... - [Beware of Ticket Scammers on Social Media: Don't Let Fake Promises Ruin Your Concert Experience](https://it.ie/beware-of-ticket-scammers-on-social-media-dont-let-fake-promises-ruin-your-concert-experience/): As the excitement builds for Coldplay’s upcoming gigs at Croke Park and fans eagerly await tickets for the much-anticipated Oasis... - [The Top VoIP Telecom Benefits Your Business Can't Ignore](https://it.ie/the-top-voip-telecom-benefits-your-business-cant-ignore/): Introduction On the 7th of March 1875 “Mr Watson, come here – I want to see you” were the first... - [TRANSFORMING YOUR WORKFORCE - The Critical Role of Human Risk Management](https://it.ie/transforming-your-workforce-the-critical-role-of-human-risk-management/): The Core of Your Cyber Defence: People and Awareness With new threats continually emerging, cybersecurity has become more critical than... - [How To Protect Your Phone and Data Against Face Stealing Scams](https://it.ie/how-to-protect-your-phone-and-data-against-face-stealing-scams/): Cybercriminals can now steal facial recognition data and use AI to create deepfakes for authentication. This blog post, originally published... - [The Cyber Security Guide for SME's](https://it.ie/the-cyber-security-guide-for-smes/): Today, SMEs face unique cyber security challenges that can impact their business continuity and data integrity. Understanding these challenges and... - [The Rising Challenge of AI-Enhanced Phishing Emails](https://it.ie/the-rising-challenge-of-ai-enhanced-phishing-emails/): As artificial intelligence (AI) continues to advance, its applications are becoming increasingly sophisticated – and not always for the better.... - [Speak No Evil: Defending Against AI Voice Cloning Scams](https://it.ie/speak-no-evil-defending-against-ai-voice-cloning-scams/): In an era marked by rapid advancements in AI technology, innovation dances on the edge of a double-edged sword. Picture,... - [IVR Phishing: Understanding and Preventing Automated Phone Scams](https://it.ie/ivr-phishing-understanding-and-preventing-automated-phone-scams/): As technology continues to evolve, so do the methods used by cybercriminals to exploit it. One such method is Interactive... - [The Benefits of Proactive IT Support.](https://it.ie/the-benefits-of-proactive-it-support/): Are you tired of constantly putting out IT fires? Imagine a world where your IT problems are solved before they... - [The Top 8 Types of Cyber Attacks](https://it.ie/the-top-8-types-of-cyber-attacks/): The cyber security landscape is continually evolving; however, a good understanding of the current threats and preventative measures is a... - [How Penetration Testing as a Service (PTaaS) is Redefining Cybersecurity](https://it.ie/how-penetration-testing-as-a-service-ptaas-is-redefining-cybersecurity/): In an era where cybersecurity threats evolve with alarming velocity, the importance of robust cyber defence mechanisms cannot be overstated.... - [Shattering the Illusion: Debunking Common Cybersecurity Myths](https://it.ie/shattering-the-illusion-debunking-common-cybersecurity-myths/): Imagine your sensitive data exposed, operations crippled, and customers outraged. This isn’t science fiction; it’s the harsh reality of a... - [Small Screen Big Risk The Increasing Threat of Mobile Phishing](https://it.ie/small-screen-big-risk-the-increasing-threat-of-mobile-phishing/): Not very long ago, I found myself tricked by a phishing email disguised as a courier notification on my phone.... - [Press Release: IT.ie to double headcount with 30 new jobs and €2.5M investment](https://it.ie/press-release-it-ie-to-double-headcount-with-30-new-jobs-and-e2-5m-investment/): DUBLIN, 27 January 2024; IT. ie, the Irish-owned Managed IT Services company, today announces plans to double its headcount in... - [Automated Penetration Testing: The New Frontier in Cybersecurity Solutions](https://it.ie/automated-penetration-testing-the-new-frontier-in-cybersecurity-solutions/): In the ever-evolving domain of cybersecurity, automated Penetration Testing as a Service (PTaaS) has emerged as a key solution for... - [The Art of IT Support: Blending Technical Expertise with Exceptional Customer Service](https://it.ie/the-art-of-it-support-blending-technical-expertise-with-exceptional-customer-service/): Why Choosing the Right IT Partner is Crucial for Your Business Imagine navigating the complexities of the digital world your... - [Cyber Security in 2024: Key Forecasts and Insights for the Year Ahead](https://it.ie/cyber-security-in-2024-key-forecasts-and-insights-for-the-year-ahead/): As 2024 unfolds, the cyber security landscape is rapidly evolving. Understanding the key trends shaping this dynamic field is essential... - [Ireland's Year in Search 2023: A Look at What Captivated the Nation](https://it.ie/irelands-year-in-search-2023-a-look-at-what-captivated-the-nation/): Google’s Year in Search is always a fascinating reflection of the collective consciousness, and Ireland’s 2023 trends are no exception.... - [The 12 Scams of Christmas 2023](https://it.ie/the-12-scams-of-christmas-2023/): As the festive season approaches, we encourage you to channel your inner Scrooge – not in stinginess, but in fiercely... - [From Blackboards to Interactive Displays: The Evolution of Classroom Technology](https://it.ie/from-blackboards-to-interactive-displays-the-evolution-of-classroom-technology/): From the humble beginnings of Blackboards to the dynamic capabilities of interactive displays, educational tools have undergone a remarkable evolution.... - [Step-by-Step Guide to Granting Delegate Access in Outlook](https://it.ie/step-by-step-guide-to-granting-delegate-access-in-outlook/): Ever felt like you could use an extra pair of hands to manage your overflowing inbox and jam-packed calendar? Microsoft... - [Beyond the Bait: A Deep Dive into Phishing Prevention](https://it.ie/beyond-the-bait-a-deep-dive-into-phishing-prevention/): In a perpetually evolving digital landscape, phishing has emerged as a dominant cybersecurity threat. As cybercriminals continually refine their tactics,... - [The Business Owner's Guide to Microsoft 365 Business Premium](https://it.ie/the-business-owners-guide-to-microsoft-365-business-premium/): Small and Medium Business (SMB) owners are inundated with a plethora of solutions that promise to boost productivity, enhance collaboration,... - [Navigating the Challenges of Switching Your IT Support Provider](https://it.ie/navigating-the-challenges-of-switching-your-it-support-provider/): The only constant is change and businesses are continually faced with the challenges of staying ahead. One key component that... - [Azure Identity Protection: A Comprehensive Overview](https://it.ie/azure-identity-protection-a-comprehensive-overview/): Azure Identity Protection, a feature of Microsoft’s Azure Active Directory, is a cutting-edge solution designed to safeguard organisations from identity-based... - [AI-Driven Phishing Attacks: A Comprehensive Guide to Understanding & Protecting Against the Threat](https://it.ie/ai-driven-phishing-attacks-a-comprehensive-guide-to-understanding-protecting-against-the-threat/): The cyber threats we face today are becoming more sophisticated and challenging to combat. One such emerging threat is the... - [Digital Piracy: Understanding the Threat of Cryptojacking](https://it.ie/digital-piracy-understanding-the-threat-of-cryptojacking/): As we venture deeper into the digital era, cybersecurity remains an ever-evolving battleground. One escalating issue that demands our attention... - [From Perimeter to Zero Trust: Evolving Cybersecurity in the Digital Age](https://it.ie/from-perimeter-to-zero-trust-evolving-cybersecurity-in-the-digital-age/): From Perimeter to Zero Trust: Evolving Cybersecurity in the Digital Age Understanding Zero Trust Zero Trust Security is a model... - [The Ultimate Guide to Microsoft Keyboard Shortcuts](https://it.ie/the-ultimate-guide-to-microsoft-keyboard-shortcuts/): Keyboard shortcuts are an essential tool for boosting productivity and efficiency when working on a computer. Whether you’re a Windows... - [Navigating the IT Landscape: Overcoming Challenges with Effective Solutions](https://it.ie/navigating-the-it-landscape-overcoming-challenges-with-effective-solutions/): In the dynamic world of business, challenges are not only inevitable but also necessary. They form the bedrock of commerce,... - [Safeguarding Personal Information: A Guide for Employees](https://it.ie/safeguarding-personal-information-a-guide-for-employees/): In today’s digital world, safeguarding personal and company information is not just important, it’s essential. - [The Shift Towards Managed IT Services: A Growing Trend in Business](https://it.ie/the-shift-towards-managed-it-services-a-growing-trend-in-business/): In recent years, more and more businesses have moved away from maintaining an in-house IT department, choosing instead to outsource... - [SOCIAL ENGINEERING: A Guide to Understanding the Attacks and How to Mitigate the Risks](https://it.ie/social-engineering-a-guide-to-understanding-the-attacks-and-how-to-mitigate-the-risks/): Introduction The landscape of cybersecurity threats is continually evolving and has largely transcended the traditional methods of hacking and virus... - [8 Reasons to Move Your Business to Microsoft SharePoint in the Cloud](https://it.ie/8-reasons-to-move-your-business-to-microsoft-sharepoint-in-the-cloud/): In today’s digital transformation era, businesses are moving to the cloud to enhance collaboration, streamline document management, and improve productivity.... - [Unified Billing: Simplifying Your Technology Expenses](https://it.ie/unified-billing-simplifying-your-technology-expenses/):  As a business owner, you’re always looking for ways to simplify various business processes. When we engage with a potential... - [Protecting Your Business from CEO and Invoice Fraud](https://it.ie/protecting-your-business-from-ceo-and-invoice-fraud/): Protecting your business from financial fraud has become more critical than ever before, with all to frequent reports of unsuspecting... - [New BEC Campaign Uses AiTM Attacks to Steal Millions from Corporate Executives via Microsoft 365 Accounts](https://it.ie/new-bec-campaign-uses-aitm-attacks-to-steal-millions-from-corporate-executives-via-microsoft-365-accounts/): A recent Business Email Compromise (BEC) campaign has been identified that is using advanced spear-phishing techniques with Adversary-in-the-Middle (AiTM) attacks... - [Cloud Computing: Unleash the Power of Cloud Technology](https://it.ie/cloud-computing-unleash-the-power-of-cloud-technology/): The advent of cloud computing has revolutionised the way modern businesses function. This technology not only provides numerous advantages, such... - [Pig Butchering Scams – What are they and how to avoid them](https://it.ie/pig-butchering-scams-what-are-they-and-how-to-avoid-them/): From business email compromises to romance scams, criminals are raking in billions by using one powerful tool: social engineering. They... - [Email Remains The Number One Threat Vector](https://it.ie/email-remains-the-number-one-threat-vector/): Attention all businesses: Are you aware of the dangerous threat lurking in your employees’ inboxes? Back in 2018 we warned... - [Press Release: IT.ie commits to being carbon-neutral by 2030 as part of Techies Go Green movement](https://it.ie/press-release-it-ie-commits-to-being-carbon-neutral-by-2030-as-part-of-techies-go-green-movement/): Dublin, 07/02/2023 – IT. ie, today announces that it has joined Techies Go Green, a movement of IT and tech-oriented... - [Data Privacy – Understanding its Importance and How Everyone Has a Role in Protecting It](https://it.ie/data-privacy-understanding-its-importance-and-how-everyone-has-a-role-in-protecting-it/): Data privacy is a critical issue that affects every individual in today’s digital age. With the rise of the internet... - [Reduce your Energy Costs by Migrating to the Cloud](https://it.ie/reduce-your-energy-costs-by-migrating-to-the-cloud/): Cloud computing isn’t just about convenience and scalability – it can also help you reduce energy costs and go green.... - [Phishing Prevention Guide](https://it.ie/phishing-prevention-guide/): By now, most people who have access to email (which is a lot of people) are aware of phishing and... - [Cloud Computing vs On-Premises Solutions](https://it.ie/cloud-computing-vs-on-premises-solutions/): Are you tired of being weighed down by the burden of maintaining on-premises IT infrastructure? Ready to break free from... - [The most popular Google searches in Ireland for 2022](https://it.ie/the-most-popular-google-searches-in-ireland-for-2022/): As 2022 draws to a close, Google has revealed the most popular trending searches in Ireland for the year. Covid... - [4 Reasons Why You Should Switch to Microsoft Office 365 Business Premium Today](https://it.ie/4-reasons-why-you-should-switch-to-microsoft-office-365-business-premium-today/): Microsoft 365 Business Premium is an effective solution to keep employees connected and productive regardless of their physical location while... - [Microsoft Surface - Built for security, designed for trust](https://it.ie/microsoft-surface-built-for-security-designed-for-trust/): Held to the same standard as all Microsoft services and software, Microsoft Surface devices provide uncompromising chip-to-cloud security, put ultimate control... - [Why are humans the biggest insider threat to your business?](https://it.ie/why-are-humans-the-biggest-insider-threat-to-your-business/): Employees have long been viewed as the ‘weakest link’ in a business’s cyber security chain and, with human error still being the... - [Cyber Insurance Checklist: 10 Essential Security Controls](https://it.ie/cyber-insurance-checklist-10-essential-security-controls/): The never-ending threat of a cyberattack is leading more and more businesses to take a serious look at cyber security... - [Build a security-savvy workforce through ongoing Human Risk Management](https://it.ie/build-a-security-savvy-workforce-through-ongoing-human-risk-management/): With Verizon reporting that the ‘human element’ plays a part in 85% of cyber security breaches, your business can be... - [Switching is Easy with IT.ie](https://it.ie/switching-is-easy-with-it-ie/): How many of us are guilty of sticking with the same service providers simply because it’s “better the devil you... - [IT.ie Intern Selina Wymann - My Experience in Ireland](https://it.ie/it-ie-intern-selina-wymann-my-experience-in-ireland/): back to all Start of Internship My name is Selina Wymann and I’m from Switzerland. I’m seventeen years old, and... - [The Benefits of a VoIP Telephone System](https://it.ie/the-benefits-of-a-voip-telephone-system/): “Mr Watson, come here – I want to see you” were the first words spoken over a telephone line by... - [What is Multi-Factor Authentication and What are the Benefits?](https://it.ie/what-is-multi-factor-authentication-and-what-are-the-benefits/): Multi-Factor Authentication or MFA is a security measure that requires you to provide two separate pieces of information before you... - [Understanding The Cyber Kill Chain](https://it.ie/understanding-the-cyber-kill-chain/): An advanced persistent threat is when a malicious actor gains access to a network and remains undetected for weeks, months... - [4 Common Business Challenges That MSPs Can Help Solve](https://it.ie/4-common-business-challenges-that-msps-can-help-solve/): Challenges are not only inevitable in business, but as it turns out, necessary. Commerce exists because of them, with almost... - [The Sustainability Journey of a Small Irish Business](https://it.ie/the-sustainability-journey-of-a-small-irish-business/): There are many ways to interpret sustainability with the word itself being described as impossibly ambiguous by Kent Porter in... - [Do you really need a UPS?](https://it.ie/do-you-really-need-a-ups/): So, Eamon (our director) asked me to put together a client mailer on Uninterruptible Power Supply (UPS) and my response... - [Cyber Security – The current state of play and how you can protect your business.](https://it.ie/cyber-security-the-current-state-of-play-and-how-you-can-protect-your-business/): As part of their thought leadership series, our partners at Microwarehouse held an online event entitled “Cyber Security: The Current... - [2021 Threat Intelligence Shows Attacks Rising Across the Board](https://it.ie/2021-threat-intelligence-shows-attacks-rising-across-the-board/): While the world continued to grapple with the challenges of 2020 — such as the ongoing COVID-19 pandemic and the... - [Microsoft New Commerce Experience Explained](https://it.ie/microsoft-new-commerce-experience-explained/): Today we are sharing some important information about the new Cloud Solution Provider (CSP) subscription purchasing platform called the New Commerce Experience... - [Beware of Email and SMS Compromise Scams](https://it.ie/beware-of-email-and-sms-compromise-scams/): This week sees the gradual return to the office with the easing of restrictions and while many companies will adopt... - [Managed IT Services – The Essential Business Utility](https://it.ie/managed-it-services-the-essential-business-utility/): Most modern providers of IT Services deliver their solutions in what is commonly referred to as Managed IT Services. While... - [The 12 Scams of Christmas](https://it.ie/the-12-scams-of-christmas/): It may be the season of goodwill and a time for giving but this Christmas we are asking you to... - [Most Popular Google Searches in Ireland for 2021](https://it.ie/most-popular-google-searches-in-ireland-for-2021/): As 2021 draws to a close in a year that was once again overshadowed by the ongoing pandemic, we look... - [What's New in Microsoft Teams November 2021 Update](https://it.ie/whats-new-in-microsoft-teams-november-2021-update/): Each month Microsoft give us an update on all the latest features added to Microsoft Teams. This post published at... - [Take the Free Remote Working Security Course and Quiz](https://it.ie/take-the-free-remote-working-security-course-and-quiz/): Remote work is whenever you’re traveling far from the office... right? Whenever you work from outside the office it will... - [IT.ie signs the Microsoft Partner Pledge](https://it.ie/it-ie-signs-the-microsoft-partner-pledge/): As a Microsoft Gold Partner, IT. ie shares Microsoft’s technology vision and commitment, understanding the pivotal role technology can play... - [Cyber Security Month 2021 – Top Cyber Tips](https://it.ie/cyber-security-month-2021-top-cyber-tips/): As cyber-attacks and their consequences grow, the imperative for cybersecurity awareness has become increasingly evident to businesses, schools, and individuals.... - [The Benefits of Cyber Security Awareness Training](https://it.ie/the-benefits-of-cyber-security-awareness-training/): Cyber Security Awareness Training is one of the best ways to help protect your business from malicious actors and prevent... - [Cyber Attack - The Human Trigger](https://it.ie/cyber-attack-the-human-trigger/): Did you know that human error was a contributing factor in 95% of breaches? Since human error plays such a... - [Cyber Awareness Training - Sowing the seeds of mistrust](https://it.ie/cyber-awareness-training-sowing-the-seeds-of-mistrust/): Most employees have sat in on manual handling courses, first-aid training, safe pass, health & safety meetings but few have... - [What is 2 Factor Authentication and What are the Benefits?](https://it.ie/what-is-2-factor-authentication-and-what-are-the-benefits/): 2 Factor Authentication or 2FA is a security measure that requires you to provide two separate pieces of information before... - [8 Benefits of Microsoft 365 to your Business](https://it.ie/8-benefits-of-microsoft-365-to-your-business/): Microsoft 365 for business, previously known as Office 365 is so much more than just Microsoft Office in the cloud.... - [Ransomware - Do You Trust Your Inbox?](https://it.ie/ransomware-do-you-trust-your-inbox/): Email is the No. 1 threat vector and most cyber-attacks including ransomware occur because of an action carried out by... - [Announcing ISO 27001 Certification](https://it.ie/announcing-iso-27001-certification/): IT. ie are delighted to announce that we have been awarded ISO 27001 standard certification for the provision of Managed... - [7 Benefits of Email Signature Management](https://it.ie/7-benefits-of-email-signature-management/): Emails play a big part in how you run your business with hundreds, if not thousands of emails sent every... - [What's New in Microsoft Teams for 2021 - Part 2](https://it.ie/whats-new-in-microsoft-teams-for-2021-part-2/): Last week Microsoft held their spring Ignite event announcing a host of new features and updates for Microsoft Teams. In... - [What's New in Microsoft Teams for 2021 - Part 1](https://it.ie/whats-new-in-microsoft-teams-for-2021-part-1/): At various times throughout the year, big tech companies host events where they announce new products or exciting updates, and... - [3.2 Billion Email Credentials Leaked Online - How Do You Protect Your Credentials?](https://it.ie/3-2-billion-emails-and-passwords-leaked-online-how-do-you-protect-your-credentials/): Earlier this month it was revealed that hackers now have access to over 3 billion emails and passwords. This is... - [How to split screen in Windows 10](https://it.ie/how-to-split-screen-in-windows-10/): Dual screens are becoming the norm in the office and now for many of us also in the home office.... - [Remote Working: Are you doing it right?](https://it.ie/remote-working-are-you-doing-it-right/): Remote Working: Are you doing it right Eamon Gallagher MD IT. ie Share on facebook Share on twitter Share on... - [Remote Working: A perk of the job or the future of work?](https://it.ie/remote-working-a-perk-of-the-job-or-the-future-of-work/): The workplace saw a dramatic shift in 2020, owing to the Covid-19 pandemic and what was a perk only 12... - [Ireland's Most Popular Google Searches of 2020](https://it.ie/irelands-most-popular-google-searches-of-2020/): As 2020 draws to a close in a year that most would rather forget but will likely remember for a... - [Be a Scrooge This Christmas - Don’t Gift Your Data to Cyber-criminals](https://it.ie/be-a-scrooge-this-christmas-dont-gift-your-data-to-cyber-criminals/): “Beware of Greeks bearing gifts” is a well-known proverb and refers to the famous Trojan Horse used by the Greeks... - [How to Detect a Phishing Email](https://it.ie/how-to-detect-a-phishing-email/): With so much of your time being spent in your inbox, it’s not surprising that this is where cybercriminals are... - [Microsoft Teams - Top New Features Of 2020](https://it.ie/microsoft-teams-top-new-features-of-2020/): This year has seen Microsoft release some welcome new features, including Custom Backgrounds, 3 x 3 view on Desktops and... - [70% of Enterprise Ransomware Victims Pay Up](https://it.ie/70-of-enterprise-ransomware-victims-pay-up/): The world most valuable resource is no longer oil, but data. So what happens when this most valuable of assets... - [Josh O’Regan reflects on his Internship with IT.ie](https://it.ie/national-college-of-ireland-intern-josh-oregan-reflects-on-his-time-with-it-ie/): Over the last 7 months, Josh O’Regan has been working with IT. ie on a paid internship. Josh is about... - [Invoice Redirect Fraud 2020](https://it.ie/invoice-redirect-fraud-2020/): It was reported by RTE, that Gardai in Waterford are investigating after it was discovered that a company was conned... - [How to Add a Custom Background to Microsoft Teams](https://it.ie/how-to-add-a-custom-background-to-microsoft-teams/): For several months now you could enable one of the virtual backgrounds from a small library of backgrounds available in... - [Switching IT Support is Easy with IT.ie](https://it.ie/switching-it-support-is-easy-with-it-ie/): Share on facebook Share on twitter Share on linkedin How many of us are guilty of sticking with service providers... - [Microsoft Teams: The past, the present and the future](https://it.ie/microsoft-teams-the-past-the-present-and-the-future/): Microsoft Teams was launched in early 2017 and has become the companies fastest growing application with approximately half a million... - [Cybercriminals will exploit Remote Workers during COVID-19 Crisis](https://it.ie/cybercriminals-will-exploit-remote-workers-during-covid-19-crisis/): I believe, however, that an element of complacency will set in with remote workers owing to the physical disconnect from... - [Is Your Business Remote Working Ready?](https://it.ie/is-your-business-remote-working-ready/): There’s been a lot of talk about “Remote Working” over the past number of days in light of the spread... - [Five Tips to Avoid Phishing Attacks](https://it.ie/five-tips-to-avoid-phishing-attacks/): Practically everyone has heard of or read about phishing emails and the reason we all know about them is that... - [Ireland’s Most Popular Google Searches of 2019](https://it.ie/irelands-most-popular-google-searches-of-2019/): As 2019 draws to a close, we look back on the most popular Google search queries in Ireland for 2019.... - [5 Reasons why Teams is Microsoft’s favourite child](https://it.ie/5-reasons-why-teams-is-microsofts-favourite-child/): Microsoft Teams isn’t new but there still remains some confusion as to what it actually is and how it can... - [IDS Ireland Domain Name Scam](https://it.ie/ids-ireland-domain-name-scam/): We have been contacted by a number of our customers seeking advice after receiving an email from an entity calling... - [Don’t be tricked this Halloween. October is Cybersecurity Awareness Month](https://it.ie/dont-be-tricked-this-halloween-october-is-cybersecurity-awareness-month/): Share on facebook Share on twitter Share on linkedin Halloween is the one night of the year when ghosts and... - [Brute Force Ransomware Attacks are on the Increase: A Strong Password Policy is your Best Defence](https://it.ie/brute-force-ransomware-attacks-are-on-the-increase-a-strong-password-policy-is-your-best-defence/): Share on facebook Share on twitter Share on linkedin Brute Force Ransomware Attacks are on the Increase: A Strong Password... - [Clicking on links accounts for 99% of all of email attacks](https://it.ie/clicking-on-links-accounts-for-99-of-all-of-email-attacks/): Share on facebook Share on twitter Share on linkedin Just over a year ago we published an article looking at... - [The IT.ie Trinity - Meet the Family](https://it.ie/the-it-ie-trinity-meet-the-family/): Back in 2004 our journey began when PCtechnix was founded by Eamon Gallagher. We primarily operated as a break/fix IT... - [Sextortion Email Scam](https://it.ie/sextortion-email-scam/): Sextortion email scams have been around for quite some time and every now and then a new wave will target... - [Beware of the latest Phishing Scam that Targets Your Google Calendar](https://it.ie/beware-of-the-latest-phishing-scam-that-that-targets-your-google-calendar/): Share on facebook Share on twitter Share on linkedin No matter where you go online, you can expect the scammers... - [Save my BT Email](https://it.ie/save-my-bt-email/): This is a re-post from our partners at Blacknight and concerns anyone who still uses a BT email account.  ... - [SIM Card Swap Scam](https://it.ie/sim-card-swap-scam/): Share on facebook Share on twitter Share on pinterest What is SIM Card Swap Scam? This isn’t a new type... - [Domain Registration Scam](https://it.ie/domain-registration-scam/): IT. ie would like to advise our clients to be on the lookout for a new email scam that’s doing... - [Avoid Malicious Spam and have a Very Merry Christmas](https://it.ie/avoid-malicious-spam-and-have-a-very-merry-christmas/): Christmas is a particularly prevalent time for malicious spam messages.  In addition to the regular email phishing, phones are also... - [Our Top Tips to Keep Your Data Safe](https://it.ie/our-top-tips-to-keep-your-data-safe/): “It won’t happen to me”. Believe me, it probably will, so don’t be a target. We’re all at risk, no... - [FilesL0cker Ransomeware](https://it.ie/filesl0cker-ransomeware/): SonicWall Capture Labs are reporting that a new variant of the FILESLOCKER ransomware is actively spreading.   FilesL0cker RAN$OMWARE (aslo... - [Latest Email Scams](https://it.ie/latest-email-scams/): Unfortunately the scammers aren’t going away and I think it’s fair to say that this is going to get worse before it... - [How to check if your Twitter Account has been hacked](https://it.ie/how-to-check-if-your-twitter-account-has-been-hacked/): How to Check if Your Twitter Account has been Hacked Have you ever wondered if your Twitter account has been... - [HERMES 2.1 Ransomware Advisory](https://it.ie/hermes-2-1-ransomware-advisory/): It has come to our attention via CSIRT-IE that there is current wave on Ransomware attacks taking place and urge... - [Invoice Redirect Fraud](https://it.ie/invoice-redirect-fraud/): Invoice Redirect Fraud Invoice Redirect Fraud Gardai are warning businesses of all sizes to be vigilant of a new wave of... - [Google are now marking HTTP sites as “Not Secure”](https://it.ie/google-are-now-marking-http-sites-as-not-secure/): Google are now marking HTTP sites as “Not Secure” At the start of July Google released the Chrome 68 update... - [Email is the Number One Threat Vector](https://it.ie/email-is-the-number-one-threat-vector/): The greatest threat to your organisation is sitting in the inboxes of your employees. Email is still the number one... - [Disaster Recovery as a Service (DRaaS) Explained](https://it.ie/disaster-recovery-as-a-service-draas-explained/): When you hear the phrase “Disaster Recover” your are probably thinking of inhospitable environments or locations that suffer from extreme... - [Double Up On Your Displays and Never Go Single Again.](https://it.ie/double-up-on-your-displays-and-never-go-single-again/): You may have noticed that there is an increasing adoption of dual or multiple display set ups in business and... - [50% of all search will be voice search by 2020](https://it.ie/50-search-will-voice-search-2020/): I heard something last week that may be common knowledge to many but came as a bit of a surprise... - [Meltdown and Spectre](https://it.ie/meltdown-and-spectre/): What is Meltdown and Spectre We’re only at the start of 2018 and already we have two security risks to... - [Do you know where that USB device came from](https://it.ie/where-did-that-usb-device-come-from/): STOP! ! – Do you know where that USB stick or memory card came from? Was it delivered in the... - [Don't ignore the elephant in the room](https://it.ie/dont-ignore-elephant-room/): By now I’m sure you’ve heard of the impending apocalypse known as GDPR. Or at least that’s what some advisors... - [BadRabbit Ransomware](https://it.ie/badrabbit-ransomware/): Writing about ransomware is starting to feel like a full-time job and unfortunately only days after my latest ransomware piece,... - [Cyber Security - Top Tips](https://it.ie/cyber-security-top-tips/): It seems that there is a new cybersecurity threat emerging, every other day with ransomware and other phishing scams being... - [Keep your Passwords Secure](https://it.ie/keep-passwords-secure/): We all have a multitude of passwords for a multitude of logins to a multitude of websites. What most don’t... - [Check if your email address has been compromised in a data breach](https://it.ie/check-if-your-email-address-has-been-compromised-in-a-data-breach/): It’s almost unimaginable how much of your personal data has accumulated online. Every day most of use, login to accounts,... - [Popular Computer Optimisation Software CCleaner Hacked](https://it.ie/popular-computer-optimisation-software-ccleaner-hacked/): Computer optimisation software is supposed to keep your computers running smoothly. Unfortunately it turns out that one of the most... - [Missed Call (Wangiri) Scam](https://it.ie/missed-call-wangiri-scam/): This post was originally published in August 2017 at the height of the last wave of what is know as... - [CEO Fraud Scam](https://it.ie/ceo-fraud-scam/): Over the last few weeks, we have seen a significant increase in reports of companies being targeted by a particular... - [GDPR and Your Business](https://it.ie/gdpr-and-your-business/): Is your Business GDPR Ready A new regulation relating to data that can be used to identify an individual comes... - [Enforce a Strong Password Policy with Windows Server](https://it.ie/enforce-strong-password-policy-windows-server/): No matter how secure you make a user’s password initially, she will eventually choose her own password. Therefore, you should... - [Beware of fake purchasing order scam](https://it.ie/beware-fake-purchasing-order-scam/): Gardaí are warning businesses of a purchase order scam, following a spate of incidents in Cork recently. In this scam... - [Cybercrime Part 3 - Fighting the Attack](https://it.ie/cybercrime-part-3-fighting-attack/): In Part 2 of this series on cybercrime I explained what Phishing is and how a particular form of phishing,... - [Cybercrime Part 2 - Prepare for the Attack](https://it.ie/cybercrime-part-2-prepare-attack/): In part 1 of this series on cyber crime, I explained its origins and that in its infancy, hacking was... - [Cybercrime Part 1 - A Brief History](https://it.ie/cyber-crime-part-1-brief-history/): Share this article? Share on facebook Share on Facebook Share on twitter Share on Twitter Share on linkedin Share on... - [Get The Most Out Of Microsoft Office 365](https://it.ie/get-microsoft-office-365/): So, I’ve purchased a Microsoft Office 365 subscription for my business. Great  Ok, so I have Word, excel and PowerPoint... - [The Battle Between HDD and SSD – And The Winner Is?](https://it.ie/battle-hdd-ssd-winner/): In conclusion, the threat of cryptojacking is both real and immediate. Understanding its mechanisms, impact, and prevention strategies is crucial... - [Ransomware Market Share](https://it.ie/ransomware-market-share/): Yes, this is a thing now! I can’t believe I’m writing a post about the leader in Ransomware. But it... - [Introducing Microsoft To-Do—now available in Preview](https://it.ie/introducing-microsoft-now-available-preview/): Microsoft have introduced a new, intelligent task management app that makes it easy to plan and manage your day. Say... - [SharePoint Virtual Summit 16 May 2017](https://it.ie/sharepoint-virtual-summit-16-may-2017/): With more than 85 million active users, Office 365 empowers individuals, teams and entire organizations with the broadest and deepest... - [Windows 10 Creators update is now available](https://it.ie/windows-10-creators-update-now-available/): After much beta testing and new feature additions, Microsoft’s Windows 10 Creators Update is finally rolling out. You can either... - [IT.ie - Coming in 2017!](https://it.ie/ie-coming-2017/): We don’t clown around. Our IT Support is frighteningly good 🙂 ! ! https://it. ie/wp-content/uploads/2017/03/IT. ie-Movie-Poster. jpg - [Remote IT Support](https://it.ie/remote-it-support/): - [We're Hiring - Field IT Engineer Required](https://it.ie/were-hiring-field-it-engineer-required/): Field IT Engineer Required.  Salary commensurate with experience. This position is available to the individual who wants to gain vast experience in the IT... - [Windows 10 Snip Tool](https://it.ie/windows-10-snip-tool/): In our last post we explained briefly the benefits and uses of the Windows Snipping Tool. In windows 10 however,... - [Snip Snip](https://it.ie/snip-snip/):   Windows Snipping Tool “Why did I never hear about this tool before now”. “I’ll never get back the hours... - [Confidentiality Agreements](https://it.ie/confidentiality-agreements/): We’re an IT Support & Services company who deals with confidential & sensitive client information on a daily basis. We... - [IT.ie, proud sponsors of Erins Isle](https://it.ie/proud-sponsors-erins-isle/): We are extremely proud to announce our sponsorship of the Erins Isle Junior Football Team. Erins Isle is a Finglas... - [Are you ready for GDPR?](https://it.ie/are-you-ready-for-gdpr/): The General Data Protection Regulation (“GDPR“) will come into effect on 25 May 2018 replacing the existing data protection framework... - [Online Backup v Online Storage](https://it.ie/online-backup-v-cloud-storage/): It can be tricky understand the difference between online backup services vs cloud storage service. Both services effectively store your... - [New Office 365 capabilities help you proactively manage security and compliance risk](https://it.ie/new-office-365-capabilities-help-proactively-manage-security-compliance-risk/):   Missing a key security signal could mean not catching a breach, but the number of security signals is increasing... - [RANSOMWARE: Common Bad Practices Are Your Biggest Threat](https://it.ie/ransomware-common-bad-practices-biggest-threat/):     2016 was without doubt, the year where ransomware became a real threat to business’s worldwide. Ireland has not... - [Sole Trader Splurges on Tech Domian](https://it.ie/sole-trader-splurges-on-tech-domian/): Pithy domain names are hot property and it’s not unusual for large sums of money to be paid to secure... - [Business Plus Publication](https://it.ie/business-plus-publication/): Business Plus Publication. - [IT.ie | Same IT Company. Shorter Name](https://it.ie/ie-company-shorter-name/): - [PCtechnix is now IT.ie](https://it.ie/pctechnix-now-ie/): What a year 2016 is shaping up to be. Having moved to a larger modern premises at the start of... - [IMPORTANT TIP: Business Online Banking](https://it.ie/important-tip-2-step-verification-business-online-banking/): - [We Have Moved](https://it.ie/moved/): PCtechnix. ie Unit 36 Finglas Business Centre, Jamestown Road, Finglas, Dublin 11 D11 FY07 - [Happy Christmas from PCtechnix](https://it.ie/happy-christmas-pctechnix/): See our Christmas newsletter here. - [PCtechnix.ie - Drawing in your Business](https://it.ie/pctechnix-ie-drawing-business/): - [Windows XP: Time to Upgrade?](https://it.ie/windows-xp-end-of-an-era-time-to-upgrade/): For obvious reasons, we’ve had a lot of calls from customers looking for advice on what to do with their... - [Domain Scam - Data Assortment Ireland](https://it.ie/internet-directory-scam-data-assortment-ireland/): Here’s another scam which surfaced in January of this year. This one is very similar to the Internet Register Ireland... - [Happy with your IT? They are...](https://it.ie/happy-with-your-it-they-are/): - [CryptoLocker Ransomware. Your Files held to Ransom!](https://it.ie/cryptolocker-ransomware-your-files-held-to-ransom/): If you are unlucky enough to have been hit by the CryptoLocker ransomware virus, I’m afraid you’re not going to... - [Windows XP. Support ends April 08th 2014.](https://it.ie/windows-xp-support-ends-april-08th-2014/):   - [Bank of Ireland Phishing Scam](https://it.ie/bank-of-ireland-phishing-scam/): Last week a client of mine had €6000 taken from their online bank account. In fact, it was €3000 on... - [Windows 8 Essential HotKeys](https://it.ie/windows-8-hotkeys/): Windows 8 HotKeys are extremely useful to jump to where you need to go on Microsofts newest operating system.   Here’s a condensed list of the more... - [Life is too short to Remove USB Safely](https://it.ie/life-is-too-short-to-remove-usb-safely/): Happy New Year everyone. Here’s some light humour to get 2013 started 🙂         - [Switching Broadband Providers](https://it.ie/switching-broadband-providers/): So you’ve just has a visit from the broadband salesperson. They’ve told you that you’re spending too much money on... - [Online Backup - Buy Online](https://it.ie/online-backup-buy-online/): Customers can purchase their online backup plan from the options below. Payment options. Prices include VAT at 21% 10gb per... - [Laptop Encryption; Understand This? Neither Can He!](https://it.ie/understand-this-neither-does-he/): - [Online Backup - Cheap As Chips](https://it.ie/online-backup-cheap-as-chips/): - [Wishing You All a Very Happy Christmas](https://it.ie/wishing-you-all-a-very-happy-christmas/): Wishing you all a very Merry Christmas and successful 2011! This year we will again be skipping the Chrimstas cards... - [RemoteSupport.ie is Green for Go!](https://it.ie/remotesupport-ie-is-green-for-go/): - [You don’t get the sweats with Online Backup](https://it.ie/you-dont-get-the-sweats-with-online-backup/): - [Office Copy and Scanner Machines - The Unknown Hard Drive](https://it.ie/office-copy-and-scanner-machines-the-unknown-hard-drive/): Not many business owners are aware that since 2002 almost all office copy machines and scanners contain a standard hard... - [Fake Indian Computer Repairs Claiming to be from Microsoft – www.onlinepccare.com [SCAM]](https://it.ie/fake-indian-computer-repairs-claiming-to-be-from-microsoft-www-onlinepccare-com-scam/): The scam: Person of Indian extraction calls a home user claiming to be from Microsoft declaring that the users pc... - [LMFM Radio Advertising](https://it.ie/lmfm-radio-advertising/): We’ve a new radio advert going live next week on LMFM. Have a listen below. - [Irish Revenue Phishing Scam](https://it.ie/irish-revenue-phishing-scam/): The other day I wrote an article to explain what the term Phishing meant. Somewhere in the middle of the... - [Phishing – Don’t Become Cyber Bait](https://it.ie/phishing-dont-become-cyber-bait/):   What is it? Phishing is the act of sending a fraudulent mail to someone under the disguise of a... - [Is peer-to-peer software killing your network?](https://it.ie/is-peer-to-peer-software-killing-your-network/): In recent weeks, various customers have reported issues with their broadband connections where it can disconnect intermittingly throughout the day. The... - [Joining the rest of the Twit – terrers..](https://it.ie/joining-the-rest-of-the-twitterrers/): Last year I suggested in this article that the over use of social networking for business was a bad idea.... - [SEO Scam - Marc Shneider](https://it.ie/seo-scam-marc-shneider/): The scams section of the blog is growing fast! Here’s another spam, scam or as I call it ‘mailware’ to add to... - [Five Years On...](https://it.ie/five-years-on/): I’m absolutely delighted to announce that PCtechnix is now five years in business! Thank you to all our customers who... - [Chinese Intellectual Property Scam on Domain Names](https://it.ie/chinese-intellectual-property-scam-on-domain-names/): It seems that Internet scams are alive and well in China.  I’ve noticed there are a few scams going around... - [Locking down employee internet access](https://it.ie/locking-down-employee-internet-access/): How much time do you think your average employee spends on the Internet during office hours? The answer, if taken... - [Best of Luck to Willows Cancer Caring Team!](https://it.ie/best-of-luck-to-willows-cancer-caring-team/): We would like to wish Richard Greene and the rest of the Willow Cancer Caring team, the very best of... - [The Social Networking Feature Creep.](https://it.ie/the-social-networking-feature-creep/): Today, more than ever, companies are using every conceivable method possible to engage with their customers, to reach new prospective... - [What’s eating your disk space?](https://it.ie/whats-eating-your-disk-space/): For servers that are, let’s say ‘maturing in age’, business owners & management are often faced with the task of... - [The Day I Just Lost Control !!](https://it.ie/the-day-i-just-lost-control/): - [dot ie or dot com?](https://it.ie/dot-ie-or-dot-com/): If it’s cheaper and quicker to setup a dot com domain name, then some people might ask why choose a... - [ICE Broadband just doesn't deliver](https://it.ie/ice-broadband-just-doesnt-deliver/): The Irish Broadband Service Providers generally irritate me. As a small Irish Company providing IT Solutions, we are often asked... - [Employee Password Complexity & Policies](https://it.ie/employee-password-complexity-policies/): When it comes to your employee password policy, you should decide whether your I. T system requires strict policing or... --- # # Detailed Content ## Pages ### Copilot Agent Test - Published: 2025-04-17 - Modified: 2025-04-17 - URL: https://it.ie/copilot-agent-test/ Managed IT Services Ireland EXPERT MANAGED IT SERVICES Exceptional Customer Experience We offer Managed IT Services to companies who want an exceptional customer experience, with minimal downtime and problems quickly resolved. We do this by offering the most secure solutions, based on the very best - and most proactive - support and customer service in the industry. Support Request Get in Touch Live Chat Managed IT Services Ireland MANAGED IT SERVICES Exceptional Customer Experience Get in Touch Live Chat https://it. ie/wp-content/uploads/2024/02/Promo-2024. mp4 Download our Profile We Understand YourFrustrations & Challenges Poor Performance Is IT getting in the way of your team doing their jobs effectively? Is your team complaining about their IT systems being too slow? Poor performing IT = Poor performing people. The challenge of improving business efficiency or planning for the future, when your IT systems aren’t performing at their best can be difficult. With IT. ie's Best-in-Class support, benefit from proactive maintenance and real-time monitoring, ensuring peak performance of your IT systems, directly contributing to enhanced team productivity. Customer Experience Are you satisfied with the experience and service delivery of your existing IT support provider? At IT. ie, we understand the challenges businesses often face with the customer experience provided by their current support services. We address these challenges head-on, ensuring that our clients receive not just technical solutions, but a superior level of IT support and service that truly aligns with their business objectives. At the heart of our ethos lies the mantra "Exceptional Customer Experience,"... --- ### IT.ie Charity Challenge - Published: 2025-02-13 - Modified: 2025-03-25 - URL: https://it.ie/charity-challenge/ Charity Fitness Challenge 2025 2 challenges 2 Charities 1 Month Donate here Facebook Twitter Youtube about the challenges https://it. ie/wp-content/uploads/2025/03/Battle-Cancer-Event. mp4 This March, We Push Our Limits for Two Incredible Causes That’s why this March, we’re taking on not one, but two epic challenges—all in the name of charity. 100 Miles Running Challenge Battle Cancer Challenge Covering 100 miles throughout March in support of the Irish Hospice Foundation. Every step counts in helping provide compassionate care for those facing life-limiting illnesses.  On March 22nd, we’ll take on a 90-minute extreme fitness challenge at the RDS, Dublin, battling through intense workouts to raise vital funds for The Friends of St Luke’s Cancer Care. 2 Months. Two charities. One Team. One Goal Donate Here Why Your Support Matters Both charities do incredible work to support people facing some of life’s toughest challenges. The Irish Hospice Foundation❤️ Provides vital end-of-life care and bereavement support to families across Ireland. The Friends of St Luke’s Cancer Care💙 Funds essential treatment, research, and patient care for those fighting cancer. Donate to The Irish Hospice Foundation Donate to The Friends of St Lukes IT. ie Charity Fitness Challenge How You Can Help Donate Now Click on the iDonate page links below to donate to one or both charities. Spread the Word Share this page and our mission with your friends, family, and colleagues. Cheer Us On Follow our journey, join us at the RDS on March 22nd, or show your support online! Donate Now Visit our iDonate Page --- ### NIS2 Compliance Information - Published: 2025-01-20 - Modified: 2025-01-28 - URL: https://it.ie/nis2-compliance-information/ NIS2 NIS2 Compliance Information The European Union’s NIS2 Directive is reshaping the cybersecurity landscape, raising the bar for organisations to protect their operations and data. At IT. ie, we’re here to help you understand what NIS2 means for your business and how we can guide you to achieve compliance while strengthening your cybersecurity posture. Contact Us What is NIS2? NIS2, the Network and Information Systems Directive, is an EU regulation designed to enhance cybersecurity resilience across essential and important sectors. It introduces stricter obligations for organisations, ensuring that critical infrastructure and key supply chains are protected against evolving cyber threats. This directive applies to businesses across sectors such as energy, healthcare, transport, and financial services, as well as specific digital providers. NIS2 expands the scope of the original NIS Directive, ensuring a comprehensive approach to managing cyber risks in a more interconnected world. Is NIS2 Compliance of Concern to You? If your organisation operates in an essential sector or provides critical services, NIS2 compliance is not optional—it’s a requirement. Falling within its scope means adhering to strict obligations aimed at enhancing cybersecurity. Non-compliance could lead to severe penalties, reputational damage, and disruptions to your operations. :Key Questions to Assess Your Compliance Needs:Are you in scope? Does your organisation fit into one of the essential sectors outlined by NIS2, such as healthcare, energy, digital infrastructure, or transport? Are your suppliers or clients in scope? Even if your business is not directly subject to NIS2, working with organisations that are means compliance... --- ### Test - Published: 2024-12-10 - Modified: 2024-12-10 - URL: https://it.ie/test-2/ The Ultimate Cyber Security Solution for Modern Businesses CyberProtect CyberProtect provides businesses with seamless IT management, enterprise-grade security, and reliable data backup solutions—all in one platform. Built to address the needs of modern organisations, CyberProtect simplifies IT operations while safeguarding your business from digital threats. Get in Touch Live Chat Why CyberProtect is Essential for Your Business Empower your team with a platform designed to simplify IT management, enhance productivity, and reduce operational costs. Centralised control over your IT infrastructureAutomated maintenance and updates for seamless operationBuilt-in compliance tools for data privacy regulationsIT. ie Managed EDR for Windows and MacOS is a cybersecurity solution that's fully managed and monitored by a 24/7, human-led SOC, who detect and investigate threats, triage alerts, and provide actionable remediation steps or one-click solutions – all with a less than 1% false positive rate.   actionable threats are discovered including: Contact Us Streamline IT Operations Centralised control over your IT infrastructure Automated maintenance and updates for seamless operation Built-in compliance tools for data privacy regulations Protect Against Cyber Threats In a world of ever-evolving cyberattacks, CyberProtect ensures your business remains protected with cutting-edge defenses. Multi-layered security to defend against ransomware and malwareAI-powered threat detection and rapid responseSecure backup and disaster recovery for business continuity Contact Us Comprehensive IT Management Take full control of your organisation’s IT landscape. From monitoring to patching, CyberProtect offers tools that empower businesses to thrive in a tech-driven world. Single-pane-of-glass visibilityAutomated software updates and patchesScalable for businesses of all sizes Advanced Cybersecurity... --- ### CyberProtect - Published: 2024-12-05 - Modified: 2025-04-08 - URL: https://it.ie/cyberprotect/ CyberProtect CyberProtect is brought to you by IT. ie. The ultimate Endpoint & User Cybersecurity bundle for your business or organisation. Get In Touch Live Chat What is CyberProtect? CyberProtect, from IT. ie is a flexible, cost-effective bundle of cyber security solutions designed for SMEs that want powerful protection without the complexity. Choose the coverage you need—Endpoint or User—or combine both for full-spectrum defence. No need for multiple vendors. No bloated security stacks. Just smart, scalable protection that works beautifully with Microsoft 365—or on its own. Whay it Matters? In a recent survey from IT. ie of 1000 Irish office workers,  over half admitted to causing a data breach. And only 15% receive the level of training needed to prevent it. CyberProtect Endpoint includes: Anti-Virus Protection – Endpoint Detection & Response (EDR) - Ransomware Detection – Patch Management – 3rd Party Software Management, Remote Monitoring & Management (RMM) and Endpoint Backup CyberProtect User that includes: Cloud Email Protection / Anti Phishing – Microsoft 365 Backup – Cloud Detect & Respond (CDR) – Cyber Awareness Training – Dark Web Monitoring – Phishing Simulations & Testing – 365 Tenant Security Management. Whether you need robust endpoint protection or comprehensive user security, CyberProtect provides an integrated, simplified, and budget-friendly approach to securing your business and meeting regulatory requirements. Request a Free Security Assessment What is CyberProtect? CyberProtect, from IT. ie is a flexible, cost-effective bundle of cyber security solutions designed for SMEs that want powerful protection without the complexity. Choose the coverage you need—Endpoint or... --- ### Giggle Bytes - Published: 2024-09-05 - Modified: 2024-11-22 - URL: https://it.ie/giggle-bytes/ Contact Us Giggle Gallery 1 of 221 - + 1. IT. ie Giggle Bytes at The Laughter Lounge. Photo: Peter Houlihan/Coalesce 2. IT. ie Giggle Bytes at The Laughter Lounge. Photo: Peter Houlihan/Coalesce 3. IT. ie Giggle Bytes at The Laughter Lounge. Photo: Peter Houlihan/Coalesce 4. IT. ie Giggle Bytes at The Laughter Lounge. Photo: Peter Houlihan/Coalesce 5. IT. ie Giggle Bytes at The Laughter Lounge. Photo: Peter Houlihan/Coalesce 6. IT. ie Giggle Bytes at The Laughter Lounge. Photo: Peter Houlihan/Coalesce 7. IT. ie Giggle Bytes at The Laughter Lounge. Photo: Peter Houlihan/Coalesce 8. IT. ie Giggle Bytes at The Laughter Lounge. Photo: Peter Houlihan/Coalesce 9. IT. ie Giggle Bytes at The Laughter Lounge. Photo: Peter Houlihan/Coalesce 10. IT. ie Giggle Bytes at The Laughter Lounge. Photo: Peter Houlihan/Coalesce 11. IT. ie Giggle Bytes at The Laughter Lounge. Photo: Peter Houlihan/Coalesce 12. IT. ie Giggle Bytes at The Laughter Lounge. Photo: Peter Houlihan/Coalesce 13. IT. ie Giggle Bytes at The Laughter Lounge. Photo: Peter Houlihan/Coalesce 14. IT. ie Giggle Bytes at The Laughter Lounge. Photo: Peter Houlihan/Coalesce 15. IT. ie Giggle Bytes at The Laughter Lounge. Photo: Peter Houlihan/Coalesce 16. IT. ie Giggle Bytes at The Laughter Lounge. Photo: Peter Houlihan/Coalesce 17. IT. ie Giggle Bytes at The Laughter Lounge. Photo: Peter Houlihan/Coalesce 18. IT. ie Giggle Bytes at The Laughter Lounge. Photo: Peter Houlihan/Coalesce 19. IT. ie Giggle Bytes at The Laughter Lounge. Photo: Peter Houlihan/Coalesce 20. IT. ie Giggle Bytes at The Laughter Lounge. Photo: Peter Houlihan/Coalesce 21.... --- ### SOC Managed Endpoint Protection and Response (EDR) - Published: 2024-07-17 - Modified: 2024-07-17 - URL: https://it.ie/managed-endpoint-protection-and-response-edr/ Endpoint Detection & Response SOC MANAGED EDR Endpoint Detection and Response (EDR) that’s fully managed by our 24/7 Security Operations Center (SOC). Get in Touch Live Chat 24x7 SOC Managed Endpoint Detection & Response Managed EDR 24x7 Managed Endpoint Security Made for SMBs IT. ie Managed EDR for Windows and MacOS is a cybersecurity solution that's fully managed and monitored by a 24/7, human-led SOC, who detect and investigate threats, triage alerts, and provide actionable remediation steps or one-click solutions – all with a less than 1% false positive rate.   actionable threats are discovered including:Built to filter out the noise and only deliver an incident report when a threat is verified, or action is needed. Designed around the core set of EDR capabilities insurance carriers are looking for. Harder for threats that have gotten past preventive measures to hide with continuous monitoring of process executions and associated metadata. IT. ie's EDR technology collects targeted process data from endpoints without blocking or impeding any of your existing security tools. Contact Us Your Business, Our Expertise Our Managed EDR is built and managed by our expert partner team, with 24/7 detection and response from a human-led SOC. Cybersecurity experts investigate suspicious activity in your environment to eliminate false positives and stop attackers before they do any damage. 24/7 Soc Managed EDR Key Features The Power of “Managed” Say goodbye to false positives and massive alert queues. Our security experts investigate suspicious behavior, triage alerts and hunt hackers down—without putting any of... --- ### Data Protection Policy - Published: 2024-07-04 - Modified: 2024-07-04 - URL: https://it.ie/data-protection-policy/ Data Protection Policy 1 Purpose of PolicyThe purpose of this Data Protection Policy is to inform employees of their obligations under the Data Protection Act 2018, and Regulation (EU) 2016/679 – of the European Parliament and the Council of the European Union; the General Data Protection Regulation (GDPR) and to provide employees with an understanding of confidentiality and clear guidelines regarding the handling of confidential information. 2 IntroductionThis policy applies to the employees of IT. ie (IT. ie/we), including temporary and fixed term employees and contractors who process any personal data.   Employees have obligations as a user of personal data (e. g. personal data of a customer) and as an employee of IT. ie.   The Data Privacy legislation give individuals certain rights regarding information held about them.   It places obligations on those who process information while giving rights to those who are the subject of that data.   Personal information covers both data privacy legislation and opinions about an individual. It is crucial that all staff understand the reasons for processing personal information.   This policy will describe the purpose of obtaining personal data and special categories of personal data (SCOPD) from service users, the principles to follow to safe-keep the information provided in confidence and circumstances when this information may need to be shared, disclosed, accessed or deleted. If employees handle persona data in any way, they should take as much case as possible to ensure they are acting in accordance with IT. ie’s procedures and... --- ### VoIP Telecoms Terms and Conditions - Published: 2024-07-04 - Modified: 2024-07-04 - URL: https://it.ie/voip-telecoms-terms-and-conditions/ VoIP Telecoms Terms & Conditions GENERAL VoIP TELECOMS TERMS AND CONDITIONS (hereinafter referred to as “Terms and Conditions” or “Terms) Date: 04 July 2024 Please read these Terms and Conditions carefully before registering for a chargeable subscription or installing any of the Solution or Services offered on this website operated by “PCTechnix Limited”, a company registered in Ireland with company number CRO 575219, with its registered address at Unit 36, Finglas Business Centre, Jamestown Road, Dublin, D11 EP86and with the EU VAT number IE 3403229JH. Some company services are provided under trade names registered to PCTechnix LTD. These are but are not limited to “IT. IE”. Any reference in this document to these trade names refers to PCTechnix LTD and is not a separate entry. Upon completing our registration for a chargeable subscription to the Solution and Services and/or installing the Solution on your devices and clicking on the accept buttons relating to our Terms and Conditions, Privacy Policy, and Cookie Policy, all of which may be modified and published on our website from time to time. In the event of any inconsistency between the content of the Terms and Conditions, Privacy Policy and then the Cookie Policy. DEFINITIONS “Account” means the numbered account established with PCTechnix LTD that contains any of the following information: Your true, accurate, current, and complete personal name or business name, administrator name, billing address, shipping address, the address where the Services will primarily be used, the records of Your Digital Lines, subscriptions, and any Services that You have purchased from PCTechnix... --- ### Terms and Conditions - Published: 2024-07-04 - Modified: 2024-07-04 - URL: https://it.ie/terms-and-conditions/ --- ### Cookie Policy (UK) - Published: 2024-06-14 - Modified: 2024-06-14 - URL: https://it.ie/cookie-policy-uk/ --- ### Privacy Statement (UK) - Published: 2024-06-14 - Modified: 2024-06-14 - URL: https://it.ie/privacy-statement-uk/ --- ### Business Connect - Published: 2024-05-28 - Modified: 2025-01-08 - URL: https://it.ie/business-connect/ VoIP Telecoms Business Connect Anytime, Anywhere Live Chat Contact Us VoIP Telecoms What is VoIP for Business Before going into details, it’s important to know exactly what a VoIP phone service is. It’s a pretty simple concept. Standing for Voice over Internet Protocol, it’s technology that allows businesses to make calls using the internet instead of over phone lines as with a traditional phone system. How does it work? Business VoIP systems take your analogue voice signals and convert them to digital data. That digital data gets sent through a server before connecting with the internet. It then arrives at its destination, and is transformed back to analogue audio. You can make and receive calls, alongside video conferencing, SMS and instant messaging, and call recording. With a VoIP system, you have everything you need all under one system. All you need is an internet connection. Contact Us Business VoIP Telecoms Advantages & Benefits of VoIP Lower Cost One of the biggest advantages of VoIP is that you have lower costs, with customers saving anything up to 50% when compared to their old system. Higher Quality Because VoIP uses your broadband connection, it offers higher call quality than traditional PSTN/ISDN systems. A VoIP telephone system offers its users HD voice using internet connectivity, with incredible clarity and crisp audio. Service Mobility With VoIP, you don’t need to be in an office and sitting by your desk phone to take phone calls. You can take and make calls from wherever you are... --- ### Business Growth - Published: 2024-05-23 - Modified: 2025-01-08 - URL: https://it.ie/business-growth/ VoIP Telecoms Business Growth Scalable VoIP Solutions Designed for Your Growing Business Live Chat Contact Us Scalable VoIP Solutions Designed for Your Growing Business Unlock the potential of your business with our new Business Growth VoIP solution. Designed to grow alongside your business, this tiered pricing model ensures you have the flexibility and scalability needed to meet your evolving communication needs. Our Business Growth solution offers superior sound quality, cost-effective call rates, and seamless integration with your existing phone numbers. Whether you're a startup or an expanding enterprise, our VoIP system provides a professional and reliable communication platform. Experience the convenience of connecting through your internet with a service that scales with your success. Join the countless businesses that have already upgraded to VoIP and see the difference it can make. Enhance your business communications today with a solution built to grow with you. Contact Us Business VoIP Telecoms Advantages & Benefits of VoIP Lower Cost One of the biggest advantages of VoIP is that you have lower costs, with customers saving anything up to 50% when compared to their old system. Higher Quality Because VoIP uses your broadband connection, it offers higher call quality than traditional PSTN/ISDN systems. A VoIP telephone system offers its users HD voice using internet connectivity, with incredible clarity and crisp audio. Service Mobility With VoIP, you don’t need to be in an office and sitting by your desk phone to take phone calls. You can take and make calls from wherever you are using... --- ### Testimonials - Published: 2024-05-07 - Modified: 2024-06-19 - URL: https://it.ie/testimonials/ Testimonials Contact Us Client Testimonials "Client testimonials are more than just endorsements. They are a mirror reflecting the strengths of our service, the effectiveness of our engagement, and the trust we’ve built. Each testimonial is a story of a promise delivered and a relationship strengthened. " FounderEamon Gallagher Kudos Praise for exceptional work. VouchPersonal assurance of quality. Some of our clients What they say about us Engineering Sector Stephen Keane Director, Tritech Engineering IT. ie have managed our IT support and hardware needs since 2004. During that time they have advised us on network infrastructure, security, policy implementation and hardware options. They support our business operations 24/7/365 and we value and recognise their essential partnership. We look forward to continuing our working partnership with them into the future. Tom Staunton Director, Global Rail Services We use IT. ie Managed Service Support and find it excellent. They in effect are our IT department and provide excellent service for both our office and field-based employees. Pat O'Reilly General Manager - Shomera In 2020 we made the switch to IT. ie. as our service provider. From the initial meeting with Eamon to the transition itself, the whole process was really smooth and the level of service since has been tremendous. I highly recommend them. Andy Pepper Apex Scientific The support team at IT. ie are fantastic. They are fully connected to our systems and get things fixed very quickly. A very good ticket system that gives you confidence it will get sorted. AEI... --- ### St Canice's Clevertouch Transformation: A Case Study - Published: 2024-03-12 - Modified: 2024-03-13 - URL: https://it.ie/st-canices-clevertouch-transformation-a-case-study/ Case Study St Canice's Clevertouch Transformation Get in Touch Live Chat Download the PDF Overview St Canice’s Girls National School, nestled on the Séamus Ennis Road in Finglas, North Dublin, boasts a rich history dating back to its inception in 1943. Originally comprised of just three classrooms, the school has evolved significantly over the decades. The construction of "the main school" in 1963 marked a pivotal expansion, initially catering to both boys and girls before the boys transitioned to a separate facility in 1971. Today, St Canice’s is a vibrant educational institution, teaching approximately 500 girls across three classes at each level from Junior Infants to Sixth Class. Under the dynamic leadership of School Principal Dearbhla White, St Canice’s has embraced digital learning, integrating technology throughout its curriculum to foster a collaborative, and stimulating educational atmosphere. Ms White and her dedicated teaching team are staunch proponents of leveraging digital resources to enrich the learning experience, reflecting a broader trend of technological integration within educational settings. The Challange The impetus for adopting interactive screens at St Canice’s was twofold, according to Ms White. The necessity to keep educational resources current and the desire to harness the full spectrum of technological benefits underscored the decision. "The adoption of technology across the schools has increased over the last few years, with technology being updated throughout the school," Ms White remarked. She highlighted the importance of evolving educational methodologies to include the latest technological advancements, thereby ensuring that students benefit from a diverse and... --- ### Accounts Assistant Vacancy - Published: 2024-03-11 - Modified: 2024-03-12 - URL: https://it.ie/accounts-assistant-vacancy/ Accounts Assistant Vacancy Details Click to Apply on Careers Page Job description Join our team at IT. ie, Ireland's premier Managed IT Services provider, as an Accounts Assistant. In this vital role, you will support our finance department with a range of accounting tasks, ensuring the accuracy and efficiency of our financial operations. This position offers a unique opportunity to develop your accounting skills within a dynamic and supportive environment, contributing significantly to the success of our business operations. Required skill & experience 1 years’ experience in a previous accounting role desirable. Ability to set and meet deadlines. Competent IT Skills – MS Office, Excel, PowerPoint etc. Previous experience working in an MSP is advantageous. Duties Assisting with recurring billing transactions (recurring billing & supplier reconciling etc). Accounts Payable & Receivable. Data Entry & Purchase Orders Processing Invoices Reconciliation of statements, expenses, and credit card invoices Miscellaneous Accounting What we offer Being a part of our esteemed organisation not only offers you a promising career trajectory but also a plethora of benefits. Enjoy generous holiday entitlements after just two years of dedicated service. Secure your future with our pension contributions after your probationary period. Embrace the flexibility of our working conditions, ensuring a work-life balance that suits your lifestyle. Generous holiday entitlements after 2 years of service. Pension contributions (post probationary period). Flexible working conditions. On-site parking Company Events Bike to work scheme Work Schedule Monday to Friday, 09:00 am to 5:30 pm. Click to Apply on Careers Page Share... --- ### Disclaimer - Published: 2024-03-06 - Modified: 2024-06-14 - URL: https://it.ie/disclaimer/ --- ### Privacy Statement (EU) - Published: 2024-03-06 - Modified: 2024-06-14 - URL: https://it.ie/privacy-statement-eu/ --- ### Cookie Policy (EU) - Published: 2024-03-06 - Modified: 2024-06-14 - URL: https://it.ie/cookie-policy-eu/ --- ### News & Media - Published: 2023-12-13 - Modified: 2025-03-28 - URL: https://it.ie/news-media/ IT. ie In the News Contact Us https://it. ie/wp-content/uploads/2023/12/Red-and-Blue-Modern-Breaking-News-Video-Background. mp4 Online Publications Print Publications Press Releases Interviews Feature Article 43% of office employees admit they could inadvertently cause a cybersecurity breach this year A new survey from IT. ie in partnership with SonicWall has found that just over half (51%) of office workers felt more vulnerable to cyberattacks than a year ago, and 43% believed they are at risk of causing a cybersecurity incident in the next 12 months Read the Article 43% of office employees admit they could inadvertently cause a cybersecurity breach this year 43% of office employees admit they could inadvertently cause a cybersecurity breach this year Read the Article 43% of office employees admit they could inadvertently cause a cybersecurity breach this year 43% of office employees admit they could inadvertently cause a cybersecurity breach this year Read the Article Office workers fear they will cause a cybersecurity breach Office workers fear they will cause a cybersecurity breach Read the Article Concern over staff getting blamed for cyber breaches Concern over staff getting blamed for cyber breaches Read the Article Employers blame staff for cybersecurity incidents, most office workers say Employers blame staff for cybersecurity incidents, most office workers say Read the Article 73% of office workers say staff get blamed for cybersecurity incidents - survey 73% of office workers say staff get blamed for cybersecurity incidents - survey Read the Article Employees feel burden of blame for cyberattacks Employees feel burden of blame for cyberattacks... --- ### SonicWall Next Generation Firewall - Published: 2023-09-12 - Modified: 2025-02-26 - URL: https://it.ie/managed-business-firewall/sonicwall-next-generation-firewall/ SonicWall Next Generation Firewall Protect your small business or branch location from intrusion, malware and ransomware with an easy-to-use, integrated security solution designed specifically for your needs. SonicWall TZ firewalls deliver enterprise-grade protection without the cost or complexity. Get in Touch 2025 Threat Report SonicWall Next Gen Firewall (NGFW) TZ Series Overview In an era of the ever-evolving security landscape, small- and medium-sized businesses (SMB) face large challenges when it comes to defending their networks, data and reputation. Keeping up with changes in technology can be as difficult as tracking the growing number of threats. The SonicWall TZ series of firewalls is designed specifically for the needs of SMBs and branch locations, delivering enterprise-class security without the enterprise-grade complexity. With Zero-Touch Deployment and simplified centralized management, installation and operation is easy. Detect sophisticated threats, including encrypted attacks, with advanced networking and security features, like the multi-engine Capture Advanced Threat Protection (ATP) cloud-based sandbox service with patent-pending Real-Time Deep Memory Inspection (RTDMI™). With optional features like PoE/PoE+ support and 802. 11ac Wi-Fi, create a unified security solution for wired and wireless networks. Simply plug in and enjoy the advanced protection of the cost-effective SonicWall TZ series firewall without worrying about complex management — or the next threat. Contact Us Features and Benefits Single-pain-of-glass Management & Reporting Manage everything from one location with Network Security Manager, a unified firewall management system that scales for any environment. SD-WAN and Zero-Touch Deployment Capabilities SonicWall Secure SD-WAN integrates with TZ firewalls without requiring an additional... --- ### Palo Alto Next Generation Firewall - Published: 2023-09-11 - Modified: 2023-09-12 - URL: https://it.ie/managed-business-firewall/palo-alto-next-generation-firewall/ Managed Business Firewall Palo Alto Next Generation Firewall Securing Your Network with Next-Generation Firewall Hardware Contact Us Live Chat Palo Alto Next Gen Firewall (NGFW) Securing Your Network with Next-Generation Firewall Hardware At IT. ie, we are proud to partner with Palo Alto Networks, the industry leader in ML-Powered Next-Generation Firewall (NGFW) solutions. Our collaboration ensures that businesses across Ireland benefit from unparalleled network security, safeguarding data centers, campuses, branches, and small offices. Contact Us The latest ML-Powered NGFWs, including new fourth generation hardware Secure all locations, from the smallest office to the largest data centers in the world and everything in between, with the world's most advanced ML-Powered NGFW. Gain complete visibility and control of applications across all users and devices – anywhere and anytime. PA-7000Palo Alto Networks PA-7000 Series ML-Powered Next-Generation Firewalls (NGFWs) enable enterprise-scale organizations and service providers to deploy security in high-performance environments, such as large data centers and high-bandwidth network perimeters. Read the datasheet >> PA-5450Palo Alto Networks PA-5450 ML-Powered NGFW platform for hyperscale data center, internet edge and campus segmentation deployments. Delivering incredible performance — 152 Gbps with security services enabled, based on a scalable modular design that enables you to increase performance as your needs increase. Read the datasheet >> PA-5400Palo Alto Networks PA-5400 Series ML-Powered Next-Generation Firewalls—comprising the PA-5440, PA-5430, PA-5420, and PA-5410—are ideal for high-speed data center, internet gateway, and service provider deployments. The PA-5400 Series appliances secure all traffic, including encrypted traffic. Read the datasheet >> PA-3400Palo Alto Networks PA-3400... --- ### Fortinet Next Generation Firewall - Published: 2023-09-11 - Modified: 2023-09-12 - URL: https://it.ie/managed-business-firewall/fortinet-next-generation-firewall/ Managed Business Firewall Fortinet Next Generation Firewall FortiGate is the only NGFW with unified management for hybrid mesh firewall Contact Us Live Chat Fortined Next Gen Firewall (NGFW) Partnered with Fortinet to Secure Your Future As a proud partner of Fortinet, we are thrilled to bring you the next generation of firewall solutions, designed to safeguard your business in the most efficient way possible. Leveraging the power of Fortinet's industry-leading innovations, we offer solutions that are not just robust but also scalable to any location, be it a remote office, a bustling campus, a data center, or a cloud environment. Contact Us Fortinet’s Next-Generation Firewall (NGFW) - FortiGate FortiGate stands as the only NGFW solution that offers unified management for a hybrid mesh firewall, ensuring seamless security across complex hybrid environments. The Fortinet FortiOS operating system underpins this solution, offering deep visibility and security across various form factors. Industry-Leading Innovations Fortinet takes pride in being the producer of the only next-gen firewall that features Universal ZTNA, inline sandbox, and SOC-as-a-Service. The FortiGate NGFWs are powered by a custom ASIC architecture, providing industry-leading threat protection and decryption at scale. It integrates features such as SD-WAN, switching and wireless, and 5G, converging your security and networking solutions into a centralized management console powered by FortiOS. Unparalleled Performance FortiGate NGFW stands as the world’s most deployed network firewall, offering unmatched AI-powered security performance and threat intelligence. It promises: Convergence A single operating system ensuring unified networking and security across all form factors and... --- ### IT Service Desk Specialist - Published: 2023-08-30 - Modified: 2023-08-30 - URL: https://it.ie/it-service-desk-specialist/ IT Service Desk Support Vacancy Details Click to Apply on Careers Page Job description IT. ie are seeking an IT Graduate to join its growing Helpdesk and Project Team. You will be working in a progressive, highly effective, personal and responsive IT company ensuring that the day-to-day running of the IT Helpdesk department is held to the highest standard. Remote IT Support & Project work. Daily support of client systems (VoIP, 365 Cloud, Endpoint & Cyber Security, etc). Day to day ticket resolutions. Level 1 Helpdesk Support with ability to progress quite quickly. Office 365, Endpoint Security, Firewall (SonicWALL) Support. New Client/Markets onboarding. Ticket queue management ensuring tickets are assigned and tracked to closure in an efficient and effective manner. PREFERRED EXPERIENCE: Associate Degree in information technology (Graduated in the last 3 years). Highly Technical with a focus on customer service and experience. Self-starter, problem solver, multi-tasker and team-oriented. What we offer Being a part of our esteemed organisation not only offers you a promising career trajectory but also a plethora of benefits. Enjoy generous holiday entitlements after just two years of dedicated service. Secure your future with our pension contributions after your probationary period.   Generous holiday entitlements after 2 years of service. Pension contributions (post proBibendumy period). Flexible working conditions. Supplemental Pay Commission pay through our upsell program. Occasional overtime pay. Work Schedule Monday to Friday, 09:00 am to 5:30 pm. Click to Apply on Careers Page Share this Job : Facebook Twitter LinkedIn Position overview Job Title Helpdesk... --- ### Phoenix BCDR - Published: 2023-08-25 - Modified: 2023-10-10 - URL: https://it.ie/phoenix-bcdr/ Business Continuity and Disaster Recovery Phoenix BCDR Moving Beyond Backup – to Full Business Availability and Data Protection Contact Us Phoenix BCDR Business Continuity and Disaster Recovery Phoenix BCDR by IT. ie is the most comprehensive and cost effective business continuity and disaster recovery (DCDR) solution made specifically for small to medium-sized businesses (SMB's)With just one solution you can meet a range of needs based on budget, environment, infrastructure, and compliance requirements. Simplify your tech stack to significantly cut costs, reduce downtime, and streamline management. Contact Us BUSINESS CONTINUITY & DISASTER RECOVERY Deployment Options Phoenix Cloud Back up all remote endpoints, desktops, laptops, servers, workstations, and Azure data directly to a secure Cloud, your private cloud, or in the public cloud without any pricey appliances. With Phoenix BCDR, Direct-to-Cloud (D2C), we deliver rapid and reliable recovery across dispersed workforces regardless of how data is lost – be it ransomware or other cyberattacks, accidental deletion, or natural disaster. Phoenix Enhanced Cloud For clients seeking a traditional backup and disaster recovery (BDR) system, we offer Phoenix Enhanced BCDR with an appliance. Clients can choose to Bring Your Own Device (BYOD) or purchase or lease appliances from our us – as well as Bring Your Own Cloud (BYOC) or data center or replicate to our partners AWS Irish Datacentres. Regardless, recovery speed and responsiveness to ransomware and other cyberthreats is best-in-class. Both deployment options ensure business continuity with a 15-minute recovery point objective (RPO) and less than a 1-hour recovery time objective (RTO). Phoenix BCDR... --- ### Inside IT Sales - Published: 2023-08-25 - Modified: 2023-09-11 - URL: https://it.ie/inside-it-sales/ Inside Sales (Grad) Vacancy Details Click to Apply on Careers Page Job description IT. ie are seeking a dynamic individual to help grow its Sales Team. The ideal candidate will have experience but it is not a complete prerequisite. An excellent grasp of IT is much more important. Candidate Profile/Requirements 3rd Level qualification in Information Technology Ability to put together comprehensive proposals. Development of a good working relationship with new and existing customers. Excellent understanding of Business IT Systems. High-level of customer service, organisational, and negotiating skills. Detail oriented with good written and verbal communication skills. Excellent computer skills with proficiency in Microsoft Office products. Ability to multi-task, prioritise, and manage time effectively. Must have ability and resources to work from home where required. Account Management. Confident, energetic and extremely well organised. What we offer At IT. ie, we believe in rewarding our employees for their hard work and dedication. We offer a competitive salary that aligns with your experience. In addition to this, we provide a laptop, mobile phone. Our benefits package includes a company pension contribution after 6 months, a training allowance for personal and professional development, and a commission programme. After 2 years of dedicated service, our employees also enjoy generous holiday entitlements. Laptop and Mobile Phone. Company Pension Contribution (after 6 months). Training allowance for development. Commission Programme. Generous holiday entitlements (after 2 years’ service). Salary will meet experience. Hybrid Working Office/Home Work Schedule Monday to Friday, 09:00 am to 5:30 pm. Click to Apply on... --- ### IT Support Field - Galway - Published: 2023-08-25 - Modified: 2023-08-25 - URL: https://it.ie/it-support-field-galway/ IT Support Field - Office Galway Vacancy Details Click to Apply on Careers Page Job description We are looking to hire new Helpdesk L2/L3 Support/Project Engineers. This is an excellent opportunity for the right candidates. You will be working in a progressive, highly effective, personal and responsive IT company ensuring that the day-to-day running of the IT Helpdesk department is held to the highest standard. Duties & Responsibilities: Field & Office Based IT Role. Minimum of 1 year supporting Windows Server 2012/2016/2019. Install Windows Servers, Deploying in live environments. Must have knowledge of VOIP systems – support experience desirable. Strong Office 365 / Azure / SharePoint Experience. Proficient in SonicWALL firewalls or equivalent experience in another brand. Must have good knowledge and ability to diagnose and resolve networking issues. Must have ability and resources to work from home where required. Account Management. Candidate Profile Highly Motivated with the ability to fully manage a project from start to finish. Must be able to document and communicate information. Must have fluent written and verbal English. Time management skills are very important in this role. Excellent Work Ethic. Full Driving Licence. 6 Month probationary period. Confident, personable, and well-rounded individual. What we offer At IT. ie, we believe in rewarding our employees for their hard work and dedication. We offer a competitive salary that aligns with your experience. In addition to this, we provide a laptop, mobile phone, and a company vehicle with a fuel card. Our benefits package includes a company pension... --- ### IT Helpdesk Support Vacancies - Published: 2023-08-23 - Modified: 2023-08-24 - URL: https://it.ie/it-helpdesk-support-vacancies/ Helpdesk Support Vacancy Details Click to Apply on Careers Page Job description We are looking to hire new Helpdesk L2/L3 Support/Project Engineers. This is an excellent opportunity for the right candidates. You will be working in a progressive, highly effective, personal and responsive IT company ensuring that the day-to-day running of the IT Helpdesk department is held to the highest standard. Required skill & experience A minimum of 3-5 years of IT Helpdesk experience. Highly technical and adept at problem-solving. Active Directory and Office 365 experience is essential A self-starter who can multitask, work well in teams, and take initiative. Desirable skills include: ESET, Webroot, Defender, Datto, VoIP & SonicWALL. What we offer Being a part of our esteemed organization not only offers you a promising career trajectory but also a plethora of benefits. Enjoy generous holiday entitlements after just two years of dedicated service. Secure your future with our pension contributions after your probationary period. Embrace the flexibility of our working conditions, ensuring a work-life balance that suits your lifestyle. Generous holiday entitlements after 2 years of service. Pension contributions (post proBibendumy period). Flexible working conditions. Supplemental Pay Commission pay through our upsell program. Occasional overtime pay. Work Schedule Monday to Friday, 09:00 am to 5:30 pm. Click to Apply on Careers Page Share this Job : Facebook Twitter LinkedIn Position overview Job Title Helpdesk Support Job Type Full-time Location Dublin, Ireland Salary Commensurate with experience. Job location --- ### The IT Room - Published: 2023-07-19 - Modified: 2024-06-17 - URL: https://it.ie/the-it-room/ The IT Room Welcome to The IT Room by IT. ie — your video hub for everything IT. From useful How-to guides to insightful Case Studies, from essential Cyber Security Tips to the latest trends in IT, we're here to empower, educate, and keep you ahead of the curve.   Youtube Tiktok Facebook Twitter Linkedin Most Recent https://youtu. be/HJSs6yyacwU Tips & Guides Case Studies Quizzes How They Say It In The Movies! Everything Else --- ### Zero Trust Security - Published: 2023-07-10 - Modified: 2023-07-13 - URL: https://it.ie/zero-trust-security/ Cyber Security | IT. ie Zero Trust Security Building Trust, Reducing Risks Get in Touch Live Chat Cyber Security Zero Trust Security Model Explained Zero Trust Security is a revolutionary cybersecurity model that challenges traditional perimeter-based security practices. Unlike traditional approaches that assume trust within the network, Zero Trust operates under the principle of "never trust, always verify. " It emphasises continuous verification of every user, device, and application attempting to access resources, regardless of their location. In the past, organisations relied on a castle-and-moat approach to security, with a strong perimeter defense protecting the internal network. However, with the rise of cloud services, mobile devices, and remote work, the traditional network perimeter has become porous, leaving organisations vulnerable to sophisticated cyber threats. Zero Trust Security addresses this challenge by implementing a comprehensive security framework that provides granular access controls and continuous monitoring. At its core, Zero Trust Security shifts the focus from network-centric security to a more user-centric and href="https://it. ie/wp-content/plugins/elementor/assets/css/widget-icon-box. min. css"> Verification Zero Trust Security emphasizes continuous verification of user identity, device health, and application integrity. Users and devices are authenticated and authorized at every access request, ensuring only legitimate entities gain access to sensitive resources. Micro-Segmentation Zero Trust Security promotes the segmentation of networks and resources into smaller, isolated segments. This approach limits the lateral movement of threats, preventing them from easily propagating across the network. Adaptive Access Control Zero Trust Security takes into account contextual information such as user location, device health, and network conditions... --- ### Broadband Failover - Published: 2023-06-26 - Modified: 2023-06-26 - URL: https://it.ie/broadband-failover/ IT. ie Broadband Broadband Failover  Streamline Your Business with Expert Insights Get in Touch Live Chat 15+ Experience Due Diligence Introduction Welcome to IT. ie, your trusted partner for Managed IT Services in Ireland. We understand that conducting IT due diligence is crucial for businesses seeking technological growth and sustainability. In today's fast-paced digital landscape, it is essential to ensure that your IT infrastructure aligns with your business objectives. Our comprehensive IT due diligence services provide you with the expert insights needed to make informed decisions and optimise your IT investments. Contact Us What is IT Due Diligence? IT due diligence is a strategic process that evaluates the technology infrastructure and systems of a business to assess its strengths, weaknesses, risks, and opportunities. It involves a meticulous examination of hardware, software, networks, data management, cybersecurity measures, and overall IT governance. By conducting IT due diligence, you gain a comprehensive understanding of your IT landscape, enabling you to make informed decisions and mitigate potential risks. Why is IT Due Diligence Important? Risk Mitigation IT due diligence helps identify potential vulnerabilities and risks within your IT systems, allowing you to address them proactively and minimise the chances of cyber threats, data breaches, and operational disruptions. Business Continuity A thorough evaluation of your IT infrastructure ensures that your systems are resilient, scalable, and capable of supporting your business operations. By identifying areas for improvement, you can optimise your IT environment for enhanced productivity and efficiency. Cost Optimisation IT due diligence enables you to... --- ### Microsoft Teams Room - Published: 2023-06-16 - Modified: 2023-06-28 - URL: https://it.ie/microsoft-teams-room/ Microsoft 365 Microsoft Teams Room Transform Your Meetings with Microsoft Teams Room Get in Touch Live Chat Microsoft Teams Room Experience the Future of Meetings Today!  Microsoft Teams Room is not just a tool, it's a revolution in the way we conduct meetings. With features like one-touch join, content sharing, and intelligent capture, you can focus on what truly matters - your meeting agenda. Get Started Ease the P. A. I. N Problem Are you spending more time setting up your meetings than actually conducting them? Agitation The constant struggle with complex interfaces and setup processes can be draining. Invalidation It's time to move away from complicated meeting tools that hinder your productivity. Need Embrace simplicity with Microsoft Teams Room and make your meetings more efficient. Unleash the Power of Team Collaboration With Microsoft Teams Room, you can bring your team together, no matter where they are. Experience the power of real-time collaboration and make decisions faster. It's time to break down the barriers and build a more connected team. Join the Microsoft Teams Room Revolution Join the thousands of organizations that have transformed their meeting experience with Microsoft Teams Room. It's time to step into the future of meetings. Are you ready? Start Your Microsoft Teams Room Journey Today! Don't wait for the future, create it. Start your journey with Microsoft Teams Room today and experience the difference. Click here to get started! Get in Touch Yealink MeetingBar A20 POWERFULLY SIMPLE   Microsoft Teams Rooms on Android for Small Rooms... --- ### IT Due Diligence - Published: 2023-06-13 - Modified: 2023-06-13 - URL: https://it.ie/it-due-diligence/ Manged IT Services IT Due Diligence  Streamline Your Business with Expert Insights Get in Touch Live Chat 15+ Experience Due Diligence Introduction Welcome to IT. ie, your trusted partner for Managed IT Services in Ireland. We understand that conducting IT due diligence is crucial for businesses seeking technological growth and sustainability. In today's fast-paced digital landscape, it is essential to ensure that your IT infrastructure aligns with your business objectives. Our comprehensive IT due diligence services provide you with the expert insights needed to make informed decisions and optimise your IT investments. Contact Us What is IT Due Diligence? IT due diligence is a strategic process that evaluates the technology infrastructure and systems of a business to assess its strengths, weaknesses, risks, and opportunities. It involves a meticulous examination of hardware, software, networks, data management, cybersecurity measures, and overall IT governance. By conducting IT due diligence, you gain a comprehensive understanding of your IT landscape, enabling you to make informed decisions and mitigate potential risks. Why is IT Due Diligence Important? Risk MitigationIT due diligence helps identify potential vulnerabilities and risks within your IT systems, allowing you to address them proactively and minimise the chances of cyber threats, data breaches, and operational disruptions. Business ContinuityA thorough evaluation of your IT infrastructure ensures that your systems are resilient, scalable, and capable of supporting your business operations. By identifying areas for improvement, you can optimise your IT environment for enhanced productivity and efficiency. Cost OptimisationIT due diligence enables you to assess the... --- ### SOC As a Service - Published: 2023-05-05 - Modified: 2023-05-05 - URL: https://it.ie/soc-as-a-service/ SOC As a Service MANAGED SOC Stop attackers in their tracks with our managed cybersecurity detection and response solution backed by a world-class security operations center. Get in Touch Live Chat 24x7 Threat Monitoring Complete Managed Security for Today’s Threats Endpoint Security Windows & macOS event log monitoring, advanced breach detection, malicious files and processes, threat hunting, intrusion detection, 3rd party NGAV integrations and more. Network Security Firewall and edge device log monitoring integrated with real-time threat reputation, DNS information and malicious connection alerting. Cloud Security Secure the cloud with Microsoft 365 security event log monitoring, Azure AD monitoring, Microsoft 365 malicious logins and overall Secure Score. 15+ ABOUT US 24x7 Cyber Security Powered by Experts Managed SOC as a Service (security operation center) is a managed service that leverages our Threat Monitoring Platform to detect malicious and suspicious activity across three critical attack vectors: Endpoint | Network | Cloud. Our elite team of security veterans hunt, triage and work with your team when actionable threats are discovered including: Continuous Monitoring – Around the clock protection with real-time threat detection World Class Security Stack – 100% purpose-built platform backed by over 50 years of security experience Breach Detection – The most advanced detection with to catch attacks that evade traditional defences Threat Hunting – Elite security team proactively hunt for malicious activity No Hardware Required – Patent pending cloud-based technology eliminates the need for on-prem hardware Managed SOC Key Features The most comprehensive set of features means you can focus you’re your business while... --- ### Case Studies - Published: 2023-05-02 - Modified: 2024-03-13 - URL: https://it.ie/case-studies/ IT. ie CaseStudies Live Chat Get in Touch Clevertouch Transformation Clevertouch Transformation St Canice's GNS transforms education with Clevertouch Interactive Displays for education. Read Now Cultivating Growth and Stability Cultivating Growth and Stability McCormack Family Farms’ Transformation with Proactive Managed IT Services Read Now Digital Transformation Digital Transformation How IT. ie helped Shomera adapt to new ways of working with a complete Digital Transformation. Read Now Human Risk Management Human Risk Management The impact of Human Risk Management on a medium-sized company in the construction industry. Read Now CERTIFIED ISO 27001 ISO 27001 provides clients with a robust information security management system, ensuring the confidentiality, integrity, and availability of their sensitive data. This internationally recognised standard delivers peace of mind and demonstrates a commitment to data protection, helping clients to comply with legal and regulatory requirements and building trust with customers and partners. Learn more about IT. ie Download our Profile Some of Our Clients What They Say Stephen Keane Director, Tritech Engineering IT. ie have managed our IT support and hardware needs since 2004. During that time they have advised us on network infrastructure, security, policy implementation and hardware options. They support our business operations 24/7/365 and we value and recognise their essential partnership. We look forward to continuing our working partnership with them into the future. Tom Staunton Director, Global Rail Services We use IT. ie Managed Service Support and find it excellent. They in effect are our IT department and provide excellent service for both our office... --- ### McCormack Family Farms' Transformation with Proactive Managed IT Services - Published: 2023-05-02 - Modified: 2023-12-22 - URL: https://it.ie/mccormack-family-farms-transformation-with-proactive-managed-it-services/ Case Study McCormack Family Farms' Transformation with Proactive Managed IT Services Get in Touch Live Chat Download The PDF Overview McCormack Family Farms is a second-generation family farm and Ireland’s leading grower of baby salad leaves, herbs, microgreens and edible flowers, renowned for their Honest Leaf ethos. They have experienced significant growth in their business in the last decade. However, they also faced significant IT challenges that had the potential to hinder their productivity and growth. McCormack Family Farms did have an agreement with an existing provider but found that while they were reactive to IT issues, what they required was a proactive IT partner and decided to engage with several other providers and seek recommendations.   “IT. ie were the only company that facilitated an on-site visit to our headquarters and put forward a proposal that was in line with our own roadmap”. Andrew Farrelly McCormack Family Farms  McCormack Family Farms decided to partner with IT. ie as their Managed IT Services provider to address their IT challenges. The Challanges McCormack Family Farms encountered various obstacles that were impeding their business operations and expansion. To tackle these challenges, they sought the assistance of a proactive Managed IT Services partner who could provide them with a comprehensive solution. Recurring Downtime The farm’s existing server was outdated and prone to frequent downtime, resulting in lost productivity and potentially impacting growth and revenue. Cyber Security With the growing reliance on technology and digital connectivity, the farm faced increased security risks that could potentially... --- ### IT Support for Manufacturing & Supply Chain - Published: 2023-04-20 - Modified: 2023-04-20 - URL: https://it.ie/it-support-for-manufacturing-supply-chain/ Managed IT Services IT Support for Manufacturing & Supply Chain Expert IT solutions for the manufacturing and supply chain industry Get in Touch Revolutionise Your Manufacturing & Supply Chain with Managed IT Services Streamline your operations and improve efficiency with our expert IT solutions Are you tired of facing downtime and production delays in your manufacturing and supply chain operations?   Are you worried about the security of your sensitive data and the potential for cyber attacks? Do you feel limited by off-the-shelf IT solutions that don't fully meet your business's unique needs? Our expert IT support for manufacturing and supply chain can help alleviate these pains and transform your operations. With our Managed IT Support, advanced cybersecurity measures, and customisable IT solutions, you can streamline your operations, prevent costly errors, and protect your sensitive data. Say goodbye to inefficiencies and limitations and revolutionise your business with our IT Support for Manufacturing & Supply Chain.   Get Started Some of our IT Services Managed IT Support Read More Remote IT Support Read More Cyber Security Read More Microsoft 365 Read More Cloud Backup Read More Cyber AwarenessTraining Read More VoIP Solutions Read More Managed Email Security Read More Managed IT Services The Benefits Managed IT Services provide significant benefits to the manufacturing and supply chain industry by streamlining operations, enhancing productivity, and ensuring data security. By outsourcing IT management to skilled professionals, businesses can focus on their core competencies while reducing downtime and minimising the risks associated with technological disruptions.... --- ### Human Risk Management Case Study Construction Industry - Published: 2023-04-14 - Modified: 2023-12-22 - URL: https://it.ie/human-risk-management-case-study-construction-industry/ Case Study Human RiskManagement Construction Industry Get in Touch Live Chat Customer Objectives Identify which employees are at high risk of being compromised in a phishing attack. Obtain an ongoing view of which employees are vulnerable to phishing attacks. Deliver regular security awareness training that will help drive user resilience to phishing attacks, as well as improve general security behaviour. Demonstrate compliance with ISO 27001 Clause 7. 2. 2. Customer Profile Industry Construction User Count 200 employees Using Service Since August 2020 The Challange/Drivers The Attack A member of staff was compromised in a 'Gift Card' phishing attack. Current Training Current security awareness training materials are unengaging and ineffective. Current Approach Current security awareness training approach is too time-consuming The Solutions Cyber Awareness Training GAP Analysis Analyse each users' current security strengths and weaknesses using a Gap Analysis Quiz. Course Delivery Using the results of the quiz, each employee will receive a new security awareness course every four weeks, with courses being prioritised to address their weakest areas first. Automation Custom compliance courses will also be delivered periodically. Simulated Phishing Campaigns & Dark Web Monitoring Simulated Phishing At least one phishing simulation will be launched every six months, in order to test the impact of the training and to identify any high-risk users. Follow up Training Instant follow-up training will be deployed to any employees who compromise their credentials during a phishing simulation, in order to reduce risk as soon as possible. Dark Web Monitoring Ongoing dark web monitoring will... --- ### Shomera's Digital Transformation Journey with IT.ie: A Case Study - Published: 2023-03-31 - Modified: 2023-12-22 - URL: https://it.ie/shomeras-digital-transformation-journey-with-itie-a-case-study/ Case Study Shomera'sDigital Transformation Get in Touch Live Chat Download the PDF Overview Shomera are the largest provider of House Extensions and Garden Rooms in Ireland and the UK. Their innovative team of designers and builders work closely with their clients to create unique living and working spaces that have graced the covers of magazines and featured in numerous television shows.  During the lockdown, Shomera saw a significant rise in demand for their services due to the shift to remote working. The need for private workspaces at home or remote locations was essential, which was at the core of Shomera's solution. It became clear that their business was about to experience significant growth. However, Shomera realised that their current IT systems were not adequate to handle the increase in demand, nor were they suitable for remote working. This realisation prompted Shomera to embark on a digital transformation journey, which included engaging with IT. ie for a solution. To address these challenges, IT. ie recommended a complete overhaul of Shomera's IT systems and a transition to cloud-based solutions. IT. ie began by implementing a managed firewall and endpoint security solution to ensure Shomera's systems were secure. Next, IT. ie moved Shomera's entire email and shared file system to Microsoft Office 365 and SharePoint to support remote working. Lastly, IT. ie migrated Shomera's phone system from an old PBX system to a new VoIP system that was fully integrated with Microsoft Teams. Overall, the digital transformation undertaken by Shomera and IT. ie... --- ### Meeting Room Booking - Published: 2023-02-20 - Modified: 2023-02-20 - URL: https://it.ie/digital-signage/meeting-room-booking/ Meeting Room Booking Sedao Live Rooms Download Brochure Request a Quote Live Rooms – Easy and versatile room booking Live Rooms is the perfect solution for simplifying your meeting room booking process. With the ability to book from your desktop PC calendar or live at the source, you can quickly and easily secure a room for your next meeting. The LED lighting system allows you to instantly see the status of the meeting room, making it easy for staff to locate and utilize the space without losing valuable productivity time. Trust Live Rooms to streamline your booking process and improve the efficiency of your meetings. Sedao Live Rooms A part of the Clevertouch Digital Ecosystem Live Rooms integrates with the Clevertouch Digital Ecosystem so you can play digital signage on the room booking panel and send messages across your digital signage screens, interactive display panels as well as room booking.   Send instant messages, promotions and communicate with staff on your entire suite all from the same platform you manage your room booking. Simple touchscreen interface Integrates with Microsoft Exchange Manage content online with SedaoLive Full function digital signage player Wall mounting brackets Quick and easy ​​​​​​​to use https://youtu. be/CP9-ZyZkvLs Personalise your displayEditable templates for personalised branding to suit your company or visitors. Delivering your messageDisplays can be used as digital signage to present promotional messages and emergency alerts. Availability status displayPanels display availability with lighting showing red when in use, orange when booked and waiting to be claimed, and... --- ### Mailchimp MIT - Published: 2023-02-07 - Modified: 2023-02-07 - URL: https://it.ie/mailchimp-mit/ Mailchimp MIT List Managed IT Clients Please add all new and updated MIT contacts to Mailchimp List  Subscribe * indicates required Email Address * Company Name * First Name * Last Name Phone Number Marketing Permissions Please select all the ways you would like to hear from IT. ie: Email Direct Mail Customized Online Advertising You can unsubscribe at any time by clicking the link in the footer of our emails. For information about our privacy practices, please visit our website. We use Mailchimp as our marketing platform. By clicking below to subscribe, you acknowledge that your information will be transferred to Mailchimp for processing. Learn more about Mailchimp's privacy practices here. --- ### Assessing Cyber Threats and Mitigating Measures for SME's in Ireland - Published: 2023-01-27 - Modified: 2023-02-01 - URL: https://it.ie/assessing-cyber-threats-and-mitigating-measures-for-smes-ireland-2023/ Assessing Cyber Threats and Mitigating Measures for SME's in Ireland. The aim of this survey is to gather valuable insights and information from your company regarding the prevalence of cyber threats affecting Small and Medium Enterprises (SMEs) in Ireland, as well as the measures being taken to address these risks. The research question we aim to answer is: "What are the most prevalent cyber threats facing SMEs in Ireland and what measures are being implemented to mitigate these security risks? " Your Input is Valuable and Anonymous --- ### Resources - Published: 2022-12-16 - Modified: 2025-04-09 - URL: https://it.ie/resources/ IT. ie Guides & Resources Download our free PDF guides and resources.   The Ultimate Microsoft Copilot Cheat Sheet The Ultimate Microsoft Copilot Cheat Sheet This cheat sheet is your go-to guide for getting the most out of Copilot. Download the PDF Managed IT Services Your Guide to Finding the Right Partner Managed IT Services Your Guide to Finding the Right Partner Choosing the right IT partner is vital. Our guide helps you navigate this decision with confidence. Download the Guide IT Needs Assessment Checklist IT Needs Assessment Checklist Assess your IT needs with our practical checklist and find the right partner for your organisation. Download the PDF Free Cyberto Poster Pack Free Cyberto Poster Pack Boost your team's cyber awareness with our Cyberto Poster Pack. Educate and protect with essential security tips! Download the Guide Cyber Awareness Poster Pack Volume 1 Cyber Awareness Poster Pack Volume 1 Empower your team with Cyber Awareness Poster Packs! SECURE - EDUCATE - PROTECT Download the PDF Cyber Awareness Poster Pack Volume 2 Cyber Awareness Poster Pack Volume 2 Empower your team with Cyber Awareness Poster Packs! SECURE - EDUCATE - PROTECT Download the PDF Cyber Security: A Guide for SME's Cyber Security: A Guide for SME's Secure your business with our comprehensive Cyber Security Guide tailored for SMEs. Download now via our blog page. Download the Guide The Ultimate Guide to Outlook Keyboard Shortcuts The Ultimate Guide to Outlook Keyboard Shortcuts Explore our essential Outlook keyboard shortcuts for efficient email and calendar... --- ### Most Popular Google Searches in Ireland for 2022 - Published: 2022-12-07 - Modified: 2022-12-07 - URL: https://it.ie/most-popular-google-searches-in-ireland-for-2022/ As 2022 draws to a close, Google has revealed the most popular trending searches in Ireland for the year. Covid associated queries that featured prominently in 2020 and 2021 were relegated with “Wordle” now sitting on top of the table for the most popular overall search query in Ireland for 2022. Wordle was created by Josh Wardle who initially created the game for himself and his partner to play before making it public in 2021. The game really took off when he added the ability for players to share their daily results on Twitter. Like so many of you, I was addicted to this game in the early part of the year before losing interest after breaking my streak. Heardle at number six for overall search queries is a word I never came across before today and unsurprisingly, had to Google it. It looks like a fun music trivia game that I'll have to try. Queries that would appear to relate to the ongoing conflict in Ukraine featured prominently on Google search, this year with both ‘Ukraine’ and ‘Russia’ featuring in the top 10 overall searches. As people across the world feared an escalation in the conflict beyond Ukraine and the talk of nations evoking various NATO, articles people across Ireland wanted to know a little more about NATO and went to Google for the answers. The most popular movie-related query this year was ‘The Batman’. To be fair the movie and its leading man Robert Pattinson, were better than... --- ### Modern Workplace - Empowering Digital Transformation - Published: 2022-10-21 - Modified: 2022-11-22 - URL: https://it.ie/modern-workplace-empowering-digital-transformation/ Microsoft Modern Workplace - Empowering Digital Transformation Reinvent the workplace experience and embrace Digital Transformation Get in Touch Elevate the Workplace Experience and Embrace Digital Transformation Implementing a Modern Workplace not only empowers your team by delivering a truly collaborative and secure working environment but it also allows you to embrace Digital Transformation across your entire organisation.  Employees expect to work securely from anywhere, on any device, and they put a high premium on work that enriches and fulfills them. When their productivity tools enhance the quality and effectiveness of their work experience, they’re happier, more valuable, and more likely to stay. Companies need to provide that empowerment, but they also need to protect vital IT assets. It’s a fundamental operational change for your customers—and an opportunity for you. With Microsoft Modern Workplace solutions, your customers can improve employee productivity and satisfaction, and create more seamless communication and collaboration across locations and platforms while maintaining the security and integrity of systems and data. Microsoft's Modern Workplaces enables you to: Initiate – seamless communication across the businessEnable Remote Workers – to connect and collaborate seamlessly, using any deviceAutomate – time consuming tasks and workflows to boost user productivityIntroduce Single Sign-on – users sign-in once to access multiple applicationsConnect Everyone – to a central document storage centre that accelerates research, discovery and updates to collaborative projectsWork Together – enabling internal and external teams to come together and collaborateEliminate – team and data silosImprove Security – protect ID, business applications, data and devices using integrated cloud-based enterprise-grade security solutions Get Started... --- ### Cloud Computing Services - Published: 2022-10-17 - Modified: 2022-12-14 - URL: https://it.ie/cloud-computing-services/ Cloud Solutions Cloud Computing Services We help you migrate your business to the cloud and enable you to harness the power of the cloud with its multitude of advanced on-demand computing services with increased flexibility, scalability and reliability.    Get in Touch Cloud Computing Services The cloud is an online service that provides access to shared resources, software, and information over the Internet. It allows users to store data in remote locations for easy retrieval and use. As a Microsoft Cloud Solutions provider (CSP) IT. ie has been providing a host of cloud computing services to clients for many years. The vast majority of Cloud solutions provide added value compared to server-based software; the core being cost efficiency. The additional security and mobility advantages that Cloud-based solutions offer are another reason why millions of businesses are switching to the Cloud every day. Delivering Cloud Solutions to businesses across Ireland Cloud computing is the delivery of a series of computing services (servers, storage, desktops, VoIP and more) over the Internet, rather than data taking up storage on on-site servers and machines. Instead, the data is stored in remote and powerful data centres. Get Started Benefits of Cloud Computing There are many benefits to using cloud computing, including increased flexibility and scalability, reduced costs, and improved collaboration and productivity. Some specific benefits include: On-demand Access to Computing Resources Increased Scalability and Flexibility Improved, Collaboration and Productivity Reduced Costs Enhanced Security With cloud computing, you can quickly and easily access a wide range... --- ### Microsoft Defender EDR - Published: 2022-09-28 - Modified: 2022-10-17 - URL: https://it.ie/microsoft-defender-edr/ Microsoft 365 Microsoft Defender EDR Advanced Threat Protection to Discover and secure endpoint devices across your Organisation. Get in Touch Learn More Rapidly stop threats Gain the upper hand against sophisticated threats like ransomware and nation-state attacks. Scale your security Put time back in the hands of defenders to prioritize risks and elevate your security posture. Evolve your defenses Advance beyond endpoint silos and mature your security based on a foundation for extended detection and response (XDR) and Zero Trust. Capabilities Gain a holistic view into your environment, mitigate advanced threats, and respond to alerts from a single, unified platform. Eliminate the blind spot in your environment Discover vulnerabilities and misconfigurations in real time Quickly go from alert to remediation at scale with automation Block sophisticated threats and malware Detect and respond to advanced attacks with deep thread monitoring and analysis Eliminate risks and reduce your attack surface Secure your mobile devices Simplify endpoint security management Eliminate the blind spot in your environment Eliminate the blind spots in your environmentDiscover unmanaged and unauthorized endpoints and network devices and secure these assets using integrated workflows. Discover vulnerabilities and misconfigurations in real time Discover vulnerabilities and misconfigurations in real timeBring security and IT together with threat and vulnerability management to quickly discover, prioritize, and remediate vulnerabilities and misconfigurations. Quickly go from alert to remediation at scale with automation Quickly go from alert to remediation at scale with automationAutomatically investigate alerts and remediate complex threats in minutes. Apply best practices and intelligent decision-making algorithms to... --- ### Managed Print Services for Schools and Education - Published: 2022-09-13 - Modified: 2022-09-19 - URL: https://it.ie/managed-print-services-for-schools-and-education/ Managed IT Services for Schools Managed Print Services for Schools and Education Save around on your printing costs with our Managed Print Services for your school. Get in Touch Are you concerned about how much your Printing or Photocopying is costing you? Managed Print Services for Schools Schools have evolved with an increased demand for a more effective approach to printing. A Managed Print Service Solution is the easiest way to transform the way you work, increasing your print output and profitability whilst offering you complete control over your print infrastructure and simplifying the way your staff print. IT. ie – Managed Print Services for schools enables you to control your printing costs by identifying the real cost of your Printing & Photocopying & then tailoring a customized printing solution to match your school's needs. • We Analyse your printing costs and get the most from your budget and print systems• We reduce or eliminate unnecessary printers & photocopiers, so that you can optimise your return on investment• We eliminate the hidden costs associated with managing your printers & photocopiers. Managed Print Services is a solution that allows you to reduce your printing costs by tailoring a printing solution to match your Print needsCall us today on 01 8424114 or email us hello@it. ie for a FREE Audit of your existing printing process & systems. Request a Free Print Audit Designed to meet your school's needs We supply print solutions that help you monitor usage and track your print spend... --- ### IT Support for Religious Organisations - Published: 2022-08-11 - Modified: 2022-08-11 - URL: https://it.ie/it-support-for-religious-organisations/ IT Support for Religious Organisations HELPING RELIGIOUS ORGANISATIONS TO GET MORE FROM THEIR ONGOING IT INVESTMENT Fully Managed IT Support Services and IT Solutions for Religious and Not-For-Profit Organisations Get in Touch IT Support for Religious Organisations There is power in numbers, but when it comes to your technology, less can sometimes mean more. Our IT support for religious organisations provides your congregation and volunteers with the tools they need to accomplish your mission. We empower your organisation to make a lasting impact with IT resources that support working on the go, and boost collaboration outside of your place of worship. IT. ie is a Premium IT support services provider that works closely with Religious and not-for-profit organisations throughout Ireland. Our Managed IT Services include IT Support, IT Consultancy, Data Backup, IT Security, Network Support and a wide range of IT Solutions including Microsoft Office 365, VoIP Solutions for Business and Cyber Awareness Training Our Managed IT Services and Solutions are tailored to meet the needs and demands of your charity and designed to maximise your IT infrastructure, now and into the future. IT. ie is proud to be chosen as the Managed Service Provider (MSP) for 100’s of businesses, charities, and schools across Dublin and nationwide.   We are a Guaranteed Irish company with ISO 27001 accreditation and a Gold Microsoft partner.   Get Started Some of our IT Services Managed IT Support Read More Remote IT Support Read More Cyber Security Read More Microsoft 365 Read More Cloud Backup Read... --- ### IT Support Tipperary - Published: 2022-07-19 - Modified: 2022-07-19 - URL: https://it.ie/it-support-tipperary/ Managed IT Services IT Support Tipperary Welcome to IT. ie. The home of Managed IT Services in Tipperary and nationwide. We specialise in providing Managed IT Services and solutions designed to transform your business through technology.   We are ISO 27001 certified a Microsoft Gold Partner and Guaranteed Irish accredited. Support Request Get in Touch IT Support Tipperary As a leading provider of IT Support in Tipperary, we ensure that we stand out from the rest by delivering to you a highly strategic approach to IT services backed up by our team of IT industry experts. As a certified Microsoft Gold Partner, we specialise in Microsoft 365, Microsoft Azure and SharePoint along with the latest business applications within the Microsoft growing ecosystem. We also specialise in Managed IT Security Services and offer advice on the most appropriate solution to protect your IT infrastructure and valuable data. Our latest offering of Cyber Security Awareness Training has proved hugely popular with clients and helps to ensure that your employees are your strongest defence against a cyberattack and not your weakest link.  Our clients vary in size from well-known national brands to a wide variety of small to medium-sized businesses. If you are considering outsourcing any element of your IT and want to engage with a company that has the experience, proven reliability, trust and delivers on its promises, why not get in touch with us. We Understand Your Frustrations & Challenges Lack of Time Poor Performance Cyber Security Change Is IT taking... --- ### IT Support Westmeath - Published: 2022-07-19 - Modified: 2022-07-19 - URL: https://it.ie/it-support-westmeath/ Managed IT Services IT Support Westmeath Welcome to IT. ie. The home of Managed IT Services in Co Westmeath and nationwide. We specialise in providing Managed IT Services and solutions designed to transform your business through technology.   We are ISO 27001 certified a Microsoft Gold Partner and Guaranteed Irish accredited. Support Request Get in Touch IT Support Westmeath As a leading provider of IT Support in Co Westmeath, we ensure that we stand out from the rest by delivering to you a highly strategic approach to IT services backed up by our team of IT industry experts. As a certified Microsoft Gold Partner, we specialise in Microsoft 365, Microsoft Azure and SharePoint along with the latest business applications within the Microsoft growing ecosystem. We also specialise in Managed IT Security Services and offer advice on the most appropriate solution to protect your IT infrastructure and valuable data. Our latest offering of Cyber Security Awareness Training has proved hugely popular with clients and helps to ensure that your employees are your strongest defence against a cyberattack and not your weakest link.  Our clients vary in size from well-known national brands to a wide variety of small to medium-sized businesses. If you are considering outsourcing any element of your IT and want to engage with a company that has the experience, proven reliability, trust and delivers on its promises, why not get in touch with us. We Understand Your Frustrations & Challenges Lack of Time Poor Performance Cyber Security Change Is... --- ### IT Support Monaghan - Published: 2022-07-19 - Modified: 2022-07-19 - URL: https://it.ie/it-support-monaghan/ Managed IT Services IT Support Monaghan Welcome to IT. ie. The home of Managed IT Services in Co Monaghan and nationwide. We specialise in providing Managed IT Services and solutions designed to transform your business through technology.   We are ISO 27001 certified a Microsoft Gold Partner and Guaranteed Irish accredited. Support Request Get in Touch IT Support Monaghan As a leading provider of IT Support in Co Monaghan, we ensure that we stand out from the rest by delivering to you a highly strategic approach to IT services backed up by our team of IT industry experts. As a certified Microsoft Gold Partner, we specialise in Microsoft 365, Microsoft Azure and SharePoint along with the latest business applications within the Microsoft growing ecosystem. We also specialise in Managed IT Security Services and offer advice on the most appropriate solution to protect your IT infrastructure and valuable data. Our latest offering of Cyber Security Awareness Training has proved hugely popular with clients and helps to ensure that your employees are your strongest defence against a cyberattack and not your weakest link.  Our clients vary in size from well-known national brands to a wide variety of small to medium-sized businesses. If you are considering outsourcing any element of your IT and want to engage with a company that has the experience, proven reliability, trust and delivers on its promises, why not get in touch with us. We Understand Your Frustrations & Challenges Lack of Time Poor Performance Cyber Security Change Is... --- ### IT Support Cavan - Published: 2022-07-19 - Modified: 2023-01-17 - URL: https://it.ie/it-support-cavan/ Managed IT Services IT Support Cavan Welcome to IT. ie. The home of Managed IT Services in Cavan and nationwide. We specialise in providing Managed IT Services and solutions designed to transform your business through technology.   We are ISO 27001 certified a Microsoft Gold Partner and Guaranteed Irish accredited. Support Request Get in Touch IT Support Cavan As a leading provider of IT Support in Co Cavan, we ensure that we stand out from the rest by delivering to you a highly strategic approach to IT services backed up by our team of IT industry experts. As a certified Microsoft Gold Partner, we specialise in Microsoft 365, Microsoft Azure and SharePoint along with the latest business applications within the Microsoft growing ecosystem. We also specialise in Managed IT Security Services and offer advice on the most appropriate solution to protect your IT infrastructure and valuable data. Our latest offering of Cyber Security Awareness Training has proved hugely popular with clients and helps to ensure that your employees are your strongest defence against a cyberattack and not your weakest link.  Our clients vary in size from well-known national brands to a wide variety of small to medium-sized businesses. If you are considering outsourcing any element of your IT and want to engage with a company that has the experience, proven reliability, trust and delivers on its promises, why not get in touch with us. We Understand Your Frustrations & Challenges Lack of Time Poor Performance Cyber Security Change Is IT... --- ### IT Support Waterford - Published: 2022-07-19 - Modified: 2024-10-09 - URL: https://it.ie/it-support-waterford/ Managed IT Services IT SUPPORT WATERFORD Welcome to IT. ie. The home of Managed IT Services in Waterford and nationwide.   Support Request Get in Touch Live Chat IT Support Waterford As a leading provider of IT Support in Waterford, we ensure that we stand out from the rest by delivering to you a highly strategic approach to IT services backed up by our team of IT industry experts. As a certified Microsoft Gold Partner, we specialise in Microsoft 365, Microsoft Azure and SharePoint along with the latest business applications within the Microsoft growing ecosystem. We also specialise in Managed IT Security Services and offer advice on the most appropriate solution to protect your IT infrastructure and valuable data. Our latest offering of Cyber Security Awareness Training has proved hugely popular with clients and helps to ensure that your employees are your strongest defence against a cyberattack and not your weakest link.  Our clients vary in size from well-known national brands to a wide variety of small to medium-sized businesses. If you are considering outsourcing any element of your IT and want to engage with a company that has the experience, proven reliability, trust and delivers on its promises, why not get in touch with us. Talk to the experts Live Chat We Understand YourFrustrations & Challenges Lack of Time Is IT taking up most of your time to manage or even fix? Does your IT Service provider respond to issues quickly and effectively? Your time is better spent on... --- ### IT Support Wexford - Published: 2022-07-19 - Modified: 2024-10-09 - URL: https://it.ie/it-support-wexford/ Managed IT Services Wexford IT Support Wexford Exceptional Customer Experience We offer Managed IT Services to companies who want an exceptional customer experience, with minimal downtime and problems quickly resolved. We do this by offering the most secure solutions, based on the very best - and most proactive - support and customer service in the industry. Support Request Get in Touch Live Chat https://it. ie/wp-content/uploads/2024/02/Promo-2024. mp4 Download our Profile We Understand YourFrustrations & Challenges Poor Performance Is IT getting in the way of your team doing their jobs effectively? Is your team complaining about their IT systems being too slow? Poor performing IT = Poor performing people. The challenge of improving business efficiency or planning for the future, when your IT systems aren’t performing at their best can be difficult. With IT. ie's Best-in-Class support, benefit from proactive maintenance and real-time monitoring, ensuring peak performance of your IT systems, directly contributing to enhanced team productivity. Customer Experience Are you satisfied with the experience and service delivery of your existing IT support provider? At IT. ie, we understand the challenges businesses often face with the customer experience provided by their current support services. We address these challenges head-on, ensuring that our clients receive not just technical solutions, but a superior level of IT support and service that truly aligns with their business objectives. At the heart of our ethos lies the mantra "Exceptional Customer Experience," a commitment deeply embedded in every service we offer to our diverse range of business clients.... --- ### IT Support Carlow - Published: 2022-07-14 - Modified: 2024-10-09 - URL: https://it.ie/it-support-carlow/ Managed IT Services IT Support Carlow Welcome to IT. ie. The home of Managed IT Services in Carlow and nationwide. We specialise in providing Managed IT Services and solutions designed to transform your business through technology.   We are ISO 27001 certified a Microsoft Gold Partner and Guaranteed Irish accredited. Support Request Get in Touch IT Support Carlow As a leading provider of IT Support in Carlow, we ensure that we stand out from the rest by delivering to you a highly strategic approach to IT services backed up by our team of IT industry experts. As a certified Microsoft Gold Partner, we specialise in Microsoft 365, Microsoft Azure and SharePoint along with the latest business applications within the Microsoft growing ecosystem. We also specialise in Managed IT Security Services and offer advice on the most appropriate solution to protect your IT infrastructure and valuable data. Our latest offering of Cyber Security Awareness Training has proved hugely popular with clients and helps to ensure that your employees are your strongest defence against a cyberattack and not your weakest link.  Our clients vary in size from well-known national brands to a wide variety of small to medium-sized businesses. If you are considering outsourcing any element of your IT and want to engage with a company that has the experience, proven reliability, trust and delivers on its promises, why not get in touch with us. We Understand Your Frustrations & Challenges Lack of Time Poor Performance Cyber Security Change Is IT taking... --- ### IT Support Kildare - Published: 2022-07-14 - Modified: 2023-01-31 - URL: https://it.ie/it-support-kildare/ IT Support Kildare Kildare's Trusted B2B IT Support & Managed Services Partner Support Request Get in Touch Live Chat Welcome to Kildare's Trusted B2B IT Support & Managed Services Partner Expert IT Solutions for Your Business At IT. ie, we offer trusted IT support services to businesses in Co Kildare. With a strategic approach and a dedicated team of IT experts, we aim to set ourselves apart in the industry. As a certified Microsoft Gold Partner, we specialise in Microsoft 365, Azure, SharePoint, and other business applications within the Microsoft ecosystem. In addition to IT support, we also offer Managed Cyber Security services to keep your IT infrastructure and data safe. Our popular Cyber Security Awareness Training helps to make your employees your strongest defense against cyberattacks. Our client base ranges from national brands to small to medium-sized businesses. If you're looking for a reliable and trusted partner for your IT needs, get in touch with us today. Comprehensive IT Services for Your Business Personalised Attention and Customised Solutions Managed IT Support Read More Remote IT Support Read More Cyber Security Read More Microsoft 365 Read More Cloud Backup Read More Cyber AwarenessTraining Read More VoIP Solutions Read More Managed Email Security Read More Why Choose Us? Why We're Kildare's Top Choice for B2B IT Support & Managed Services Experts in Office 365, OneDrive, SharePoint & Teams. An IT Support partner for all your IT, Print & Telephony requirements. Unified Monthly Invoice for all Products & Services. Customer Focused with... --- ### IT Support Kilkenny - Published: 2022-07-14 - Modified: 2024-10-09 - URL: https://it.ie/it-support-kilkenny/ Managed IT Services kILKENNY IT SUPPORT KILKENNY Exceptional Customer Experience Welcome to IT. ie. The home of Managed IT Services in Co Kilkenny and nationwide. We specialise in providing Managed IT Services and solutions designed to transform your business through technology.   We are ISO 27001 certified a Microsoft Gold Partner and Guaranteed Irish accredited. Support Request Get in Touch Live Chat https://it. ie/wp-content/uploads/2024/02/Promo-2024. mp4 Download our Profile We Understand YourFrustrations & Challenges Poor Performance Is IT getting in the way of your team doing their jobs effectively? Is your team complaining about their IT systems being too slow? Poor performing IT = Poor performing people. The challenge of improving business efficiency or planning for the future, when your IT systems aren’t performing at their best can be difficult. With IT. ie's Best-in-Class support, benefit from proactive maintenance and real-time monitoring, ensuring peak performance of your IT systems, directly contributing to enhanced team productivity. Customer Experience Are you satisfied with the experience and service delivery of your existing IT support provider? At IT. ie, we understand the challenges businesses often face with the customer experience provided by their current support services. We address these challenges head-on, ensuring that our clients receive not just technical solutions, but a superior level of IT support and service that truly aligns with their business objectives. At the heart of our ethos lies the mantra "Exceptional Customer Experience," a commitment deeply embedded in every service we offer to our diverse range of business clients. Recognising... --- ### IT Support Wicklow - Published: 2022-07-14 - Modified: 2023-02-10 - URL: https://it.ie/it-support-wicklow/ Managed IT Services IT Support Wicklow Welcome to IT. ie. The home of Managed IT Services in Co Wicklow and nationwide. We specialise in providing Managed IT Services and solutions designed to transform your business through technology.   We are ISO 27001 certified a Microsoft Gold Partner and Guaranteed Irish accredited. Support Request Get in Touch IT Support Louth As a leading provider of IT Support in Co Wicklow, we ensure that we stand out from the rest by delivering to you a highly strategic approach to IT services backed up by our team of IT industry experts. As a certified Microsoft Gold Partner, we specialise in Microsoft 365, Microsoft Azure and SharePoint along with the latest business applications within the Microsoft growing ecosystem. We also specialise in Managed IT Security Services and offer advice on the most appropriate solution to protect your IT infrastructure and valuable data. Our latest offering of Cyber Security Awareness Training has proved hugely popular with clients and helps to ensure that your employees are your strongest defence against a cyberattack and not your weakest link.  Our clients vary in size from well-known national brands to a wide variety of small to medium-sized businesses. If you are considering outsourcing any element of your IT and want to engage with a company that has the experience, proven reliability, trust and delivers on its promises, why not get in touch with us. We Understand Your Frustrations & Challenges Lack of Time Poor Performance Cyber Security Change Is... --- ### IT Support Louth - Published: 2022-07-11 - Modified: 2023-01-17 - URL: https://it.ie/it-support-louth/ Managed IT Services IT Support Louth Welcome to IT. ie. The home of Managed IT Services in Co Louth and nationwide. We specialise in providing Managed IT Services and solutions designed to transform your business through technology.   We are ISO 27001 certified a Microsoft Gold Partner and Guaranteed Irish accredited. Support Request Get in Touch IT Support Louth As a leading provider of IT Support in Co Louth, we ensure that we stand out from the rest by delivering to you a highly strategic approach to IT services backed up by our team of IT industry experts. As a certified Microsoft Gold Partner, we specialise in Microsoft 365, Microsoft Azure and SharePoint along with the latest business applications within the Microsoft growing ecosystem. We also specialise in Managed IT Security Services and offer advice on the most appropriate solution to protect your IT infrastructure and valuable data. Our latest offering of Cyber Security Awareness Training has proved hugely popular with clients and helps to ensure that your employees are your strongest defence against a cyberattack and not your weakest link.  Our clients vary in size from well-known national brands to a wide variety of small to medium-sized businesses. If you are considering outsourcing any element of your IT and want to engage with a company that has the experience, proven reliability, trust and delivers on its promises, why not get in touch with us. We Understand Your Frustrations & Challenges Lack of Time Poor Performance Cyber Security Change Is... --- ### IT Support Meath - Published: 2022-07-11 - Modified: 2024-03-13 - URL: https://it.ie/it-support-meath/ Managed IT Services Co Meath IT SUPPORT MEATH Exceptional Customer Experience We offer  Managed IT Support to companies in Co Meath who want an exceptional customer experience, with minimal downtime and problems quickly resolved. We do this by offering the most secure solutions, based on the very best - and most proactive - support and customer service in the industry. Support Request Get in Touch Live Chat https://it. ie/wp-content/uploads/2024/02/Promo-2024. mp4 Download our Profile We Understand YourFrustrations & Challenges Poor Performance Is IT getting in the way of your team doing their jobs effectively? Is your team complaining about their IT systems being too slow? Poor performing IT = Poor performing people. The challenge of improving business efficiency or planning for the future, when your IT systems aren’t performing at their best can be difficult. With IT. ie's Best-in-Class support, benefit from proactive maintenance and real-time monitoring, ensuring peak performance of your IT systems, directly contributing to enhanced team productivity. Customer Experience Are you satisfied with the experience and service delivery of your existing IT support provider? At IT. ie, we understand the challenges businesses often face with the customer experience provided by their current support services. We address these challenges head-on, ensuring that our clients receive not just technical solutions, but a superior level of IT support and service that truly aligns with their business objectives. At the heart of our ethos lies the mantra "Exceptional Customer Experience," a commitment deeply embedded in every service we offer to our diverse... --- ### IT Support Galway - Published: 2022-06-08 - Modified: 2024-03-12 - URL: https://it.ie/it-support-galway/ MANAGED IT SERVICES GALWAY IT SUPPORT GALWAY IT. ie: The Trusted Irish IT Company providing Managed IT Services and technology solutions that drive business growth. Talk to us today! Support Request Get in Touch Live Chat IT Support & Managed Services Partner in Galway Expert IT Solutions for Your Business Get expert IT support and secure managed services for your business in Galway. As a certified Microsoft Gold Partner, we specialise in Microsoft 365, Azure, and SharePoint solutions, and offer comprehensive Managed Cyber Security Services to protect your IT infrastructure and data. Our team of industry experts will work with you to create a customised IT strategy, ensuring your success.   https://it. ie/wp-content/uploads/2024/02/Promo-2024. mp4 Download our Profile We Understand YourFrustrations & Challenges Poor Performance Is IT getting in the way of your team doing their jobs effectively? Is your team complaining about their IT systems being too slow? Poor performing IT = Poor performing people. The challenge of improving business efficiency or planning for the future, when your IT systems aren’t performing at their best can be difficult. With IT. ie's Best-in-Class support, benefit from proactive maintenance and real-time monitoring, ensuring peak performance of your IT systems, directly contributing to enhanced team productivity. Customer Experience Are you satisfied with the experience and service delivery of your existing IT support provider? At IT. ie, we understand the challenges businesses often face with the customer experience provided by their current support services. We address these challenges head-on, ensuring that our clients receive... --- ### IT Support Cork - Published: 2022-06-08 - Modified: 2024-03-12 - URL: https://it.ie/it-support-cork/ Managed IT Services cork IT Support Cork Exceptional Customer Experience Hello, we are IT. ie; the home of Managed IT Services in Cork city and surrounding regions. We specialise in providing Managed IT Services and solutions designed to transform your business through technology.   We are ISO 27001 certified a Microsoft Gold Partner and Guaranteed Irish accredited. Support Request Get in Touch Live Chat https://it. ie/wp-content/uploads/2024/02/Promo-2024. mp4 Download our Profile We Understand YourFrustrations & Challenges Poor Performance Is IT getting in the way of your team doing their jobs effectively? Is your team complaining about their IT systems being too slow? Poor performing IT = Poor performing people. The challenge of improving business efficiency or planning for the future, when your IT systems aren’t performing at their best can be difficult. With IT. ie's Best-in-Class support, benefit from proactive maintenance and real-time monitoring, ensuring peak performance of your IT systems, directly contributing to enhanced team productivity. Customer Experience Are you satisfied with the experience and service delivery of your existing IT support provider? At IT. ie, we understand the challenges businesses often face with the customer experience provided by their current support services. We address these challenges head-on, ensuring that our clients receive not just technical solutions, but a superior level of IT support and service that truly aligns with their business objectives. At the heart of our ethos lies the mantra "Exceptional Customer Experience," a commitment deeply embedded in every service we offer to our diverse range of business... --- ### Surface for Business Accessories - Published: 2022-05-31 - Modified: 2022-05-31 - URL: https://it.ie/surface-for-business-accessories/ --- ### Digital Signage - Published: 2022-05-10 - Modified: 2023-02-20 - URL: https://it.ie/digital-signage/ Digital Signage CM Series Digital Signage Delivering powerful and clear engagement for every space CM Series is a large format professional display complete with digital signage and meeting room system integration. Delivering powerful brilliance with effortless control, CM Series pushes the boundaries of technology, capturing and engaging with audiences. Download Brochure Request a Quote HealthcareScheduled and instant message playout with Real-Time management functionality. RetailVibrant picture quality with powerful poster and movie playback with effortless scheduling. EnterpriseWireless display connectivity and RS232 control for professional meeting room integration with control systems. EducationDigital signage integration to display full-screen signage including posters and videos. Previous Next Improving audience engagement Suitable for a range of applications and sectors High-performance technology improving audience engagement to bring meeting presentations and digital signage content to life! Packed with powerful features we know you’ll love: 4k UltraHD Resolution 24/7 Operation Landscape & Portrait Power Management Scheduling Android Technology Wireless Display Connectivity Vibrant Picture Quality Control Integration Dynamic Digital Signage Playback Ask us a question or request a quote If you would like to talk to us or just have a question about our interactive display, please don't hesitate to contact us and we'll get right back to you.   Contact Us --- ### Clevertouch LUX for Enterprise - Published: 2022-05-10 - Modified: 2023-11-03 - URL: https://it.ie/interactive-whiteboards-and-displays-for-business/ Interactive Displays & Whiteboards Lux for Enterprise Elevate Your Enterprise Collaboration with Cutting-Edge Technology Welcome to the future of interactive displays, where the Clevertouch Lux for Enterprise transforms your meetings and collaborative efforts into a seamless, productive, and engaging experience. Designed with the enterprise environment in mind, our latest interactive display is a powerhouse of innovation and flexibility. Contact Us LUX Brochure Live Chat Interactive Displays & Whiteboards Transform Your Collaborative Spaces with State-of-the-Art Interactive Displays Elevate your team's engagement and productivity with the next generation of Interactive Displays. These state-of-the-art panels are designed to bring a new level of interactivity to your meetings, presentations, and learning environments. With intuitive touch interfaces, crisp visuals, and seamless connectivity, our Interactive Displays bridge the gap between digital convenience and collaborative dynamics. Experience a canvas where ideas can flourish, strategies are visualized, and learning is immersive. Whether it's for the boardroom, the classroom, or the creative studio, these displays are the cornerstone of a modern, connected, and interactive experience. Why Choose Clevertouch Lux for Enterprise? Google EDLA Certified Access a world of apps with the confidence of enhanced security. Versatile Connectivity Whether in-person, hybrid, or remote, your meetings adapt to your needs. Customisable Experience Tailor the display to fit your enterprise with advanced personalization options. Superior Sound and Visuals:  Immerse in the clarity of 4K resolution and superior audio with dual front-facing, bass-enhanced speakers. This cutting-edge display combines advanced features with seamless integration, empowering teams to communicate and collaborate in the way they... --- ### Surface for Business: Hybrid Work - Published: 2022-05-03 - Modified: 2022-07-06 - URL: https://it.ie/surface-for-business-hybrid-work/ Get in Touch For any Surface inquiries please email hello@it. ie Contact Page --- ### Newsletters - Published: 2022-04-13 - Modified: 2022-12-22 - URL: https://it.ie/newsletters/ IT. ie News Newsletter Archive Get the latest news and advisories direct to your inbox. Stay in the loop with our monthly round-up of news updates. Recent Newsletters Recent Posts --- ### Cyber Essentials Certification - Published: 2022-03-28 - Modified: 2022-03-28 - URL: https://it.ie/cyber-essentials-certification/ Cyber Security Cyber Essentials Certification Cyber Essentials helps you to guard against the most common cyber threats and demonstrate your commitment to cyber security. Get in Touch Get Started What is Cyber Essentials? Cyber Essentials is a globally recognised IT security standard developed by the UK’s National Cyber Security Centre, which is used to ensure that IT software and processes are secure and organisations are protected from data breaches and leaks. It may be a mandatory certification required by governments and large organisations when working with suppliers on sensitive projects. Completed as a self-assessment standard, the certification ensures that you are protected from a wide range of the most serious cyber threats. This is critical because being vulnerable to basic threats will make you a target for attacks from cyber criminals. Because the majority of cyberattacks are looking for targets that do not have the Cyber Essentials technical controls in place, certification gives you peace of mind that your defences will protect you against the vast majority of common cyberattacks. By achieving this standard you will be able to: Reassure customers that you take cyber security seriously Be listed on the Directory of organisations awarded Cyber Essentials Attract new business with the assurance that you have cyber security measures in place Why should you get Cyber Essentials? Cyber Essentials certification indicates that your organisation takes a proactive stance against malicious cyber attacks. In addition, it offers a mechanism to demonstrate to customers, investors, insurers and others that you have taken the minimum... --- ### Penetration Testing - Published: 2022-03-28 - Modified: 2024-08-08 - URL: https://it.ie/penetration-testing/ Pen Testing As a Service (PTaaS) Automated Penetration Testing As-a-Service Automate - Test - Secure - Repeat Discover IT. ie's, Automated Network Penetration Testing. State-of-the-art cyber defense, monthly testing, detailed analytics, and expert-driven reports. Secure your network today! Get in Touch Live Chat https://youtu. be/VRpMC43nF0Q Automated Pen Testing As-a-Service (PTaaS) Penetration Testing Penetration testing, also referred to as pen testing is a standard approach to quantifying and identifying such vulnerabilities across an organisation.   The test will usually try to simulate a real-life threat and demonstrate how a system would hold up against such a threat. By assessing if an IT System is susceptible to a cyber-attack, you will be able to plan, repair and strengthen your organisation’s infrastructure defences against such attack. An internal pen test is undertaken within an organisation’s network, searching for vulnerabilities from within. An external pen test is performed remotely, with an ethical hacker looking for security vulnerabilities in internet-facing assets such as FTP and mail servers.  IT. ie are proud to partner with Kayseya to deliver a revolutionary solution that allows you to have a full-blown penetration test every month, instead of just once a year.   Contact Us Validated by Experts Combining the knowledge, skills, logic, and toolsets of numerous consultants into one, PenTest is the perfect solution to consistently satisfy your organisation’s needs for quality results. Real Time Tracking An important step to assessing your organisation’s risk is the ability to detect and respond to malicious activities occurring within your environment. PenTest... --- ### Inside Technical Sales Executive - Published: 2022-03-25 - Modified: 2022-04-04 - URL: https://it.ie/inside-technical-sales-executive/ IT. ie Careers Inside Technical Sales Executive Apply Now Open the door to a career with IT. ie Job Description IT. ie are seeking a dynamic individual(s) to help grow its Sales Team. The ideal candidate will have experience, but it is not a complete prerequisite. We are looking for both junior and senior executives of mixed experience levels. Apply today. . Role Requirements Development of a good working relationship with new and existing customers. Ability to put together comprehensive proposals. Excellent understanding of Business IT Systems. High-level of customer service, organisational, and negotiating skills. Detail oriented with good written and verbal communication skills. Excellent computer skills with proficiency in Microsoft Office products Ability to multi-task, prioritise, and manage time effectively. Confident, energetic and extremely well organised. Package Details Highly Competitive Salary and CommissionCompany Laptop & Phone. Pension entitlements after probation period. Flexible Hybrid WorkingMonday to Friday 0900 - 1730 Get in Touch APPLY TODAY sEND YOUR c. v --- ### Blog - Published: 2022-03-21 - Modified: 2022-03-21 - URL: https://it.ie/blog/ IT. ie Blog News & Advisories The IT. ie blog has a bit of everything on IT and cybersecurity. Read about the latest tech and learn about the latest cyber threats. 2021 Threat Intelligence Shows Attacks Rising Across the Board While the world continued to grapple with the challenges of 2020 — such as the ongoing COVID-19 pandemic and the shift to remote work — cybercriminals were building on what... Read More Microsoft New Commerce Experience Explained Today we are sharing some important information about the new Cloud Solution Provider (CSP) subscription purchasing platform called the New Commerce Experience (NCE).   What is the New Commerce Experience (NCE) Microsoft’s Cloud... Read More Beware of Email and SMS Compromise Scams Share on facebook Share on twitter Share on linkedin This week sees the gradual return to the office with the easing of restrictions and while many companies will adopt fully... Read More Managed IT Services – The Essential Business Utility Share on facebook Share on twitter Share on linkedin Most modern providers of IT Services deliver their solutions in what is commonly referred to as Managed IT Services. While many... Read More The 12 Scams of Christmas It may be the season of goodwill and a time for giving but this Christmas we are asking you to be a bit of a Scrooge and don’t gift your... Read More Most Popular Google Searches in Ireland for 2021 As 2021 draws to a close in a year that was once again overshadowed by the... --- ### Privacy Policy - Published: 2022-03-20 - Modified: 2024-02-27 - URL: https://it.ie/privacy-policy/ Policies Privacy Policy 1. 0 IntroductionIT. ie is committed to protecting and respecting your privacy. This Privacy Policy sets out how we, as a Data Controller, collect, use, process and disclose the personal data  (“Data”) that we collect from you, or that you provide to us, on our website https:/it. ie (“Site”). This Privacy Policy should be read in conjunction with our  Cookies Policy. By visiting this website, you are accepting the terms of this Website Privacy Policy.  Any external links to other websites are clearly identifiable as such and we are not responsible for the content or the privacy policies of these other websites.  Please read the following carefully to understand our use of your Data. 2. 0 Types of Information CollectedThere are two types of information collected. 2. 1 Personal DataThis data identifies you or can be used to identify you and includes:your name;your phone number;your email address;your address;information that you provide by filling in forms on our Site2. 2 Non-Personalised DataLike most websites, we gather statistical and other analytical information collected on an aggregate basis of all visitors to our website. This Non-Personal Data comprises of information that cannot be used to identify or contact you and includes data such as demographic information such as:user IP addresses;  browser types;  or other anonymous statistical data involving the use of our website. 3. 0 Purposes for which we hold your data3. 1 Personal DataWe will process any Personal Data you provide to us for the following purposes:to provide you with the goods... --- ### Microsoft Surface Range - Published: 2022-03-14 - Modified: 2022-03-22 - URL: https://it.ie/microsoft-surface-range/ --- ### Referral Program - Published: 2022-03-12 - Modified: 2022-03-18 - URL: https://it.ie/referral-program/ IT. ie Referral Program Refer IT. ie & Reward Yourself! Get in Touch Refer us & Reward Yourself The best ‘thank you’ we can receive is a referral from an appreciative client. If you are happy with the work we’ve done for you, why not share our information with a company who is in need of our IT business services? How does it work? To refer a company, simply fill out the form or call us directly at 01 8424114. Should we sucessfully sign-up your referral, we’ll send you a €250 OneforAll gift card.  Alternatively we would also be happy to make a donation, in your name, to a charity, of your choice Your referral is under no obligation to use our services. We also promise to be 100% respectful of their time and will only engage in a light-touch manner. Let Someone Else Enjoy Hassle-Free IT --- ### IT Support for Charities - Published: 2022-03-11 - Modified: 2023-09-20 - URL: https://it.ie/it-support-for-charities/ IT Support for Charities HELPING CHARITIES TO GET MORE FROM THEIR ONGOING IT INVESTMENTFully Managed IT Support Services and IT Solutions for charities and Non-Profit Organisations Get in Touch IT Support for Charities IT. ie is a Premium IT support services provider that works closely with charities and Non-profit organisations throughout Ireland. Our Managed IT Services include IT Support, IT Consultancy, Data Backup, IT Security, Network Support and a wide range of IT Solutions including Microsoft Office 365, VoIP Solutions for Business and Cyber Awareness Training We also own and operate office365. ie and remotesupport. ie. Our Managed IT Services and Solutions are tailored to meet the needs and demands of your charity and designed to maximise your IT infrastructure, now and into the future. IT. ie is proud to be chosen as the Managed Service Provider (MSP) for 100’s of businesses, charities, and schools across Dublin and nationwide.   We are a Guaranteed Irish company with ISO 27001 accreditation and a Gold Microsoft partner.   Get Started Some of our IT Services Managed IT Support Read More Remote IT Support Read More Cyber Security Read More Microsoft 365 Read More Cloud Backup Read More Cyber AwarenessTraining Read More VoIP Solutions Read More Managed Email Security Read More Benefits of IT Support for Charities Cost effective IT Support solution Designed to reduce overheads and maximise productivity Can help increase fund raising efforts through well managed IT Allows IT budgets stretch further Custom built IT Support to suit the requirements of any charity Get in... --- ### IT Careers - Published: 2022-03-11 - Modified: 2024-03-12 - URL: https://it.ie/it-careers/ IT Careers Join Ireland's Leading Managed IT Services Provider View Positions IT Careers JOIN OUR TEAM Welcome to the IT. ie careers page, where innovation meets excellence. As a trusted provider of Managed IT Services across Ireland since 2004, we are on the lookout for passionate individuals to join our growing team. Explore a world of opportunities in the IT sector with us. available positions it support field We are seeking a dedicated IT professional to join our team in a role that encompasses both field and office-based responsibilities and based at our Galway Office. Location: Galway Salary: Generous Vacancy Details Apply for Role Helpdesk Support We are looking to hire new Helpdesk L2/L3 Support/Project Engineers. This is an excellent opportunity for the right candidates. Location: Dublin Salary: Generous Vacancy Details Apply for Role Helpdesk/ grad role IT. ie are seeking an IT Graduate to join its growing Helpdesk and Project Team. Location: Dublin Salary: Generous Apply for Role Vacancy Details inside sales (grad) Drive our growth by identifying opportunities and building lasting relationships with potential clients. Location: Dublin Salary: Generous Vacancy Details Apply for Role Accounts/ assistant role IT. ie are seeking an accounts assistant to join our team. Location: Dublin Salary: Generous Apply for Role Vacancy Details who we are At IT. ie, we pride ourselves on our customer-centric approach, backed by a team of dedicated IT professionals. Founded by Eamon Gallagher, our journey began as PCtechnix, evolving over the years to become the renowned IT. ie. With offices in... --- ### Microsoft 365 Backup - Published: 2022-03-10 - Modified: 2024-01-30 - URL: https://it.ie/microsoft-365-backup/ IT. ie Managed Services Microsoft 365 Backup Backup for Microsoft Office 365 is more than simply filling gaps. It’s about providing access and control to all. Contact Us What We Backup SharePoint Outlook Teams OneDrive Microsoft 365 Backup Don't Let Cyber Threats Disrupt Your Business: Secure Your Microsoft 365 Data Now! IT. ie's comprehensive detection, protection, and recovery helps you safeguard your Microsoft 365 data against both known and unknown cyber threats and common data loss scenarios. Contact Us Microsoft 365 Backup Effortless Backup for Microsoft 365: Protect Your Data in Just a Few Clicks! Data loss can happen in an instant, but recovering it shouldn't be a hassle. IT. ie offers a fast, reliable, and scalable solution to back up your Microsoft 365 data. Streamline your data protection with our easy-to-use interface and get back to business faster. Say Goodbye to Data Loss Worries with Advanced Threat Protection and Recovery  IT. ie combines advanced threat protection with robust backup capabilities. Our solution proactively scans for malicious threats and ensures complete data protection with regular backups. Experience the peace of mind that comes with knowing your data is secure and easily recoverable. Transparent Pricing, Unmatched Data Security: The IT. ie Promise We believe in straightforward, predictable pricing. With IT. ie, you'll know your costs upfront, and as your business grows, so do your savings. Invest in top-tier data security without any hidden fees or surprises. Empower Your Business with Comprehensive Microsoft 365 Cloud Protection Protect your vital Microsoft 365 applications... --- ### Microsoft Azure - Published: 2022-03-10 - Modified: 2022-03-18 - URL: https://it.ie/microsoft-azure/ Get to Know Microsoft Azure Explore the world of cloud computing and learn what sets Azure apart. Get in Touch Microsoft Azure Cloud computing is when you access computing services—like servers, storage, networking, software—over the internet (“the cloud”) from a provider like Azure. For example, instead of storing personal documents and photos on your personal computer’s hard drive, most people now store them online: that’s cloud computing. Cloud computing platforms, like Azure, tend to be less expensive and more secure, reliable, and flexible than on-premises servers. With the cloud, equipment downtime due to maintenance, theft, or damage is almost non-existent. You can scale your compute and storage resources—up or down—almost instantly when your needs change on Azure. Also, you typically pay only for the services you use, which provides a level of convenience and cost-control that’s almost impossible to achieve with on-site infrastructure. . Get Started What is Azure Azure is an ever-expanding set of cloud computing services to help your organization meet its business challenges. Azure gives you the freedom to build, manage, and deploy applications on a massive, global network using your preferred tools and frameworks. With Azure, you can: Be future-ready Operate hybrid seamlessly Build on your terms Trust your cloud Continuous innovation from Microsoft supports your development today—and your product visions for tomorrow. Build on the latest advancements in the cloud, including more than 1,000 new capabilities released in the last year. On-premises, in the cloud, and at the edge—Azure meets you where you are. Integrate and... --- ### Managed Business Firewall - Published: 2022-03-10 - Modified: 2023-09-12 - URL: https://it.ie/managed-business-firewall/ Managed Firewall Managed Business Firewalls Your Shield Against Cyber Threats Contact Us Live Chat Next Gen Firewalls (NGFW) Partnered with the best to Secure Your Future At IT. ie, we understand the evolving landscape of cyber threats and the necessity to stay a step ahead. Our Managed Business Firewall service is designed to offer you the most robust and advanced firewall solutions in partnership with industry leaders - SonicWall, Palo Alto, and Fortinet. Contact Us SonicWall - Enterprise-Grade Protection for SMBs SonicWall delivers a firewall solution that is both easy to use and integrated, specifically designed for small and medium-sized businesses (SMBs) and branch locations. The SonicWall TZ series offers:Zero-Touch Deployment and centralized management for easy installation and operation. Real-Time Deep Memory Inspection (RTDMI™) to detect sophisticated threats, including encrypted attacks. Single-pane-of-glass Management & Reporting to manage everything from one location. Visit SonicWall Page Palo Alto - ML-Powered Next-Generation Firewall Solutions In collaboration with Palo Alto Networks, we bring you ML-powered Next-Generation Firewall (NGFW) solutions that offer unparalleled network security across various scales of business operations. The Palo Alto NGFWs feature:Hybrid Mesh Firewall Management for seamless security in complex environments. Industry-Leading Innovations including Universal ZTNA and SOC-as-a-Service. Unmatched Performance with AI-powered security and threat intelligence. Visit Palo Alto Page Fortinet - FortiGate, The Only NGFW with Unified Management Fortinet stands tall with its FortiGate NGFW, offering unified management for a hybrid mesh firewall, ensuring seamless security across complex hybrid environments. Fortinet’s solutions are characterized by:Universal ZTNA and inline sandbox features.... --- ### IT Equipment Leasing - Published: 2022-03-09 - Modified: 2022-06-01 - URL: https://it.ie/it-equipment-leasing/ IT. ie Services IT Hardware Leasing Kit out your office with the very latest tech and spread the costs with easy monthly payments. Get in Touch IT Hardware Leasing IT. ie are delighted to partner with Grenke, to help you secure leasing for all your office IT and technology requirements.  Commercial leasing with a host of benefits – that’s a Straight Lease Rental. Get ahead of the competition with the very latest equipment, flexibly and affordably. Get Started FIXED INSTALMENTS, BIG INVESTMENTS Enjoy the freedom to get business-critical equipment quickly. With IT. ie & GRENKE Straight Lease, all you have to do is choose your preferred basic lease term and you're ready to go. What do you get out of it? The certainty you need to make plans with fixed instalments over time. Meanwhile reserving capital where it belongs - in your business.   Flexible 24, 36 or 48 months – or something else entirely? The choice is yours. Easy to plan Fixed monthly instalments – affordable and easy to plan. Up to date Simply replace assets whenever you need to. Secure, mobile and legally watertight All you need to sign your GRENKE leasing contract is a tablet, smartphone or PC and internet access. With eSignature from GRENKE, you can sign your documents digitally. This will save you valuable time that you can devote to your ideas and your customers. Get in Touch https://youtu. be/bS4aO71b2UY Got an idea that can't wait. It doesn't have to. Get the quipment you need... --- ### Managed Print Services - Published: 2022-03-06 - Modified: 2024-04-09 - URL: https://it.ie/managed-print-services/ IT Services MANAGED PRINT SERVICES We are dedicated to providing exceptional Managed Print Services to businesses throughout Ireland.   Get in Touch Are you concerned about how much your Printing or Photocopying is costing you? Managed Print Services At IT. ie we offer a Managed Print Solution whereby you incorporate all your printers under one agreement. You pay per Black or Colour Copy. This will cover you for all your toners, parts & servicing.  Managed Print Services can offer you a solution that streamlines your printing & photocopying while delivering significant cost savings. The benefits speak for themselves!  Optimised Office Efficiency: A Managed Print Service (MPS) helps organisations streamline their printing and document processes, allowing them to increase their office efficiency and productivity. Reduced Printing Costs: An MPS helps organisations reduce their overall printing costs by optimising the printing habits of their staff, eliminating unnecessary printing and consolidating supplies. Increased Security: An MPS provides organisations with the tools and technologies needed to secure their printing environment, including authentication, encryption, and device tracking. Improved Document Management: An MPS helps organisations better manage their documents, providing them with secure storage and archiving solutions, as well as access control and document versioning. Reduced Environmental Impact: A MPS helps organisations reduce their environmental impact by reducing paper usage, eliminating wasteful printing habits, and using energy-efficient devices. Get Started Designed to meet your business needs Many current services are restrictive and rigid in how they’re applied. Our offering is different. There’s no ‘off the shelf’ solution. Each package is designed... --- ### Microsoft 365 Business Premium - Published: 2022-03-02 - Modified: 2024-08-07 - URL: https://it.ie/microsoft-365-business-premium/ Microsoft 365 Microsoft 365 Business Premium If you're looking for a comprehensive business package that will help you work more efficiently, then Microsoft Office 365 Business Premium might be right for you. It's designed to provide businesses with a complete set of office solutions, including email, document management, web conferencing, and instant messaging. Get in Touch Live Chat Microsoft 365 Business Premium Microsoft 365 Business Premium brings together best-in-class Office apps and powerful cloud services with comprehensive security that helps protect your business against advanced cyber threats. Stay up to date with the latest versions of Word, Excel, PowerPoint, and more. Connect with customers and coworkers using Outlook, Exchange, and Teams. Manage your files from anywhere with 1 TB of cloud storage on OneDrive per user. Defend your business against advanced cyberthreats with sophisticated phishing and ransomware protection. Control access to sensitive information using encryption to help keep data from being accidentally shared. Secure devices that connect to your data and help keep iOS, Android, Windows, and Mac devices safe and up to date. Compatible with Windows 10/11 Pro. Some management features are not supported in Windows Home. All languages included.   Get Started Apps and services included Microsoft 365 Business Premium Features Enjoy Office Apps Get the latest features and capabilities with fully installed and always up-to-date versions of Outlook, Word, Excel, PowerPoint for Windows or Mac, OneNote (features vary), and Access and Publisher (PC only). Defend against cyberthreats Activate Microsoft Defender for Office 365 to help guard against viruses,... --- ### Cyber Security Awareness Training - Published: 2022-03-02 - Modified: 2025-01-07 - URL: https://it.ie/cyber-security-awareness-training/ Human Risk Management CYBER SECURITY AWARENESS TRAINING Empower, Protect, Secure - Your Cyber Safety Journey Starts Here Get in Touch Live Chat Cyber Security Awareness training Why Human Risk Management (HRM)? Humans are targets 36% of data breaches involve phishing, 11% more than in 2020 Humans make mistakes Human error is a key factor in over 90% of data breaches.   Compliance is essential Key standards like ISO 27001 require regular security awareness training.   Cyber Security Awareness training Your one-stop solution for a security-savvy workforce Understand and strengthen your business's security posture against human error and user-targeted attacks through ongoing HRM. Drive security awareness Train staff on modern security best practices through engaging security awareness courses. Reduce human error Educate staff on how to avoid common mishaps like sending sensitive data to the wrong person. Combat phishing attacks Empower users with the ability to spot, avoid and report even the most sophisticated phishing attacks. Safeguard exposed users Reduce the chances of an attack by detecting when user credentials are stolen and exposed on the dark web. Implement security standards Keep staff well-versed on company security procedures with core policy templates and trackable approvals. Demonstrate compliance Showcase your compliance efforts with real-time reporting on how your business is addressing human risk. Cyber Security Awareness training How quickly could your business be breached? “How quickly could a cyber criminal exploit your employees andbreach your business? Get your Human Risk Report tounderstand your human risk areas and how to fix them. ”... --- ### Managed Online Backup - Published: 2022-03-02 - Modified: 2023-09-06 - URL: https://it.ie/managed-online-backup/ Managed Online Backup Phoenix File Protect Take the heat off your team with our fully managed backup service. We take care of your data so you can take care of business. Live Chat Contact Us Online Backup Secure Your Business Data with Phoenix File Protect At IT. ie, we understand the importance of safeguarding your business data. With Phoenix File Protect, we offer a comprehensive managed backup solution tailored for businesses in Ireland. Our mission is to ensure that your data remains accessible, secure, and intact, no matter what challenges arise. Contact Us Phoenix File Protect What is Managed Backup as a Service? Managed Backup as a Service (BaaS) is the practice of creating, storing and managing copies of company data to the cloud, handled as a service by a cloud provider. It helps companies avoid data loss by automating the backup process. If data is lost, stolen or corrupted, there’s a ‘clean’ version hosted off-site, which can be restored as needed.     Why Choose Phoenix File Protect? Simplified Data Management Focus on your core business operations while we handle the intricacies of data backup. Say goodbye to the hassles of managing secondary arrays, offsite transfers, and backup cycles. Robust Data Protection: Our state-of-the-art backup solution ensures your data is replicated and stored securely. Benefit from our partnership with industry leaders to provide you with the best backup technologies. Managed Backup as a Service (BaaS) Automated backup processes to prevent data loss. In case of data mishaps, retrieve a clean... --- ### Data Backup and Replication - Published: 2022-03-02 - Modified: 2023-09-06 - URL: https://it.ie/data-backup-and-replication/ Data Security Phoenix Backup & Replication Advanced Data Protection & Recovery Contact Us Live Chat Data Security Replication for Ultimate Disaster Preparedness Phoenix Backup & Replication offers a comprehensive solution to ensure your business remains operational even in the face of unexpected challenges. With our advanced replication technology, you can achieve the recovery time and point objectives (RTOs/RPOs) that your business demands. Say goodbye to relying on disjointed point-products or outdated legacy systems. Phoenix's integrated solution ensures efficient data movement and replication whenever required. Contact Us Data Security Single Platform for Modern Data Protection Uptime Assurance for Critical Operations In today's fast-paced world, downtime is not an option. Phoenix assists you in preparing for any unforeseen events, ensuring your business operates seamlessly with minimal disruptions. Quick Recovery for Unanticipated Downtime When adversity strikes, it's crucial to bounce back swiftly to prevent revenue loss and brand damage. With Phoenix, you gain access to a robust set of capabilities and a network of partners, empowering you to tackle any challenge head-on. Efficient Replication for All Transferring data off-site can be daunting due to large data volumes, latency, and internet traffic. Whether you're dealing with slow or fast connections, or vast amounts of data, Phoenix has got you covered. Data Security Replication & DRaaS: Be Ready for Anything Reliable In-built Replication Achieve optimal recovery time objectives (RTO) for your assets with a ready-to-launch VM copy. Phoenix offers:Efficient replication with change block tracking (CBT) – only transfer the modified blocks, minimizing data size and... --- ### Managed Email Security - Published: 2022-03-02 - Modified: 2023-09-19 - URL: https://it.ie/managed-email-security/ Microsoft 365 Managed Email Security Email Security for M365 is powered by a collaborative AI engine that continuously learns from an alliance of more than 1. 4 billion protected mailboxes, millions of daily user reports, and a team of cybersecurity analysts.   Get in Touch Live Chat 93 percent of all network breaches include a phishing or spear-phishing attack. Predictive AI technology Unmatched Threat Intelligence Email security is provided via our partners a Vade. With over 100 billion emails scanned per day, their AI engine continually learns from the latest Microsoft 365 email threats and decimates dynamic phishing, ransomware, and spear-phishing attacks. For the most part, the perimeters of vigilant organizations are reasonably tight. Firewalls are in place, servers are patched, and physical security is in place. However, email is a gaping hole in your network defenses. Email is the vector for virtually all the bad things that keep you up at night. What’s worse is that cybercriminals are using email to target the weakest link in an organization’s cybersecurity chain: humans. If you think that your organization is safe from email-borne attacks because you have enabled Office 365 email security add-ons like Exchange Online Protection (EOP) or Advanced Threat Protection (ATP), you need to think again. While these security tools are effective at blocking massive spam waves and known threats, they will not reliably stop highly targeted phishing, spear phishing or zero-day attacks. Get Started 1 % OF CYBER ATTACKS START WITH EMAIL 1 % OF NETWORK BREACHES ARE... --- ### IT Support for Engineering - Published: 2022-03-02 - Modified: 2023-03-08 - URL: https://it.ie/it-support-for-engineering/ Managed IT Services IT Support for Engineering & Construction Leading IT Support for Engineering & construction Companies Get in Touch With an intense focus on customers and projects, today's engineering and construction firms require real-time and seamless collaboration among architects, engineers, contractors, on-site project managers and back-office staff.   Fully Managed IT Services However, the fragmented nature of the construction industry and the long list of interrelated business operations such as finance, project management, purchasing and field operations present challenges to organisations that want to align all their resources and streamline their operations. These challenges can be overcome with the development and deployment of strategic IT Solutions.  IT. ie helps engineering and construction companies become more competitive by providing custom IT solutions for consulting, business processes, applications and infrastructure. We base our solutions on industry best practices and provide cost-conscious, around-the-clock support to address the specific requirements of your business. Get Started Some of our IT Services Managed IT Support Read More Remote IT Support Read More Cyber Security Read More Microsoft 365 Read More Cloud Backup Read More Cyber AwarenessTraining Read More VoIP Solutions Read More Managed Email Security Read More Managed IT Support for Engineering & Construction We have built a solid reputation as a trusted partner in the engineering and construction industry since 2004. We provide a full range of Managed IT and Managed Security services, which allows you to maximise the productivity and effectiveness of your ongoing IT investment.  It’s essential that your IT Support company... --- ### Microsoft 365 - Published: 2022-03-01 - Modified: 2024-10-16 - URL: https://it.ie/microsoft-365/ Microsoft Microsoft 365 for Business Microsoft 365 is a suite of apps that help you stay connected and get things done Live Chat Contact Us Top challenges for today’s businesses Microsoft 365 Backup and Disaster Recovery can be complicated, taking up a lot of time and resources. Enable remote work.  The world can change rapidly and unexpectedly, and businesses of all sizes need easier, secure ways to work and serve customers from almost anywhere. Strengthen security.  Small businesses are attractive targets for cybercriminals, and protecting sensitive information becomes even more challenging when people work remotely. Reduce costs & complexity.  As you adjust to an uncertain economy and marketplace in a post-Covid-19 world, you need ways to work more efficiently without adding expensive, complicated technology. Support growth.  You need solutions that can extend easily and affordably as your business changes and grows, without requiring significant up-front investment. Contact Us Our Microsoft 365 Products & Supporting Services Microsoft 365 Services Microsoft 365 Business Premium Read More Microsoft 365 Email Security Read More Microsoft 365 Backup Read More Microsoft Azure Read More Microsoft Dynamics Sales Professional Read More Microsoft 365 Benefits of Microsoft 365 for business For clients seeking a traditional backup and disaster recoveryBe more productive almost anywhere with real-time collaboration. Work with people almost anywhere using cloud-based Office apps. Stay in touch with videoconferencing, chat, and calling as well as email. Help protect your business information with technology you can trust. Help protect data against malware, unauthorized access, and accidental deletion using built-in... --- ### Managed Email Signature - Published: 2022-02-23 - Modified: 2024-01-05 - URL: https://it.ie/managed-email-signature/ OUTLOOK / MICROSOFT 365 Email Signature Management All staff get automatic email signatures for desktop, web, mobile.  Easy to set up and run with Microsoft Cloud web portal.  Enforce and achieve brand consistency.  Extend marketing campaigns to email signatures. Live Chat Contact Us SAFE DATA IT. ie partner xink service is safely hosted at ISO 27001 certified data centres (Microsoft Azure). Because this ensures the best, most secure data storage available in accordance with all laws and regulations, including GDPR Contact Us EASY TO SET UP AND RUN! xinK designed the web portal to allow IT to hand off administration to marketing/communications dept. (No workload in IT). This is possible via the browser-based user-friendly web portal with role-based login capability.      Central administration (web portal) Outlook desktop email signature (Windows/Mac) Outlook on the web email signature (browser) Outlook app email signature (iOS/Android) Mail app email signature (iOS) Integrates with Microsoft 365 (formerly Office 365) Integrates with Active Directory, Azure AD, SQL ISO 27001 environments (Microsoft Azure Cloud) Email Signature Management Consistency Across All Devices The web portal helps you make sure that all signatures look consistent across platforms and devices. Role-Based Logins The role-based login is a highly valued feature among our customers. With role-based permissions, administrators can delegate responsibilities to named employees, who are then able to update signatures, create signature campaigns, and segment email signatures. Get in Touch Intuitive Interface You decide how you want your Microsoft 365 (formerly Office 365) email signatures to look! Upload and create... --- ### Mobile Device Management - Published: 2022-02-23 - Modified: 2022-12-21 - URL: https://it.ie/mobile-device-management/ Managed IT Services Mobile Device Management Devices propel the modern workplace. Delight employees with IT automation. Get in Touch IT. ie is Your Trusted Source in IT Services and Technology Solutions Mobile Device Management IT. ie have teamed up with Hexnode, the leading provider of Device Management solutions to businesses and educational institutions across the globe. Mobile Device Management (MDM) is a solution that allows you to monitor, manage and secure employees' mobile devices (such as smartphones and tablets) that are deployed across multiple mobile service providers and across multiple mobile operating systems. MDM solutions provide a way to ensure corporate data remains secure, and to control and monitor the use of mobile devices in the workplace. Get Started Mobile Device Management Request a Demo The standard for unified mobile, desktop & IoT management. Unified Endpoint Management Kiosk Lockdown Management Mobile Device Management Rugged Device Management IoT Management Manage any platform and any device Case Study Videos https://www. youtube. com/watch? v=X4j8O0WeXfkhttps://www. youtube. com/watch? v=uwdDT1IoKhshttps://www. youtube. com/watch? v=jZ64HNwggrU Device Management For Your Sector Education Download PDF Healthcare Download PDF Hospitality Download PDF Government Download PDF Field Services Download PDF SMB Download PDF Get in Touch Contact Us --- ### Business Endpoint Protection - Published: 2022-02-23 - Modified: 2024-05-07 - URL: https://it.ie/business-endpoint-protection/ Cyber Security Business Endpoint Protection To secure businesses, you need endpoint protection that’s stronger and smarter than traditional business antivirus. Get in Touch Webroot Endpoint Protection Discover More ESET Endpoint Protection Advanced Discover More What is endpoint protection? Endpoint protection, or endpoint security, is a general term that describes cybersecurity services for network endpoints, like laptops, desktops, smartphones, tablets, servers, and virtual environments. These services may include antivirus and antimalware, web filtering, and more. Endpoint protection helps businesses keep critical systems, intellectual property, customer data, employees, and guests safe from ransomware, phishing, malware, and other cyberattacks. Why businesses need endpoint protection? Criminals are constantly developing new ways to attack networks, take advantage of employee trust, and steal data. Smaller businesses may think they’re not a target, but that couldn’t be further from the truth. In fact, small businesses with 100 employees or fewer now face the same risk of attack as a 20,000-employee enterprise. *No matter their size, businesses need reliable endpoint security that can stop modern attacks. And since most companies are subject to some form of compliance and privacy regulations, protection for endpoints is 100% necessary to help businesses avoid hefty fines and damage to their reputation due to a security breach. Endpoint Solutions Webroot Endpoint Protection Stop sophisticated cyberattacks Next-generation protection Contextual threat intelligence Industry-leading efficacy Streamline management Cloud-based console Fast deployment & scans RMM, PSA & BI integrations Save time and money Lower TCO & flexible billing No software conflicts No reimaging Webroot® Evasion Shield The... --- ### Business Broadband - Published: 2022-02-21 - Modified: 2024-04-29 - URL: https://it.ie/business-broadband/ Business Broadband IT. ie Business Broadband We have partnered with Ireland's leading broadband providers to offer your business the connectivity it requires no mater where you are located in Ireland.   Live Chat Contact Us IT. ie Business Broadband Unbeatable Connectivity IT. ie offers unbeatable internet connectivity with multiple peering points and private network interconnects to major cloud providers and content delivery networks. We’ve partnered with fibre and microwave providers to offer broadband access to businesses across the country, backed by IT. ie support and customer service.   Make an Enquiry Check Broadband Availability Once you submit your details, we will check your Eircode for the very best broadband options available to you. . By clicking Check, you agree to receive an email contact from IT. ie from which you can unsubscribe at any point.   Business Broadband Common Deployment Options Fibre Broadband Fibre broadband utilises fibre-optic cables to transmit data at high speeds using light. This technology is exceptionally reliable and capable of supporting large bandwidths, making it particularly suitable for densely populated urban environments. The speed and efficiency of fibre broadband make it a preferred choice for both residential and business customers seeking fast and stable internet connections. Microwave Broadband Microwave broadband delivers internet connectivity using radio frequencies that transmit data wirelessly over considerable distances. This method is advantageous in rural or remote areas where laying physical cables is impractical or too costly. Microwave broadband can bridge significant geographical challenges, providing stable and effective internet access where traditional wired connections... --- ### Remote Working Solutions - Published: 2022-02-21 - Modified: 2023-02-02 - URL: https://it.ie/remote-working-solutions/ IT Services Remote Working Solutions Get supported no matter where you are located.   Get in Touch Remote Working Without question, remote working is here to stay and while the pandemic accelerated the digital transformation for many businesses, they have now opened their eyes to the future of work practices. Back in 2019, before Covid-19 was on our radar, it was predicted that by 2025, 70% of the workforce would be working remotely, at least 5 days a month.  A Gartner CFO survey revealed that over two thirds (74%) have plans to permanently shift employees to remote working after the Covid-19 crisis ends. Remote working has benefits to both the employees and employers. Motivated workers enjoy the autonomy of remote work, however, less motivated workers may struggle and need closer supervision. For employees, long commutes are a thing of the past and your employment isn’t dictated by geography. As an employer, you now have a larger pool of talent to choose from and the overheads borne from a physical office space can be reduced. There seems little doubt that a more flexible approach to work practices is a rapidly growing trend but there are a number of factors employers need to consider Get Started Remote Working Services Managed Email Security Multi-faceted anti-phishingMachine LearningAnti-spear PhishingOne click remediation Microsoft 365 Office 365Microsoft TeamsCollaboration toolsAutomated tasks VoIP Telecoms Hosted PBXVoIP for TeamsVoIP Call CentreNuaOne – VoIP without limits Disaster Recovery Managed & Monitored24/7 SupportAnytime TestingLocal Data centres Remote IT Support Unlimited SupportHelpDesk SupportPatch ManagementMS 365 Management... --- ### VoIP Solutions for Business - Published: 2022-02-21 - Modified: 2025-01-08 - URL: https://it.ie/voip-solutions-for-business/ VoIP Telecoms VoIP Telecom for Business Anytime, Anywhere Live Chat Contact Us VoIP Telecoms What is VoIP for Business Before going into details, it’s important to know exactly what a VoIP phone service is. It’s a pretty simple concept. Standing for Voice over Internet Protocol, it’s technology that allows businesses to make calls using the internet instead of over phone lines as with a traditional phone system. How does it work? Business VoIP systems take your analogue voice signals and convert them to digital data. That digital data gets sent through a server before connecting with the internet. It then arrives at its destination, and is transformed back to analogue audio. You can make and receive calls, alongside video conferencing, SMS and instant messaging, and call recording. With a VoIP system, you have everything you need all under one system. All you need is an internet connection. Contact Us Business VoIP Telecoms Advantages & Benefits of VoIP Lower Cost One of the biggest advantages of VoIP is that you have lower costs, with customers saving anything up to 50% when compared to their old system. Higher Quality Because VoIP uses your broadband connection, it offers higher call quality than traditional PSTN/ISDN systems. A VoIP telephone system offers its users HD voice using internet connectivity, with incredible clarity and crisp audio. Service Mobility With VoIP, you don’t need to be in an office and sitting by your desk phone to take phone calls. You can take and make calls from wherever... --- ### Contact - Published: 2022-02-20 - Modified: 2025-04-08 - URL: https://it.ie/contact/ Get in Touch If you would like further information on any of our services or simply have a question, then please get in touch and we'll get right back to you.   (01) 8424114 hello@it. ie Contact Us Contact hello@it. ie Dublin: (01) 8424114 Galway: (091) 353328 Cork: (021) 2038189 Belfast: (028) 91422084 Manchester: +44 1617101729 Dublin HQ Unit 35, Finglas Business Centre, Jamestown Road, Finglas Dublin 11, D11 EP86 (O1) 8424114 Cork Office Unit P5, Marina Commercial Park, Centre Park Rd, Cork, T12 PN7F (021) 2038189 Galway Office Galway Technology Centre, Mervue Business Park, Galway, H91 D932 (091) 353328 Manchester Office Manchester Business Park Aviator Way, 3000 Aviator Way, Wythenshawe, M22 5TG Contact Nuatech IT. ie Newsletter Subscribe Now Please sign up to receive our newsletters that regularly comprise of vital IT Security advisories.   We'd love to hear from you Contact Us If you would like to talk to us or just have a question about one of our services, please don't hesitate to contact us and we'll get right back to you.   Send us a Message --- ### Managed IT Support - Published: 2022-02-20 - Modified: 2025-04-08 - URL: https://it.ie/managed-it-support/ Expert IT Support Ireland Managed IT Support Elevate your business with tailored IT support, cyber security, and technology solutions. Benefit from rapid response times, ISO 27001 certification, impeccable client services, and expertise in Microsoft 365. With Office in Dublin, Cork and Galway IT. ie can support your business anywhere at any time.   Contact Us Live Chat IT. ie Your Trusted Managed IT Support Partner In order for your business to be successful, all the "moving parts" of your technology must work like a well-oiled machine. For every business, there are desktop computers, laptops, Smart phones, servers, cloud accounts among many others. Larger companies have in-house IT staff, but small businesses often can't afford their own IT team. This is where IT. ie comes into play. Our team will act as your personal IT department. We will manage all devices, cloud accounts, and all other business technology. Stop waiting to make the change and see how IT. ie can help you today! Get Started Live Chat CERTIFIED ISO 27001 ISO 27001 provides clients with a robust information security management system, ensuring the confidentiality, integrity, and availability of their sensitive data. This internationally recognised standard delivers peace of mind and demonstrates a commitment to data protection, helping clients to comply with legal and regulatory requirements and building trust with customers and partners. Learn more about IT. ie Download our Profile Why Choose Us IT Simply Makes Sense Finding the right IT Support partner for your business can be a challenge. Every... --- ### Cyber Security - Published: 2022-02-20 - Modified: 2025-01-08 - URL: https://it.ie/cyber-security/ Managed Services Cyber Security Solutions Our Managed Cyber Security Services encompass prevention, detection, and remediation. This robust multi-layered approach means that we cover all areas, warding off the danger posed by Advanced Persistent Cyber security Threats  Get in Touch Live Chat 15+ Fully Managed Cyber Security Solutions With an ever-evolving cyber security landscape, businesses are facing increased and more complex threats to their environments. The frequency and impact of attacks, ranging from data breaches, insider threats, to ransomware, are overwhelming. Many companies, lacking proper resources or expertise, find themselves adrift in perilous waters. The consequence is severe—falling prey to devastating attacks that erode both revenue and reputation. Our Fully Managed Cyber Security Solutions offer a comprehensive shield with a three-fold strategy: prevention, detection, and remediation, effectively countering the menace of Advanced Persistent Cyber Security Threats. Some of our Cyber Security Services Business Endpoint Protection Read More Managed Email Security Read More Business Firewall Read More Cloud Backup & Recovery Read More Cyber Essentials Certification Read More Cyber Awareness Training Read More Penetration Testing Read More Microsoft Defender EDR Read More Why Choose Us When it comes to Cyber Security, it's essential to have a deep understanding of the threats facing your business, as well as the skills and tools to counter those threats effectively. At IT. ie, we have been providing these resources to Irish businesses for over 17 years, ensuring they are protected against the latest cyber threats. Our Cyber Team possesses up-to-the-minute cyber security intelligence about malware, phishing... --- ### Managed IT Services - Published: 2022-02-20 - Modified: 2025-04-08 - URL: https://it.ie/ Managed IT Services Ireland EXPERT MANAGED IT SERVICES Exceptional Customer Experience We offer Managed IT Services to companies who want an exceptional customer experience, with minimal downtime and problems quickly resolved. We do this by offering the most secure solutions, based on the very best - and most proactive - support and customer service in the industry. Support Request Get in Touch Live Chat Managed IT Services Ireland MANAGED IT SERVICES Exceptional Customer Experience Get in Touch Live Chat https://it. ie/wp-content/uploads/2024/02/Promo-2024. mp4 Download our Profile We Understand YourFrustrations & Challenges Poor Performance Is IT getting in the way of your team doing their jobs effectively? Is your team complaining about their IT systems being too slow? Poor performing IT = Poor performing people. The challenge of improving business efficiency or planning for the future, when your IT systems aren’t performing at their best can be difficult. With IT. ie's Best-in-Class support, benefit from proactive maintenance and real-time monitoring, ensuring peak performance of your IT systems, directly contributing to enhanced team productivity. Customer Experience Are you satisfied with the experience and service delivery of your existing IT support provider? At IT. ie, we understand the challenges businesses often face with the customer experience provided by their current support services. We address these challenges head-on, ensuring that our clients receive not just technical solutions, but a superior level of IT support and service that truly aligns with their business objectives. At the heart of our ethos lies the mantra "Exceptional Customer Experience,"... --- ### Microsoft New Commerce Experience (NCE) - Published: 2022-02-14 - Modified: 2022-03-17 - URL: https://it.ie/microsoft-new-commerce-experience/ Microsoft New Commerce Experience (NCE) Today we are sharing some important information about the new  Cloud Solution Provider (CSP) subscription purchasing platform called the New Commerce Experience (NCE).   What does this mean for you? With this new platform, Microsoft will be adding some new rules for how users can add and remove licences to a subscription. This updated process goes into effect on March 1, 2022, and the details you need to know are outlined below: There will now be 2 subscription commitment terms: Monthly and Annual.  Users who opt for the convenience of a monthly subscription will incur a 20%  surcharge from the annual subscription price. This applies to all Microsoft CSP licensing, including BC and Microsoft 365.  Users will still be able to add licences during the term of a subscription but will no longer be able to reduce the number of licences during the term of a subscription.  Full payment for the cost of the licences for the term of the subscription will be required in advance and is non-refundable.   Subscription Terms Subscription terms can be 1-month or 12-month and there are pros and cons for each offer. 1 Month Term 12 Month Term Probably the most popular term for SMBs, a full 1-year licence gives an economical edge and flexible billing options of either monthly or full-term upfront payments. Even better – more licences can be added in after the term start date, with their end dates aligned to the original subscription term end date so you’re not trying to remember a staggered... --- ### Cookies Policy - Published: 2022-02-11 - Modified: 2022-03-17 - URL: https://it.ie/cookies-policy/ IT. ie Cookies Policy ‍Cookies Policy for IT. ieThis is the Cookie Policy for https://it. ieWhat Are CookiesAs is common practice with almost all professional websites this site uses cookies, which are tiny files that are downloaded to your computer, to improve your experience. This page describes what information they gather, how we use it and why we sometimes need to store these cookies. We will also share how you can prevent these cookies from being stored however this may downgrade or 'break' certain elements of the sites functionality. For more general information on cookies, please read "What Are Cookies". How We Use CookiesWe use cookies for a variety of reasons detailed below. Unfortunately, in most cases there are no industry standard options for disabling cookies without completely disabling the functionality and features they add to this site. It is recommended that you leave on all cookies if you are not sure whether you need them or not in case they are used to provide a service that you use. Disabling CookiesYou can prevent the setting of cookies by adjusting the settings on your browser (see your browser Help for how to do this). Be aware that disabling cookies will affect the functionality of this and many other websites that you visit. Disabling cookies will usually result in also disabling certain functionality and features of the this site. Therefore it is recommended that you do not disable cookies. The Cookies We Set- Email newsletters related cookies‍This site offers newsletter or email... --- ### About Us - Published: 2022-01-10 - Modified: 2025-04-08 - URL: https://it.ie/about-us/ About IT. ie exceptional customer experience is our promise Get in Touch https://youtu. be/l1h3n5kgqRc Download our Company Profile At IT. ie, we recognise the complexities and demands of navigating today's dynamic business landscape. Established in 2004 by Eamon Gallagher, our mission has been to equip businesses with innovative IT & technology solutions that not only meet but exceed their expectations. Our evolution from a break/fix IT service provider to a comprehensive source of Managed IT Services, Cloud Solutions, Cyber Security, and proactive IT support reflects our commitment to staying ahead in an ever-changing digital world. Our Pledge: Stellar Customer Experience Our goal at IT. ie is to deliver an unparalleled customer experience across all our departments. We understand that in the realm of IT, efficiency is key. That's why we've set a high-performance standard: resolving 90% of client tickets within one hour. This ambitious KPI is not just a target; it's a reflection of our dedication to ensuring minimal downtime for our clients, enabling them to focus on their core business activities without disruption. How We Achieve This 01 Rapid Response Team: At the heart of our customer service excellence is our Rapid Response Team. Comprising top-tier IT professionals, this team is the frontline of our service delivery, ensuring swift and effective resolution of client issues. 02 Clear, Jargon-Free Communication We believe that clear and transparent communication is crucial. Our team is trained to communicate complex IT solutions in a jargon-free, understandable manner, ensuring that our clients are always in... --- ### Interactive Displays for Schools - Published: 2021-12-21 - Modified: 2024-04-04 - URL: https://it.ie/interactive-displays-for-schools/ Interactive Whiteboards Interactive Displays for Schools Designed by teachers, for teachers, Clevertouch are more than just interactive touchscreens. They deliver a truly intuitive and collaborative experience. Feature-rich, with solutions to free teachers from the constraints of the restrictive traditional classroom. Make lessons extraordinary with Clevertouch Interactive displays. Contact Us Live Chat The Educational Survey Our partners at Clevertouch spoke to 235 users of education technology to get their feedback on classroom tech. Download The Survey Inspiring Classroom Experiences As the need grows for more collaborative learning spaces, so does the demand for technology in the classroom. The Clevertouch Ecosystem enables today's teaching professionals to focus their valuable time on creating life changing learning experiences, with seamless technology that is as simple to operate as it is dynamic. Transform a lesson into an extraordinary event, empower students to interact, and discover the impact of immersive learning with the Clevertouch digital classroom. Decades of Experience Looking for an interactive and immersive classroom experience? Look no further than Clevertouch! We've teamed up with the experts in interactive technology, led by a team of former teachers with decades of experience. They're dedicated to empowering schools and making learning more engaging for both teachers and students. Don't settle for a lackluster classroom experience, choose Clevertouch for a more interactive and dynamic learning environment. Clevertouch Impact LUX Make an impact in the classroom with IMPACT Lux. Innovation For Your World 65" 4K | 75" 4K | 86" 4K The first ever interactive classroom display to be... --- ### IT Support Holiday Cover - Published: 2021-05-05 - Modified: 2022-07-11 - URL: https://it.ie/it-support-holiday-cover/ IT Support Holiday Cover If you would like to talk to us about temporary IT Support cover just fill in the form and hit check-in. We'll be back to you before you have your bags packed. Holiday Cover We can take over your entire IT Support or supplement your existing IT Team for fixed leave periods. Sickness Cover We can immediately take charge of your IT Support in the event of unexpected sick leave periods. Remote Support Our dedicated team of experienced Service Desk Technicians can handle almost any IT issue you are likely to encounter On-site Support Should you require on-site assistance, then we can immediately despatch a member of our Field Service team. IT Support Holiday and Sickness Cover The rules of IT holiday cover have changed. Remote outsourced IT cover is here to stay and IT. ie are leading the way When your IT team is on leave, be it planned or unplanned,  your business doesn’t have to face disruption.   IT. ie can dedicate an IT resource to your organisation for holiday cover, short-term leave or even just for extra help during a busy period. IT. ie work with clients who require short-term IT support for holiday or sickness absences. Support is provided remotely and on-site if required, in the same way, that we provide our fully managed IT support services. We can provide all the support you need remotely or mix it up with an onsite/remote hybrid solution. IT Support. Your way, while you're away! Relax and Switch... --- ### Single IP Broadband Failover - Published: 2021-04-16 - Modified: 2022-03-06 - URL: https://it.ie/single-ip-broadband-failover/ Business Broadband Single IP Broadband Failover Protected uptime for connected businesses Get in Touch Single IP Broadband Failover IT. ie brings you Orion from our partners at Viatel. Orion is an award-winning Single IP auto-failover that protects businesses from costly outages. Dual connections and seamless failover create always-on connectivity. https://www. youtube. com/watch? v=-vyN2TvzB8A What Makes Orion an Award-Winner Static IP Stream Uniquely engineered for real time applications like VPN and VoIP. PCI Compliant Businesses can process payments as usual even in an outage. Instantaneous Switchover occurs within milliseconds of network disruption and restoration. Fully Automated Orion fails over and back with no need for manual intervention. See the Benefits of Orion Guaranteed Cloud Access The migration of critical applications to the cloud results in very little tolerance for downtime. Two diverse WAN connections keep employees connected to all vital applications. Zero Disruption Automatic failover means there is no need to contact IT when an outage strikes. Enhanced secondary connections make it business-as-usual while the primary connection awaits repair. Protected Uptime Service disruptions are outside of your control but can have a devastating impact on your business. Protect against lost productivity, missed business opportunities and irritated customers. Monitoring and Reporting Connections are remotely monitored by our engineers. A report is issued whenever the failover is deployed and when the primary connection is restored. Cost-effective Orion makes enterprise-class, resilient connectivity affordable for the first time. Invest in peace of mind, knowing that, when an outage does occur, your company will stay fully... --- ### IT Support for Accountants - Published: 2021-02-14 - Modified: 2022-03-28 - URL: https://it.ie/it-support-for-accountants/ Managed IT Services IT Support For Accountants IT. ie provides managed services and IT support for accountants, ranging from on-site and remote support to hardware provision, cloud computing services and consultancy. Whatever the specific requirements, we have the right mix of solutions for accountancy firms. Get in Touch Managed IT Support for Recruitment Agencies Better Serve Your Clients by Optimising Your IT Environment Most accountants trade on being reliable and efficient. The accountancy firms we work with have exactly the same requirement for our IT support, and we don’t disappoint them. We can provide highly effective IT support for accountants, including day-to-day support for accountancy-specific software such as Sage. This means that you can turn to a single supplier for all of your IT and software requirements.   Get Started Some of our IT Services Managed IT Support Read More Remote IT Support Read More Cyber Security Read More Microsoft 365 Read More Cloud Backup Read More Cyber AwarenessTraining Read More VoIP Solutions Read More Managed Email Security Read More Managed IT Services How IT. ie can help your accounting firm We are experienced in working with accountancy firms of all sizes. From large, well-established firms to smaller growth practices, we have the experience to provide the right solution for you. IT. ie ensures your accounting firm is always making considered and well-informed decisions about future IT planning with no surprises. Talk to us Support at Your Fingertips Data Protection and Security Access to Your Data Anytime, Anywhere IT. ie... --- ### IT Support for Recruitment Agencies - Published: 2021-02-08 - Modified: 2022-03-28 - URL: https://it.ie/it-support-for-recruitment-agencies/ Managed IT Services IT Support for Recruitment Agencies Recruit an IT Support company you can trust Get in Touch T Support for Recruitment Agencies Better Serve Your Clients by Optimising Your IT Environment Work smarter and deliver even better value for your customers with specialist IT Support for Recruitment Agencies. You can rely on IT. ie to keep their business performing at its best, always. Get Started Some of our IT Services Managed IT Support Read More Remote IT Support Read More Cyber Security Read More Microsoft 365 Read More Cloud Backup Read More Cyber Awareness Training Read More VoIP Solutions Read More Managed Email Security Read More Managed IT Services Recruit an IT Support Provider, You can Trust. As a successful recruitment agency, you boast an enviable track record of helping scores of companies find their ideal candidates. Yet when it comes to finding and hiring your own IT support staff, you’re presented with some serious obstacles to overcome. With your IT environment, ever more present in the cloud, you need an IT Support company that doesn't just know IT hardware but is also expert in cloud solutions and support.   The incidents of small businesses falling victim to Cybercrime is ever-growing and will, unfortunately, continue to grow. There's simply no point investing in the very best and latest laptops and desktops if you don't have a robust cybersecurity strategy in place. We can help you with that. We provide a host of cybersecurity and data backup solutions, to... --- ### IT Support for Estate Agents - Published: 2021-02-08 - Modified: 2022-03-28 - URL: https://it.ie/it-support-for-estate-agents/ Managed IT Services IT Support For Estate Agents And Property Sector Leading IT Support the Property Industry Get in Touch Managed IT Support for Estate Agents Better Serve Your Clients by Optimising Your IT Environment Property investment, real estate and property management companies are now having to invest in technology in order to meet the demands of their increasingly tech-savvy customers and succeed in this crowded market. You need an IT partner who has worked with numerous property companies and can recommend the right IT solutions that work for your business. With the right IT in place, you’ll be able to work faster, manage your processes better and provide a first-class customer experience. Get Started Some of our IT Services Managed IT Support Read More Remote IT Support Read More Cyber Security Read More Microsoft 365 Read More Cloud Backup Read More Cyber Awareness Training Read More VoIP Solutions Read More Managed Email Security Read More Managed IT Services IT Support for Estate Agents Even moments of downtime can mean huge revenue losses, or massive inefficiency as people sit around waiting for IT to work again. Losing the ability to communicate with real estate clients, carry out deals and general loss of productivity can be devastating. You need an IT partner who will proactively monitor your systems to prevent future problems from arising, taking care of software and system updates in the background. Talk to us Support at Your Fingertips Data Protection and Security Access to Your Data Anytime, Anywhere... --- ### IT Support for Medical Practices - Published: 2021-01-31 - Modified: 2022-03-19 - URL: https://it.ie/it-medical-practices/ Managed IT Services IT Support for Medical Practices Your IT health is our priority GP’s and healthcare professionals are essential to the health and wellbeing of everyone. IT Systems are essential for the smooth running and administration of the modern medical Practice. Get in Touch IT Services For GP's and Medical Practices Welcome to IT. ie. The home of subscription-based Managed IT Services in Ireland. We specialise in providing IT Support & Solutions to small businesses throughout Ireland, including GP’s dentists and medical centres.    Get Started Some of our IT Services Managed IT Support Read More Remote IT Support Read More Cyber Security Read More Microsoft 365 Read More Cloud Backup Read More Cyber AwarenessTraining Read More VoIP Solutions Read More Managed Email Security Read More Testimonials Eamon and his team provide a great service. Their attention and knowledge was paramount in bringing our offices from one laptop to a fully functional networked office. Work flow has improved and our new systems look great! The back-up support is also fantastic, always a pleasure dealing with them! Noreen Fitzpatrick Managing Director, FitzMedical The support team at IT. ie are fantastic. They are fully connected to our systems and get things fixed very quickly. A very good ticket system that gives you confidence it will get sorted. Andy Pepper Director, Apex Scientific Support at Your Fingertips Data Protection and Security Access to Your Data Anytime, Anywhere IT. ie understands that every minute counts in your industry. Our IT support services handle... --- ### Business Total Talk - Published: 2020-11-23 - Modified: 2025-01-08 - URL: https://it.ie/business-total-talk/ VoIP Telecoms Business Total-Talk (unlimited calls on a per-user basis) - Starting from €22 per user per month. )Our Total-Talk plan is a truly unique offering in the Irish business telephony market – one that is truly without limits.   A fully cloud-based, hosted solution, with all the integrations your business needs, softphone applications to enable remote working, and above all there are no charges for any of your calls. Live Chat Contact Us VoIP Telecoms Welcome to Business without Limits IT. ie Business Total-Talk is a truly unique offering in the Irish business telephony market – one that is truly without limits.   A fully cloud-based, hosted solution, with all the integrations your business need, softphone applications to enable remote working, and above all there are no charges for any of your calls.   Say goodbye to restrictions and say hello to truly unlimited voice solutions for your business.    Contact Us Business VoIP Telecoms Pricing Table What's Included For all users Unlimited Free Irish Landline and Mobile calls* Unlimited Free UK LandLine and Mobile calls* Unlimited Free USA LandLine and Mobile calls* Hosted Phone System Microsoft Teams Integration CRM integrations with Salesforce, Zoho and others Softphone App included Call Centre Agents and Queues Call Centre Wallboards and Analytics Call recording + multi-year storage *Terms, Conditions, Minimum User Count, and Fair Use policies apply. Business Hero Per User € 22 Monthly                       Contact Us Popular Business Connect Per User €... --- ### Hosted VoIP Call Centre Solution - Published: 2020-09-27 - Modified: 2025-01-08 - URL: https://it.ie/hosted-voip-call-centre-solution/ VoIP Telecoms Hosted VoIP Call Centre Grow their business using advanced call centre performance metrics and insights – Boost productivity and efficiency – Cultivate better customer relationships. Our Hosted Phone and Call Centre Solution is a powerful, inbound call centre platform designed to help businesses of any scale: Live Chat Contact Us VoIP Telecoms IT. ie Hosted Call Centre Having a call centre is no longer just for large organisations.   The IT. ie Call Centre Solution is a powerful, inbound call centre platform designed around the needs of call centres of any scale. With IT. ie Call Centre you can:Grow your business with advanced call centre performance metrics and insightsBoost productivity and efficiency by integrating your calling solution with leading CRM solutions like Salesforce and Zoho as well as Office365 and Google. Enhance customer relationships with VIP routingImplement and manage your call centre wherever your agents may be thanks to cloud-based solutions. Make the right decisions – instant reporting is made easy by our detailed data on the performance of inbound calls, such as number of calls, call distribution, call length and wait times as well as historic data. Make the right impression for your customers – distribute calls to individual queues for Customer Service, Sales and other departments as well as managing VIP customers. Contact Us Business VoIP Telecoms Call Centre Benefits Simple, rapid deployment As no infrastructure is involved, we can speedily deploy IT. ie Call Centre to your team. Easy to Use Our virtual call centre... --- ### VoIP for Teams - Published: 2020-09-26 - Modified: 2025-01-08 - URL: https://it.ie/voip-for-teams/ VoIP Telecoms VoIP for Teams Integrate your phone system with Microsoft Teams Live Chat Contact Us VoIP Telecoms What is VoIP for Teams Microsoft Teams is the game changer when it comes to collaboration tools, combining all your regular Office 365 files with the tools to create a truly collaborative space. VoIP for Teams allows you to go beyond files and integrate your phone system with Teams creating a unique, truly collaborative workspace combining written and voice communications.  Designed around the way businesses function, VoIP for Teams allows those who work collaboratively the benefits of an integrated phone system as part of their collaborative suite, whilst allowing standalone deskphone and normal business PBX functionality to continue. With VoIP for Teams, companies retain the ability to use multiple collaborative tools and CRM software across their business. So, if your sales team are happy on salesforce, then there’s no need for them to change their routine. Contact Us Why VoIP for Teams works for real businesses VoIP for Teams allows businesses the flexibility to have full PBX functionality for all users and Teams users simultaneously. Teams inbound and outbound calling is enabled but is via our Hosted PBX enabling the functionality of a full business phone system and unbeatable call rates Microsoft Teams and VoIP for Teams: The perfect match No need to change existing numbers Retain full PBX functionality and call flows Mix Teams and Standard VoIP phones Simple Per User Subscription Retain desk phones and devices Retain IP based call... --- ### Hosted PBX Phone - Published: 2020-09-26 - Modified: 2024-06-07 - URL: https://it.ie/hosted-pbx-phone/ VoIP Telecoms Business Cloud Telecom Get your business communications ready for the 21st-century workplace and save up to 50% versus your current bills. Live Chat Contact Us VoIP Telecoms What is a Hosted Phone? Rather than having physical infrastructure on site handling your calls, a Hosted Phone System from IT. ie takes your Phone System (PBX) and calling to the cloud Being cloud based means that we always provide you with the most up to date solutions for your business Routing your calls via cloud-based VoIP calling allows your business to save up to 50% on costs vs your current provider Quick-and-easy installation in a matter of days with zero downtime Call from anywhere, using your work number from your laptop or mobile device via your phone system – perfect for remote enabling your staff whilst avoiding large mobile bills Contact Us Business VoIP Telecoms A Host of Features for your business Connect multiple locations Bring together offices and employees in different offices, cities or countries. Remote enable your staff with our cloud-based phone system. Unlimited free calling to Irish and UK Landlines Forget about costly line rentals and call charges with one low monthly fee, including unlimited Ireland and UK landline calls. . Keep your numbers A new phone system doesn’t mean you have to change your numbers, we can onboard your existing numbers or supply you with new ones whenever you need them Non-geographic numbers Need a number that’s not tied down to one location? Choose a non-geographic0818... --- ### Thank You - Published: 2020-08-24 - Modified: 2022-03-17 - URL: https://it.ie/thank-you/ Thank You We'll get right back to you While you're here, why don't you sign up to our newsletter and we'll share all our latest articles, including the latest advisories on Cyber threats.    IT. ie Newsletter --- ### Secure Hard Drive Destruction - Published: 2020-07-05 - Modified: 2023-11-16 - URL: https://it.ie/secure-hard-drive-destruction/ IT. ie Services Certified Hard Drive Destruction When disposing of old equipment, do you consider the sensitive data held on the hard drives? With the introduction of the GDPR regulations, this has become even more critical. A data breach could cost your business more than just its reputation. Get in Touch Hard drive (HDD) destruction If you use a Paper Shredder, you will know how important it is to destroy Confidential Information – but how do you destroy the same information that is stored electronically, on your old PC’s or Laptops? The data on a single hard drive, when printed out, will cover many football pitches. Imagine what could happen if a drive full of confidential customer or company data fell into the wrong hands. Whether you throw it away or let it lie forgotten in deep storage, a hard drive you no longer use is a > Book Today HDD Destruction/Recycling € POA Volume Discount Available (drives only) 100% destruction of data @ IT. ie HQ You Deliver, We Destroy & Recycle Certificate of Destruction issued Same Day Quotation Book Today Get in Touch Contact Us --- ### Switch IT Support - Published: 2020-05-03 - Modified: 2023-08-09 - URL: https://it.ie/switch-it-support/ Join IT. ie Switch Today Trusted by 100's of businesses nationwide Get in Touch Switch in 4 Easy Steps Switching is as easy as changing your telephone provider and you can do it in four easy steps.   Contact The first step is to simply say hello. You can reach us via the contact form on this page, by emailing us at hello@it. ie or give us a call on (01) 8424114. Consult We can perform a site survey or even provide you with indicative pricing over the phone. Contract We’ll send out an IT Support Proposal for review within 24 hours. Commence When you switch to IT. ie as your dedicated IT Service provider, we follow a strict documented onboarding process. SLA Performance 0 % Customer Satisfaction 0 % Customer Retention 0 Mins Average Resolution Response Time 0 % First Contact Fix Resolution What you can expect from us. 1 Rapid Response Field Support Team If you require assistance on site, we deploy our engineers in minutes, not days. We work for you and are ready to respond, when and where you need us. 2. No long-term contract Your IT Support Package is paid monthly just like a regular utility bill. No large upfront payments or annual commitments. You can cancel anytime with jusr 30 days notice. 3. Trained & Certified You need to be confident that your IT Support provider has the requisite skills and training to effectively manage your IT systems. We take training seriously. Both the... --- ### IT Support for Freight Transport and Logistics - Published: 2020-04-07 - Modified: 2022-03-19 - URL: https://it.ie/it-support-for-freight-transport-and-logistics/ Managed IT Services IT Support For Freight Transport And Logistics Leading IT Support for the Freight, Transport & Logistics Industry Get in Touch IT Services Better Serve Your Clients by Optimising Your IT Environment We provide IT services for businesses interested in optimising technology and managing IT solutions. IT. ie helps you retain focus on the pressing business matters you face every day, without the added stress from IT related issues.     Get Started Some of our IT Services Managed IT Support Read More Remote IT Support Read More Cyber Security Read More Microsoft 365 Read More Cloud Backup Read More Cyber AwarenessTraining Read More VoIP Solutions Read More Managed Email Security Read More Managed IT Support for Freight Transport & Logistics Sector The Freight Transport, Distribution and Logistics (FTDL) services sector includes transportation by road, rail, sea, and air. It employs 97,000 people nationally and has seen significant growth over the last five years. Research by the Department of Business, Enterprise, and Innovation reports that technologies such as data analytics and Artificial Intelligence is transforming the sector with new insights and better forecasting. More than ever information technology is driving this sector that is forecast to have a market size of $2,400 bn globally in 2020. The technological transformation of the industry has put a demand on companies to ensure that their IT infrastructure is optimised to ensure they can stay competitive in this rapidly changing industry. Since starting operation in 2004, IT. ie has established a solid reputation... --- ### Office 365 Backup - Published: 2020-02-24 - Modified: 2020-02-24 - URL: https://it.ie/office-365-backup/ Microsoft 365 Backup Backup your Microsoft 365 data to the cloud Backup for Microsoft Office 365 is more than simply filling gaps. It’s about providing access and control to all. Get in Touch Data is the lifeblood of business. IT. ie have teamed up with leading data backup provider ek. co formerly Datastring to provide an Microsoft 365 backup that puts data under your control. Microsoft 365 backup is more than simply filling the gaps, it's about providing access and control to all.   Why backup Microsoft 365? With Microsoft 365, you can work from anywhere without the need to host your own email, files and SharePoint infrastructure. However Microsoft only protects Microsoft 365 at the infrastructure level. It's still your data. You control it and its your responsibility to protect it at a >Backup Microsoft 365 SharePoint, Email and FilesRetrieve Office 365 Exchange Online, SharePoint Online, OneDrive for Business and Microsoft Teams data from a cloud-based instance of 365 and backup the data as often as every five minutes in Microsoft’s Native format. Get in TouchMeet Security and Compliance RequirementsSecurity and compliance concerns are big drivers when choosing to backup Microsoft 365 data. Using our backup partner ek. co’s solution you can recover exactly what you need with granular advanced search and find functionality and store data based on long-term retention policies for regulatory or compliance needs. Get in TouchSimple & Transparent PricingPricing is simple, cost effective and predictable. Pricing is based on a subscription model similar to many of... --- ### Managed It Support for the Hospitality Sector - Published: 2020-02-13 - Modified: 2022-03-19 - URL: https://it.ie/managed-it-support-for-the-hospitality-sector/ Managed IT Services IT Support For The Hospitality Sector Leading IT Support for the Hospitality Sector Get in Touch IT Support for the Hospitality Sector Better Serve Your Clients and Guests by Optimising Your IT Environment We understand that the hotel and hospitality business is about service quality and meeting customers’ needs, which leaves little time to be concerned with IT and technology.    Get Started Some of our IT Services Managed IT Support Read More Remote IT Support Read More Cyber Security Read More Microsoft 365 Read More Cloud Backup Read More Cyber AwarenessTraining Read More VoIP Solutions Read More Managed Email Security Read More Managed IT Support for Hospitality Sector The hospitality sector has experienced significant growth since the downturn and is estimated to be worth €5 billion to the Irish economy. A recent report identified 18,377 enterprises in the sector with a workforce of 177,000 that accounts for 8% of employment in Ireland.   IT. ie has built upon its established reputation as a trusted partner to many sectors including the hospitality sector since 2004. We provide a full range of Managed IT and Managed Security services, which allows you to maximise the productivity and effectiveness of your ongoing IT investment.  It’s essential that your IT Support company can keep up with your demands and that of your industry. We understand that you work in a fast-paced industry and require immediate support to help fix any issues whenever and wherever they happen.   Talk to us Support... --- ### IT Support for Legal Services - Published: 2020-02-12 - Modified: 2022-11-18 - URL: https://it.ie/it-support-for-legal-services/ Managed IT Services IT Support For The Legal Sector Specialist IT Support for Legal Practices and Law Firms Get in Touch Live Chat Managed IT Support for Legal Sector Better Serve Your Clients by Optimising Your IT Environment As a leading IT solution provider for the legal sector, we understand and appreciate how critical the four pillars of security, speed, functionality and reliability are to the sector. Even more so than in some industries – not least because of the severe consequences that would arise should things go awry. Practically every piece of information that you process is time-sensitive, security-sensitive and highly valuable, meaning that any delay, breach or loss could be catastrophic.   Some of our IT Services Managed IT Support Read More Remote IT Support Read More Cyber Security Read More Microsoft 365 Read More Cloud Backup Read More Cyber AwarenessTraining Read More VoIP Solutions Read More Managed Email Security Read More Managed IT Services Managed IT Support for Law Firms Legal Services are essential to everyone, from private individuals to SME’s to large enterprises and multinationals.  As a leading IT solution provider for the legal sector, we understand and appreciate how critical the four pillars of security, speed, functionality and reliability are to the sector. Even more so than in some industries – not least because of the severe consequences that would arise should things go awry. Practically every piece of information that you process is time-sensitive, security-sensitive and highly valuable, meaning that any delay, breach or... --- ### IT Support for Professional Services - Published: 2020-02-07 - Modified: 2022-03-19 - URL: https://it.ie/it-support-for-professional-services/ Managed IT Services IT Support For Professional Services Leading IT Support for the Professional Services Sector Get in Touch Managed IT Support for Professional Services Better Serve Your Clients by Optimising Your IT Environment If you are a worker with high-value skills, you need a professional IT infrastructure that enables you to serve your clients and keep your results and revenues growing. It’s not uncommon for high-powered professionals to neglect their IT needs because they are busy serving their clients. But when you need help, don’t you want someone that takes customer service seriously as you do? Someone that knows IT as well as you know your own domain?   Get Started Some of our IT Services Managed IT Support Read More Remote IT Support Read More Cyber Security Read More Microsoft 365 Read More Cloud Backup Read More Cyber AwarenessTraining Read More VoIP Solutions Read More Managed Email Security Read More Managed IT Services IT Support for Professional Services Ireland has proved to be a highly sought-after location for the delivery of global Business Services. In the early 1990s international companies, attracted by our highly skilled workforce and pro-business environment, began to base their centralising functional support activities here. IT. ie has built upon its established reputation as a trusted partner to business services since 2004. We provide a full range of Managed IT and Managed Security services, that allows you to maximise the productivity and effectiveness of your ongoing IT investment.  It’s essential that your IT Support company... --- ### IT Support for the Financial Services and Insurance Sector - Published: 2020-02-07 - Modified: 2022-03-19 - URL: https://it.ie/it-support-for-the-financial-services-and-insurance-sector/ Managed IT Services IT Support For The Financial And Insurance Sectors Leading IT Support for the Financial Services & Insurance industry Get in Touch Custom IT Solutions for Finance and Insurance Companies Managed IT Support & Services for Engineering Companies We provide IT services for the financial & insurance firms interested in optimising technology and managing IT solutions. IT. ie helps you retain focus on the pressing matters you face every day, without the added stress of IT issues.   Get Started Some of our IT Services Managed IT Support Read More Remote IT Support Read More Cyber Security Read More Microsoft 365 Read More Cloud Backup Read More Cyber AwarenessTraining Read More VoIP Solutions Read More Managed Email Security Read More Managed IT Support for Finance & Insurance A reliable IT support company that can keep up with your demands is essential. We understand that you work in a fast-paced industry and require immediate support to help fix any issues whenever and wherever they happen. We know the unique nature of the finance and insurance industry and the challenges you face, such as:The ever-growing threat of cybersecurity attacksA balance of security and accessibility in regard to electronic recordsSupporting Remote Working StaffData Security and RecoveryYou can rest assured that we will take the time to understand your specific business needs, devising a tailored solution that will enhance your productivity and help you get your work done faster.   Talk to us Support at Your Fingertips Data Protection and Security Access... --- ### IT Support for the Healthcare Industry - Published: 2020-01-31 - Modified: 2022-03-19 - URL: https://it.ie/it-support-for-healthcare/ Managed IT Services IT Support for the healthcare and Pharmaceuticals Industry Leading IT Support for the Healthcare Industry Get in Touch Managed IT Support for Healthcare Better Serve Your Clients and Staff by Optimising Your IT Environment IT. ie is one of Ireland’s leading healthcare IT service providers. With almost two decades of experience providing, IT services to healthcare, IT. ie understands your unique technological needs.    Get Started Some of our IT Services Managed IT Support Read More Remote IT Support Read More Cyber Security Read More Microsoft 365 Read More Cloud Backup Read More Cyber AwarenessTraining Read More VoIP Solutions Read More Managed Email Security Read More Managed IT Support for Engineering Sector To stay competitive, healthcare providers cannot maintain the status quo. Collaborative cloud technologies, mobile solutions, enhanced security, and an optimised IT environment will push your organisation ahead of the competition. We can provide these healthcare IT services and more to provide you with a seamless technology experience, allowing you to transform the patient experience. IT. ie understands the many healthcare IT challenges you must face in the ever-changing technological landscape.   Talk to us Support at Your Fingertips Data Protection and Security Access to Your Data Anytime, Anywhere IT. ie understands that every minute counts in your industry. Our IT support services handle any technical issues you face within minutes so you can focus on the matter at hand. You Call-We Connect-We Resolve Businesses today face an unprecedented amount of data vulnerability. We are highly... --- ### Corporate Social Responsibility - Published: 2019-11-21 - Modified: 2025-02-13 - URL: https://it.ie/corporate-social-responsibility/ Corporate Social Responsibility THINK GLOBALLY, ACT LOCALLY Corporate Social Responsibility Our CSR At IT. ie we believe in being good corporate citizens so that we may benefit our clients, or employees and our community. As a Guaranteed Irish member, we also work hard to live up to its ethos to provide quality jobs, support local communities and are committed to Irish provenance. Some of our ongoing initiatives include the sponsorship of local sports clubs that are an integral part of the local community and its culture. Each year volunteers from our team take part in various challenges to raise money for charities across Ireland including:2021 - 2,500 KM Challenge for Barnardos2022 - Hell & Back for the Mater Foundation2023 - 200 Km in a month (individual challenge) for The Mater Foundation2023 - Hell & Back for the Save Our Sonia Campaign 2025 - 100 Mile Challenge for The Irish Hospice Foundation2025 - Battle Cancer Challenge for The Friends of St Luke's Cancer Care As part of our de-carbonisation goal, we are working hard to reduce our CO2 emissions. To date, we have replaced 80% of our diesel fleet with fully electric vehicles and in early 2022 we installed solar panels to provide charge to our fleet and reduce our reliance on the national electrical grid.  At IT. ie we believe in being good corporate citizens so that we may benefit our clients, or employees and our community. As a Guaranteed Irish member, we also work hard to live up to its ethos... --- ### Sonicwall Cyber Threat Report 2019 - Published: 2019-08-06 - Modified: 2019-08-06 - URL: https://it.ie/sonicwall-cyber-threat-report-2019/ While there has been a drop in ransomware attacks in 2019, overall malware attacks are on the rise with 194,171 new variants exposed by Sonicwall Advanced Threat Protection, so far in 2019. With 1,078 discover each day of the year, the threat to your business is ever increasing. Traditional PDF's and MS Office files continue to be routinely leveraged to exploit users trust. Internet of Things (IoT) malware attacks have surged past the level of 2018 and attacks on encrypted traffic has also seen a sharp rise in 2019. Arm your business with the latest threat intelligence from the mid-term Sonicwall Cyber Threat report. --- ### Email Security for Microsoft 365 - Published: 2018-11-27 - Modified: 2018-11-27 - URL: https://it.ie/email-security-for-office-365/ Microsoft 365 Email Security With 258 million corporate users, Microsoft 365 is the #1 target for cyberattacks. Get in Touch 93 percent of all network breaches include a phishing or spear-phishing attack. Predictive AI technology Unmatched Threat intelligence Email security is provided via our partners a Vade. With over 100 billion emails scanned per day, their AI engine continually learns from the latest Microsoft 365 email threats and decimates dynamic phishing, ransomware, and spear-phishing attacks. For the most part, the perimeters of vigilant organizations are reasonably tight. Firewalls are in place, servers are patched, and physical security is in place. However, email is a gaping hole in your network defenses. Email is the vector for virtually all the bad things that keep you up at night. What’s worse is that cybercriminals are using email to target the weakest link in an organization’s cybersecurity chain: humans. If you think that your organization is safe from email-borne attacks because you have enabled Office 365 email security add-ons like Exchange Online Protection (EOP) or Advanced Threat Protection (ATP), you need to think again. While these security tools are effective at blocking massive spam waves and known threats, they will not reliably stop highly targeted phishing, spear phishing or zero-day attacks. Get Started Data breaches are increasing. 1 % of Cyber attacks start with email 1 % of network breaches are phishing related 1 % Of Cyber Attacks are malware What's the common thread? Email The greatest threat to your organisation is sitting in... --- ### Interactive Whiteboards and Displays - Published: 2018-09-22 - Modified: 2023-11-03 - URL: https://it.ie/interactive-whiteboards/ Communication and Collaboration at its best Interactive Whiteboards & Digital Signage Transform your boardroom or classroom into a collaborative space Get in Touch Business Education Digital Signage Interactive Whiteboards & Digital Signage Go Beyond the Meeting Room Interactive Whiteboards are the ultimate collaboration tool. Perfect for the company boardroom or the classroom and designed to promote engagement and participation amongst your meeting attendees or students. Many interactive whiteboards and smart panels are also Open Pluggable Specification (OPS) enabled, allowing you to incorporate a Windows PC directly into the rear of the display.   Clevertouch Technologies https://youtu. be/dGfCGXQCMIoAs the need grows for more collaborative learning spaces, so does the demand for technology in the classroom. The Clevertouch Ecosystem enables today's teaching professionals to focus their valuable time on creating life-changing learning experiences, with seamless technology that is as simple to operate as it is dynamic. Transform a lesson into an extraordinary event, empower students to interact, and discover the impact of immersive learning with the Clevertouch digital classroom.    Interactive Displays for Business Clevertouch LUX for Enterprise Elevate Your Enterprise Collaboration with Cutting-Edge Technology Full range of sizes:  65" 4K  | 75" 4K | 86" 4K Welcome to the future of interactive displays, where the Clevertouch Lux for Enterprise transforms your meetings and collaborative efforts into a seamless, productive, and engaging experience. Designed with the enterprise environment in mind, our latest interactive display is a powerhouse of innovation and flexibility.      Visit Page Interactive Displays for Education Interactive Displays for Education... --- ### IT Support Dublin - Published: 2018-05-25 - Modified: 2024-04-19 - URL: https://it.ie/it-support-dublin/ IT Support Dublin The home of managed IT services in Dublin.   We offer Managed IT Services to companies who want an exceptional customer experience, with minimal downtime and problems quickly resolved. We do this by offering the most secure solutions, based on the very best - and most proactive - support and customer service in the industry. Get in Touch Live Chat IT Support for SME's in Dublin Sometimes it is difficult to find the right IT partner for your business.  Every business is unique and there is no ‘one size fits all approach to IT Support.  With this in mind, we like to evaluate the needs of each and every client on a case by case basis. We are a local, Managed IT Support company, based in Dublin but with a national reach, providing a complete service & product range to 100's of businesses nationwide. From start-up companies and schools to large multinational organisations, our proven ability with installing, supporting, repairing and maintaining computer systems is customer-focused, efficient and always professional.    https://it. ie/wp-content/uploads/2024/02/Promo-2024. mp4 We Understand YourFrustrations & Challenges Poor Performance Is IT getting in the way of your team doing their jobs effectively? Is your team complaining about their IT systems being too slow? Poor performing IT = Poor performing people. The challenge of improving business efficiency or planning for the future, when your IT systems aren’t performing at their best can be difficult. With IT. ie's Best-in-Class support, benefit from proactive maintenance and real-time monitoring,... --- ### Online Data Backup - Published: 2017-06-24 - Modified: 2017-06-24 - URL: https://it.ie/online-data-backup/ Secure online backup and recovery Get Started Company Data is paramount to every business. “Backup is cheap, but recovery is expensive”.   That’s what we say but what are the facts? Studies have shown that up to 60% of companies that experience serious data loss, will permanently cease operations within 6 months.   Why should you choose online backup with IT. ie? Fully Automated With online backup You don't have to worry about manual backups or changing tapes. Secure and Reliable Most companies don’t test their backups. That’s usually the most common mistake. We always perform a test restore of any file or folder during the first three months to ensure the backups are setup correctly It's offsite Storing your backups in the same room as your server is pointless if the room is flooded or damaged by fire. Our backup servers are located in two separate data centres Accessible Anywhere Your data can be restored to any computer anywhere Contact us about Online Backup Phone: (01) 8424114 Email: sales@it. ie Unit 35, Finglas Business Centre, Jamestown Road, D11 EP86 MON-FRI 09:00 - 17:30 Facebook Twitter Linkedin --- ### Comms Cabinet Cleanup - Published: 2017-06-24 - Modified: 2023-10-31 - URL: https://it.ie/comms-cabinet-cleanup/ IT. ie Services Comms Cabinet Cleanup When a communications rack falls into disarray, it’s probably time to get it cleaned out or even restructured. Request a Quote Comms Cabinet & Cleanup & Refresh The comms cabinet is very much at the centre of every business. Broadband, network and telephone systems are all managed from this location. It is here where the system administrator or IT person will patch someone or something into the business network or telephone system. Most often, the request from management to do so, comes with very little notice.  Even with the best of intentions, maintaining a tidy cabling system is often secondary to the urgency of resolving business critical network issues or downtime in general. This leads to a chaotic cabling system which invariably creates more difficult issues down the road. Get Started BENEFITS OF KEEPING A CLEAN AND TIDY COMMS CABINET OR RACK Networking Performance and Stability A network can only be as strong as it’s physical side. No matter how fast your speeds, it doesn’t matter if the cables and equipment are poorly installed. Poorly placed equipment and messy cabling not only looks unattractive but can obstruct circulation of air and cause equipment strain and overheat. Maintenance and Troubleshooting Any job is easy when you can see everything in scope. Adding a new patch panel is as easy as seeing the inbound and outbound ports and connecting them in a similar structure to the rest of the cabling. Without structured cabling in place, most... --- ### Network Support - Published: 2017-06-23 - Modified: 2022-03-31 - URL: https://it.ie/network-support/ Network Support & Maintenance We provide support and maintenance for your network infrastructure.   Get in Touch Network Support From installing servers to comms cabinet cleanup to structured cabling we support every element of your network infrastructure. Network Support from IT. ie is designed to support your existing network configuration when required, supply and install a completely new business network. From comms cabinet and network switches to the end-user, we ensure that your business is best placed to operate in an optimal working environment.   Get Started Structured Cabling Cabling is often neglected during IT system implementations because it’s not seen as requiring an upgrade. Of all the network areas that can be ‘future-proofed’, structured cabling is one of the easiest. Once installed, a cabling solution can satisfy business requirements for many years. For this reason it’s important to get an expert Needs Assessment at the start of your project. Installing adequate cable management in your comms rooms and wiring closets from the start is crucial to ensuring you are not left with a jungle of cables further down the road. Front, side and rear cable management should be installed in all cabling racks to provide cable routes and cable management.   We can recommend a cable management solution to suit your requirements. Data Cabling Fiber Optic Cabling Network Cabinet Refits Communications rooms, cabinets and data centres Wireless-to-wired network access installations Hubs, switches and routers Comms Cabinet Refresh There are several benefits to having a clean and tidy cabinet. 1-... --- ### IT Support For Schools - Published: 2017-06-22 - Modified: 2022-11-14 - URL: https://it.ie/it-support-for-schools/ IT Services IT SUPPORT FOR SCHOOLS We've been providing IT Support and services to schools and the wider education sector for more than 17 years. Get in Touch IT. ie supports schools all across the country. IT SUPPORT FOR SCHOOLS & EDUCATION SECTOR No matter how well you look after your IT, you need reliable support that delivers fast effective fixes that keeps students learning and staff teaching, in a safe and secure IT environment. IT. ie has been providing premium IT services comprising of Sales, Support and Solutions to both Primary and Post Primary Schools nationwide, for over 17 years. Our subscription model of Managed IT Services allows you to budget effectively throughout the year and avoid unnecessary ad-hoc IT costs. Get Started WE DEVELOPED OUR SCHOOLS MANAGED SUPPORT SERVICE TO PROVIDE ICT SUPPORT WITH A DIFFERENCE. Working as your ICT partner, keeping your systems working well, so you can concentrate on teaching and running the school. We don’t just aim to save your school money. We create an environment to help your school grow, develop and enhance the teaching experience. Get Started Discounts available to schools: Microsoft Office 365 Antivirus Protection Laptops Tablets Desktops TECHNOLOGY PLANNING We pride ourselves in being the complete IT solutions company. We work with you, to ensure that we can build you the very best IT system, within your budget, while ensuring that it has future proofing built in, to reduce your IT spend in the future. PROACTIVE IT SYSTEMS MONITORING Even when... --- ### Direct Debit e-Mandate - Published: 2017-03-16 - Modified: 2022-04-15 - URL: https://it.ie/direct-debit-emandate/ IT. ie Accounts eMandate Click on the button to be taken to our eMandate Page Sign eMandate What are the Benefits of Direct Debit? Cost-saving – Direct Debit can save customers any charges incurred by missing a payment as the method is automated. Time-saving – Direct Debit payments save time by cutting out an administrative task. Certainty – Direct Debit gives you peace of mind knowing your payments will be made on time each month. You’ll also know exactly when your payments will happen. Improves your financial management – Direct Debit payment helps you to better manage your cash flow, allowing you to stay one step ahead when it comes to your expenses. Secure – robust technological security measures ensure all transactions are handled in the most professional and secure environment. Trusted method of payment – Direct Debit is a credible method of payment that is recognised and trusted. --- ### Sign up to Our Newsletter - Published: 2014-01-22 - Modified: 2022-12-15 - URL: https://it.ie/sign-up-to-our-newsletter-here/ Newsletter Get great articles direct to your inbox. Stay in the loop with our monthly round-up of news updates. Our Most Recent Newsletters Our Most Recent Blog Posts --- ### Maintenance Mode - Published: 2013-10-16 - Modified: 2013-10-16 - URL: https://it.ie/maintenance-mode/ Maintenance Mode Avada includes blank pages so you can build all kinds of awesome stuff, like a maintenance mode page! If you're a code nerd or a Word Press newbie, Avada is for you. It's built for everyone, and can be as simple or complex as you want. We truly care about our users & end product which is why our users love Avada! You will too with free updates & amazing support. Avada includes so many different options and designs. Create amazingly cool layouts with all the different tools we provide. --- ## Posts ### The Ultimate Microsoft Copilot Cheat Sheet - Published: 2025-04-09 - Modified: 2025-04-09 - URL: https://it.ie/the-ultimate-microsoft-copilot-cheat-sheet/ - Categories: Microsoft 365 - Tags: Microsoft, Microsoft 365 Microsoft Copilot is changing the way we work—bringing the power of generative AI directly into the tools you use every day, including Word, Excel, PowerPoint, Outlook, Teams and more. Whether you're writing content, crunching data, or managing your inbox, Copilot acts as your intelligent partner, saving you time and supercharging your productivity. This cheat sheet is your go-to guide for getting the most out of Copilot. We've packed it with shortcuts, tips, and real-world use cases so you can hit the ground running—whether you're a newbie or looking to level up your AI game. Copilot Tips & Best Practices Be clear and specific – The better your prompt, the better the result. Don’t be afraid to ask follow-up questions. Use natural language – Talk to Copilot like you would a colleague. It understands context and conversational commands. Refine your results – If it doesn’t get it right first time, guide it. Add details or rephrase your request. Leverage existing content – Copilot can summarise, rewrite, or repurpose content from existing documents or emails. Stay secure – Copilot respects the permissions and data access controls already in place across Microsoft 365. General Commands & Prompts Use these prompts across Microsoft 365 apps:Summarisation👉 “Summarise this document in three key points. ”👉 “Give me a concise summary of this email thread. ”Content Generation👉 “Write a professional email response to this request. ”👉 “Create a project proposal based on these notes. ”Formatting & Refining👉 “Make this text more formal. ”👉 “Reword this paragraph for... --- ### The Drive to 75: Finding the Perfect Balance in Microsoft Secure Score - Published: 2025-03-19 - Modified: 2025-03-19 - URL: https://it.ie/the-drive-to-75-finding-the-perfect-balance-in-microsoft-secure-score/ - Categories: Cyber Security, Microsoft, Microsoft 365, NIS2 - Tags: Cyber security, Microsoft, Microsoft 365, Secure Score Cyber threats are evolving at an alarming rate, and businesses of all sizes are in the crosshairs. Measuring your organisation’s security readiness isn’t just a useful metric - it’s an imperative. But how can you do that? This is where Microsoft Secure Score comes in—a powerful benchmark that evaluates your security posture within Microsoft 365. Setting high security standards is something we take very seriously. To help our clients measure and improve their security readiness, we’ve launched The Drive to 75, a dedicated initiative to help businesses achieve a 75% Secure Score or higher—ensuring better protection, compliance, and peace of mind. What is Microsoft Secure Score? Microsoft Secure Score is a built-in security assessment tool within Microsoft 365 that analyses your organisation’s security configuration and provides a percentage score based on implemented security controls. The higher your Secure Score, the stronger your security posture. Improving your Secure Score is not just about boosting numbers—it directly impacts your organisation’s ability to prevent cyber threats, comply with industry standards (NIS2, ISO 27001, GDPR), and build customer trust. Why a High Secure Score Matters A high Secure Score means your organisation has adopted robust cybersecurity best practices, reducing the risk of breaches and ensuring better compliance. Here’s why improving your Secure Score should be a top priority:Stronger Access Controls – Enforcing Multi-Factor Authentication (MFA) and Conditional Access policies ensures that only authorised users access your data, reducing the risk of credential-based attacks. Improved Data Protection – Data Loss Prevention (DLP) and sensitivity labels... --- ### Press Release: 43% of office workers say they could cause a cybersecurity breach this year - Published: 2025-03-12 - Modified: 2025-03-12 - URL: https://it.ie/press-release-43-of-office-workers-say-they-could-cause-a-cybersecurity-breach-this-year/ - Categories: Cyber Security, NIS2, Press Release - Tags: Cyber security, Survey Dublin, 12 March 2025 - IT. ie, a leading Irish IT managed services company, today announces the results of new research, conducted in partnership with SonicWall, which reveals a lack of confidence among office workers in their ability to thwart cyberthreats. The survey found that 51% of office workers feel more vulnerable to cyberattacks than they did a year ago, leading to 43% believing that they are at risk of causing a cybersecurity incident in the next 12 months. The research of 1,000 office workers based in Ireland was carried out by Censuswide on behalf of IT. ie and SonicWall, a global leader in cybersecurity innovation. It uncovers a need for more cybersecurity training for office workers, along with a greater sense of shared responsibility for upholding cybersecurity standards. The survey found that of the 43% who feel at risk of causing a breach, 60% attribute it to incomplete or non-existent cybersecurity training, and nearly a third (31%) blame poor communication from management regarding cyber risks.   These feelings of being ill-prepared are reflected among the general office worker population, too, with 21% saying they do not feel adequately trained to deal with increased cybersecurity threats on a day-to-day basis. This is despite the fact that the EU’s incoming cybersecurity legislation, the NIS2 Directive, outlines cybersecurity training as one of the minimum measures required for compliance. Generally, the recommended frequency for cybersecurity training is once per month – as long as it is aligned with a multilayered approach that includes... --- ### Invoice Scams Are Costing Businesses Millions – Here’s How to Stay Safe - Published: 2025-02-05 - Modified: 2025-02-05 - URL: https://it.ie/invoice-scams-are-costing-businesses-millions-heres-how-to-stay-safe/ - Categories: Cyber Security, DORA, NIS2 - Tags: Cyber security, Data protection, DORA, NIS2 Invoice fraud continues to be a serious concern for businesses, leading to substantial financial losses and operational disruptions. Cybercriminals are becoming increasingly sophisticated, using deceptive tactics to manipulate companies into transferring funds to fraudulent accounts. This post explores the threat of invoice scams, real-world case studies, and strategies businesses can implement to protect themselves. What is Invoice Redirect Fraud? Invoice redirect fraud occurs when criminals impersonate legitimate suppliers or business contacts to trick companies into making payments to fraudulent accounts. This can be done via email, phone calls, or forged documents. By exploiting weak security measures and human error, scammers can siphon substantial sums before being detected. A Typical Invoice Redirect Fraud Process Step 1: Target IdentificationScammers research a business and its suppliers, often using publicly available information or previous data breaches.  Step 2: Email Compromise or SpoofingFraudsters either hack into a supplier’s email or create a fake email domain closely resembling the real one. An email is sent to the finance team, requesting a payment update.  Step 3: Fake Invoice SubmissionThe scammer sends an invoice using a fraudulent bank account, disguised as a routine payment request. The email might contain urgent language, warning of service disruption if payment isn’t made quickly. Step 4: Payment ProcessingThe business processes the invoice and transfers funds to the scammer’s account. Since the invoice appears genuine, the fraud may go unnoticed for days or weeks.  Step 5: Funds DisappearanceOnce the payment is made, scammers immediately withdraw or transfer the funds to other accounts, making... --- ### What is Microsoft Entra ID? A Guide to Microsoft Identity Security - Published: 2025-01-31 - Modified: 2025-01-31 - URL: https://it.ie/what-is-microsoft-entra-id-a-guide-to-microsoft-identity-security/ - Categories: Cyber Security, Microsoft, Microsoft 365 - Tags: Cyber security, Microsoft, Microsoft 365 What is Microsoft Entra ID? Microsoft Entra ID is a cloud-based identity and access management (IAM) solution provided by Microsoft. It helps organisations secure and manage user identities, enabling secure access to applications, devices, and resources. Entra ID plays a crucial role in identity protection, authentication, and authorisation for businesses, allowing users to sign in and securely access corporate resources. It is a core part of the Microsoft Entra suite, which includes identity governance, multi-cloud identity management, and conditional access policies. Formerly Known as Azure Active Directory (Azure AD) Before July 2023, Microsoft Entra ID was known as Azure Active Directory (Azure AD). The rebranding was part of Microsoft's effort to simplify identity management across hybrid and cloud environments while aligning it with the broader Microsoft Entra suite. Despite the name change, Microsoft Entra ID retains all the features of Azure AD, with enhancements to identity security, zero-trust principles, and automation capabilities. Key Components of Microsoft Entra ID Microsoft Entra ID includes several key components that strengthen identity security and access management: 1. Identity Protection Uses machine learning to detect and mitigate identity risks. Helps organisations detect suspicious sign-in attempts and protect against identity-based threats. Provides automated responses to potential security breaches. 2. Conditional Access Ensures secure access by enforcing risk-based policies. Uses signals like user location, device compliance, and risk assessment to determine access levels. Enhances Zero Trust security by granting access only when conditions are met. 3. Multi-Factor Authentication (MFA) Adds an extra layer of security beyond passwords.... --- ### Press Release - 73% of office workers in Ireland say staff get blamed for cybersecurity incidents - Published: 2025-01-16 - Modified: 2025-01-16 - URL: https://it.ie/press-release-73-of-office-workers-in-ireland-say-staff-get-blamed-for-cybersecurity-incidents/ - Categories: Press Release - Tags: Cyber security, Press Release, SonicWall DUBLIN, 16 January 2025: IT. ie, a leading Irish IT managed services company, today announces the results of new research, conducted in partnership with SonicWall, which reveals feelings of blame among employees in Ireland when it comes to cybersecurity. The study found that nearly three-quarters (73%) of office workers believe their employer holds staff personally responsible – either through disciplinary action or unfavourable treatment – for cybersecurity incidents. In fact, some 29% of office workers report that at least one person in their company has been fired for accidentally causing a breach in the last 12 months. The research of 1,000 office workers based in Ireland was carried out by Censuswide on behalf of IT. ie and SonicWall, a global leader in cybersecurity innovation. More than a third (38%) of respondents believe their company 'always’ holds employees responsible for cybersecurity incidents, while 35% said they do so ‘sometimes’. Given this stance, the survey explored the personal impact of cybersecurity threats and incidents on workers. It found that 50% of office workers feel stressed about cybersecurity in their job. This is despite the fact that the majority (60%) of respondents believe employees are not to blame for unintentional breaches and incidents. The personal toll of causing a cybersecurity breach is so great that almost two-thirds (64%) of office workers said they would leave, or consider leaving, their job if they were to cause a breach. Meanwhile, 79% advocate for organisations providing mental health support to those who fall victim to cybersecurity... --- ### Managed IT Services: Your Guide to Finding the Right Partner - Published: 2025-01-15 - Modified: 2025-01-15 - URL: https://it.ie/managed-it-services-your-guide-to-finding-the-right-partner/ - Categories: IT Support, Managed IT Services - Tags: Managed IT Services Introduction In today’s fast-paced business environment, technology is no longer just a support function—it is the backbone of successful operations. Managed IT Services Providers (MSPs) are key partners in helping businesses navigate complex IT landscapes, ensuring systems are efficient, secure, and aligned with business goals. This guide provides a roadmap for identifying, evaluating, and partnering with the right MSP, empowering you to make informed decisions and achieve your organisational objectives. What Are Managed IT Services? Definition and Scope Managed IT services involve delegating IT responsibilities to a professional third-party organisation. These services typically include:Proactive monitoring and maintenance. IT SupportSecurity management. Backup and disaster recovery. IT consulting and strategic planning. Benefits of Managed IT Services Proactive Problem Solving: Issues are identified and resolved before they disrupt operations. Cost Savings: Outsourcing IT reduces the need for full-time staff and expensive infrastructure. Access to Expertise: MSPs bring specialised knowledge across various technologies. It also gives you access to the resources and expertise previously only available to large organisations and multi-nationals. Enhanced Security: Dedicated teams ensure data protection and regulatory compliance. Types of MSP ModelsFull-Service MSPs: Cover all aspects of IT, acting as an outsourced IT department. Co-Managed Services: Collaborate with in-house teams, filling gaps in expertise or capacity. Specialist MSPs: Focus on specific areas like cybersecurity or cloud services. Understanding the Role of an MSP in Modern Businesses Technology is evolving rapidly, and businesses must adapt to remain competitive. MSPs play a crucial role in:ScalabilityAllowing businesses to grow without worrying about IT limitations.... --- ### APT groups are increasingly deploying ransomware – and that’s bad news for everyone - Published: 2025-01-08 - Modified: 2025-01-08 - URL: https://it.ie/apt-groups-are-increasingly-deploying-ransomware-and-thats-bad-news-for-everyone/ - Categories: Cyber Security, Guest Post, Ransomware - Tags: Cyber security, ESET, Ransomware APT groups are increasingly deploying ransomware – and that’s bad news for everyone The blurring of lines between cybercrime and APT attacks underscores the increasingly fluid and multifaceted nature of today’s cyberthreats. There was a time when the boundary between cybercrime and advanced persistent threat activity was rather easy to discern. Cybercriminals were fuelled solely by the profit motive. And their counterparts in the government carried out mainly cyberespionage campaigns, plus the occasional destructive attack, to further their employers’ geopolitical goals. However, in recent months, this line has begun to dissolve, including when it comes to ransomware, a trend also noted by ESET’s latest Threat Report. This has potentially major implications for IT and security leaders – not only increasing the risk of attack, but also changing the calculus around how to mitigate that risk. Blurred lines in cyberspace You could argue that ransomware attacks launched by allegedly state-sponsored hackers is, in fact, nothing new. In 2017, alleged state-affiliated operatives are thought to have launched WannaCry (aka WannaCryptor), the first ever global ransomworm. It was only halted after a security researcher stumbled upon and activated a “kill switch” hidden in the malicious code. In the same year, alleged state-sponsored hackers launched the NotPetya campaign against Ukrainian targets, although in this case it was actually destructive malware disguised as ransomware in order to throw investigators off the scent. In 2022, ESET observed the Sandworm group using ransomware in a similar way: as a data wiper. The line between alleged state-backed operations and financially motivated crime has been blurring ever since.... --- ### How to Spot Scams and Keep Your Data Safe This Holiday - Published: 2024-12-16 - Modified: 2024-12-16 - URL: https://it.ie/how-to-spot-scams-and-keep-your-data-safe-this-holiday/ - Categories: Cyber Security, Guest Blog - Tags: Christmas, Cyber security, Data protection, phishing ESET Ireland December 16, 2024 How to Spot Scams and Keep Your Data Safe This Holiday This post was originally published by ESET Ireland on the 29th of November and republished here with their permission.  The holiday season is, for many a time to rest and enjoy their friends and families as well as some good food. For scammers, it’s the most fruitful time of the year. Why, you may ask? Well, there are several reasons for this. The first and most obvious is that this is the season of giving, and people tend to spend quite a lot of money on gifts for their loved ones. The season starts way before Black Friday or Cyber Monday. According to the National Retail Federation´s latest consumer survey, this Christmas is expected to reach a record average of $902 per person across gifts, food, decorations, and other seasonal items. As expected, most holiday shopping is done online nowadays. According to a recent survey, 44% of shoppers expect to do more than half of their shopping online in 2024. The aforementioned gold mines for both shoppers and holiday scammers, Black Friday and Cyber Monday are the specific days that most people plan to do their holiday shopping; just over half of those surveyed (53%) are concerned about being scammed. Interestingly, according to the survey, the majority of people fall victim to online shopping scams and phishing scams ahead of other types. But people´s spending on gifts is not the only reason. People are also increasingly charitable, making them... --- ### The 12 Scams of Christmas 2024 - Published: 2024-12-11 - Modified: 2024-12-12 - URL: https://it.ie/the-12-scams-of-christmas-2024/ - Categories: Uncategorized - Tags: Christmas, Cyber security, phishing, Ransomware The holiday season is here once again and before you dive headfirst into the holiday cheer, it’s that time of year when we ask you to channel your inner Scrooge—and no, we’re not talking about being mean but rather being shrewd when it comes to sharing information online. Over the past couple of years, we’ve revised and updated this list of Christmas scams to reflect the evolving tactics of fraudsters. This year is no different: we bring you the latest and most pressing threats to watch out for in 2024. Stay sharp, stay informed, and keep the joy of the season intact. 1. AI-Generated Phishing Scams Advances in artificial intelligence have allowed scammers to create highly convincing phishing emails that appear to come from trusted brands, such as banks, online retailers, or delivery services. These emails often include urgent requests to click on links or download attachments, leading to malware infections or theft of sensitive information. How to Protect Yourself Verify emails directly with the source before clicking links. Avoid responding to unsolicited messages. Be wary of emails with grammatical errors or unusual sender addresses. Verify emails directly with the source before clicking links. Avoid responding to unsolicited messages. Be wary of emails with grammatical errors or unusual sender addresses. 2. Social Media Marketplace Scams Scammers prey on holiday shoppers by offering “exclusive” deals on must-have gifts through social media ads or marketplace listings. These items are often non-existent, and victims either lose their money or have their payment information... --- ### Achieving the Optimal 75% Microsoft Secure Score: Why It Matters for Your Business - Published: 2024-12-03 - Modified: 2024-12-03 - URL: https://it.ie/achieving-the-optimal-75-microsoft-secure-score-why-it-matters-for-your-business/ - Categories: Uncategorized - Tags: Cyber security, Data protection, Microsoft, Secure Score If your business uses Microsoft 365, you've likely come across the Microsoft Secure Score—a powerful indicator of your organisation's security posture. Let’s explore why aiming for 75% is both a realistic and crucial target, and why upgrading from Microsoft 365 Business Standard to Business Premium might be the best decision for your company’s security. Why 75%, is the Secure Score Sweet Spot Striving for a perfect Secure Score often leads to stringent security measures that, while robust, can significantly disrupt day-to-day operations and decrease productivity. In contrast, a 75% score offers substantial protection without imposing heavy burdens on your employees. This balance is particularly important in light of emerging regulations like NIS2 (Network and Information Security Directive 2) and DORA (Digital Operational Resilience Act). These compliance frameworks emphasise that businesses must demonstrate due diligence in cybersecurity, but not at the cost of becoming operationally paralysed. With a Secure Score of 75%, you can demonstrate that your organisation is following best practices and complying with key requirements, without compromising on productivity. The Importance of the 75% Target: Mitigating Risks A 75% Secure Score is more than just a number. It’s a strong indicator that your organisation has implemented many of the crucial protections to fend off today’s common threats. With this level of maturity in your security setup, you’ll have minimised vulnerabilities while ensuring your company remains compliant with industry standards. Think of it as a milestone that represents the level at which your organisation is well-defended, but not overly burdened by strict controls that... --- ### Stay Cyber-Safe This Holiday Season: Essential Cybersecurity Tips for Your Business - Published: 2024-11-25 - Modified: 2024-11-28 - URL: https://it.ie/stay-cyber-safe-this-holiday-season-essential-cybersecurity-tips-for-your-business/ - Categories: Uncategorized - Tags: Cyber Awareness Training, Cyber security, Data protection, phishing, Ransomware The holiday season is almost upon us, bringing with it a significant increase in online activity. As eager shoppers hop online to bag bargains on Black Friday or Cyber Monday, cyber-criminals also see this as a prime opportunity to target bargain hunters. With many using their work devices to access online marketplaces, your business systems face significant risks. Statistics highlight a stark reality: phishing attacks alone historically spike by up to 50% in December, making your vigilance crucial. This blog post offers some practical advice and tips on how to help protect your business, this holiday season.   Beware of Holiday-Themed Phishing Scams Phishing attacks often rise during the holidays, as cybercriminals use holiday-themed messages to lure employees into clicking on malicious links or downloading harmful attachments. Here’s how to spot these scams: Be Cautious of Urgent Holiday Deals: Emails or messages with urgent holiday offers or last-minute discounts can be phishing attempts. Always verify the sender’s address and avoid clicking links or downloading attachments if you’re unsure. Look Out for Fake Seasonal Greetings: Scammers may send “season’s greetings” or “holiday gift” emails that contain malicious links. Treat unexpected messages with caution, especially if they’re from unfamiliar sources. Suspicious HR Communications: Around the holidays, employees may receive notifications about end-of-year benefits or Paid Time Off (PTO) requests. Cybercriminals often exploit this by sending fake HR emails to trick recipients into providing personal information or credentials. Instruct your staff to verify such communications directly with HR. Tip: Regularly remind your team... --- ### Microlearning for Cyber security Awareness: Small Modules, Big Impact - Published: 2024-11-11 - Modified: 2024-11-11 - URL: https://it.ie/microlearning-for-cyber-security-awareness-small-modules-big-impact/ - Categories: Uncategorized - Tags: Cyber Awareness Training, Cyber security, Microlearning There was a time when cybersecurity was seen as the sole responsibility of the IT department or dedicated cyber experts, with little involvement from the average user. Today, things are different. From interns to senior executives, cybersecurity is everyone’s responsibility, and we all have a role to play. The rapid pace of innovation brings new opportunities but also introduces new threats, especially with disruptive technologies like AI reshaping the cyber threat landscape. With people's schedules already packed, how can we make cybersecurity training both digestible and effective? Enter microlearning. By delivering short, focused training sessions, microlearning ensures that cybersecurity education is accessible, engaging, and impactful. It turns what could be your organisation's weakest link into one of its strongest defences—your people. What is Microlearning? Microlearning is a modern approach to training that delivers content in bite-sized, focused segments. Instead of an hour-long session on 'What Not to Click,' it breaks lessons down into short modules—quick enough to finish before your coffee (tea in my case) gets cold. This approach keeps learners engaged, avoiding the glazed-over expressions often seen in traditional training sessions. Microlearning is flexible and designed to fit seamlessly into the daily work routine, whether through quick videos, quizzes, or interactive tasks. The result? Better retention, sharper skills, and cybersecurity awareness that sticks. After all, people are more likely to remember what they learn in short bursts than in a marathon session that feels like cramming for an exam. Microlearning: A Lasting Solution, Not a Passing Fad If you... --- ### DORA: Understanding Compliance for Financial Institutions  - Published: 2024-10-21 - Modified: 2024-10-21 - URL: https://it.ie/dora-understanding-compliance-for-financial-institutions/ - Categories: DORA - Tags: Compliance, Cyber security, Data protection John Grennan Eamon Gallagher October 21, 2024 The regulatory landscape in the European Union (EU) has grown increasingly complex as the importance of cybersecurity and operational resilience takes centre stage, particularly in financial services. Two of the most significant regulations designed to protect critical sectors from cyber threats and operational disruptions are the Digital Operational Resilience Act (DORA) and the Network and Information Security Directive (NIS2).  In this blog, we will explore what DORA is, how it compares to other regulations like NIS2, the key requirements for compliance, and how a Managed Services Provider (MSP) can support financial institutions in their efforts to meet DORA’s requirements.   What is DORA? The Digital Operational Resilience Act (DORA) is part of the European Union’s larger financial regulatory framework. It aims to ensure that financial entities, such as banks, insurance companies, and payment service providers, are well-prepared to withstand ICT-related disruptions and cyberattacks. The act mandates that institutions implement robust measures to protect their ICT systems, ensuring continuity of services even during significant disruptions.   Key Dates:  September 2020: DORA was proposed by the European Commission in response to rising cyber threats.   November 2022: The European Parliament formally adopted DORA.   January 2025: DORA is expected to come into force and be enforced across the European Union.   DORA is designed to strengthen the operational resilience of financial services across the EU by setting clear guidelines on how firms should manage ICT risk, ensuring the stability of critical services during disruptions.  ... --- ### Telekopye scammer network targets Booking.com and Airbnb - Published: 2024-10-16 - Modified: 2024-10-16 - URL: https://it.ie/telekopye-scammer-network-targets-booking-com-and-airbnb/ - Categories: Cyber Security, Guest Blog, Phishing, Scams - Tags: Cyber security, phishing Guest Post by ESET October 14, 2024 This post, originally published on the ESET blog on October 10 2024, is reposted here with permission.  ESET researchers discovered that the organized scammer network Telekopye has expanded its operations to target users of popular accommodation booking platforms like Booking. com and Airbnb. ESET Research released new findings on Telekopye, a scam toolkit designed to help cybercriminals defraud people on online marketplaces. Telekopye groups have expanded their targeting to popular accommodation booking platforms, such as Booking. com and Airbnb. The attackers are utilizing compromised accounts of legitimate hotels and accommodation renters. These scams were especially prevalent in the summer holiday season in the targeted regions, surpassing Telekopye’s marketplace scams in ESET telemetry. They have also increased the sophistication of their victim selection and of targeting the two booking sites, where the phishing pages are even more believable than regular online marketplace ones. Telekopye is a toolkit that operates as a Telegram bot turning online marketplace scams into illicit organized business. It is used by dozens of scam groups with up to thousands of members to steal millions of euros from their victims. ESET Research presented the latest findings about Telekopye at the 2024 Virus Bulletin conference. In the Telekopye scammer network, the scammers refer to the targeted buyers and sellers as Mammoths. The scammers, called Neanderthals by ESET researchers, require little to no technical knowledge – Telekopye takes care of everything in a matter of seconds. According to ESET telemetry, the booking scams started... --- ### Windows 10 End Of Life: Is Your Business Ready? - Published: 2024-10-14 - Modified: 2025-01-02 - URL: https://it.ie/windows-10-end-of-life-is-your-business-ready/ - Categories: Microsoft, Windows 10, Windows 11 - Tags: Microsoft, Windows 11 John Grennan October 14, 2024 On 14th October 2025, Windows 10, the much-loved operating system will reach its End of Life (EOL), meaning it will no longer receive updates or security patches. As a result, businesses and individuals still using Windows 10 need to start planning their transition to Windows 11. In this blog, we’ll cover what EOL means, why it’s essential to act now, and how your business can smoothly navigate the transition. What Does Windows 10 EOL Mean? When Windows 10 reaches its EOL, Microsoft will no longer release security patches or updates, leaving any systems still using the OS highly vulnerable to cyber threats. This includes malware, ransomware, and other cyber-attacks that could compromise sensitive data. Beyond security risks, the lack of updates means compatibility issues with new software, which could affect productivity and innovation. As your business grows, relying on outdated technology could slow you down. Why Upgrade to Windows 11? Upgrading to Windows 11 isn’t just about staying secure—this new OS offers a range of benefits that make it a smarter, more future-proof choice for businesses. Enhanced security: Windows 11 comes with advanced security features, including improved hardware-based protection, secure boot, and advanced encryption, all designed to defend against modern cyber threats. Productivity boosts: Windows 11 introduces a new, streamlined interface and optimised virtual desktops, helping employees manage tasks more efficiently, especially in hybrid work environments. Performance improvements: With better resource management and faster startup times, Windows 11 enables smoother multitasking and better overall system... --- ### The Evolving Role of Managed Service Providers (MSPs) in Business Growth - Published: 2024-09-20 - Modified: 2024-09-20 - URL: https://it.ie/the-evolving-role-of-managed-service-providers-msps-in-business-growth/ - Categories: Managed IT Services - Tags: Cyber security, Digital Transformation, Managed Services In the past, Managed Service Providers (MSPs) were often seen as external IT teams – troubleshooters called upon when something broke. Their role was reactive, focusing on keeping systems running smoothly and ensuring basic tech support for day-to-day operations. Fast forward to today, and the landscape has drastically changed. MSPs have evolved into strategic partners, deeply integrated into a business's operations. No longer just the go-to for fixing servers or resetting passwords, MSPs now play a central role in driving growth, innovation, and scalability. They help businesses navigate digital transformation, streamline processes, and focus on core goals while staying ahead of technological advancements. Let’s take a closer look at how MSPs are contributing to business growth. 1. Digital Transformation: MSPs as Enablers of Innovation Digital transformation has become somewhat of a buzzword, but its real-world impact on businesses is profound. MSPs are at the forefront of guiding companies through this process. Whether it’s migrating systems to the cloud, automating operations, or implementing advanced data management, MSPs have the expertise to ensure businesses embrace new technologies efficiently. Key Contributions:Cloud Services: Moving from on-premise infrastructure to cloud-based solutions allows businesses to scale quickly, reduce costs, and provide remote work flexibility. MSPs facilitate seamless cloud migrations, ensuring minimal downtime and maximum efficiency. Automation: MSPs implement automation tools that streamline processes, eliminate repetitive tasks, and free up human resources to focus on higher-value activities. Software Integrations: They help businesses integrate new technologies with existing systems, ensuring smooth transitions and efficient operations without disruption.  By... --- ### Preparing for NIS2: Why a Multi-Layered Cybersecurity Approach is Critical - Published: 2024-09-09 - Modified: 2024-09-12 - URL: https://it.ie/preparing-for-nis2-why-a-multi-layered-cybersecurity-approach-is-critical/ - Categories: Security John Grennan, Eamon Gallagher & Wayne Morgan September 9, 2024 As the cyber threat landscape continues to evolve, the sophistication and frequency of attacks are escalating at an alarming rate. This is particularly concerning for small to medium-sized businesses (SMBs), which are often perceived by cybercriminals as easy targets. With the upcoming enactment of the NIS2 Directive in October, organisations in Ireland and across the EU must reassess their cybersecurity strategies to ensure compliance. The NIS2 Directive, which builds upon the original NIS Directive, introduces stricter requirements for cybersecurity across critical sectors. This makes adopting a robust multi-layered approach to cybersecurity not just advisable but essential. Understanding NIS2 and Its Impact on SMBs The NIS2 Directive aims to enhance the overall level of cybersecurity within the EU by setting minimum standards for risk management, incident reporting, and supply chain security across all Member States. It applies to a wide range of critical sectors, including energy, transport, health, financial services, water supply, digital infrastructure, and public administration. These sectors are considered essential for the functioning of society and the economy, and therefore they are subject to stricter cybersecurity requirements under NIS2. Non-compliance with the directive can result in significant penalties, including substantial fines and potential reputational damage. This underscores that cybersecurity is not merely an IT concern but a critical business imperative. The responsibility for compliance under NIS2 rests squarely on each organisation, regardless of size. This means that SMBs must also ensure their cybersecurity measures meet these new standards. With... --- ### Hello, is it me you’re looking for? How scammers get your phone number - Published: 2024-09-03 - Modified: 2024-09-03 - URL: https://it.ie/hello-is-it-me-youre-looking-for-how-scammers-get-your-phone-number/ - Categories: Guest Blog, Scams Hello, is it me you’re looking for? How scammers get your phone number Your humble phone number is more valuable than you may think. Here’s how it could fall into the wrong hands – and how you can help keep it out of the reach of fraudsters. This Blog was originally published on ESET Ireland on July 16 and is republished with permission.  What might be one of the easiest ways to scam someone out of their money – anonymously, of course? Would it involve stealing their credit card data, perhaps using digital skimming or after hacking into a database of sensitive personal information? While effective, these methods may be resource-intensive and require some technical prowess. What about stealing payment info via fake websites? This may indeed fit the bill, but spoofing legitimate websites (and email addresses to “spread the word”) may not be for everybody, either. The odds are also high that such ploys will be spotted in time by the security-savvy among us or thwarted by security controls. Instead, bad actors are turning to highly scalable operations that rely on sophisticated social engineering tactics and costs little to operate. Using voice phishing (also called vishing) and message scams (smishing), these operations have been developed into a scam call-centre industry worth billions of dollars. For starters, these ploys may not require much in the way of specialized or technical skills. Also, a single person (often a victim of human trafficking) can, at a time, ensnare multiple unwitting victims in various flavours of fraud. Would you take... --- ### Beware of Ticket Scammers on Social Media: Don't Let Fake Promises Ruin Your Concert Experience - Published: 2024-08-29 - Modified: 2024-08-29 - URL: https://it.ie/beware-of-ticket-scammers-on-social-media-dont-let-fake-promises-ruin-your-concert-experience/ - Categories: Scams - Tags: Online Scams, Scams, Ticket Scams As the excitement builds for Coldplay's upcoming gigs at Croke Park and fans eagerly await tickets for the much-anticipated Oasis reunion in 2025, the spectre of ticket scammers looms larger than ever. These opportunistic fraudsters are perfectly poised to exploit the fervour of fans desperate to catch their favourite bands live. The Allure of Last-Minute Tickets: A Scammer’s Playground It’s a common scenario: tickets sell out in minutes, and many are left frantically searching for any available seats. Enter the scammers, ready with promises of last-minute tickets. They typically target fans on social media platforms where people are already discussing the gigs. The most prevalent scams involve the hijacking Facebook accounts. Here’s how they often play out:Account Hijacking: Scammers gain access to a person's Facebook account and then post offers for sought-after concert tickets. Tagging Friends: They tag friends of the account owner to spread the word, exploiting trust and creating a sense of urgency. Direct Contact via Messenger: When someone shows interest, the conversation often moves to Messenger. The scammer, impersonating your friend, assures that the tickets are available and urges a quick payment, often through platforms like Revolut. Red Flags to Watch Out For While the excitement of potentially scoring tickets can be overwhelming, there are several red flags you should be aware of:Too-Good-To-Be-True Offers: If the deal seems too good to be true, it probably is. However, be aware that scammers may also offer tickets at current resale prices to seem legitimate and lower your guard. Unnatural... --- ### The Top VoIP Telecom Benefits Your Business Can't Ignore - Published: 2024-08-13 - Modified: 2024-08-13 - URL: https://it.ie/the-top-voip-telecom-benefits-your-business-cant-ignore/ - Categories: VoIP Telecoms - Tags: Remote Working, VoIP Telecoms, VoIP. Introduction On the 7th of March 1875 “Mr Watson, come here – I want to see you” were the first words ever spoken over a telephone line by the inventor of the telephone Alexander Graham Bell. Telephony has come a long way since then and in an era where efficient communication is the backbone of business success, VoIP (Voice Over Internet Protocol) has emerged as the leading solution.  Traditional phone systems, while still in use, are increasingly being overshadowed by the versatile, cost-effective, and feature-rich alternatives that VoIP offer. This post explores the top benefits of VoIP telecom systems and why your business should consider making the switch. Cost Efficiency One of the most compelling reasons businesses are adopting VoIP telecoms is the significant cost savings it provides. Traditional phone systems often come with high operational costs, including expensive long-distance charges and maintenance of hardware. VoIP, on the other hand, leverages the internet to transmit voice data, drastically reducing the cost of calls, especially international ones. Additionally, VoIP systems require minimal hardware investments, as they can operate on existing computer systems and smartphones. The scalability of VoIP also means that businesses can easily add or remove lines without incurring significant expenses, making it an ideal choice for growing enterprises. Flexibility and Mobility As remote and hybrid work models become more prevalent, the need for flexible communication solutions has grown. VoIP meets this need by offering unparalleled mobility. Employees can make and receive calls from anywhere with an internet connection, whether... --- ### TRANSFORMING YOUR WORKFORCE - The Critical Role of Human Risk Management - Published: 2024-07-23 - Modified: 2024-07-23 - URL: https://it.ie/transforming-your-workforce-the-critical-role-of-human-risk-management/ - Categories: Cyber Awareness Training, Cyber Security - Tags: Cyber Awareness Training, Cyber security, phishing, Ransomware The Core of Your Cyber Defence: People and Awareness With new threats continually emerging, cybersecurity has become more critical than ever. While employing a robust, multi-layered approach—featuring firewalls and antivirus software—is vital, the true cornerstone of any cyber defence strategy is your people. Fostering a strong culture of cyber awareness can be one of the most powerful and cost-effective tools available. This approach transforms what might otherwise be your weakest link into your best defence. What is Human Risk Management? Human Risk Management (HRM) involves identifying, assessing, and mitigating risks posed by human behaviours within an organisation. In the realm of cyber security, HRM focuses on educating and empowering employees to recognise and respond to cyber threats, thereby reducing the overall risk to the organisation. Why Cyber Awareness Training is Essential Cyber awareness training educates employees about potential cyber threats and teaches them how to avoid common pitfalls and should the worst happen, the actions to take to minimise the damage. This training covers topics such as recognising phishing emails, safe internet practices, and the importance of strong passwords. The benefits are substantial, leading to a more vigilant and informed workforce capable of identifying and mitigating cyber risks. Habits That Make Us Vulnerable Cyber criminals exploit common human habits to breach security systems. Here are some typical behaviours that make organisations vulnerable:Weak and Reused Passwords: Many people choose simple, easy-to-guess passwords and often reuse the same passwords across multiple sites. This makes it significantly easier for attackers to crack accounts... --- ### How To Protect Your Phone and Data Against Face Stealing Scams - Published: 2024-07-19 - Modified: 2024-08-07 - URL: https://it.ie/how-to-protect-your-phone-and-data-against-face-stealing-scams/ - Categories: Cyber Security - Tags: Cyber security, ESET Cybercriminals can now steal facial recognition data and use AI to create deepfakes for authentication. This blog post, originally published by ESET and authored by Roman Cuprik, explores what this means for consumers and businesses, highlighting the increasing popularity of facial recognition technologies for secure authentication and the potential risks associated with them. Recently, facial recognition technologies have become an increasingly popular tool for secure authentication, one praised for its convenience. When technology giants such as Apple popularized their Face ID technology for face authentication, which, in general, couldn’t be fooled by static photographs and encrypts users’ facial data, security concerns naturally dwindled to the point where even banks and the wider financial sector now use facial recognition systems as a form of authorization. However, this “good news” about technological progress may also create a false picture of biometric recognition as the ultimate tool for secure authentication. No more passwords, no more scams, no one can steal a 3D image of your natural face, right? Neither time nor cybersecurity practice stands still, so if you think that facial authentication alone will prevent you from being scammed or your device from being breached, read further to understand the limits to the security it can provide. In the latest ESET Threat Report H1 2024, ESET researchers describe how adversaries use fake mobile apps to replace their own faces with those of their victims using AI face-swapping services. This method can be used by cybercriminals to gain unauthorized access to victims’ accounts. The strongest protection lies in using combinations of... --- ### The Cyber Security Guide for SME's - Published: 2024-07-16 - Modified: 2024-07-18 - URL: https://it.ie/the-cyber-security-guide-for-smes/ - Categories: Cyber Awareness Training, Cyber Security, Data Protection, Guide, Phishing, Ransomware, Scams - Tags: Cyber Awareness Training, Cyber security, Data protection, Guide, Managed IT Services, phishing, Ransomware Today, SMEs face unique cyber security challenges that can impact their business continuity and data integrity. Understanding these challenges and implementing effective security measures is not just beneficial; it's crucial. That's why IT. ie has crafted an extensive Free Cyber Security Guide, tailored specifically for small and medium-sized enterprises. This guide is an invaluable resource, designed to bolster your defences against the most prevalent cyber threats today. Inside This Guide You Will Find: 1. Cyber Security Basics Learn the fundamental steps to protect your business, including updating software, implementing robust data backup strategies, and enforcing strong password policies. 2. Understanding the NIST Framework Discover how the NIST Cyber Security Framework can help you manage and reduce cyber security risks by focusing on key areas: Identify, Protect, Detect, Respond, and Recover. 3. Physical Security Understand the importance of physical security in cyber security, from securing paper files to using encryption on business devices. 4. Phishing Recognise and defend against phishing attempts with tips on identifying fake emails and protecting your data from cyber criminals. 5. Tech Support Scams Learn how to identify and respond to fraudulent tech support scams that can compromise your network and sensitive information. 6. Email Authentication Explore the tools and practices for ensuring that emails from your domain are authentic, helping to prevent email spoofing and phishing attacks. 7. Secure Remote Access Get detailed advice on securing remote connections to your network, including using VPNs, encryption, and multi-factor authentication. Don't leave your business vulnerable to cyber threats.... --- ### The Rising Challenge of AI-Enhanced Phishing Emails - Published: 2024-06-19 - Modified: 2024-06-19 - URL: https://it.ie/the-rising-challenge-of-ai-enhanced-phishing-emails/ - Categories: Cyber Security, Phishing - Tags: Cyber security, phishing As artificial intelligence (AI) continues to advance, its applications are becoming increasingly sophisticated – and not always for the better. In the realm of cybersecurity, AI has become a double-edged sword. On one hand, it enhances security measures, aiding in detecting and neutralising threats. On the other, it provides cybercriminals with powerful tools to craft more convincing phishing emails, making it increasingly difficult for individuals to spot fraudulent attempts.   AI in Phishing: A New Level of Deception Phishing scams have long been a threat, but AI has transformed the landscape significantly. AI-powered tools enable scammers to generate error-free, compelling emails that mimic the tone and style of legitimate organisations. These emails can be customised at scale to target individuals, making them highly personalised and more convincing. To demonstrate, consider two emails presented below—one real and one fake. Both are crafted to appear as if they come from a reputable source, Microsoft, asking to verify account activity. However, the fake email contains subtle discrepancies designed to trick the recipient.  Can you spot the six differences between these emails? Despite their sophistication, AI-generated phishing emails still leave subtle clues that can alert a discerning eye:Unusual sender email addresses: Always verify the domain name. AI might create convincing sender names, but domain spoofing can often be spotted if you look closely. Too-good-to-be-true offers: Be sceptical of emails making incredible offers or claims. If something sounds too good to be true, it probably is. Mismatched URLs: Before clicking on any link in an... --- ### Speak No Evil: Defending Against AI Voice Cloning Scams - Published: 2024-06-10 - Modified: 2024-07-12 - URL: https://it.ie/speak-no-evil-defending-against-ai-voice-cloning-scams/ - Categories: Cyber Security, Scams - Tags: AI, Cyber security, Deepfake In an era marked by rapid advancements in AI technology, innovation dances on the edge of a double-edged sword. Picture, if you will, an angel and a devil perched upon your shoulders. The angel whispers of the boundless potential and ethical uses of Generative AI, heralding a future of convenience and progress. Conversely, the devil murmurs temptations, exploiting these same technologies for deceit and fraud. This metaphor captures the duality of digital advancement: the line between beneficial and harmful uses of AI, is increasingly blurred. This article ventures into the shadowy realm of AI driven voice cloning scams offering insights into safeguarding yourself and your business against these criminal exploits. Understanding the Threat AI voice fraud, a sophisticated form of social engineering, manipulates trust by mimicking the voices of those you know, such as a family member, a public figure, or a work colleague. Unlike traditional scams, which cast a wide net hoping to catch the unaware, voice cloning scams target with precision, using familiar voices to bypass your defences. Imagine receiving a call that chills your blood — a voice, indistinguishable from a loved one, caught up in an emergency demanding immediate financial aid. It could be a grandchild in hospital who needs to pay a medical bill or a child screaming that they’ve been kidnapped with the kidnappers demanding immediate ransom payment. These aren’t hypothetical scenarios but actual reported examples of cloned voice scams from across the globe. Now let’s take the familiar CEO scam where a junior... --- ### IVR Phishing: Understanding and Preventing Automated Phone Scams - Published: 2024-06-05 - Modified: 2024-06-05 - URL: https://it.ie/ivr-phishing-understanding-and-preventing-automated-phone-scams/ - Categories: Cyber Security, Phishing - Tags: Cyber Awareness Training, Cyber security, phishing As technology continues to evolve, so do the methods used by cybercriminals to exploit it. One such method is Interactive Voice Response (IVR) phishing. This form of phishing leverages automated phone systems to trick individuals into revealing sensitive personal or financial information. Let’s delve into what IVR phishing is and how to protect yourself from this growing threat. What is IVR Phishing? IVR phishing involves scammers setting up fake automated phone systems that mimic those used by legitimate organisations. Here’s a typical scenario of how it works:Setup: Scammers create a bogus IVR system designed to sound like a trusted entity, such as a bank or government agency. Contact: They contact potential victims via phone calls or SMS, often pretending to be from the trusted entity. Bait: The message usually creates a sense of urgency, claiming there is an issue with the victim’s account or other urgent matters. Direct: Victims are instructed to call a number provided in the message, which leads to the fake IVR system. Extract: Once connected, the IVR system prompts victims to input sensitive information, such as account numbers or PINs, under the pretence of verifying their identity or resolving the issue. Use: Scammers then use the collected information for fraudulent activities like accessing bank accounts or committing identity theft. IVR phishing involves scammers setting up fake automated phone systems that mimic those used by legitimate organisations. Here’s a typical scenario of how it works: Protecting Yourself from IVR Phishing To safeguard against IVR phishing, consider these... --- ### The Benefits of Proactive IT Support. - Published: 2024-05-09 - Modified: 2024-05-09 - URL: https://it.ie/the-benefits-of-proactive-it-support/ - Categories: IT Support - Tags: IT Support, Managed IT Services Are you tired of constantly putting out IT fires? Imagine a world where your IT problems are solved before they even arise. That's the power of proactive IT support with a Managed IT Services provider (MSP). The modern business environment is highly dynamic and waiting for systems to fail before fixing them simply won’t cut it. Proactive IT support is all about staying ahead, predicting issues, and resolving them swiftly to maintain continuous business operations. This blog post will delve into the key benefits of proactive IT support, showing how it can not only save your business time and money but also enhance overall performance. Unpacking the Benefits of Proactive IT Support 1. Minimised Downtime Downtime can be a significant drain on resources, costing businesses not only money but also their valuable time and ultimately their reputation. Proactive IT support is designed to anticipates many potential issues and addresses them before they escalate into serious problems that could halt business operations. By monitoring systems, your MSP can implement fixes, ensuring that business operations are smooth and uninterrupted. 2. Enhanced Security With cyber threats evolving at a breakneck pace, reactive security measures are no longer sufficient. Your proactive IT support provider will help you to build robust multi-layered defences with continuous monitoring of networks and systems to detect threats early. This approach includes regular updates and patches to security systems before vulnerabilities can be exploited. As a result, businesses benefit from strengthened defences, reducing the risk of data breaches and cyber-attacks.... --- ### The Top 8 Types of Cyber Attacks - Published: 2024-04-17 - Modified: 2024-04-24 - URL: https://it.ie/the-top-8-types-of-cyber-attacks/ - Categories: Cyber Security - Tags: Cyber Awareness Training, Cyber security, Data protection, phishing, Ransomware The cyber security landscape is continually evolving; however, a good understanding of the current threats and preventative measures is a vital first step towards an effective defence. The inspiration for this post comes from this excellent animated illustration below, found on the LinkedIn page of The Cyber Security News. It succinctly outlines the top 8 types of cyber-attacks, a crucial piece of information for anyone keen on safeguarding their digital environments. For this post we expanded on the available information to further explain each type of threat, the methodology of the attack and preventive measures that should be taken to greatly mitigate against an attack. Here are the top eight types of cyber-attack presently in existence. 1. Phishing What It Is & How It Operates: Phishing involves sending fraudulent communications that appear to come from a reputable source, usually through email. The goal is to steal sensitive data like credit card numbers and login information or to install malware on the victim’s machine. How You Can Be Targeted: People are targeted through seemingly legitimate emails or messages that urge the recipient to take an action such as clicking on a link or downloading an attachment. Common lures include urgent requests for information, offers of refunds, fake alerts, or required security checks. Prevention Measures:Always verify the sender’s email address for authenticity. Avoid clicking on links or downloading attachments from unknown or suspicious sources. Implement advanced spam filters and security protocols. Educate employees and individuals on recognising phishing attempts. 2. Ransomware What... --- ### How Penetration Testing as a Service (PTaaS) is Redefining Cybersecurity - Published: 2024-04-02 - Modified: 2024-04-02 - URL: https://it.ie/how-penetration-testing-as-a-service-ptaas-is-redefining-cybersecurity/ - Categories: Cyber Security, Managed IT Services - Tags: Automation, Penetration Testing, PTaaS In an era where cybersecurity threats evolve with alarming velocity, the importance of robust cyber defence mechanisms cannot be overstated. Penetration Testing, a key part of any cybersecurity strategy, has seen a significant transformation with the emergence of automated Penetration Testing as a Service (PTaaS). Understanding Penetration Testing Penetration testing, often referred to as pen testing, is a cybersecurity technique used to evaluate the security of a network. The process involves simulating a cyber-attack against the system to identify vulnerabilities and security weaknesses that a hacker could exploit. The objective is not to cause harm but to uncover security gaps so that they can be fixed before a malicious actor discovers and exploits them. Penetration testing provides valuable insights into the effectiveness of an organisation's defensive mechanisms and helps in strengthening the security posture against potential threats. Introducing automated Penetration Testing as a Service (PTaaS) At the heart of modern cybersecurity strategies lies PTaaS, a streamlined and efficient approach to penetration testing. This automated service offers a meticulous examination of networks, identifying vulnerabilities with precision and agility. Unlike traditional methods that are often time-consuming and labour-intensive, PTaaS employs cutting-edge technology to ensure comprehensive coverage and up-to-the-minute threat detection. PTaaS vs. Manual Penetration Testing: A Comparative Analysis Manual penetration testing, while valuable, faces limitations in scalability and consistency. Human error, time constraints, and the evolving complexity of cyber threats pose significant challenges. In contrast, PTaaS brings unparalleled speed, efficiency, and accuracy to the table. Automation allows for regular and thorough assessments,... --- ### Shattering the Illusion: Debunking Common Cybersecurity Myths - Published: 2024-03-25 - Modified: 2024-03-25 - URL: https://it.ie/shattering-the-illusion-debunking-common-cybersecurity-myths/ - Categories: Cyber Security Imagine your sensitive data exposed, operations crippled, and customers outraged. This isn't science fiction; it's the harsh reality of a cyber-attack. In today’s environment, robust cybersecurity isn't an option – it's an imperative. But navigating the world of cybersecurity can be confusing. Myths and misconceptions abound, leading to a false sense of security and, ultimately, vulnerabilities. This article serves as your myth-busting guide, debunking common misconceptions and empowering you to build a truly resilient defence. Myth 1: Small Businesses Aren't Targets for CyberattacksFact: Small businesses are very often targeted by cybercriminals because they may be viewed as having weaker security measures compared to larger corporations. In fact, small businesses are attractive targets because they hold valuable data and may serve as entry points to larger partner networks. Cyber incidents at large organisation tends to get more publicity, however, the European Agency for Network and Information Security (ENISA) reported in 2023 that 61% of data breaches in the EU related to SME’s. Myth 2: A Strong Password Is Enough for ProtectionFact: While strong passwords are important, they are only one layer of security. Multi-factor authentication (MFA), regular software updates, and employee cybersecurity training are essential components of a comprehensive security strategy. The same ENISA report highlighted that over 80% of data breaches in the EU involve stolen or weak passwords. Myth 3: Cybersecurity Is Solely the IT Department's ResponsibilityFact: Cybersecurity is a shared responsibility. Every employee plays a crucial role in maintaining security by following best practices, such as identifying phishing... --- ### Small Screen Big Risk The Increasing Threat of Mobile Phishing - Published: 2024-03-04 - Modified: 2024-03-04 - URL: https://it.ie/small-screen-big-risk-the-increasing-threat-of-mobile-phishing/ - Categories: Phishing, Security - Tags: Cyber security, mobile phishing, phishing Not very long ago, I found myself tricked by a phishing email disguised as a courier notification on my phone. Caught up in the whirlwind of my day I hastily opened the email, neglecting to spot the red flags characteristic of a phishing attempt. It turned out to be a harmless simulated phishing email delivered by our Human Risk Management solution and had coincidentally arrived on the very day I was expecting a delivery.  Despite being someone who prides themselves on having a sharp eye for phishing emails, the convenience and haste of checking this email on the move nearly led me to carrying out an action that in a genuine threat situation, would likely have led to a compromise — a lapse I would unlikely make had I been reviewing the email at my desk. This experience highlighted the distinctive vulnerabilities associated with mobile devices, prompting me to examine further the escalating threat of mobile phishing. It served as a stark reminder that even those well-versed in cyber security can find themselves at risk when interacting with digital communications outside the structured environment of desktop computing. According to the 2023 Verizon Mobile Security Index, over 80% of phishing sites target mobile devices specifically or are designed to function on both desktop and mobile. This blog post is an examination of why our mobile devices have become focal points for cybercriminals and how we can enhance our defences against attacks. Why Mobile Devices are Prime Targets for Phishing Mobile users... --- ### Press Release: IT.ie to double headcount with 30 new jobs and €2.5M investment - Published: 2024-02-27 - Modified: 2024-02-29 - URL: https://it.ie/press-release-it-ie-to-double-headcount-with-30-new-jobs-and-e2-5m-investment/ - Categories: Charity - Tags: Growth, Recruitment DUBLIN, 27 January 2024; IT. ie, the Irish-owned Managed IT Services company, today announces plans to double its headcount in the next three years with the creation of 30 new jobs. The company will invest €2. 5M in its team expansion as it hires for roles in its offices in Dublin, Cork and Galway. IT. ie was founded in 2004 by Eamon Gallagher and has experienced rapid growth in the last number of years. Revenues have increased by an average of 42% year-on-year since 2021, reaching €5M at the end of last year. The company forecasts that revenues will reach €8M by the end of 2025. IT. ie credits its growth to a high number of referrals from satisfied customers as well as a strong focus on sales and digital marketing strategies, which together have resulted in a steady increase in new client acquisitions. Referrals account for 75% of new business for IT. ie and recent years have seen the company acquire more than 45 new clients per annum. Additionally, the company’s growth corresponds with increasing investments across all industries in long-term digital transformation strategies. This has led to greater awareness of the importance of managed services companies, such as IT. ie, in ensuring the fluidity and consistency of business operations, as well as effective cloud migration, compliance and risk management.  A number of the new roles in IT. ie will be in the company’s recently established Service Delivery Team, working from IT. ie’s offices in Dublin, Galway, and Cork.... --- ### Automated Penetration Testing: The New Frontier in Cybersecurity Solutions - Published: 2024-02-08 - Modified: 2024-02-12 - URL: https://it.ie/automated-penetration-testing-the-new-frontier-in-cybersecurity-solutions/ - Categories: Cyber Security - Tags: Automated Penetration Testing, Penetration Testing, PTaaS In the ever-evolving domain of cybersecurity, automated Penetration Testing as a Service (PTaaS) has emerged as a key solution for businesses aiming to strengthen their defences against cyber threats. This post examines PTaaS, exploring its workings, advantages, and how it distinguishes itself from traditional penetration testing methods. What is Penetration Testing as a Service (PTaaS)? Penetration Testing as a Service (PTaaS) represents a modern approach to cybersecurity, where penetration testing is provided as a continuous, service-based model rather than a one-off engagement. PTaaS combines automated tools with expert knowledge to conduct comprehensive assessments of an organisation's IT infrastructure, identifying vulnerabilities and offering actionable insights to mitigate potential threats. How Does PTaaS Operate? PTaaS is typically offered on a subscription basis, providing regular, automated penetration tests that simulate cyber attacks on a network to pinpoint vulnerabilities. This service model ensures that testing is an integral part of the organisation’s ongoing security strategy. Key components of PTaaS include:Automated Scanning: Advanced software is used to automatically scan an organisation's networks, applications, and systems for vulnerabilities. Expert Analysis: Despite the emphasis on automation, human expertise is crucial for interpreting scan results, identifying false positives, and suggesting remediation strategies. Continuous Testing: PTaaS offers continuous or scheduled testing, in contrast to the periodic nature of traditional pen tests, ensuring vulnerabilities are identified and addressed in a timely manner. Real-Time Reporting: PTaaS platforms provide immediate insights and reports, enabling organisations to understand and act on identified vulnerabilities without delay. PTaaS vs Traditional Penetration Testing Traditional penetration testing... --- ### The Art of IT Support: Blending Technical Expertise with Exceptional Customer Service - Published: 2024-01-22 - Modified: 2024-01-22 - URL: https://it.ie/the-art-of-it-support-blending-technical-expertise-with-exceptional-customer-service/ - Categories: IT Support - Tags: Customer Experience, IT Support Why Choosing the Right IT Partner is Crucial for Your Business Imagine navigating the complexities of the digital world your business operates in without robust IT support - it's a scenario no modern business can afford. Over the last decade, the way businesses operate and interact with customers has undergone a seismic shift. In this landscape, IT support is not just a necessity, but a vital component of business growth and stability. The choice of an IT partner, therefore, is not merely a technical decision; it's a strategic move that shapes the future of your business. The Increasing Demand for Comprehensive and Agile IT Support Modern businesses are in a constant state of evolution, driven by technological innovations and market dynamics. Many are finding that their existing IT support simply isn’t cutting it any longer. The demand for agile, efficient, and customer-centric IT support is higher than ever. Businesses need partners who can blend technical expertise with a keen focus on client needs, ensuring a secure and supportive IT environment. Choosing the Ideal IT Partner: A Holistic Approach When looking for an IT support partner, it's essential to consider more than just technical abilities. The ideal provider, prioritises the customer experience, understands the intricacies of cybersecurity, and supports proactive business strategies. Characteristics like transparent communication, tailored solutions, and a deep understanding of each business's unique needs are what set them apart. Seamless Transition: Laying the Foundation of a Strong Partnership Transitioning to a new IT support provider should be seamless... --- ### Cyber Security in 2024: Key Forecasts and Insights for the Year Ahead - Published: 2024-01-02 - Modified: 2024-01-03 - URL: https://it.ie/cyber-security-in-2024-key-forecasts-and-insights-for-the-year-ahead/ - Categories: Cyber Security - Tags: AI, Articficial Intelligence, Cyber Awareness Training, Cyber Insurance, Cyber security, Data protection, phishing As 2024 unfolds, the cyber security landscape is rapidly evolving. Understanding the key trends shaping this dynamic field is essential to keep pace with emerging threats and challenges. In late 2023, leading industry vendors released their predictions and forecasts for the coming year. For this post I decided to test the capabilities of ChatGPT plus in analysing information from multiple sources. I first provided links to each report asking the AI to analyse the reports separately. I then asked it to collate the information into the ten most common themes and trends for 2024. This post presents a synthesis of these insights, offering a glimpse into what 2024 holds for cyber security, with a unique perspective gained through AI-enhanced analysis. 1. The Rise of AI in Cyber Security One of the most significant trends identified is the increased use of Artificial Intelligence (AI) in cyber security. AI's role is twofold: enhancing defence mechanisms and powering sophisticated cyberattacks. AI-driven automation in threat detection and incident response is set to become more prevalent, offering efficient solutions to complex security challenges. However, this also means that cybercriminals will leverage AI to craft more convincing phishing campaigns and social engineering attacks, necessitating advanced AI countermeasures. 2. The Persistent Threat of Ransomware Ransomware continues to be a significant threat, evolving with increasingly sophisticated tactics like double and triple extortion. In double extortion, cybercriminals not only encrypt the victim's data but also threaten to release sensitive information publicly if the ransom isn't paid. Triple extortion takes... --- ### Ireland's Year in Search 2023: A Look at What Captivated the Nation - Published: 2023-12-11 - Modified: 2023-12-11 - URL: https://it.ie/irelands-year-in-search-2023-a-look-at-what-captivated-the-nation/ - Categories: Google - Tags: Google search Google's Year in Search is always a fascinating reflection of the collective consciousness, and Ireland's 2023 trends are no exception. Google has just released its search trends for 2023 so Let's dive into the top 5 searches in various categories, revealing what captured our interests in 2023. Movies OppenheimerBarbieBanshees of InisherinEverything Everywhere All at OnceGuardians of the Galaxy 3The year’s most searched movie was the fascinating historical drama "Oppenheimer" staring our very own Cillian Murphy followed by the whimsical and empowering world of "Barbie. Another nod to Irish talent was the fantastic Martin McDonagh’s "Banshees of Inisherin" staring Colin Farrell and Brendan Gleeson while "Everything Everywhere All at Once" and "Guardians of the Galaxy 3" demonstrate a love for high-concept and adventure films. People Russell BrandHuw EdwardsPhillip SchofieldRyan TubridyJoe BidenThe top-three people searched for in Ireland related to allegations and revelations from personalities in the UK while the controversary around the RTE payments to Ryan Tubridy put him in the number-four spot. At the tail end of this list is US President Joes Biden who visited Ireland in the spring of this year. Recipes Viking ToastPornstar MartiniMarry Me ChickenAirfryer recipesBanana MuffinsOur culinary curiosity shines through in these top recipe searches. From the hearty and robust "Viking Toast" to the sweet simplicity of "Banana Muffins," there's a treat for everyone in this list. "Marry Me Chicken" a personal favourite of mine was number-three followed by"Airfryer recipes" suggesting a trend towards convenient and healthier cooking methods. Sports Rugby World CupWomen's World CupRyder... --- ### The 12 Scams of Christmas 2023 - Published: 2023-11-24 - Modified: 2023-12-07 - URL: https://it.ie/the-12-scams-of-christmas-2023/ - Categories: Cyber Security, Phishing, Scams - Tags: Cyber security, Online Scams, phishing As the festive season approaches, we encourage you to channel your inner Scrooge – not in stinginess, but in fiercely protecting your data and your hard-earned money from criminals.   Last year, An Garda Síochána issued a warning to consumers, stating that online fraud was on the rise at Christmas time.  This year, our message is clear: "Be a Scrooge" with your private and financial data - or it might become a gift for criminals. In our latest article, "The 12 Scams of Christmas 2023," we explore the most prevalent scams that could leave you out of pocket or expose your data and spoil your holiday cheer. 1. Sophisticated Phishing Emails These emails are crafted with advanced techniques such as Artificial Intelligence, making them look almost identical to those from reputable brands. They often lure victims with fake alerts or offers, leading to sites that steal personal information. Always verify the email's authenticity and avoid clicking on links or attachments from unknown sources. If in doubt “Don’t Click” 2. Social Media Ad Scams Scammers use social media platforms to post ads for exclusive or hard-to-find items at incredibly low prices. These ads often lead to fake websites where your payment information can be stolen. Always research the seller and look for reviews on independent platforms before making a purchase. 3. Bogus Websites and URL Spoofing Cybercriminals create fake websites that mimic legitimate online retailers, often using URLs that contain subtle misspellings or alterations that can easily go unnoticed. These websites... --- ### From Blackboards to Interactive Displays: The Evolution of Classroom Technology - Published: 2023-11-08 - Modified: 2023-11-08 - URL: https://it.ie/from-blackboards-to-interactive-displays-the-evolution-of-classroom-technology/ - Categories: Interactive Displays - Tags: Interactive Displays, Interactive Displays for Schools, Interactive Whiteboards, Smartboards, Technology in Education From the humble beginnings of Blackboards to the dynamic capabilities of interactive displays, educational tools have undergone a remarkable evolution. In this post we will explore the journey of classroom technology and the transformative role of interactive displays in modern education. The Dawn of Classroom Technology: The Blackboard Era The blackboard or chalkboard, introduced in the early 19th century, was the original centrepiece for classroom instruction. James Pillans, Headmaster of the Old High School of Edinburgh, Scotland is widely credited with inventing the blackboard in 1801. It was a revolutionary tool that allowed teachers to present information to the entire class, fostering a new group learning dynamic. This simple innovation set the stage for a more visual and interactive form of teaching. Blackboards have been a classroom stable for over 200 years and while many schools have phased them out in recent decades in favour of modern technology, they are still used in many schools across the globe to this very day.   The Rise of Overhead Projectors and Whiteboards Throughout the 20th century the overhead projector, invented way back in 1853 became popular at places of learning, casting transparencies onto a screen, allowing for pre-prepared material to be displayed and interacted with. The whiteboard also became popular, eliminating chalk dust and introducing colourful non-permanent markers into the mix. (I wonder if there’s a whiteboard in existence today that doesn’t bear the scars of the accidental permanent marker streak). The whiteboard and overhead projector paved the way for a cleaner... --- ### Step-by-Step Guide to Granting Delegate Access in Outlook - Published: 2023-10-12 - Modified: 2023-10-12 - URL: https://it.ie/step-by-step-guide-to-granting-delegate-access-in-outlook/ - Categories: Microsoft 365 - Tags: Microsoft, Microsoft 365, Microsoft Tips & Tricks, Outlook Ever felt like you could use an extra pair of hands to manage your overflowing inbox and jam-packed calendar? Microsoft Outlook offers a solution for this. Think of it as having a virtual assistant. This feature, known as Delegate Access, lets you designate another individual, termed a delegate, to handle your emails and calendar on your behalf. Why Use Delegate Access? This feature is especially handy for professionals who have assistants to manage their schedules. For instance, a CEO might have their executive assistant handle meeting requests, emails, and calendar scheduling. But it's not just limited to such scenarios; even peers can use Delegate Access to collaborate What Makes Delegate Access Special? Unlike the basic folder sharing in Outlook, Delegate Access offers more advanced permissions. You can decide if your delegate can only read your emails, or if they can also send, edit, or even delete them. By default, a delegate can fully access your Calendar and Tasks. However, if you want them to view all your inbox messages, you'll need to grant extra permissions. Note: This feature requires Microsoft Exchange Server and both you and your delegate should be using the same Office Outlook version. How to Activate Delegate Access Open Outlook and click on the FILE tab. 2. Navigate to Account Settings > Delegate Access. 3. The Delegates dialog box opens. 4. Click Add and choose your delegate from the Exchange Global Address List. 5. Set the desired permissions for your delegate. Remember, if you want your delegate... --- ### Beyond the Bait: A Deep Dive into Phishing Prevention - Published: 2023-10-01 - Modified: 2023-10-01 - URL: https://it.ie/beyond-the-bait-a-deep-dive-into-phishing-prevention/ - Categories: Cyber Security, Phishing - Tags: Cyber Awareness Training, Cyber security, Data protection, phishing In a perpetually evolving digital landscape, phishing has emerged as a dominant cybersecurity threat. As cybercriminals continually refine their tactics, no business, regardless of its size, is immune to the risks. Drawing from our in-depth Phishing Guide (free download below), we aim to provide you with a concise yet comprehensive overview of this menace and how to fortify your defences against it. Deciphering the World of Phishing At its core, phishing is the malicious practice of sending deceptive emails with the intent of obtaining sensitive information. These emails can vary in their approach. Some are broad scams, like the notorious advance-fee scam, where a seemingly wealthy individual (remember the Nigerian prince), often claiming to be in a precarious situation, requests financial assistance with the promise of substantial returns. On the other hand, spear phishing is a more targeted and sinister variant. Here, cybercriminals invest time researching their potential victims, gathering information that makes the deceitful emails appear more genuine. This may involve impersonating business associates, colleagues or friends, making the scam more believable and thereby increasing its chances of success.  This method often employs Social Engineering tactics to better understand the target and can be very effective for the criminals. You can read our Social Engineering Guide from a few months back to better understand this tactic.   The Anatomy of a Successful Phishing Attack Several elements often converge to make a phishing attack successful:Carrot or Stick: Cybercriminals use tantalising offers or intimidating threats to capture the recipient's attention. Familiarity: By leveraging known... --- ### The Business Owner's Guide to Microsoft 365 Business Premium - Published: 2023-09-13 - Modified: 2023-09-18 - URL: https://it.ie/the-business-owners-guide-to-microsoft-365-business-premium/ - Categories: Microsoft 365 - Tags: Cyber security, Microsoft, Microsoft 365, Microsoft Teams, Remote Working Small and Medium Business (SMB) owners are inundated with a plethora of solutions that promise to boost productivity, enhance collaboration, or fortify cybersecurity. While many solutions address each of these niche challenges effectively, in the quest for a holistic solution Microsoft 365 Business Premium stands apart. Beyond offering the trusted suite of Office applications, it delivers advanced collaborative and productivity tools combined with avant-garde security features that empowers businesses to operate seamlessly and securely from anywhere at any time. But what exactly is Microsoft 365 Business Premium? Essentially, it is a subscription service that brings together the best of Microsoft's productivity tools and pairs them with advanced security features to help protect your business from cyber threats. It is designed to foster collaboration, streamline workflows, and secure your business data, all under a single pane of glass. Let us now look at the top five benefits that make Microsoft 365 Business Premium an indispensable tool for SMB’s. 1. Seamless Communication and Collaboration In the world of business, time is of the essence. Microsoft 365 Business Premium ensures that you save precious time by avoiding the hassle of switching between different apps and searching for files incessantly. With Microsoft Teams at its core, it facilitates real-time collaboration through chat and online meetings, allowing employees to share files and co-author documents in one unified space, thereby enhancing productivity and fostering a collaborative spirit. 2. Fortified Against Unauthorised Access The remote working landscape necessitates stringent security measures to prevent unauthorised access to sensitive... --- ### Navigating the Challenges of Switching Your IT Support Provider - Published: 2023-09-04 - Modified: 2023-09-04 - URL: https://it.ie/navigating-the-challenges-of-switching-your-it-support-provider/ - Categories: IT Support The only constant is change and businesses are continually faced with the challenges of staying ahead. One key component that often gets overlooked, yet plays a pivotal role in a company's success, is its IT support. But what happens when your current IT support provider is no longer cutting it? The thought of switching might seem daunting, but with the right approach, it can be a game-changer for your business. Let's explore the challenges and solutions to making a seamless IT transition. The Challenges of Sticking to the Status Quo Resistance to Change: The age-old adage, "better the devil you know," often holds businesses back. There's a comfort in familiarity, even if it's not serving your best interests. However, in the ever-changing world of IT, this resistance can hinder growth and expose your business to unnecessary risks. Evolving Work Environments: The pandemic has reshaped how businesses operate. With a surge in remote and hybrid working models, the need for robust, adaptable, and proactive IT support has never been greater. Relying solely on reactive measures can leave gaps in your IT infrastructure. If your current provider is stuck in the past or only offers reactive solutions, you're missing out on modern, proactive support methods that can propel your business forward. Cybersecurity Threats: Regardless of your industry, a significant portion of your business functions in the digital space, which is constantly besieged by evolving threats. Relying on outdated IT support can expose your enterprise to cyberattacks, data breaches, and various security vulnerabilities.... --- ### Azure Identity Protection: A Comprehensive Overview - Published: 2023-08-31 - Modified: 2023-08-31 - URL: https://it.ie/azure-identity-protection-a-comprehensive-overview/ - Categories: Microsoft - Tags: azure, Identity Protection, Microsoft, Microsoft 365 Azure Identity Protection, a feature of Microsoft's Azure Active Directory, is a cutting-edge solution designed to safeguard organisations from identity-based threats. It's a proactive approach, leveraging vast amounts of data and advanced algorithms, to detect, investigate, and address potential risks associated with user identities. Risk Detection Azure Identity Protection is constantly evolving, with Microsoft continuously updating its risk detection capabilities. This system benefits from the analysis of trillions of signals daily, sourced from platforms like Active Directory, Microsoft Accounts, and even Xbox. Some of the behaviours it can detect include: Usage of anonymous IP addresses. Password spray attacks. Instances of leaked credentials. Every time a user signs in, the system evaluates the risk associated with that session. Depending on the detected risk level, appropriate policies are activated to ensure both the user and the organisation remain secure. Risk Investigation Azure Identity Protection offers detailed reporting tools for administrators. These reports help in: Tracking each detected risk. Monitoring sign-ins associated with one or more risks. Identifying users who have been flagged for risky behaviour or have had risk detections reported. These reports are invaluable for IT teams to delve deeper into potential threats and address them effectively. Risk Remediation Given the vast number of potential threats, automation is crucial. Azure Identity Protection offers: Automatic Remediation: By using Risk-based Conditional Access policies, the system can prompt users for additional verification methods, such as multifactor authentication or secure password resets, based on the detected risk. Successful completion of these steps automatically resolves the... --- ### AI-Driven Phishing Attacks: A Comprehensive Guide to Understanding & Protecting Against the Threat - Published: 2023-08-14 - Modified: 2023-08-14 - URL: https://it.ie/ai-driven-phishing-attacks-a-comprehensive-guide-to-understanding-protecting-against-the-threat/ - Categories: Broadband, Cyber Awareness Training, Cyber Security, Phishing - Tags: AI, Cyber Awareness Training, Cyber security, Data protection, phishing The cyber threats we face today are becoming more sophisticated and challenging to combat. One such emerging threat is the use of Artificial Intelligence (AI) by criminals to orchestrate highly targeted and convincing phishing campaigns. These AI-powered attacks are not only more personalised but also adaptive, making them harder to detect and prevent. In this post, we'll investigate how criminals are leveraging AI to create more effective phishing campaigns and explore actionable strategies to reduce the risks. Whether you're an individual concerned about personal security and data or an organisation seeking to protect its assets, understanding this new frontier of cybercrime is essential in staying a step ahead of the attackers. How Criminals are Leveraging AI for Phishing Campaigns Automated Content Creation: AI algorithms can generate very convincing emails and websites that mimic legitimate organisations. This makes it harder for people to recognise phishing attempts increasing the likelihood of them falling victim to an attack. Personalisation: By using AI to analyse publicly available information, criminals can create highly personalised phishing emails. These emails may include the target's name, job title, or other personal details, making them appear more credible. Adaptive Tactics: AI can analyse the success rate of different phishing strategies and adapt to use the most effective ones. This means that phishing campaigns can become more effective over time. Image Recognition and CAPTCHA Bypassing: Some AI models can recognise images and even solve CAPTCHAs, allowing automated bots to bypass security measures on websites. Real-time Decision Making: AI can make... --- ### Digital Piracy: Understanding the Threat of Cryptojacking - Published: 2023-08-01 - Modified: 2023-08-01 - URL: https://it.ie/digital-piracy-understanding-the-threat-of-cryptojacking/ - Categories: Cyber Security - Tags: Cyber security, Cyyptojacking, Data protection As we venture deeper into the digital era, cybersecurity remains an ever-evolving battleground. One escalating issue that demands our attention is cryptojacking. The recently released SonicWall Mid-Year Threat report for 2023, warns of a record surge in cryptojacking. In 2022, cryptojacking surpassed 100 million for the first time ever. In the first six months of 2023, attack volumes have not only eclipsed that milestone, they’ve more than tripled it, rising 399% to more than 332 million hits — compared to just 66. 7 million during the first half of last year. This form of digital piracy is a serious threat, and a better understanding of this menace is vital as you strive to protect your assets in the ever-evolving digital landscape. . The Advent of Cryptojacking The onset of cryptojacking is closely tied to the proliferation of cryptocurrency. As digital currencies like Bitcoin and Ethereum became mainstream, malicious actors saw an opportunity to use others' computing resources to mine these currencies without consent. This is essentially what cryptojacking is - unauthorised use of a person's computer to mine cryptocurrency. Crypto mining, as a legitimate process, involves the validation and addition of new transactions to a blockchain, for which miners are rewarded with newly minted coins. However, cryptojackers exploit this process by hijacking devices and systems to mine cryptocurrency illicitly, reaping the financial benefits at the expense of the victims' computing power and electricity consumption. Cryptojacking Modus Operandi The operation of cryptojacking often follows a predictable pattern. In most cases, it... --- ### From Perimeter to Zero Trust: Evolving Cybersecurity in the Digital Age - Published: 2023-07-13 - Modified: 2024-01-15 - URL: https://it.ie/from-perimeter-to-zero-trust-evolving-cybersecurity-in-the-digital-age/ - Categories: Cyber Security - Tags: Cyber security, Zero Trust From Perimeter to Zero Trust: Evolving Cybersecurity in the Digital Age Understanding Zero Trust Zero Trust Security is a model of cyber security that challenges traditional perimeter-based security practices. Unlike traditional approaches that assume trust within the network, Zero Trust operates under the principle of “never trust, always verify. ” It demands continuous verification of every user, device, and application attempting to access resources, regardless of their location. In the past, organisations relied on what is referred to as the castle-and-moat approach to security, with a strong perimeter defence protecting the internal network. It has become more and more apparent that with the rise of cloud services, mobile devices, and remote work, the traditional network perimeter has become somewhat porous, leaving organisations vulnerable to sophisticated cyber threats. Zero Trust Security addresses this challenge by implementing a comprehensive security framework that provides granular access controls and continuous monitoring. At its core, Zero Trust Security shifts the focus from network-centric security to a more user-centric and height="800" src="https://it. ie/wp-content/uploads/2023/07/Zero-Trust-Model-1024x1024. png" alt="Zero Trust Principles" loading="lazy" srcset="https://it. ie/wp-content/uploads/2023/07/Zero-Trust-Model-1024x1024. png 1024w, https://it. ie/wp-content/uploads/2023/07/Zero-Trust-Model-300x300. png 300w, https://it. ie/wp-content/uploads/2023/07/Zero-Trust-Model-150x150. png 150w, https://it. ie/wp-content/uploads/2023/07/Zero-Trust-Model-768x768. png 768w, https://it. ie/wp-content/uploads/2023/07/Zero-Trust-Model-1536x1536. png 1536w, https://it. ie/wp-content/uploads/2023/07/Zero-Trust-Model-2048x2048. png 2048w" sizes="(max-width: 800px) 100vw, 800px" /> The Importance of Zero Trust With the increasing sophistication of cyber threats, traditional security models have proven to be inadequate. Zero Trust offers several benefits that make it a compelling choice for organisations aiming to enhance their security posture: Enhanced Security Posture By adopting a Zero Trust approach, organisations... --- ### The Ultimate Guide to Microsoft Keyboard Shortcuts - Published: 2023-06-22 - Modified: 2024-08-27 - URL: https://it.ie/the-ultimate-guide-to-microsoft-keyboard-shortcuts/ - Categories: Guide, Microsoft - Tags: Excel, Keyboard Shortcuts, Microsoft, Productivity, Windows, Word Keyboard shortcuts are an essential tool for boosting productivity and efficiency when working on a computer. Whether you're a Windows user or frequently use Microsoft Word or Excel, mastering keyboard shortcuts can significantly streamline your workflow. In this guide, we will provide you with the top 30 keyboard shortcuts for Windows 10 and 11, as well as for Microsoft Word and Excel. These shortcuts will empower you to perform common tasks, navigate through applications, and execute commands swiftly, all at the tip of your fingers. So, let's dive in and discover the time-saving magic of keyboard shortcuts! Please refresh this page if the guide isn't shown below. Microsoft Keyboard shortcut guide Download Your Free Guide Download Share this post --- ### Navigating the IT Landscape: Overcoming Challenges with Effective Solutions - Published: 2023-06-20 - Modified: 2023-06-29 - URL: https://it.ie/navigating-the-it-landscape-overcoming-challenges-with-effective-solutions/ - Categories: Managed IT Services - Tags: Cyber security, Managed IT Services, Productivity In the dynamic world of business, challenges are not only inevitable but also necessary. They form the bedrock of commerce, with every business built on the premise of solving problems for others, and in turn, needing solutions for their own. The rapid evolution of information technology over the past few decades has opened up unprecedented opportunities, but it has also ushered in a new set of challenges. This is where an IT Managed Services Provider (MSP) steps in, helping businesses navigate the complex IT landscape, address technology-related challenges, and harness the power of technology to streamline operations and create new opportunities. Regardless of your business's nature or the industry you operate in, there are certain common IT challenges most businesses will encounter. Here, we outline four key IT challenges that most businesses face today, and how partnering with an IT MSP like IT. ie can help you overcome them. The Time Dilemma – For businesses without a dedicated IT department, managing or troubleshooting IT issues can consume a significant amount of time, diverting focus from core responsibilities. By partnering with an IT MSP like IT. ie, you can reclaim your valuable time. We serve as your full-fledged IT department, ready to address your IT needs promptly and efficiently. The Performance Hurdle – Your team's performance is directly linked to your IT infrastructure's performance. Subpar IT systems can lead to a decline in overall productivity. IT is more than just a set of computers; it's a comprehensive ecosystem of technology and... --- ### Safeguarding Personal Information: A Guide for Employees - Published: 2023-06-08 - Modified: 2023-06-12 - URL: https://it.ie/safeguarding-personal-information-a-guide-for-employees/ - Categories: Cyber Security, Data Protection - Tags: Cyber Awareness Training, Cyber security, Data protection, phishing In today’s digital world, safeguarding personal and company information is not just important, it’s essential. McCormack Family Farms' Transformation with Proactive Managed IT Services Introduction In today’s digital world, safeguarding personal and company information is not just important, it’s essential. Cyber threats are ever-increasing, and data breaches can have serious implications, both financially and reputationally. This guide is designed to provide employees with an understanding of how to protect personal and company information from such threats. Understanding Personal Information Personal information refers to any information relating to an identified or identifiable individual. This could include names, addresses, phone numbers, bank account numbers, email addresses, login credentials, PPS numbers, and other similar information. Importance of Safeguarding Personal Information Safeguarding personal information is crucial to protect the individual’s privacy, prevent identity theft, and ensure compliance with data protection regulations such as the GDPR. Furthermore, businesses also have a responsibility to protect customer and employee information from unauthorised access and data breaches. Safeguarding your Personal Information Strong Passwords: Use complex passwords, combining upper- and lower-case letters, numbers, and special characters. Change your passwords regularly and avoid using the same password for multiple accounts. Multi-Factor Authentication (MFA): Where possible, enable 2FA. This adds an extra layer of security by requiring not only a password and username but also something that only the user has on them (like a mobile device). Phishing Awareness: Be aware of phishing attacks. Never click on suspicious links in emails, and never provide your personal information in response to an email request. Secure Networks: Use secure and trusted networks when accessing sensitive information. Avoid using... --- ### The Shift Towards Managed IT Services: A Growing Trend in Business - Published: 2023-06-06 - Modified: 2023-06-14 - URL: https://it.ie/the-shift-towards-managed-it-services-a-growing-trend-in-business/ - Categories: Managed IT Services - Tags: Managed IT Services In recent years, more and more businesses have moved away from maintaining an in-house IT department, choosing instead to outsource their IT needs to a Managed Service Providers (MSP). This trend is driven by a several compelling advantages offered by MSPs, which can provide businesses with a more cost-effective, scalable, and specialised IT solution. Cost-Effectiveness One of the more compelling reasons to move to managed IT is the cost. Maintaining an in-house IT department can be incredibly expensive, with costs including salaries, benefits, training, and the purchase and maintenance of hardware and software. Outsourcing to an MSP, on the other hand, is much more cost-effective. MSPs typically operate on a subscription model, whereby you pay a set monthly fee for a package of services and solutions, much the same as many other subscription services you are signed up to. This makes IT costs more predictable, and most likely lower, than maintaining an in-house department. Access to Specialised Expertise MSPs are IT specialists, with a depth and breadth of knowledge that can be difficult for in-house departments to match. As technology evolves rapidly, keeping up with the latest developments, threats, and opportunities can be a full-time job. MSPs are committed to staying at the forefront of technological advancements and security trends, and this expertise is shared with their clients.  What this means is that by leveraging your MSP you will have access to the latest technologies and security measures without having to invest in extensive training or hiring additional staff. No... --- ### SOCIAL ENGINEERING: A Guide to Understanding the Attacks and How to Mitigate the Risks - Published: 2023-05-02 - Modified: 2023-05-10 - URL: https://it.ie/social-engineering-a-guide-to-understanding-the-attacks-and-how-to-mitigate-the-risks/ - Categories: Cyber Security - Tags: Social Engineering Introduction The landscape of cybersecurity threats is continually evolving and has largely transcended the traditional methods of hacking and virus distribution. Today, social engineering attacks have emerged as one of the most insidious and effective means of attack, relying on manipulation and psychology instead of technical expertise. Modern IT systems are difficult to infiltrate from the outside but not so when you manipulate or trick someone into granting you access. In this guide, we will explore social engineering attacks, the various techniques employed by cybercriminals, and provide practical tips to stay safe from these ever-evolving threats. Deconstructing Social Engineering Social Engineering Defined: Social engineering is the act of manipulating individuals into divulging confidential information or performing actions that compromise their security. Cybercriminals accomplish this by exploiting human psychology, making this type of attack particularly challenging to detect. The Human Factor in Cybersecurity: When it comes to cybersecurity, human error or negligence can often lead to security breaches, making humans the weakest link in the security chain. Social engineering specifically targets this vulnerability by exploiting trust and human nature. Common Goals of Social Engineering Attacks: The goals of social engineering attacks can range from gaining unauthorised access to sensitive information, stealing credentials, spreading malware, or conducting fraud or identity theft, making this a versatile tool for cybercriminals. The overall goal of the criminal is to manipulate you into taking an action that leads to a compromise. An Overview of Social Engineering Attacks Phishing: Phishing is a type of social engineering attack... --- ### 8 Reasons to Move Your Business to Microsoft SharePoint in the Cloud - Published: 2023-04-12 - Modified: 2023-05-10 - URL: https://it.ie/8-reasons-to-move-your-business-to-microsoft-sharepoint-in-the-cloud/ - Categories: Cloud Computing, Microsoft, Productivity - Tags: Digital Transformation, Microsoft 365, SharePoint In today's digital transformation era, businesses are moving to the cloud to enhance collaboration, streamline document management, and improve productivity. Microsoft SharePoint is a cloud-based platform that offers a wide range of features to meet these needs. In this post, we will explore the top reasons why businesses should consider moving their operations to Microsoft SharePoint in the cloud. Improved Collaboration: SharePoint enables teams to collaborate more effectively by providing a centralised platform for sharing documents, files, and other information. With SharePoint, team members can work on the same document simultaneously, reducing the need for email attachments and manual version control. Document Management: SharePoint provides robust document management capabilities, including version control, content approval workflows, and metadata management. This ensures that documents are secure, up-to-date, and easily accessible by authorised users. Mobility: With SharePoint, you can access and work with all your files and folders from anywhere at any time from any device. Customisable: SharePoint can be customised to meet specific business needs, including custom workflows, forms, and templates. This allows organisations to tailor the platform to their unique business processes and requirements. Integration: SharePoint integrates with other Microsoft 365 tools and services, including Office, Teams, and PowerApps. This provides a seamless experience for users and enables organisations to leverage existing investments in Microsoft technology. Searchability: SharePoint includes powerful search capabilities, allowing users to find the information they need across the platform quickly. Security: SharePoint includes robust security features, including user permissions, encryption, and access controls. This ensures that data... --- ### Unified Billing: Simplifying Your Technology Expenses - Published: 2023-04-03 - Modified: 2023-05-10 - URL: https://it.ie/unified-billing-simplifying-your-technology-expenses/ - Categories: Productivity - Tags: Unified Billing  As a business owner, you're always looking for ways to simplify various business processes. When we engage with a potential new client, we always ask them about the challenges and frustrations they are facing with the existing providers of their various technology solutions. One area that often stands out more than any other is the frustrations of the accounts teams who are faced with a multitude of invoices for different services & products from the same or across all providers. We’ve found that the best solution is often the simplest and that’s why we introduced unified billing which allows us to combine all our services into a single monthly invoice. What is Unified Billing? Unified billing is the practice of combining multiple services into a single invoice. Instead of receiving separate invoices for each service, you receive one invoice that covers all the services you’re subscribed to. This can include services such as Managed IT Support, Microsoft Office 365, Endpoint Protection, Online backup, Domain Hosting, Managed Print, Managed Firewall, Email Protection, and more. Advantages of Unified Billing Simplified Billing Process One of the main advantages of unified billing is that it simplifies the billing process. Instead of having to deal with multiple invoices, you receive a single invoice that covers all our services. This makes it easier for you to keep track of expenses and reduce the risk of errors. Improved budgeting By consolidating all IT expenses into a single invoice, you can more accurately forecast and budget for future... --- ### Protecting Your Business from CEO and Invoice Fraud - Published: 2023-03-29 - Modified: 2023-05-10 - URL: https://it.ie/protecting-your-business-from-ceo-and-invoice-fraud/ - Categories: Cyber Security, Phishing, Scams Protecting your business from financial fraud has become more critical than ever before, with all to frequent reports of unsuspecting businesses falling victim to criminals. CEO fraud and invoice fraud are two common types of scams that have cost small firms in Ireland millions of euros. The Banking and Payments Federation Ireland's (BPFI) via FraudSMART reports that in 2022 alone, small businesses in Ireland were conned out of €8m as a result of these scams, highlighting the need for business owners to educate themselves and their employees on how to avoid falling victim to these fraudulent activities. What is CEO Fraud? CEO fraud is a type of phishing scam where cybercriminals impersonate a CEO or senior executive of a company to trick employees into transferring funds to an unauthorised bank account. The scammer usually sends an email to an employee in the finance department, asking them to urgently transfer money to an account they claim is for a confidential business transaction. The request that you believe to originate from your boss may say that he’s busy or running into an urgent meeting and demand the payment be made straight away, leaving the employee to feel that they would be in trouble if they didn’t carry out the demand from their boss.   The email may appear genuine, with the correct email address and even the company logo, making it difficult for employees to suspect anything is amiss. To add to the deception, the email may also come from an email... --- ### New BEC Campaign Uses AiTM Attacks to Steal Millions from Corporate Executives via Microsoft 365 Accounts - Published: 2023-03-15 - Modified: 2023-05-10 - URL: https://it.ie/new-bec-campaign-uses-aitm-attacks-to-steal-millions-from-corporate-executives-via-microsoft-365-accounts/ - Categories: Cyber Security, Phishing - Tags: Data protection, Email Scam, Microsoft, phishing A recent Business Email Compromise (BEC) campaign has been identified that is using advanced spear-phishing techniques with Adversary-in-the-Middle (AiTM) attacks to target Microsoft 365 accounts belonging to corporate executives. The campaign, which researchers from Mitiga discovered during an incident response case, is now widespread and is targeting transactions worth several million dollars each. The phishing emails used in this campaign inform the target organisation that their usual corporate bank account is frozen due to a financial audit and provide new payment instructions. These new payment instructions suggest switching to a new bank account owned by a so-called subsidiary, which is actually owned by the attackers. To make the attack more convincing, the attackers hijack email threads and use typo-squatted domains that quickly pass as authentic to CC’d legal representatives known to the victims. The attack on corporate executives starts with a phishing email pretending to come from DocuSign, the electronic agreements management platform used widely in corporations. The email targets common security misconfigurations often used to limit false positive spam alerts from DocuSign, allowing the email to get inside the target's inbox. When the target clicks on the ‘Review Document’ button to open it, they land on a phishing page on a spoofed domain, where they are urged to log in to the Windows domain. The attackers use AiTM attacks to bypass Multi-Factor Authentication (MFA). They appear to be using a phishing framework, evilginx2 proxy, to perform the AiTM attack. When a target inputs their credentials and solves the MFA... --- ### Cloud Computing: Unleash the Power of Cloud Technology - Published: 2023-03-06 - Modified: 2023-05-10 - URL: https://it.ie/cloud-computing-unleash-the-power-of-cloud-technology/ - Categories: Cloud Computing - Tags: Cloud Computing, Cloud Storage, Digital Transformation The advent of cloud computing has revolutionised the way modern businesses function. This technology not only provides numerous advantages, such as scalability, flexibility, cost-effectiveness, and enhanced collaboration, but is also eco-friendly. Cloud computing is a crucial element of digital transformation, empowering organisations to harness technology's potential to achieve their objectives more efficiently. Given the increasing popularity of cloud computing, it is imperative for companies to comprehend its potential to enhance sustainability and productivity. This post aims to explore the fundamentals of cloud computing, its benefits, and how it can facilitate your business's growth while minimising its carbon footprint. What is Cloud Computing? Cloud computing is a technology that allows users to access computing resources, including software, servers, storage, and databases, over the internet. In simple terms, it means that instead of storing and processing data on your computer's hard drive or a local server, you can store and access it over the internet. Cloud computing providers offer on-demand access to computing resources, which enables businesses to scale their resources up or down as needed. There are three main types of cloud computing services: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). IaaS provides access to computing resources such as servers, storage, and networking. PaaS offers a platform for developers to create and deploy applications. SaaS offers a ready-to-use software application hosted on a cloud platform. The Benefits of Cloud Computing There are several benefits of cloud computing, including: Scalability: Cloud computing allows... --- ### Pig Butchering Scams – What are they and how to avoid them - Published: 2023-02-15 - Modified: 2023-05-10 - URL: https://it.ie/pig-butchering-scams-what-are-they-and-how-to-avoid-them/ - Categories: Cyber Awareness Training, Cyber Security, Scams - Tags: Cyber Awareness Training, Email Compromise scams, phishing, Romance Scams, Scams, Social Engineering From business email compromises to romance scams, criminals are raking in billions by using one powerful tool: social engineering. They lure their victims into making mistakes that could cost them everything - whether it's trusting someone they shouldn't or sending their hard-earned money into a black hole. But just when we thought we'd seen it all, a new sinister scheme called "pig butchering" has emerged, and it's quickly becoming one of the most effective ways to steal large sums from unsuspecting targets. Originally hailing from Southeast Asia, pig butchering scams have now made their way across the globe, leaving a trail of heartbreak and empty bank accounts. The scam is typically run by a group of cryptocurrency scammers who scour dating apps and social media platforms in search of vulnerable targets. The scammer creates a fake profile and reaches out to their victim via social media, WhatsApp, Tinder, or other dating sites. They may even try random texts, posing as an old acquaintance or sending messages to an incorrect number. Once they've made contact, the scammer will engage the victim in friendly conversation, posing as a new friend or a potential lover. Their ultimate goal? To establish trust with the victim and reel them into their trap. The Pig Butchering Scam has 3 phases: The Slow Build This first phase of the scam can take days, weeks or even months. A stranger will contact you out of the blue via social media, text, email or a messaging app and attempt... --- ### Email Remains The Number One Threat Vector - Published: 2023-02-09 - Modified: 2023-05-10 - URL: https://it.ie/email-remains-the-number-one-threat-vector/ - Categories: Cyber Awareness Training, Cyber Security, Scams - Tags: Cyber Awareness Training, Cyber security, Email Security, phishing Attention all businesses: Are you aware of the dangerous threat lurking in your employees' inboxes? Back in 2018 we warned that the greatest threat to your organisation Is sitting in the inboxes of your employees. Despite advancements in cyber defence, this is still the case and it's becoming easier for bad actors to target your inbox with phishing scams. Sophisticated Phishing-as-a-service (PaaS) kits, allow, even novice hackers to deploy convincing phishing that can automatically localise phishing pages based on a victim’s native language. According to Vade, a global leader in threat detection, seven out of ten businesses suffered a serious data breach via email in the past year. In the fourth quarter of 2022, Vade detected a staggering 278. 3 million phishing emails, surpassing the previous quarter's total by 74. 4 million. The best defence against these attacks is a multi-layered approach to cybersecurity. Act now before it's too late. Protect your business and stay ahead of the game. Here are several recommended steps that we recommend and that will greatly help mitigate against phishing and malware attacks: Implement email filtering: Installing an email filtering solution, can help protect against phishing and malware attacks by scanning emails for malicious content and blocking them before they reach your inbox. Regular software updates: Ensure that all your software and email client are regularly updated to the latest version, as this can help protect against vulnerabilities that could be exploited by phishing and malware attacks. Use multi-factor authentication: Multi-factor authentication adds an extra... --- ### Press Release: IT.ie commits to being carbon-neutral by 2030 as part of Techies Go Green movement - Published: 2023-02-08 - Modified: 2023-05-10 - URL: https://it.ie/press-release-it-ie-commits-to-being-carbon-neutral-by-2030-as-part-of-techies-go-green-movement/ - Categories: Press Release, Sustainability Dublin, 07/02/2023 – IT. ie, today announces that it has joined Techies Go Green, a movement of IT and tech-oriented companies who are committed to decarbonising their businesses. Established in 2004 IT. ie delivers managed IT Services and technology solutions to hundreds of enterprises across Ireland. IT. ie joins the community of organisations who are aiming to become carbon-neutral by 2030 at the latest. Techies Go Green enables each member to purposefully improve their energy efficiency by collaborating and sharing practical know-how. Started by IT distributor DataSolutions, more than 200 companies have signed up to the initiative to date. John Grennan, Marketing Manager at IT. ie said:” At IT. ie, we believe in the power of technology to not only transform the world but also to protect it. That's why we are committed to becoming a carbon neutral company by 2030, proving that business success and environmental responsibility go hand in hand. " Michael O’Hara, Techies Go Green co-founder said: “We are delighted that IT. ie has joined Techies Go Green – an important initiative which aims to benefit companies, people and the planet. “It is vital that every business takes responsibility, sets targets and reduces their environmental impact on the earth. Techies Go Green is designed to support this, share ideas and make a sustainable difference. ” To learn more about or become a signatory with Techies Go Green, visit www. techiesgogreen. com. - Ends - About IT. ie Founded by Eamon Gallagher in 2004, IT. ie is the... --- ### Data Privacy – Understanding its Importance and How Everyone Has a Role in Protecting It - Published: 2023-01-24 - Modified: 2023-05-10 - URL: https://it.ie/data-privacy-understanding-its-importance-and-how-everyone-has-a-role-in-protecting-it/ - Categories: Data Protection Data privacy is a critical issue that affects every individual in today's digital age. With the rise of the internet and social media, personal information is being collected, analysed, and shared at an unprecedented rate. This has led to the emergence of what has been called “surveillance capitalism," where companies monetise personal data for profit. Often referred to as the "most valuable commodity" in today's digital age, data can be used to inform business decisions, create new products and services, and target advertising to specific groups of consumers. It can also be used to improve efficiency and reduce costs across industries. Data alone is not valuable, it's the insights and the ability to act on that data that makes it valuable. Back in 2018, I remember attending a presentation on data where the speaker claimed; that by analysing a person's Twitter data, it was possible to create a 95% accurate profile of that person. This would give valuable insight into their behaviour, likes and dislikes, and even predict future actions. At the time, I thought that this was a little sensationalist, but now, with the advent of advanced AI technology like ChatGPT, built on vast amounts of data, that claim doesn't seem so sensationalist, after all. Twitter was simply used as the example here and does not make any claim as to how Twitter makes use of the data it holds. Predictions based on data are not definitive; they are very accurate educated guesses but cannot and I imagine should... --- ### Reduce your Energy Costs by Migrating to the Cloud - Published: 2023-01-09 - Modified: 2023-05-15 - URL: https://it.ie/reduce-your-energy-costs-by-migrating-to-the-cloud/ - Categories: Cloud Computing Cloud computing isn't just about convenience and scalability - it can also help you reduce energy costs and go green. On-premises servers may seem like a convenient option, but they can rack up a hefty energy bill with their constant power needs and heat generation. All that energy usage adds up, and for small and medium-sized businesses, it can be a struggle to keep the lights on. But don't worry, the cloud is here to save the day (and some money)! By migrating to the cloud, you can take advantage of energy-efficient infrastructure and reduce your carbon footprint. It's a win-win for your business and the environment! There are several ways that a business can reduce its energy costs by migrating to the cloud: Reduced energy consumption: By hosting data and applications on remote servers, businesses can significantly reduce the energy required to power and cool their own on-site servers. Increased energy efficiency: By leveraging the power of virtualisation, cloud computing can give your energy efficiency a boost. How so, you ask? Well, with virtualisation, cloud providers can run multiple virtual servers on a single physical one, making better use of resources. Sure, big data centres can use up a lot of energy but think about it this way: they're essentially taking care of the computing needs of thousands of businesses. That's a lot more energy efficient than if all those businesses were running their own on-premises systems! So not only can cloud computing help cut energy costs, it can... --- ### Phishing Prevention Guide - Published: 2023-01-05 - Modified: 2023-01-09 - URL: https://it.ie/phishing-prevention-guide/ - Categories: Cyber Security By now, most people who have access to email (which is a lot of people) are aware of phishing and may have even fallen victim to or encountered a phishing attempt. Phishing is a type of online fraud in which attackers send fake emails or texts, or create fake websites, in an attempt to trick people into giving away sensitive information such as login credentials, financial information, or personal identification numbers. The goal of phishing attacks is usually to steal money or information, or to gain access to computer systems for malicious purposes. Phishing can be described as a "fishing" expedition, where scammers cast a wide net in the hopes of tricking people into biting on their fraudulent schemes. Just like a fisherman hopes to catch a fish with bait. In both cases, the goal is to deceive and manipulate in order to achieve a desired outcome. Phishing attacks often use social engineering techniques to lure victims into revealing sensitive information, such as pretending to be a legitimate company or authority figure and asking the victim to confirm their login details or other personal information. It is important to be cautious when receiving unsolicited requests for personal information and to verify the authenticity of any website or email before entering sensitive information. The following is not an exhaustive list but by following these guidelines you can significantly reduce the risk of a successful phishing attack. Be cautious of unsolicited emails, especially those that ask you to click on a link... --- ### Cloud Computing vs On-Premises Solutions - Published: 2023-01-03 - Modified: 2023-01-09 - URL: https://it.ie/cloud-computing-vs-on-premises-solutions/ - Categories: Cloud Computing Are you tired of being weighed down by the burden of maintaining on-premises IT infrastructure? Ready to break free from the chains of physical hardware and embrace the limitless possibilities of the cloud? Then maybe it's time to ditch those outdated, clunky on-premises solutions and make the switch to the cloud! With cloud computing, you can say goodbye to expensive upfront costs, tedious maintenance tasks, and limited scalability. There are several benefits to using cloud computing over on-premises solutions:  On-demand access to computing resources: With cloud computing, you can quickly and easily access a wide range of computing resources, such as storage, networking, and computing power, without having to invest in expensive infrastructure or hardware. In contrast, on-premises solutions require you to purchase and maintain your own hardware, which can be costly and time-consuming. Increased scalability and flexibility: Cloud computing allows you to scale up or down as needed, so you only pay for the resources you use. This makes it easy to quickly add or remove resources as your needs change and allows you to be more agile and responsive to market demands. In contrast, on-premises solutions can be difficult and expensive to scale and may not be able to keep up with changing business needs. Improved collaboration and productivity: Cloud-based tools and applications make it easy for teams to work together and share information, regardless of their location. This can help improve collaboration and productivity and make it easier for your business to respond to changes in the... --- ### The most popular Google searches in Ireland for 2022 - Published: 2022-12-07 - Modified: 2023-01-09 - URL: https://it.ie/the-most-popular-google-searches-in-ireland-for-2022/ - Categories: Google As 2022 draws to a close, Google has revealed the most popular trending searches in Ireland for the year. Covid associated queries that featured prominently in 2020 and 2021 were relegated with “Wordle” now sitting on top of the table for the most popular overall search query in Ireland for 2022. Wordle was created by Josh Wardle who initially created the game for himself and his partner to play before making it public in 2021. The game really took off when he added the ability for players to share their daily results on Twitter. Like so many of you, I was addicted to this game in the early part of the year before losing interest after breaking my streak. Heardle at number six for overall search queries is a word I never came across before today and unsurprisingly, had to Google it. It looks like a fun music trivia game that I'll have to try. Queries that would appear to relate to the ongoing conflict in Ukraine featured prominently on Google search, this year with both ‘Ukraine’ and ‘Russia’ featuring in the top 10 overall searches. As people across the world feared an escalation in the conflict beyond Ukraine and the talk of nations evoking various NATO, articles people across Ireland wanted to know a little more about NATO and went to Google for the answers. The most popular movie-related query this year was ‘The Batman’. To be fair the movie and its leading man Robert Pattinson, were better than... --- ### 4 Reasons Why You Should Switch to Microsoft Office 365 Business Premium Today - Published: 2022-11-30 - Modified: 2023-03-08 - URL: https://it.ie/4-reasons-why-you-should-switch-to-microsoft-office-365-business-premium-today/ - Categories: Microsoft Microsoft 365 Business Premium is an effective solution to keep employees connected and productive regardless of their physical location while simultaneously safeguarding their data and protecting them against cyber threats. Microsoft 365 Business Premium provides a cost-effective but highly efficient solution for small to medium-sized businesses. It brings together advanced security capabilities with collaboration tools to help you run your business securely from anywhere. Furthermore, Microsoft 365 Business Premium has multiple subscription levels, allowing businesses to grow and scale at their own pace. Here are four ways in which Microsoft 365 business premium can benefit your business.  Access from Anywhere. Whether you're at home, at work, or on the road, Office 365 Business Premium lets you use the same apps wherever you are. And with Intune Endpoint Device Management included, you can manage your devices remotely, even when you're offline. With Microsoft Intune you can:Keep all endpoints updated with security patchesGrant or revoke access to business apps remotelyUse “find my device” and “wipe my device” for lost or stolen devicesDeploy and authenticate apps on devicesProtect company data by controlling how users can share itEnsure devices and apps are compliant with your security policies Stay Secure with Advanced Security Features. With advanced security features, you can protect your data from unauthorised access, viruses, malware, and spam. Plus, you can easily share files securely with others using OneDrive for Business. One of the primary benefits of Microsoft 365 Business Premium is the inclusion of Microsoft Endpoint Protection and Response (EDR). EDR is an... --- ### Microsoft Surface - Built for security, designed for trust - Published: 2022-11-08 - Modified: 2023-09-06 - URL: https://it.ie/microsoft-surface-built-for-security-designed-for-trust/ - Categories: Microsoft Held to the same standard as all Microsoft services and software, Microsoft Surface devices provide uncompromising chip-to-cloud security, put ultimate control in your hands, and provide peace of mind wherever and however work gets done. In a global environment where security threats are ever-increasing in sophistication, Surface provides world-class security across multiple layers including hardware, firmware, software, application, and identity. From conceptual design to a team members’ first Hello – Surface reduces complexity and elevates trust.   20% reduction in security breaches, annually, for Surface device users 17% reduction in endpoint security costs when using a portfolio of Surface devices Built for peace of mind Every Surface device is designed with industry-leading security. TPM 2. 0 protects and controls authentication. BitLocker encryption is enabled by default on all Surface end-user devices (reducing the amount of time needed to deploy with AutoPilot and ensuring all users receive secure devices out-of-the-box). Most Surface device features the Microsoft-designed and built unified extensible firmware interface (UEFI)² to control device firmware and select devices feature secured-core Industry-leading biometrics provides device owners instant and more secure access with Windows Hello for Business, replacing passwords with strong, two-factor authentication. And, to minimize risk end-to-end, Surface continuously evaluates supplier security in manufacturing and works with resellers to develop security-focused distribution logistics. Ultimate control Ultimate control remains in your hands long after deployment through a variety of features. Built with and for the Windows and Microsoft 365 security stack, our devices not only meet every standard for a highly secured PC but are also capable of automatically receiving updates... --- ### Why are humans the biggest insider threat to your business? - Published: 2022-10-12 - Modified: 2023-05-10 - URL: https://it.ie/why-are-humans-the-biggest-insider-threat-to-your-business/ - Categories: Cyber Awareness Training, Cyber Security Employees have long been viewed as the ‘weakest link’ in a business’s cyber security chain and, with human error still being the number one cause of data breaches, that unwanted title can still be applied to many businesses today. But what makes employees such an insider threat to your business?  In this article, we’ll guide you through the different types of insider threats within your business and the key reasons why businesses suffer a user-related data breaches. Oh, and we’ll also give you some advice on mitigating all of the above! What are the different types of insider threats within your business? According to Verizon’s Data Breach Investigation Report (DBIR), over 85% of data breaches involve the ‘human element’. A common misconception here is that all user-related data breaches are caused by simple negligence – e. g. clicking on a phishing email. The fact is, although negligence plays a huge role in most user-related data breaches, a big portion of these breaches are caused by additional or completely separate factors. According to Verizon’s report, these are the three main types of insider threats:Negligent users make up 61%These types of users can be defined as those who commit acts like copying the wrong person into an email, attaching the wrong file to an email or clicking on a malicious phishing link. Negligent users, with credentials exposed on the dark web, make up 25%These types of users are less common but are even more at risk than solely negligent users. That’s because these employees... --- ### Cyber Insurance Checklist: 10 Essential Security Controls - Published: 2022-10-04 - Modified: 2024-01-02 - URL: https://it.ie/cyber-insurance-checklist-10-essential-security-controls/ - Categories: Cyber Security, Data Protection The never-ending threat of a cyberattack is leading more and more businesses to take a serious look at cyber security insurance to help them recover some of the financial losses that would result from an attack or incident. While a continuing rise in attacks is making cyber insurance more attractive, so too, is it making it more difficult to obtain. More attacks result in more claims and lead to higher premiums with insurance companies becoming very selective about who and what they are willing to cover. Insurance underwriters will likely require that you have robust security measures and policies in place before they even consider providing your company with a quotation. Here are some of the security controls insurers are likely to require to be in place, before issuing a quotation:(Note: this post contains links to various pages on our website. Never click on links you do not trust 100%. If you do not trust the links in this post, you can find all the information directly on our website) 1. Multi-Factor Authentication. At the top of every insurance underwriter’s requirement list is Multifactor Authentication (MFA). Cyberattacks such as ransomware frequently exploit weak or stolen passwords to infiltrate systems. MFA reduces the risk by requiring a combination of verification factors such as a password or PIN along with a security token, mobile app, or biometric identifier. It’s almost impossible to get cyber insurance without MFA. To learn more about MFA read our post “What is MFA and what are the benefits”... --- ### Build a security-savvy workforce through ongoing Human Risk Management - Published: 2022-08-19 - Modified: 2023-12-14 - URL: https://it.ie/build-a-security-savvy-workforce-through-ongoing-human-risk-management/ - Categories: Cyber Awareness Training With Verizon reporting that the ‘human element’ plays a part in 85% of cyber security breaches, your business can be compromised by just one well-crafted and well-researched phishing email landing in an employee’s inbox. The fact is, common attacks like phishing have rapidly evolved over the past few years, and businesses have been slow to put in place effective measures for combatting the growing risks - resulting in more breaches, costly financial hits and damaging data losses. Our Human Risk Management service reduces employee human error and gives staff the knowledge to combat evolving cyber threats.   Start tackling human cyber risk through ongoing Human Risk Management (HRM) With user-targeted attacks seeing a huge increase in the past couple of years, not least due to the rapid switch of staff working from home, sophisticated attacks like phishing and business email compromise have surged.  That’s why we now offer a new comprehensive solution for helping your business measure, reduce and monitor human cyber risk - without hindering employee productivity or draining internal time or money.  With our new managed Human Risk Management (HRM) service, you’re able to: Prevent user-related breaches, fines and financial losses caused by human errorStrengthen data loss prevention by boosting human resilience to targeted attacksDemonstrate compliance standards with key frameworks like ISO 27001 How does it work? Human Risk Management (HRM) combines the key elements needed to build a security-savvy culture against evolving cyber threats. It does this by combining:Regular user-tailored security awareness training that educates staff through bite-sized... --- ### Switching is Easy with IT.ie - Published: 2022-08-15 - Modified: 2023-08-09 - URL: https://it.ie/switching-is-easy-with-it-ie/ - Categories: Marketing How many of us are guilty of sticking with the same service providers simply because it’s “better the devil you know”? There can be a lot to consider when you are thinking of switching from one IT Support provider to another and it can seem like a daunting process. However, it does not have to be. Switching IT Support providers is largely no different than switching any other utility.  How we work and do business has changed a lot. Many businesses have now adopted new ways of working with fully remote or hybrid working environments, and we now rely so much more on cloud solutions and online tools to work, communicate, and collaborate. Many providers simply have not adapted quickly enough to the changing world. Long before the impact of Covid, we were helping clients transition to the cloud and embrace modern technologies, to improve business processes and drive growth. We have the tools, the skills, and the team to help your business grow and provide solutions that help you protect your systems from the ever-evolving cyber threat landscape.  Reasons why Businesses Switch IT Support Providers. You don’t want to sign a long-term agreement. Our Managed IT Support & Services contracts are month-to-month meaning that you are only required to give us 30 days’ notice, should you wish to cease with our services. Simply put, if you are not happy with our services, you shouldn’t be compelled to remain with us.   You’re fed up with poor customer service. Our model of... --- ### IT.ie Intern Selina Wymann - My Experience in Ireland - Published: 2022-08-05 - Modified: 2022-12-05 - URL: https://it.ie/it-ie-intern-selina-wymann-my-experience-in-ireland/ - Categories: Miscellaneous back to all Start of Internship My name is Selina Wymann and I’m from Switzerland. I’m seventeen years old, and I enjoy doing things with my loved ones. I love seeing and experiencing new things and that’s why I’m here for an internship in Ireland. I’m staying with a family near Phibsborough and working at IT. ie in Finglas. IT. ie is an IT support company that supports other companies. The process is fairly simple; we get a support ticket that goes to an engineer who then fixes IT problem that the other company has. The people here do a lot more here, but I won’t go into the details.  I flew here on the 17th of July, and that was one of the biggest experiences of my life. It was my first time flying anywhere on my own and only the second time I flew in my entire life. Everything was new and I had to get myself into a whole new life for those three weeks. I think this would be one of the scariest moments in the life of a seventeen-year-old girl – leave your family behind, leave your friends behind, leave your job behind. Although the internship is only for three weeks it has been challenging and I’ve had to push myself through with the help of the guys here. This has been difficult but I’m growing from it and my English is growing from it as well. After all, that was my whole mission and... --- ### The Benefits of a VoIP Telephone System - Published: 2022-08-02 - Modified: 2023-09-05 - URL: https://it.ie/the-benefits-of-a-voip-telephone-system/ - Categories: Productivity, Remote Working - Tags: Remote Working, VoIP. “Mr Watson, come here – I want to see you” were the first words spoken over a telephone line by Alexander Graham Bell on the 7th of March 1876. Since then, the world has become a much smaller place with the telephone allowing people to communicate in real-time across the globe. “Mr Watson, come here – I want to see you” were the first words spoken over a telephone line by Alexander Graham Bell on the 7th of March 1876. Since then, the world has become a much smaller place with the telephone allowing people to communicate in real-time across the globe. I’m not going to bore you and go into the full evolution of the telephone, except to say, that the traditional landline known as Public Switched Telephone Network (PSTN) was first introduced in 1946. It is still in use today by many businesses. Although most now use the digital version known as ISDN. It’s not fair to say that PSTN/ISDN is dead, but it is certainly coming to the end of its life and is simply not compatible with our changing world and how we communicate and collaborate.    So, what is VoIP? VoIP (Voice Over Internet Protocol) is a phone technology that allows you to make and receive phone calls using the internet instead of traditional phone lines. Unlike landline phone systems that are limited to a single desk phone in your office, VoIP lets you make and receive business phone calls from your laptop, tablet, regular smartphone (using an App), and even VoIP-compatible office desk phones or headsets. While many businesses have made the switch to a VoIP system there are many more that are nervous about switching in much the same way car owners today are hesitant about making the switch to Electric Vehicles (EVs). It's... --- ### What is Multi-Factor Authentication and What are the Benefits? - Published: 2022-07-12 - Modified: 2022-12-05 - URL: https://it.ie/what-is-multi-factor-authentication-and-what-are-the-benefits/ - Categories: Data Protection, Security - Tags: 2 Factor Autentication, 2FA, Cyber security, Data Security Multi-Factor Authentication or MFA is a security measure that requires you to provide two separate pieces of information before you are granted access to an online service. In the past, it has been far too easy for hackers to obtain credentials and access your online services. By implementing MFA you are telling the online service that you are in fact, who you claim to be. What is Multi Factor Authentication (MFA)? Multi Factor Authentication or MFA is a security measure that requires you to provide at least two separate pieces of information before you are granted access to an online service. In the past, it has been far too easy for hackers to obtain credentials and access your online accounts. By implementing MFA, you are telling the online service that you are in fact who you claim to be. The most common method of authentication to date has been single-factor authentication whereby you provide a username and password to access the service. With MFA security is greatly enhanced as you must now provide a second form of authentication to access the service. Many services that offer or require MFA make use of mobile devices as a means of secondary authentication. Common methods include an authenticator app, text messaging service or biometrics. With the authenticator app you set up your service and once you login into your account you will be prompted to enter a one-time code that will expire within a set time limit. Similarly, with text message authentication, the online service will send you a message with a one-time code that you must enter to access the service. Biometrics such as the fingerprint reader on your mobile device is another secure and speedy method of providing MFA authentication.   What are the benefits of Multi Factor Authentication? Reduce Fraud & Identity Theft It is very likely that at least one of your online accounts... --- ### Understanding The Cyber Kill Chain - Published: 2022-06-20 - Modified: 2023-09-05 - URL: https://it.ie/understanding-the-cyber-kill-chain/ - Categories: Cyber Security An advanced persistent threat is when a malicious actor gains access to a network and remains undetected for weeks, months and even years. Lockheed developed the Cyber Kill Chain with the idea that if we identify threats early enough, this will reduce the possibility of an advanced persistent threat. The cyber kill chain is an adaptation of the military’s kill chain, which is a step-by-step approach that identifies and stops the enemy activity. Cyber-security is a topic I find fascinating but admit that my knowledge in the area is limited. Thankfully there are countless online resources available to help enthusiastic amateurs gain an understating of this complex world. One such resource that I became familiar with during the past year is LinkedIn Learning. Recently, I undertook a short course titled “Introduction to Ethical Hacking” by industry expert Lisa Bock. My rationale for undertaking this course was to gain a better understanding of a Penetration Testing service my company was offering to its clients. Thankfully the course didn’t get overly technical and was easy to follow and hugely interesting. One subject area that I found most interesting and something I had little or no knowledge of was the cyber kill chain. The kill chain will be explained in detail in this post but needless to say that given my lack of knowledge on the topic, the content of this post is taken from course learnings, online research and conversations with our own cyber experts.      Today’s Threat landscape Today's threat landscape is complex and continually evolving with current threats putting every business, government entity, and individual in the crosshairs. Malware is becoming more aggressive, and we are experiencing everything from network-based ransomware worms, to devastating wiper malware. Malicious actors are designing sophisticated malware that is polymorphic in nature meaning it can change or morph, making it more difficult to detect with antimalware programs. This behaviour makes it even more difficult to combat because... --- ### 4 Common Business Challenges That MSPs Can Help Solve - Published: 2022-04-25 - Modified: 2022-12-05 - URL: https://it.ie/4-common-business-challenges-that-msps-can-help-solve/ - Categories: Marketing Challenges are not only inevitable in business, but as it turns out, necessary. Commerce exists because of them, with almost every business predicated on the need to address the challenges of others and in turn, requires others to address theirs. The growth of information technology over the last 30+ years has created opportunities not previously thought possible. It has also brought with it, new challenges. Challenges are not only inevitable in business but as it turns out, necessary. Commerce exists because of them with almost every business predicated on the need to address the challenges of others and in turn, requires others to address theirs. The growth of information technology over the last 30 + years has created incredible opportunities but also brought with them new challenges. The role of an IT Managed Services Provider (MSP), such as IT. ie is to address the unique challenges technology brings to your business and enable you to use that same technology to improve business processes and develop more opportunities. Depending on the nature of your business, the challenges you face may be unique to your situation or the industry you operate in. The following four challenges are not unique to any single business entity or industry but broadly reflect the shared challenges businesses face today. 1. Time Challenge – Unless you’re a large company with a dedicated IT department, you’re going to find that you are spending more and more of your time managing or even fixing IT issues that are taking you away from your core roles and responsibilities. When you employ an MSP such as IT. ie, the first challenge we solve is giving you back your precious time. Not only will you get your time back, but you’ll also get a fully developed IT department, at your disposal.      2. Performance Challenge – When your IT isn’t working then your team isn’t performing.... --- ### The Sustainability Journey of a Small Irish Business - Published: 2022-04-20 - Modified: 2023-10-26 - URL: https://it.ie/the-sustainability-journey-of-a-small-irish-business/ - Categories: Sustainability There are many ways to interpret sustainability with the word itself being described as impossibly ambiguous by Kent Porter in his 2015 book “Sustainability”. The best definition or explanation for sustainability, I believe comes from the United Nations Brundtland Commission, who in 1987, described sustainability as “meeting the needs of the present without compromising the ability of future generations to meet their own needs”.    In fact, there are 17 Sustainable Development Goals that layout a blueprint to achieve a better and more sustainable future for all. No single goal is necessarily more important than any other, however, our dependence of fossil fuels and their impact on global warming is having the most immediate and far-reaching impact.    I asked Hans Zomer, CEO of The Global Action Plan Ireland for his thoughts on SME’s and how they can have an impact on sustainability?  “SMEs are not only the backbone of Ireland’s economy, they are also vital if we are to make the transition to a more sustainable way of living. We are seeing more and more that SMEs in Ireland are realising that sustainability is not only a good aspiration, but that there are tangible benefits to the company. By aiming to reduce the company’s impact on the environment and the climate, many SMEs are embracing the principles of the circular economy, reducing waste and energy use, and building greater resilience in their business processes. And companies are discovering that they benefit, too, in terms of greater employee engagement and positive brand awareness. We are seeing that... --- ### Do you really need a UPS? - Published: 2022-03-30 - Modified: 2022-12-05 - URL: https://it.ie/do-you-really-need-a-ups/ - Categories: Productivity So, Eamon (our director) asked me to put together a client mailer on Uninterruptible Power Supply (UPS) and my response was to ask if there is much of a requirement for a UPS today? I was thinking that, with more and more businesses moving from on-prem servers to the cloud, is there any real need for a UPS? Eamon agreed that there was less of a requirement in terms of supporting on-prem servers but added, “what about, switches, hubs, point of sale and other network and communication devices and let’s not forget that many companies still require or prefer on-prem servers”. Fair point, I conceded, and so decided to talk to our tech team so that I could understand some of the benefits of UPS. Here’s what I found out. Emergency Power Supply – Unless you have a backup generator, when the power goes down your systems go down. With a UPS you have an alternative source of power to keep vital systems running until such time as the power is restored and should power not be restored for several hours, you can at least ensure that vital systems are safely shutdown without damage or loss to data from a sudden power loss.  Provides Surge Protection: In the event of a power surge, the UPS identifies the bad power supply and stops it from directly powering your device. It then immediately provides an alternative form of stable power to prevent damage to data or devices common with power surges.  Data Protection:... --- ### Cyber Security – The current state of play and how you can protect your business. - Published: 2022-03-23 - Modified: 2023-04-24 - URL: https://it.ie/cyber-security-the-current-state-of-play-and-how-you-can-protect-your-business/ - Categories: Cyber Security As part of their thought leadership series, our partners at Microwarehouse held an online event entitled “Cyber Security: The Current State of Play”. The event was moderated by Guido Marchetti – Microsoft Modern Work & Security Lead at Microwarehouse and the speakers included Des Ryan – Director of solutions and cyber security for Microsoft Ireland, Oli Venn of Watchguard and Brian Honan of BH Consulting. What was evident from the start and agreed by all the speakers was that cyber-attacks are continuing to grow with cybercriminals becoming more malicious and sophisticated.  We are all witnessing the horrific scenes of an unjustified conflict in Ukraine unfold on our TV screens and social media channels, but conventional military conflict is today supplemented by an army of keyboard warriors whose battlefield extends far beyond the borders of the sovereign state of Ukraine. To date there is no evidence to suggest that Ireland has come under any cyber-attacks directly relating to the conflict, however, this is likely to change, and it is expected that the conflict will bring about a sharp rise in attacks by both state actors and criminals who will capitalise on the conflict in much the same way as they capitalised on the Covid Crisis.          Here are some of the key points from the event: In terms of Ransomware Ireland is ranked 20 in the world for machine count encounters but when you look at it per capita, per machine, Ireland is ranked number 1. 85% of... --- ### 2021 Threat Intelligence Shows Attacks Rising Across the Board - Published: 2022-02-21 - Modified: 2022-12-05 - URL: https://it.ie/2021-threat-intelligence-shows-attacks-rising-across-the-board/ - Categories: Security - Tags: SonicWall, Threat Report While the world continued to grapple with the challenges of 2020 — such as the ongoing COVID-19 pandemic and the shift to remote work — cybercriminals were building on what they learned that year to become more adaptable and formidable in 2021. While the world continued to grapple with the challenges of 2020 — such as the ongoing COVID-19 pandemic and the shift to remote work — cybercriminals were building on what they learned that year to become more adaptable and formidable in 2021. But as cybercriminals followed the moves of an ever-changing world, SonicWall Capture Labs threat researchers followed the movement of cybercriminals, recording where they attacked, who they targeted and what sorts of new techniques they developed. By compiling these findings into the 2022 SonicWall Cyber Threat Report, we’re offering organizations the actionable threat intelligence they need to combat the rising tide of cybercrime. Here are a few of the key findings from the report:RansomwareIn 2021, SonicWall Capture Labs Threat Researchers recorded 623. 2 million ransomware attempts globally, an increase of 105% year over year. This increase was fueled by large volumes of Ryuk, SamSam and Cerber attacks, which together made up 62% of the total ransomware volume. While the growth in ransomware was unusually aggressive, so were many of the techniques ransomware gangs used to separate legitimate organizations from their money. Double extortion continued to grow in 2021, and terrifying new triple extortion techniques began taking hold as well.  Supply-chain attacks and attacks on vital infrastructure also increased, putting pressure on lawmaking bodies around the world to unify against ransomware’s growing threats.   MalwareAs attacks of nearly every type have grown over the past couple of years, we’ve been able to count on one silver lining: “Well, at least malware volume is down. ” A... --- ### Microsoft New Commerce Experience Explained - Published: 2022-02-16 - Modified: 2022-12-05 - URL: https://it.ie/microsoft-new-commerce-experience-explained/ - Categories: Microsoft - Tags: Microsoft, New Commerce Experience. NCE Today we are sharing some important information about the new Cloud Solution Provider (CSP) subscription purchasing platform called the New Commerce Experience (NCE).   What is the New Commerce Experience (NCE) Microsoft’s Cloud Solution Provider (CSP) Program is ever-changing and adapting to meet the current business needs of organisations of all sizes. Microsoft's latest evolution of the CSP program is called the New Commerce Experience (NCE). NCE will change how you purchase Microsoft online services such as Microsoft 365, Dynamics 365, Power Platform and Windows 365. It aims to reduce complexity and provide cost savings for longer-term commitments.   What does this mean for you? With this new platform, Microsoft will be adding some new rules for how users can add and remove licences to a subscription. This updated process goes into effect on March 1, 2022, and the details you need to know are outlined below:  There will now be 2 subscription commitment terms: Monthly and Annual.   Users who opt for the convenience of a monthly subscription will incur a 20%  surcharge from the annual subscription price. This applies to all Microsoft CSP licensing, including BC and Microsoft 365.   Users will still be able to add licences during the term of a subscription but will no longer be able to reduce the number of licences during the term of a subscription.   Full payment for the cost of the licences for the term of the subscription will be required in advance and is non-refundable.   Subscription Terms Subscription terms can be 1-month or... --- ### Beware of Email and SMS Compromise Scams - Published: 2022-01-25 - Modified: 2022-02-21 - URL: https://it.ie/beware-of-email-and-sms-compromise-scams/ - Categories: Cyber Awareness Training, Scams, Security - Tags: Email Scams, Online Fraud, phishing This week sees the gradual return to the office with the easing of restrictions and while many companies will adopt fully remote or hybrid working, many more look forward to having their teams back in the office. Cybercriminals tend to take advantage of any situational changes and we are already seeing an uplift in scams. Share on facebook Share on twitter Share on linkedin This week sees the gradual return to the office with the easing of restrictions and while many companies will adopt fully remote or hybrid working, many more look forward to having their teams back in the office. Cybercriminals tend to take advantage of any situational changes and we are already seeing an uplift in scams. As we become more cyber-aware the cyber-criminals are becoming more innovative and one area that is of particular concern is the reported incidents of criminals infiltrating legitimate email addresses, email threads and mobile SMS messages? The latter I witnessed only last week when my wife received a text message purporting to be from her bank to warn her that they had noted suspicious activity in her account. The message was in a thread of legitimate messages she’d received over time from her bank but thankfully she had the security awareness to pause and not immediately take the action demanded in the message. In this case, the poor grammar and use of American English by the Irish bank threw up a red flag, but it would have been very easy to have been caught out by this. Salary Mandate Fraud A similar type of fraud whereby scammers infiltrate a legitimate email address or thread has been around for a couple of years but appears to be on the rise. Often referred to as Salary Mandate Fraud, this type of fraud targets individuals in your companies HR, payroll... --- ### Managed IT Services – The Essential Business Utility - Published: 2022-01-24 - Modified: 2022-11-17 - URL: https://it.ie/managed-it-services-the-essential-business-utility/ - Categories: IT Support - Tags: IT as a Utility, IT Support, Managed IT Services, MSP, Utility Computing Most modern providers of IT Services deliver their solutions in what is commonly referred to as Managed IT Services. While many of us simply refer to it as IT Support it's like saying your mobile device is just a phone. Making calls is just one of many functions your mobile device can do and the same can be said for modern IT Services. IT Support is a very important element of Managed IT Services but only one of the many functions carried out by your IT service provider. Share on facebook Share on twitter Share on linkedin Most modern providers of IT Services deliver their solutions in what is commonly referred to as Managed IT Services. While many of us simply refer to it as IT Support, it's like saying your mobile device is just a phone. Making calls is just one of many functions your mobile device can do and the same can be said for modern IT Services. IT Support is a very important element of Managed IT Services but only one of the many functions carried out by your IT service provider. Your Managed IT Services provider is now responsible for your physical devices in the office and in the home office, the security for these devices and the digital and cloud applications utilised on these devices. They ensure you have instant access to valuable data and insights and let you collaborate effectively from anywhere in the world. IT is now at a point where it’s not simply a tool anymore but more an essential utility that is delivered and supported by your IT service provider.      Utility computing is a concept established by John McCarthy in the 1960s when he predicted that computation may someday be organised as a public utility. There are several utilities that a business requires to function: electricity, water and gas are some of the obvious ones that come to mind. When you think of a utility you think of a service you simply can’t live without and that is fundamental... --- ### The 12 Scams of Christmas - Published: 2021-12-15 - Modified: 2023-11-15 - URL: https://it.ie/the-12-scams-of-christmas/ - Categories: Scams, Security - Tags: Christmas, Cyber security, Data protection, Fraud, Scams It may be the season of goodwill and a time for giving but this Christmas we are asking you to be a bit of a Scrooge and don’t gift your finances or data to potential scammers. Here are some of the most common scams you are likely to experience across email, text message and phone calls. Tis the season to be jolly, but not if you fall victim to a scammer! This Christmas we are asking you to be a bit of a Scrooge and don’t gift your financial information or personal data to criminals. Here are some of the most common scams you are likely to experience across email, text messages and phone calls.   1. The Look-alike Website Scam Many scammers create look-alike sites that can mirror the real ones. Double-check the website address before entering any financial or personal information. If the lock symbol isn’t shown beside the URL representing HTTPS, immediately navigate away from the page. HTTPS doesn’t guarantee that a website is legitimate but it’s a red flag if the symbol isn’t present. Watch out for URLs that use the names of well-known brands along with extra words. Also, be aware that many of these sites contain misspelt words and poor grammar.    2. The Compromised Account Scams You may receive an email, text or even a call claiming that your Amazon, PayPal, Netflix or bank account has been compromised. Never just take any notification that makes such an alarming claim at face value. If you are concerned and feel the notification may be authentic, then contact your provider directly and do not respond to the mail or text. Never click on any links or share personal or financial information.   3. The IT Support Scam This Scam has been doing the rounds for many years and can be in the form of a phone call or email stating there is something wrong... --- ### Most Popular Google Searches in Ireland for 2021 - Published: 2021-12-09 - Modified: 2022-12-05 - URL: https://it.ie/most-popular-google-searches-in-ireland-for-2021/ - Categories: Google - Tags: Google Searches, Google Trends As 2021 draws to a close in a year that was once again overshadowed by the ongoing pandemic, we look back on the most popular Google searches in Ireland over the last year in comparison to 2020. Coronavirus is still in the top 5 of overall searches but has fallen to 3rd place from 2nd in 2021 and this year sports-related queries take up 3 of the top 5 spots. Here are the top Google search queries in Ireland for 2021 compared to 2020. As 2021 draws to a close in a year that was once again overshadowed by the ongoing pandemic, we look back on the most popular Google searches in Ireland over the last year in comparison to 2020. Coronavirus is still in the top five of overall searches but has fallen to third place from second in 2020 and this year sports-related queries take up three of the top five spots. Here are the top Google search queries in Ireland for 2021 compared to 2020.      Overall Queries While Ireland didn’t qualify for the tournament it still brought a welcome relief from watching empty sports stadiums for much of the year and so the delayed 2020 European Championships was the most popular overall search in Ireland. Coronavirus did feature and was the third most popular search, however, down from second last year and with schools closed in the early part of the year the Seesaw online learning and tuition app generated a lot of search traffic. The top five overall search queries are: 2020 US electionCoronavirusCaroline FlackPremier LeagueCNN 2021 European ChampionshipPremier League Coronavirus SeesawChristian Eriksen ‘How to’ Queries How did we ever get things done before Google was there to tell us how to do it? “How to” queries generate a lot of search traffic and this year, as was the case in 2020, Covid related queries dominate this category, however, thankfully we are no longer asking “How to make a Face mask”, which was top in 2020 or more worryingly “How to... --- ### What's New in Microsoft Teams November 2021 Update - Published: 2021-12-08 - Modified: 2022-12-05 - URL: https://it.ie/whats-new-in-microsoft-teams-november-2021-update/ - Categories: Microsoft - Tags: Microsoft, Microsoft Teams Each month Microsoft give us an update on all the latest features added to Microsoft Teams. This post published at the end of November showcases a number of excellent new features that are sure to please Teams fans and users across the globe. Each month Microsoft give us an update on all the latest features added to Microsoft Teams. This post published at the end of November by Microsoft highlights several new features that are sure to please Teams fans and users across the globe.   Meetings Integrated Communication Access Realtime Translation ART captioning in meetings You can now view captions coming from a CART (Communication Access Realtime Translation) provider within the Microsoft Teams meeting window instead of a secondary window. Follow along with what is being said without having to choose between the captions and presentation. Meeting organizers and participants can enable CART captions from their meeting options.   Content from camera Content from camera in Teams enables intelligent capture which allows you to share content from physical whiteboards and documents in a high-quality way during meetings. You can use the camera in your laptop, a secondary USB webcam, or a document camera. Just like the experience available in Microsoft Teams Rooms, the intelligent content capture technology will detect, crop, and frame the asset while enhancing the content in the video stream. People standing in front of the asset can be made transparent so everyone can see content clearly.   Word cloud for polls in Teams When users collect responses for an open text poll in a Teams meeting, word cloud data insights will be available to give them a quick view on the top text phrases people answered. Calling Custom Music on Hold Tenant administrators can configure the audio being played... --- ### Take the Free Remote Working Security Course and Quiz - Published: 2021-11-29 - Modified: 2022-12-05 - URL: https://it.ie/take-the-free-remote-working-security-course-and-quiz/ - Categories: Cyber Awareness Training - Tags: Quiz, Remote Working, Remote Working Security Course, Work from Home Security Remote work is whenever you’re traveling far from the office... right? Whenever you work from outside the office it will normally be considered remote work. From an information security standpoint, however, what also matters is whether you are connected to the company network or not. So, if you're enjoying the sun on a bench outside the office, or perhaps in a coffeeshop downstairs, you may still be able to connect to the company network. The two things to consider are:Am I connected to the company network? Am I physically outside the workplace? You may also be in a situation where you are physically inside the office but are not connected to the company network. In this situation, you could be considered to be working remotely.     Why does remote work pose a security risk? So, you’ve got your remote working setup all ready to go. Can’t you just get started right away? When you’re working remotely, your devices, data and network activity won’t be protected physically by the workplace or by the security of the company’s internal network. Without the proper precautions, remote work can lead to unauthorised access to:Company devices. While theft of a device will obviously cause a monetary loss, a criminal accessing company data or the company network through the device could lead to far more serious financial and reputational damage. Company data. A breach of sensitive or confidential data could prove highly damaging to your organisation. Protecting customer data is also essential to maintain the trust... --- ### IT.ie signs the Microsoft Partner Pledge - Published: 2021-11-16 - Modified: 2023-10-26 - URL: https://it.ie/it-ie-signs-the-microsoft-partner-pledge/ - Categories: Corporate Social Responsibility, Microsoft - Tags: Diversity, Ethical, Microsoft, Microsoft Partner Pledge, Sustainability As a Microsoft Gold Partner, IT.ie shares Microsoft’s technology vision and commitment, understanding the pivotal role technology can play in addressing broader societal challenges. To drive this Microsoft have launched the Microsoft Partner Pledge which focuses on the following four critical goals: As a Microsoft Gold Partner, IT. ie shares Microsoft’s technology vision and commitment, understanding the pivotal role technology can play in addressing broader societal challenges. To drive this Microsoft have launched the Microsoft Partner Pledge which focuses on the following four critical goals: Digital Skills Helping Ireland to prepare for the challenges of the Fourth Industrial Revolution through Microsoft's Digital Skills program. We will act as ambassadors of Microsoft Irelands Digital Skills initiatives and support the development of digital skills via work experience opportunities and internships. We will also be providing opportunities for staff to undertake new digital skills training.    Diversity We will focus on inclusive recruitment and promotion processes and practices, striving for a strong representation across all levels. We are an innovative, customer first provider of Managed IT Services and our key competitive advantage is our people. Responsible and Ethical AI Ensuring Artificial Intelligence is developed and implemented in responsible and ethical ways, as we set out in AI for good and Future Computed Sustainability We are committed to sustainability and reducing your carbon footprint. In 2020 we began the process of decarbonisation. We first set a goal of replacing our existing diesel fleet with electric vehicles by 2025. We are delighted to say that we are ahead of this goal and today 60% of our fleet is fully electric. We are currently in negotiations with sustainable power providers and expect to have solar panels installed on the roof of our premises in the first quarter of... --- ### Cyber Security Month 2021 – Top Cyber Tips - Published: 2021-10-11 - Modified: 2022-12-05 - URL: https://it.ie/cyber-security-month-2021-top-cyber-tips/ - Categories: Cyber Awareness Training, Data Protection, Security - Tags: Cyber Awareness Training, Cyber Security Month, Data protection, phishing As cyber-attacks and their consequences grow, the imperative for cybersecurity awareness has become increasingly evident to businesses, schools, and individuals. Attackers use a variety of vulnerabilities and phishing attacks to compromise the security of your networks and devices. To approach this threat effectively and protect your networks, it is vital to become familiar with the cyber essentials of your business and personal accounts, such as email, social media, and more so that you can better secure your information and identity online! October is Cyber Security Month #CyberSecMonth and here are some simple tips to help keep you safe online. Share on linkedin Share on twitter Share on whatsapp Share on facebook Share on email How do you approach Cybersecurity? As cyber-attacks and their consequences grow, the imperative for cybersecurity awareness has become increasingly evident to businesses, schools, and individuals. Attackers use a variety of vulnerabilities and phishing attacks to compromise the security of your networks and devices. To approach this threat effectively and protect your networks, it is vital to become familiar with the cyber essentials of your business and personal accounts, such as email, social media, and more so that you can better secure your information and identity online! October is Cyber Security Month #CyberSecMonth and here are some simple tips to help keep you safe online. Cyber Security Month 2021 – Cyber Tips from IT. ie  Be aware of risk. Be aware of possible risks, such as malware viruses, ransomware, and phishing. It’s also important for everyone in your organisation to be aware of the possible risk and threats that could occur should your systems become affected by any of these threats. To help you to evaluate your employee or human risk we are currently offering businesses a Free Human Risk assessment, whereby we scan your employee email addresses for dark web breaches and run a simulated phishing campaign on your behalf. This allows us to then provide you with a Free Human Risk Report. To get a better idea of what’s involved please view this Sample Risk Report.  Train your employees. Employees and emails are the... --- ### The Benefits of Cyber Security Awareness Training - Published: 2021-07-27 - Modified: 2025-01-07 - URL: https://it.ie/the-benefits-of-cyber-security-awareness-training/ - Categories: Cyber Awareness Training - Tags: Cyber Awareness Training, Cyber Security Awareness Training Cyber Security Awareness Training is one of the best ways to help protect your business from malicious actors and prevent possible breaches. A compromise of valuable data resulting from a cyber-attack is possibly the greatest threat to your business, right now. Here are 6 benefits of Cyber Security Awareness Training and why your organisation should implement it, right now. Cyber Security Awareness Training is one of the best ways to help protect your business from malicious actors and prevent possible breaches. A compromise of valuable data resulting from a cyber-attack is possibly the greatest threat to your business, right now. There are a plethora of tools available to help protect your systems and mitigate risk and your business likely employs several of them. Many of these tools are excellent and vital to your cyber defences, however, none of them will protect you 100%. It’s much like the old Domestos advertisement that claimed it “kills 99% of all known germs”. You see the 99% and think, that’s really good but what they are also telling you is that they can’t kill all germs. Cybersecurity tools are much the same. What many of these tools don’t account for is the human factor. People are creatures of habit and cybercriminals are counting on our bad habits to launch a successful attack. You might think that this would make your employees the weakest link when in fact it’s quite the opposite. If you provide them with the right tools to heighten their cyber awareness, they quickly become your best defence.  Here are 6 benefits of Cyber Security Awareness Training and why your organisation should implement it, right now.   Helps Prevent Breaches and AttacksThe first and perhaps most important benefit of Cyber security Awareness Training is that it can help prevent cyber-attacks from being successful. Although some cybercriminals adopt sophisticated techniques, most attacks are actually fairly... --- ### Cyber Attack - The Human Trigger - Published: 2021-07-13 - Modified: 2025-01-07 - URL: https://it.ie/cyber-attack-the-human-trigger/ - Categories: Cyber Awareness Training, Ransomware, Security - Tags: Cyber Awareness Training, Cyber security, phishing, Ransomware Did you know that human error was a contributing factor in 95% of breaches? Since human error plays such a vast role in cyber breaches, addressing it is key to reducing the chances of your business being successfully targeted. It also allows you to protect your business from a far wider range of threats than any single technical solution could and can potentially empower your workforce to actively look out for and report new threats they may encounter. Mitigation of human error must be key to business cybersecurity in 2021. Across the globe wave after wave of ransomware attacks are targeting private companies, health services and state institutions. News headlines often describe the attacks as “sophisticated” and while, the malware deployed is indeed sophisticated, so too is practically everything that runs on your IT systems. For the average user and the business owners who are victims of cybercrime, this is not relevant and all you need to understand is that the delivery of the malware and what triggers it is very simple. Most attacks occur because of an action on the part of the human user. When you click on a link, you are taking an action and that action makes you the “human trigger”.     In the military when recruits are first introduced to firearms they are told by instructors, time and time again that firearms are not dangerous until you put your finger on the trigger. Soldiers are trained to keep their finger off the trigger and outside the trigger guard until they are ready to discharge a round. This is drilled into soldiers the world over and for good reason. When you apply pressure to the trigger an action will take place where you will have a desired or even expected outcome, but the outcome is also largely unknown. The soldier’s level of skill and training will impact the unknown factor. The round might not hit the target, it may hit a totally unintended target with dire consequences. Soldiers train to mitigate the risk but can never... --- ### Cyber Awareness Training - Sowing the seeds of mistrust - Published: 2021-06-27 - Modified: 2025-01-07 - URL: https://it.ie/cyber-awareness-training-sowing-the-seeds-of-mistrust/ - Categories: Cyber Awareness Training - Tags: Cyber Awareness Training, Cyber security Most employees have sat in on manual handling courses, first-aid training, safe pass, health & safety meetings but few have ever participated in cyber training. If the inbox is the biggest threat to the business, then the casual nature of how it is used by staff must change Every country will have their ‘HSE moment’ where the general population are in a state of shock at the sheer devastation caused by a ransomware attack.   The Irish health system is still reeling from the aftereffects of theirs and if rumours are true, the decryption tool was only provided because it brought both heat and bad PR to the criminal organisation behind it. It is believed that this entire event was brought about by an employee clicking on a link sent to them in an email. So how does an organisation such as the HSE prevent this from re-occurring? Yes, they will be updating, replacing & upgrading IT systems such as servers, workstations, kiosks, switches, firewalls and so on. The projects will be of huge scale and the already weary, hard-working IT teams will have a long road ahead of them. But the obvious question that will be asked to and within IT will be “How do we prevent staff from opening a similar email again? ” You can argue why the email got through in the first place, but no email security solution is infallible. No employee is either for that matter and that is why their help is so important. The next step in the process is to introduce a permanent and sustained campaign of cybersecurity and awareness training. Most employees have sat in on manual handling courses, first-aid training, safe pass, health & safety meetings but few have ever participated in cyber training.   If the... --- ### What is 2 Factor Authentication and What are the Benefits? - Published: 2021-05-19 - Modified: 2023-04-20 - URL: https://it.ie/what-is-2-factor-authentication-and-what-are-the-benefits/ - Categories: Data Protection, Security - Tags: 2 Factor Autentication, 2FA, Cyber security, Data Security 2 Factor Authentication or 2FA is a security measure that requires you to provide two separate pieces of information before you are granted access to an online service. In the past, it has been far too easy for hackers to obtain credentials and access your online services. By implementing 2FA you are telling the online service that you are in fact, who you claim to be. What is Multi Factor Authentication (MFA)? 2 Factor Authentication or 2FA is a security measure that requires you to provide two separate pieces of information before you are granted access to an online service. In the past, it has been far too easy for hackers to obtain credentials and access your online accounts. By implementing 2FA you are telling the online service that you are in fact, who you claim to be. The most common method of authentication to date has been single factor authentication whereby you provide a username and password to access the service. With 2FA security is greatly enhanced as you must now provide a second form of authentication to access the service. Many services that offer or require 2FA make use of mobile devices as a means of secondary authentication. Common methods include an authenticator app, text messaging service or biometrics. With the authenticator app you set up your service and once you login into your account you will be prompted to enter a one-time code that will expire within a set time limit. Similarly, with text message authentication, the online service will send you a message with a one-time code that you must enter to access the service. Biometrics such as the fingerprint reader on your mobile device is another secure and speedy method of providing 2FA authentication. What are the benefits of Multi Factor Authentication? Reduce Fraud & Identity Theft It is very likely that at least one of your online accounts has been... --- ### 8 Benefits of Microsoft 365 to your Business - Published: 2021-05-03 - Modified: 2022-12-05 - URL: https://it.ie/8-benefits-of-microsoft-365-to-your-business/ - Categories: Office 365 - Tags: Microsodt, Microsoft 365, Office 365 Microsoft 365 for business, previously known as Office 365 is so much more than just Microsoft Office in the cloud. It is an entire ecosystem of tools and applications that fuel business growth. Here are some of the key benefits of Microsoft 365 for Business. Share on facebook Share on twitter Share on linkedin Efficiency, Collaboration, and Communication are at the core of an effective organisation. With a plethora of tools available to businesses today, it can be both time-consuming and frustrating trying to find the right tools for your organisation. While some on-premise applications still have their place, they were very much designed for a static business environment. Some organisations have completed their digital transformation while most others are at some waypoint along their journey. As your business transforms, the most important step you take will be the adoption of cloud technologies.            Microsoft 365 for business, previously known as Office 365 is so much more than just Microsoft Office in the cloud. It is an entire ecosystem of tools and applications that fuel business growth. Here are some of the key benefits of Microsoft 365 for Business. 1. Access – Anytime/Anywhere Microsoft 365 for Business allows your organisation to store all your files securely in the cloud. What this means for you is that you can access files and work with them using the Microsoft 365 apps, anytime and anywhere from an array of digital devices. This is especially important for the many organisations that have mobile or remote working teams. 2. Scalability As I’ve already mentioned, Microsoft 365 for Business is an entire ecosystem of tools and apps that are designed to fuel business growth. As your business grows you can add new apps and create your own custom... --- ### Ransomware - Do You Trust Your Inbox? - Published: 2021-04-10 - Modified: 2022-12-05 - URL: https://it.ie/ransomware-do-you-trust-your-inbox/ - Categories: Ransomware - Tags: Cyber security, Data protection, Ransomware Email is the No.1 threat vector and most cyber-attacks including ransomware occur because of an action carried out by the recipient of an email. So, do you trust your inbox? The following tips are designed to help you investigate an email and avoid falling victim to a ransomware or other cyber-attack. Share on facebook Share on twitter Share on linkedin Just this morning (14/05/2021) it was revealed that the Irish Health Service Executive (HSE) has been forced to take their IT Systems offline in response to an ongoing ransomware attack. This post was originally published in April in response to similar attacks on educational institutions in Ireland, however, the steps we recommend here can and should be implemented by all users of IT systems across every sector.    While most of the world is working together to fight the ongoing global pandemic, cybercriminals see this as an opportunity, and we are seeing more and more attacks on the services and institutions vital in this fight. Every business and every private user is a potential target of cybercrime but more and more we are seeing large scale attacks that disrupt healthcare, education, and government services. Email is the No. 1 threat vector and most cyber-attacks including ransomware occur because of an action carried out by the recipient of an email. So, do you trust your inbox? The following tips are designed to help you investigate an email and avoid falling victim to a ransomware or other cyber-attack.  Suspicious SenderCybercriminals use various spoofing techniques to trick users into believing an email is legitimate. Check the domain closely for close ‘cousin’ domains. Be cautious when reading email on your mobile device, as only the display name may be visible even if the email is bogus. Subject Line & ToneEnticing, urgent, or threatening language is commonly... --- ### Announcing ISO 27001 Certification - Published: 2021-04-02 - Modified: 2022-12-05 - URL: https://it.ie/announcing-iso-27001-certification/ - Categories: Data Management, Data Protection IT.ie are delighted to announce that we have been awarded ISO 27001 standard certification for the provision of Managed IT Services from the NSAI. IT. ie are delighted to announce that we have been awarded ISO 27001 standard certification for the provision of Managed IT Services from the NSAI. ISO 27001 is one of the most widely recognised and internationally accepted information security standards. It’s one of the few standards that uses a top-down, risk-based approach to evaluation. It identifies requirements and specifications for a comprehensive Information Security Management System (ISMS), defining how an organisation should manage and treat information more securely, including applicable security controls. In order to achieve this certification, IT. ie’s (PCtechnix Ltd) compliance was validated by an independent auditor. We are happy to report that, after demonstrating an ongoing and systematic approach to managing and protecting company and customer data, the review was completed with the awarding of ISO certification. This certification is additional proof of our commitment to information security. It plays an important role in assuring our customers that IT. ie takes all necessary steps to keep their data safe, secure, and accessible. Our company-wide approach to data protection ensures the highest standard of security for our customers, and we are honoured to be leading the Customer Engagement space in compliance, setting an example for partners and competitors alike. “I am delighted that we have been awarded ISO 27001. This was only possible because of the hard work of the team here at IT. ie. The entire process has allowed us to take a much more strategic look at how we manage every aspect of the business. The certification forms... --- ### 7 Benefits of Email Signature Management - Published: 2021-03-11 - Modified: 2023-12-18 - URL: https://it.ie/7-benefits-of-email-signature-management/ - Categories: Productivity - Tags: Email Signature Management, Managed Email Signatures Emails play a big part in how you run your business with hundreds, if not thousands of emails sent every day by your team. Your email signature is a business card right there at the bottom of every email you send but unlike a business card it gets seen by more people and can do a whole lot more. Emails play a big part in how you run your business with hundreds, if not thousands of emails sent every day by your team. Your email signature is a business card right there at the bottom of every email you send but unlike a business card it gets seen by more people and can do a whole lot more. Have you ever admired the email signature of one of your suppliers or customers and wondered how they get it to look so smart? Chances are that they’ve engaged the services of an email signature management provider. A managed email signature helps to shape your corporate identity, represent your company and promote your events and websites without any active campaigning. They are dynamic and can be set up to be unique for each person or each department. They are also a great tool for your marketing team who can use email signatures to promote social media accounts, sign-ups or active campaigns. Your web portal analytics gives you excellent insights into the signature engagement. At IT. ie we use xink email signature management solutions and while I’m sure most providers have similar functionality and services, the benefits listed below are based on our experience with this service. Here are the Top 7 Benefits of Email Signature Management: 1. A consistent style of company email signature It can be difficult to maintain consistency in your emails and promotions and it can be a challenge to ensure that information is up-to-date or necessary disclaimers are in place... --- ### What's New in Microsoft Teams for 2021 - Part 2 - Published: 2021-03-07 - Modified: 2022-12-05 - URL: https://it.ie/whats-new-in-microsoft-teams-for-2021-part-2/ - Categories: Microsoft - Tags: Ignite 2021, Microsoft, Microsoft Teams Last week Microsoft held their spring Ignite event announcing a host of new features and updates for Microsoft Teams. In Part 1 we looked at the new features and updates for the Meeting and Webinar functions. In this post, we will look at the rest of the features and updates announced for Teams including; Chat and Collaboration, Security, Customisation, Calling and Teams Management. Last week Microsoft held their spring Ignite event announcing a host of new features and updates for Microsoft Teams. In Part 1 we looked at the new features and updates for the Meeting and Webinar functions. In this post, we will look at the rest of the features and updates announced for Teams including; Chat and Collaboration, Security, Customisation, Calling and Teams Management.   Chat and Collaboration Microsoft Teams Connect Teams Connect makes it easy to share channels with anyone, internal or external to your organisation. The shared channel will appear within an individual’s primary Teams tenant alongside other teams and channels, making it easy for everyone to access it in their workflow. In the shared workspace, you can leverage Teams rich collaboration capabilities: chat, meet, call, share and co-author documents in real-time. Admins have access to granular controls, allowing their organisation to stay in control of how external users access data and information. Teams Connect is available today in private preview and will roll out broadly later this calendar year. . Teams and Dynamics 365 business process experience Stay in the flow of work with new Dynamics 365 Sales, Marketing, Customer Service, Field Service, and Teams connected experiences. Take advantage of Teams capabilities like chatting, sharing documents, and managing meeting and webinar invites without leaving the Dynamics 365 workspace. You can also securely access, update, and share Dynamics 365 records from within Microsoft Teams. These features will be rolling out in April. Task publishing checklist and editing capabilities Task... --- ### What's New in Microsoft Teams for 2021 - Part 1 - Published: 2021-03-05 - Modified: 2022-12-05 - URL: https://it.ie/whats-new-in-microsoft-teams-for-2021-part-1/ - Categories: Microsoft - Tags: Ignite 2021, Microsoft, Microsoft Teams At various times throughout the year, big tech companies host events where they announce new products or exciting updates, and Microsoft is no different. The Microsoft Ignite event is the hot ticket event for both Microsoft partners and enthusiasts. At this, year’s Ignite hosted between 02-04 of March Microsoft announced a host of updates for Microsoft Teams. So much was announced that I’m going to put it into two separate posts. At various times throughout the year, big tech companies host events where they announce new products or exciting updates, and Microsoft is no different. The Microsoft Ignite event is the hot ticket event for both Microsoft partners and enthusiasts. At this, year's Ignite hosted between 02-04 of March Microsoft announced a host of updates for Microsoft Teams. So much was announced that I'm going to put it into two separate posts. I can't claim credit for this and will be posting this almost verbatim to the Microsoft Post.        Meetings Dynamic view Dynamic view intelligently arranges the elements of your meeting for an optimal viewing experience. As people join, turn on video, start to speak, or begin to present in a meeting, Teams auto-adjusts and personalises your layout. Dynamic view is rolling out soon.    View Switcher The new view switcher in the top bar of your Teams meeting allows you to control how you see the meeting content. You may prefer to interact naturally with your colleagues and without visual distractions using Together mode. With Gallery at top, all video feeds display at to the top of your meeting window, making it easier to have a more natural eye gaze with others.  Focus hides all video feeds and puts the attention fully on the shared content and Fullscreen can help remove other desktop distractions. View switcher will be available soon. Presenter Mode Use Presenter mode to step up the production level of your presentations and customize how your video feed and content appear to... --- ### 3.2 Billion Email Credentials Leaked Online - How Do You Protect Your Credentials? - Published: 2021-02-16 - Modified: 2022-12-05 - URL: https://it.ie/3-2-billion-emails-and-passwords-leaked-online-how-do-you-protect-your-credentials/ - Categories: Cyber Security, Data Protection, Security - Tags: Data Breach, Email Security, Hacking Earlier this month it was revealed that hackers now have access to over 3 billion emails and passwords. This is being called the largest data breach of all time and actually consists of a combination of smaller data breaches that have occurred over the past several years. Named the Compilation of All Breaches, or COMB and odds are that your email and password are included. To test this I checked both my private Gmail account and my business IT. ie account using the free tool,  Have I Been Pawned. What I found was that my private Gmail address had been compromised in several breaches, however, luckily my business Outlook account has not been compromised. Pawned is a great tool and lists any data breach where your credentials were compromised. In this post, I will look at some of the ways you can mitigate against a data breach of your credentials.         Use the Underpants Rule The underpants rule is straightforward and involves only 3 easy to follow steps that are good practice for both password protection and underwear, in general. So, treat your passwords like your underpants.        Change them often – Set a policy in place whereby passwords must be changed every 30, 60 or 90 days. By doing this you are not preventing a compromise but given that most people won’t know for months or even years that their credentials have been compromised, it narrows the window whereby the compromise could be of harm to you or your... --- ### How to split screen in Windows 10 - Published: 2021-02-13 - Modified: 2022-12-05 - URL: https://it.ie/how-to-split-screen-in-windows-10/ - Categories: Microsoft, Windows 10, Windows Tips - Tags: Microsoft, Windows 10 Dual screens are becoming the norm in the office and now for many of us also in the home office. They offer you more screen real estate and allows you to view and interact with several windows without having to minimise one window to view another. For many more, however, a dual environment isn’t an option, be it lack of space or for reasons of budget. The good news is that you can still get much of the multi-tasking benefits of dual-screen from a single screen using Windows 10, window-snapping. In this guide, I will walk you through all the ways to split your screen in Windows 10. Split Screen into two or four windows Splitting your screen in half is very simple in Windows 10. All you have to do is to drag an open window to the left or right side of the screen. This will automatically ‘snap’ that window to take up exactly half of the screen. . Any other windows you have open at the time will appear as smaller thumbnails on the other half of the screen, at which point you can click the one you want to fill that half.   Alternatively, you can just get on with what you were doing in the snapped window and the remaining windows will return to where they were before you started snapping. With the two windows snapped to the left and right half of the screen, you can adjust the amount each window takes up by... --- ### Remote Working: Are you doing it right? - Published: 2021-01-17 - Modified: 2022-12-05 - URL: https://it.ie/remote-working-are-you-doing-it-right/ - Categories: Remote Working - Tags: Remote Working, Work from Home Remote Working: Are you doing it right Eamon Gallagher MD IT. ie Share on facebook Share on twitter Share on linkedin March 2020 was a sucker punch for business and the lockdowns that followed have felt like a daily regime of 10 gruelling rounds in the ring. Some had trained and prepared for the first blow, others have adapted quite well and there are those who are still struggling to understand what hit them. My advice to anyone running a business is to never assume that just because your employees are all working remotely that you are all set. The days before and after lockdowns should be when you’re training hard and not during lockdowns themselves. I’ve been remote working for as long as I can remember. Since 2015, I have spent every summer (July & August), mid-terms, extended breaks, etc working remotely from Slovakia. I like to think I can offer plenty of good advice in this area but that’s not the subject matter at hand. I will, however, throw in my ‘5 Top Tips’ at the end of this article. Remote Working: Striking the balance between ‘Needs’ versus ‘Wants’. Whenever I’m discussing remote working with customers, I try to focus on the areas they have likely overlooked or the parts of the solution they’ve offered staff that go some of the way but not all. There are many parts to achieving the best results from your remote working staff. I have used a few examples below to highlight... --- ### Remote Working: A perk of the job or the future of work? - Published: 2021-01-12 - Modified: 2022-12-05 - URL: https://it.ie/remote-working-a-perk-of-the-job-or-the-future-of-work/ - Categories: Remote Working - Tags: Remote Working, Work from Home The workplace saw a dramatic shift in 2020, owing to the Covid-19 pandemic and what was a perk only 12 months ago, became the norm in 2020. Back at the beginning of March 7th, 2020, I wrote that “there is a very real possibility that remote working may well become the business continuity tool of necessity for many businesses” and that undoubtedly rang true. But now as we look to the future of remote working; will it once again be resigned to a perk of the job? Remote Working: A perk of the job or the future of work? The workplace saw a dramatic shift in 2020, owing to the Covid-19 pandemic and what was a perk only 12 months ago, became the norm in 2020. Back at the beginning of March 2020, I wrote that “there is a very real possibility that remote working may well become the business continuity tool of necessity for many businesses” and that has undoubtedly rung true. But now as we look to the future of remote working; will it once again be resigned to a perk of the job? Without question, remote working is here to stay and while the pandemic accelerated the digital transformation for many businesses, they have now opened their eyes to the future of work practices. Back in 2019, before Covid-19 was on our radar, it was predicted that by 2025, 70% of the workforce would be working remotely, at least 5 days a month.  A Gartner CFO survey revealed that over two thirds (74%) have plans to permanently shift employees to remote working after the Covid-19 crisis ends. Remote working has benefits to both the employees and employers. Motivated workers enjoy the autonomy of remote work, however, less motivated workers may struggle and need closer supervision. For employees, long commutes are a thing of the past and your employment isn’t dictated by geography. As an employer, you now have a larger pool of talent to choose from and the overheads borne from a physical office space can... --- ### Ireland's Most Popular Google Searches of 2020 - Published: 2020-12-09 - Modified: 2022-12-05 - URL: https://it.ie/irelands-most-popular-google-searches-of-2020/ - Categories: Google - Tags: Google search, Google Trends As 2020 draws to a close in a year that most would rather forget but will likely remember for a very long time, we look back on the most popular Google searches in Ireland for 2020. The main themes of this year’s searches are not surprisingly, Coronavirus and the US elections, however, I was surprised to find that that the US elections recorded more searches that coronavirus and that the Irish General Elections didn’t even make it into the top 10. With barbers and salons closed for long periods throughout the year, the home haircut became the norm and so “how to cut men’s hair” made the top 5 while “how to cut your own hair” was a little further down the list in 7th place. Here are the top Google search queries in Ireland for 2020.    Top 5 overall search queries 2020 US election (We had one here too, you know? ) Coronavirus Caroline Flack Premier League (It was finally Liverpool's year) CNN Top 5 “How to” search queries How to make a face mask? How to make hand sanitiser? (Please don’t ever try this) How to register to vote? How to cut men's hair? (Some very mixed results) How to make scones? The top 5 people searches Joe Biden Boris Johnson Kim Jong Un (The Rocketman was popular) Phillip Schofield Donald Trump Top television shows search queries Normal People (Everybody was talking about it) Love Island The Queen's Gambit The Fall (Let down by the last season)... --- ### Be a Scrooge This Christmas - Don’t Gift Your Data to Cyber-criminals - Published: 2020-12-01 - Modified: 2023-11-23 - URL: https://it.ie/be-a-scrooge-this-christmas-dont-gift-your-data-to-cyber-criminals/ - Categories: Scams “Beware of Greeks bearing gifts” is a well-known proverb and refers to the famous Trojan Horse used by the Greeks to enter the city of Troy, under false pretences. The Trojan metaphor is very common in the world of cyber-security and now you know why. It is very rare to get something for nothing (or is it just me?) and so this one time you are being encouraged to be a Scrooge this Christmas and Don’t Gift your Data to Criminals. Christmas is a time for giving but this Christmas we are asking you, not to gift your data to criminals. Owing to the strange circumstances we have all found ourselves in, these past few months, we are now more than ever, engaging with each other and carrying out our purchases, online. With the Christmas season rapidly approaching cyber-criminals will increase their rate of attack in an attempt to gain access to your most valuable commodity, your data. Most attacks are only successful because they persuade you to take and action and grant the criminal access to your device and/or your data. Here’s an example (true story); This morning I received an email by a named person whom I have never met nor have I ever had dealings with online and who was gifting me an Amazon Gift card. Isn’t it just wonderful to think that there are such generous selfless people out there who reach out to random strangers and give them something, for nothing in return? Unfortunately, while there are no doubt selfless people out there, not all that many send gift cards with a monetary value to hundreds or even thousands of strangers. This is, of course, a scam and not a particularly sophisticated one at that and so most of us would identify it as such, however, they fool enough victims to make it worth their while. If I was to click on the link provided to receive my generous gift then I will very likely compromise... --- ### How to Detect a Phishing Email - Published: 2020-11-05 - Modified: 2022-12-05 - URL: https://it.ie/how-to-detect-a-phishing-email/ - Categories: Office 365, Scams - Tags: Email Fraud, Email Scam, phishing, Scams With so much of your time being spent in your inbox, it’s not surprising that this is where cybercriminals are increasingly targeting their victims. Your email is “The Number One Threat Vector” and Phishing emails are proving highly successful for cyber-criminals. The content for this post is courtesy of our partners at VadeSecure. Here you will learn how to detect a phishing email after which you should take the test to see if you can detect a phishing email. To find out how you can protect your inbox, please visit our Managed Email Security page by clicking on the button below. Share on facebook Facebook Share on twitter Twitter Share on linkedin LinkedIn Share on whatsapp WhatsApp How to Detect a Phishing Email With so much of your time being spent in your inbox, it's not surprising that this is where cybercriminals are increasingly targeting their victims.   Your email is "The Number One Threat Vector" and Phishing emails are proving highly successful for cyber-criminals. The content for this post is courtesy of our partners at VadeSecure. Here you will learn how to detect a phishing email after which you should take the test to see if you can detect a phishing email. To find out how you can protect your inbox, please visit our Managed Email Security page by clicking on the button below.   Visit Our Page 1. Suspicious Sender Cybercriminals use various spoofing techniques to trick users into believing an email is legitimate. Check the domain closely for close ‘cousin’ domains. Be cautious when reading email on your mobile device, as only the display name may be visible even if the email is bogus. 2. Subject Line & Tone Enticing, urgent, or threatening language is commonly used to encourage the recipient to take immediate action. Evoking a sense of curiosity, greed, or fear is a common tactic among phishing schemes. 3. Greeting Phishers often send out mass emails to gather information, so they use generic greetings. But, sophisticated phishers personalize their emails with information such as names, email addresses, and even breached passwords. 4. Errors Read the email... --- ### Microsoft Teams - Top New Features Of 2020 - Published: 2020-10-01 - Modified: 2022-12-05 - URL: https://it.ie/microsoft-teams-top-new-features-of-2020/ - Categories: Microsoft, Productivity - Tags: Break Out Rooms, Ignite 2020, Microsoft, Microsoft 365, Microsoft Lists, Microsoft Teams, Teams Together Mode This year has seen Microsoft release some welcome new features, including Custom Backgrounds, 3 x 3 view on Desktops and Raise your Hand in Meetings. As the features keep rolling out the team at IT.ie have picked the top new features announced at or leading up to the Microsoft’s Virtual Ignite 2020 event. Launched in 2017, Teams has become Microsoft’s fastest-growing application and has really found its stride in 2020. As businesses quickly adapted to remote working Microsoft 365 saw its revenue grow by 19% in a three month period up to the end of June. Microsoft Teams saw a single-day high of 200 million meeting participants during that time. In the words of Microsoft CEO, Satya Nadella, such growth constituted “two years of digital transformation in two months. ” This year has also seen Microsoft release some welcome new features, including Custom Backgrounds, 3 x 3 view on Desktops and Raise your Hand in Meetings. As the features keep rolling out the team at IT. ie have picked the top new features announced at or leading up to the Microsoft’s Virtual Ignite 2020 event.    Together Mode Together Mode was launched earlier in the summer and is designed to place all meeting participants together in a virtual space that looks as if they are all sharing the same room. There’s certainly an element of fun with it but also at a time when work colleagues are physically separated, it allows them to be together, even if only in a virtual environment. I read one commentator refer to it as resembling something akin to the Muppet Show and I can see what he means but as they release more virtual environments and customisations, I can see this as a very useful feature in terms of engagement and user experience for business and education users. The Verge reports... --- ### 70% of Enterprise Ransomware Victims Pay Up - Published: 2020-08-20 - Modified: 2022-12-05 - URL: https://it.ie/70-of-enterprise-ransomware-victims-pay-up/ - Categories: Ransomware, Scams, Security - Tags: Blackbaud, IT Security, Online Scams, phishing, Ransomware, SonicWall The world most valuable resource is no longer oil, but data. So what happens when this most valuable of assets is compromised or stolen? Would you pay to get it back or prevent its release to the wilds of the internet? Recent data suggests that 70% of enterprise ransomware attacks result in the criminals successfully eliciting payment from their victims. The world most valuable resource is no longer oil, but data. So what happens when this most valuable of assets is compromised or stolen? Would you pay to get it back or prevent its release to the wilds of the internet? Recent data suggests that 70% of enterprise ransomware attacks result in the criminals successfully eliciting payment from their victims. What’s more, the amounts being paid by the victims to prevent the release of their data, have gone up significantly. Some of the most prolific ransomware operators have even created websites where they release the data of non-paying victims. Early ransomware attacks were largely aimed at locking victims out of their systems with payment demanded to regain access. This shift in the modus operandi of the criminals is proving to be very costly to businesses and highly profitable to criminals.   This post was inspired by an email we received this week from a charitable organisation we have donated to, informing us that, a company that provides database systems to them, was the victim of a ransomware attack. The victim of the  --- ### Josh O’Regan reflects on his Internship with IT.ie - Published: 2020-08-06 - Modified: 2022-12-05 - URL: https://it.ie/national-college-of-ireland-intern-josh-oregan-reflects-on-his-time-with-it-ie/ - Categories: Careers, Miscellaneous - Tags: Internship, IT Support, IT.ie Over the last 7 months, Josh O’Regan has been working with IT. ie on a paid internship. Josh is about to begin his final year at the National College of Ireland (NCI) where he is currently undertaking a BSc in Computing. Unfortunately, this will spell the end to Josh’s time with us, but before he leaves us to undertake what is sure to be a challenging, yet rewarding final year, Josh has agreed to tell us a little about his time with IT. ie. Josh's Story There are few things better than hands-on experience in the subject matter you have been studying in theory for 3 years, I got this and more with my time at IT. ieI started with IT. ie back in January on an internship as part of my degree (BSc in Computing in NCI) and was immediately learning on the job. There was a massive mindset change from the very academic, focused and more streamlined nature of college to the practical and dynamic nature of working in IT. ie. I enjoyed this (along with the free coffee) immensely, the idea of being trusted to do the work while also being able to ask for guidance and it being available from any member of the team was perfect for me.  I was readily able to apply many of the skills I learned in college to my role, as the emphasis put on team projects throughout my 3 years made collaboration in the workplace much easier and natural... --- ### Invoice Redirect Fraud 2020 - Published: 2020-06-10 - Modified: 2023-03-29 - URL: https://it.ie/invoice-redirect-fraud-2020/ - Categories: Scams, Security - Tags: Email Scams, Invoice Fraud, Invoice Redirect Fraud, Scams It was reported by RTE, that Gardai in Waterford are investigating after it was discovered that a company was conned out of €65,000 while in the process of buying a machine to be used in the manufacturing of PPE. With many businesses returning to partial or full operations this week, they are likely to find themselves targeted by fraudsters and cybercriminals. It has been widely reported by many experts including the team at IT. ie that cybercriminals are using the Covid-19 crisis to target businesses all over the world, at a time when their guard may be down. It was reported by RTE, that Gardai in Waterford are investigating after it was discovered that a company was conned out of €65,000 while in the process of buying a machine to be used in the manufacturing of PPE.  It was found that the Irish company was engaging with a legitimate company in China, however, at some point, the fraudsters tricked the company by sending them an email purporting to be from the legitimate company and making a demand for payment to an account listed in the email. Thankfully the swift actions by the Garda National Economic Crime Bureau and the company’s bank resulted in the successful retrieval of the payment. This company was very lucky as the scam was identified and acted on very quickly. Many more businesses aren’t so lucky and lose large sums of money.      This type of fraud is referred to as Invoice Redirect Fraud and long before the current health crisis was costing Irish companies millions of euro a year.   How does it work? The scammers will contact your business by way of email, letter or phone call purporting to one of your legitimate... --- ### How to Add a Custom Background to Microsoft Teams - Published: 2020-06-02 - Modified: 2022-12-05 - URL: https://it.ie/how-to-add-a-custom-background-to-microsoft-teams/ - Categories: Microsoft, Office 365, Productivity, Videos - Tags: Microsoft, Microsoft 365, Microsoft Teams For several months now you could enable one of the virtual backgrounds from a small library of backgrounds available in Teams. Microsoft now allows you to add your own custom background for video meetings Share on facebook Share on twitter Share on linkedin Microsoft Teams is relatively new, having been launched in 2017 and even before the explosion of video messaging brought on by current events, it was seen as Microsoft’s fastest-growing application. Admittedly, I’m a fan of the application and would rate it above both Zoom and Slack owing to its seamless integration with the Microsoft 365 ecosystem. If you want to know a little more about the history and benefits of Teams then I suggest you read a couple of our other Teams posts ( Teams, Past Present & Future and 5 Reasons why Teams is Microsoft’s Favourite Child). This short post is about a recent update for Teams that I truly see as a gamechanger for the application. For several months now you could enable one of the virtual backgrounds from a small library of backgrounds available in Teams. Microsoft now allows you to add your own custom background for video meetings. Besides the obvious fun, you can have by adding whatever pictures you desire, there are several other reasons why custom backgrounds are a great addition to the application. The most important one for me is that I can now comfortably enable my webcam during meetings and not be embarrassed about my cluttered spare room that I have been using while working from home. Some people might also be uncomfortable having their private space on display to colleagues and clients. However, what I see as the biggest advantage of this update for your... --- ### Switching IT Support is Easy with IT.ie - Published: 2020-05-25 - Modified: 2022-12-05 - URL: https://it.ie/switching-it-support-is-easy-with-it-ie/ - Categories: IT Support, Marketing, Sales - Tags: IT Support, Managed IT Services, Switching IT Providers Share on facebook Share on twitter Share on linkedin How many of us are guilty of sticking with service providers simply because it’s “better the devil you know”? There can be a lot to consider when you’re thinking of switching from one IT Support provider to another and it can seem like a daunting process. However, it doesn’t have to be. While there may be a little more involved, Switching IT Support providers is largely no different than switching to any other utility provider. Over the past number of months, many businesses in Ireland and indeed globally have suffered, not as the result of poor business practices but because of an unexpected health emergency that has affected the entire planet. Entire business models and work practices have had to change and adapt to new ways of operating with many companies now effectively operating from the homes of their employees. At the start of the crisis, we published a post (Is Your Business Remote Working Ready) where we stated that there would be a seismic shift in how businesses operate in a post COVID world. Remote Working and other flexible working solutions are here to stay and for many workers and indeed businesses, this is good news. Remote working gives autonomy to workers and many businesses have or will likely see a reduction in operating costs and an increase in employee productivity. What has this got to do with switching IT providers, I hear you say? Well, what you need to ask yourself... --- ### Microsoft Teams: The past, the present and the future - Published: 2020-04-21 - Modified: 2022-12-05 - URL: https://it.ie/microsoft-teams-the-past-the-present-and-the-future/ - Categories: Microsoft, Productivity, Software - Tags: Microsoft, Microsoft 365, Microsoft Teams, Office 365 Microsoft Teams was launched in early 2017 and has become the companies fastest growing application with approximately half a million companies worldwide using it (Pre COVID-19). What you may not know is that the app started life on a fruit farm in Hawaii and hotel room in Las Vegas. Share on facebook Share on twitter Share on pinterest Share on facebook Share on twitter Share on linkedin The Past Microsoft Teams was launched in early 2017 and has become the companies fastest growing application with approximately half a million companies worldwide using it (Pre COVID-19).  What you may not know is that the app started life on a fruit farm in Hawaii and hotel room in Las Vegas. For years Microsoft had been trying to convince businesses to switch to group chats but the product it had acquired for the task, wasn’t up to it. Brian McDonald who had worked on the original version of the Outlook email app was tasked with creating a concept for Microsoft’s new chat software. Around this time Slack was becoming very popular and Microsoft was eager to have a strong competitor in place, as soon as possible. McDonald explained in an interview with The Verge website in 2017, that the original pitch in early 2015 included some bizarre offsite locations for brainstorming. He put together a team that had worked well together in the past, including the lead engineer on Teams, Jigar Thakkar. McDonald took some of the Team to his fruit farm in Hawaii and Thakkar took his engineering team to Las Vegas. The groups would conference call to collaborate and share ideas, mimicking typical office environments, worldwide.  Only a month after returning from their remote working sessions the team had already created a working prototype of what was introduced in November... --- ### Cybercriminals will exploit Remote Workers during COVID-19 Crisis - Published: 2020-03-22 - Modified: 2022-12-05 - URL: https://it.ie/cybercriminals-will-exploit-remote-workers-during-covid-19-crisis/ - Categories: Data Protection, Remote Support, Scams, Security - Tags: COVID-19, Cybercrime, Remote Working I believe, however, that an element of complacency will set in with remote workers owing to the physical disconnect from HQ that will likely lead to many users and business falling victim to cybercriminals who are taking advantage of the COVID-19 crisis. Share on facebook Share on google Share on twitter Share on linkedin Remote working has become somewhat of a buzzword over the past couple of weeks with many companies finding themselves with a need to rapidly scale their remote working capabilities. Never before have so many businesses switched operations from their offices to the homes of their employees, in so little time. When this crisis has passed as no doubt it will, I believe that there will be a seismic shift towards remote working and flexible working solutions by many businesses. Most of the challenges faced over the past week or so will have been basic teething problems while setting up ICT equipment, VPN’s etc. I believe, however, that a degree of complacency will set in owing to the physical disconnect from HQ that will likely lead to many users and businesses falling victim to cybercriminals who are taking advantage of the COVID-19 crisis.  During this time of physical disconnection from HQ, there has been a concerning spike in cases of CEO Fraud (Executive Whaling). Given the chaos of these past two weeks and the pressures people are under, it’s very easy to drop the ball and fall victim to an email purporting to be from the boss and making an urgent demand to pay someone or some external entity.   CNBC. com reports that fraudsters are taking advantage of the Coronavirus and expect to see phishing scams similar to those brought on by the fear and uncertainty of the 2008... --- ### Is Your Business Remote Working Ready? - Published: 2020-03-07 - Modified: 2022-12-05 - URL: https://it.ie/is-your-business-remote-working-ready/ - Categories: Microsoft, Office 365, Productivity - Tags: Business Continuity, Coronavirus, Homeworking, Remote Working There’s been a lot of talk about “Remote Working” over the past number of days in light of the spread of the Coronavirus, however, the adoption of remote working had seen significant growth long before Coronavirus was on anyone’s radar. Remote working is a viable option for many but unfortunately for many more, it is not. Share on facebook Share on twitter Share on linkedin There’s been a lot of talk about “Remote Working” over the past number of days however, the adoption of remote working had seen significant growth long before Coronavirus was on anyone’s radar. Remote working is a viable option for many but unfortunately for many more, it is not. As a digital marketer, I can very easily work from home, as I’m doing while writing this post but what about employees at a production facility? Moving a factory assembly line to an employee’s place of residence might prove challenging, to say the least. Customer-facing workers are also excluded from this flexible working option. A research report titled “Remote Working in Ireland – Future Jobs 2019” defines remote working as “a form or organising and/or performing work using information technology ... . which could also be performed at the employer’s premises” There are two primary types of remote working: Homeworking, where the employee works from home. Hub-working, where the employee works from a hub, with co-working collaborative space or hot desking facilities. When I added the idea for this post to my content calendar, several weeks ago, Coronavirus/Covid-19 wasn’t something many people outside of mainland China were overly concerned about. Over the past number of days, we have been hearing about tech giants such as Google and Twitter asking their entire workforce to work from home in light of the outbreak and to test their readiness for remote working. I will shortly go... --- ### Five Tips to Avoid Phishing Attacks - Published: 2020-01-23 - Modified: 2022-12-05 - URL: https://it.ie/five-tips-to-avoid-phishing-attacks/ - Categories: Data Protection, Ransomware, Scams, Security - Tags: Data protection, phishing, security, Social Engineering, spear phishing, whaling Practically everyone has heard of or read about phishing emails and the reason we all know about them is that they just won’t go away. As far back as 2010, we were warning our clients about these malicious emails Share on facebook Share on twitter Share on linkedin Phishing email attacks are on the rise with research suggesting that 90% of global enterprises were targeted by phishing attacks in 2019. According to the latest Microsoft Security Intelligence Report,  phishing emails rose by a staggering 74% in 2019 over 2018. If you have an email address and not surprisingly most of us do, then you have likely received a phishing email or multiple phishing emails at some point over the past couple of years. As far back as 2010, we were warning our clients about these malicious emails, (Don’t become Cyber Bait) and before I give you our top tips to avoid falling victim to a phishing attack, let us first look at the methods employed in a phishing attack. There are four attack methods Phishing Phishing emails are sent to a large number of users simultaneously with the intention to “fish” sensitive information by posing as known and reputable sources. These emails will likely have legitimate-looking graphics and logos included. Banks, credit card providers, revenue, financial institutions and large corporations such as PayPal and Microsoft are just a few of the common ones. A phishing campaign typically sends out emails to huge numbers of recipients. Most recipients don’t use the bank, card provider etc, that the mail purports to be from but by sheer weight of numbers, these emails will arrive in the inboxes of some actual customers of the institution it claims to be from and who may... --- ### Ireland’s Most Popular Google Searches of 2019 - Published: 2019-12-19 - Modified: 2022-12-05 - URL: https://it.ie/irelands-most-popular-google-searches-of-2019/ - Categories: Google, Humour - Tags: 2019, Google, Google search, Google Treads As 2019 draws to a close, we look back on the most popular Google search queries in Ireland for 2019. Some are obvious while others, not so much, at least for the middle-aged author of this post. The most popular overall search term was Rugby World Cup, however given our performance in the tournament, I think that search term just like the tournament itself, should be resigned to history. The top five overall search terms also include two much loved modern Irish legends that sadly passed away this year, namely Mr Gay Byrne and Mr Brendan Grace. Google Trends have very conveniently given us the most searched for terms in the categories that follow. As I’ve already mentioned many of the top search queries are in line with our expectations, however, given that “How to boil an egg? ” and “How to vote? ” are the top two “How to” queries, I am genuinely worried for the future. Anyway, here are the top five search queries in the categories listed; Top Five Overall Search Terms 1) Rugby World Cup (Let us resign this one to history)2) Gay Byrne (RIP to a broadcasting legend)3) Storm Lorenzo (Not the Italian hunk the ladies were hoping for)4) Game of Thrones (So disappointed with the last season)5) Brendan Grace (RIP to a comedy genius) Rugby World Cup How to... ? How to boil an egg? 1) How to boil an egg? (Seriously! )2) How to vote? (Again seriously! )3) How to pronounce psalm? (Fair enough)4) How to... --- ### 5 Reasons why Teams is Microsoft’s favourite child - Published: 2019-12-12 - Modified: 2022-12-05 - URL: https://it.ie/5-reasons-why-teams-is-microsofts-favourite-child/ - Categories: Microsoft, Software - Tags: Microsoft Teams, Office 365, Slack Microsoft Teams isn’t new but there still remains some confusion as to what it actually is and how it can help improve workplace productivity. Is it just another chat app? Is it an upgrade of Microsoft Skype for Business? Microsoft Teams is so much more than just another chat app and while having some of the same functionality of Skype, it’s an entirely independent application. Teams is an extremely powerful application that’s designed for the modern business to enhance teamwork through enriched collaboration and communication. As it’s an entirely new application built from the ground up it doesn’t come with the many legacy issues of existing Microsoft applications. Here are my 5 reasons why Teams is Microsoft’s favourite child; 1. Not Just a Slack Killer Microsoft Teams has a similar look and feel to Slack however, under the hood it has plenty of additional features and functionality that sets it apart. Both applications are classed as office collaboration platforms that are designed to enhance overall productivity. Slack is geared at individuals and very small businesses while Teams is geared for both small business and large enterprises. Teams can run as a stand-alone application however, the real power behind Teams is how it works seamlessly with Microsoft’s Office 365 Productivity Suite and seeing as most business now run Office 365, Teams would appear to be winning the race as the collaboration application of choice for businesses. The comparison chart below gives you a better idea of what you get with the... --- ### IDS Ireland Domain Name Scam - Published: 2019-11-21 - Modified: 2022-12-05 - URL: https://it.ie/ids-ireland-domain-name-scam/ - Categories: Scams, Security - Tags: Domain Name Scam, Online Scams We have been contacted by a number of our customers seeking advice after receiving an email from an entity calling itself IDS Ireland soliciting them to buy a domain associated with their brand. The mail suggests that someone has requested to register your brand name with a .eu or .com address and they are offering you a first registration option for these domains. Back in January, many small businesses in Ireland received almost identical emails from what appears to be the same source but then calling itself DNS Ireland. The current website they are using is similar to the one they used back in January, with slightly different branding and a different business address. Share on facebook Share on twitter Share on linkedin We have been contacted by a number of our customers seeking advice after receiving an email from an entity calling itself IDS Ireland soliciting them to buy a domain associated with their brand. The mail suggests that someone has requested to register your brand name with a . eu or . com address and they are offering you a first registration option for these domains. Back in January many small businesses in Ireland received almost identical emails from what appears to be the same source but then calling itself DNS Ireland. The current website they are using is similar to the one they used back in January with slightly different branding and a different business address. Click on the link to read our January post, https://it. ie/domain-registration-scam/ While it’s possible that the services they offer allows you to register a domain, at the very least, these emails are dishonest and so let's call them out for what they are, Scam Emails. The email suggests that they have contacted you to give you “first registration option” as you are the owner of the . ie domain. As pointed out by legitimate domain registration company Blacknight, no such obligation exists. They refer to it as “nonsense and a transparent attempt to extort as much cash a possible from someone who may be unaware of the realities of domain name registration”. Another thing to note is that legitimate domain registration companies don’t ask for... --- ### Don’t be tricked this Halloween. October is Cybersecurity Awareness Month - Published: 2019-10-24 - Modified: 2022-12-05 - URL: https://it.ie/dont-be-tricked-this-halloween-october-is-cybersecurity-awareness-month/ - Categories: Ransomware, Scams, Security Share on facebook Share on twitter Share on linkedin Halloween is the one night of the year when ghosts and ghouls freely roam the streets, however in this brave new online world that we all inhabit scary stuff isn’t limited to a single day. Disguised as cyber threats, digital ghosts and ghouls are ever-present, waiting to strike their next victim. In 2019 there were more tricks than treats so as cybersecurity month comes to a close in Europe and the US, here are some of the ghastliest cyber tricks employed from within the depths of the dark web. Trick #1 -Phishing — The old reliable in the world of cybercrime remains popular because it works. It has been reported that approximately one in every 99 emails is actually a phishing attack, and 30% of these malicious messages make it past security systems. The world economic forum reports that 2020 will be known as the year of the advanced phishing attacks, owing to the number of phishing kits available on the dark web. These kits will require that cybercriminals only need basic technical knowledge to run their own phishing attack campaigns. Your first contact with a phishing scam will likely be via your email inbox. We’ve published several articles on the scourge of phishing scams and how to mitigate against them however, I recommend this recent one: Clicking on Links Accounts for 99% of all email attacks. Trick #2 – AI Deepfake – Cybercriminals have started to create and employ advanced attacks using... --- ### Brute Force Ransomware Attacks are on the Increase: A Strong Password Policy is your Best Defence - Published: 2019-09-30 - Modified: 2022-12-05 - URL: https://it.ie/brute-force-ransomware-attacks-are-on-the-increase-a-strong-password-policy-is-your-best-defence/ - Categories: Data Protection, Ransomware, Scams, Security - Tags: Brute Force, Cyber security, Ransomware Share on facebook Share on twitter Share on linkedin Brute Force Ransomware Attacks are on the Increase: A Strong Password Policy is your Best Defence Recent research by leading cybersecurity firms such as SonicWall, McAfee and F-Secure has found that brute force attacks are now the preferred means of spreading ransomware however, phishing emails remain popular. While several reports last year showed that ransomware was on the decline the news for 2019 isn’t so good. The image below from SonicWall shows that Ransomware is on the increase in 2019 with a recent report from McAfee showing that attacks that leverage file locking malware have more than doubled in 2019.    The Attack Landscape H1 2019 report from F-Secure informs us that the most common delivery method for ransomware during the period was via remote desktop protocol (RDP) at 31% of cases. What these reports confirm is that ransomware hasn't gone away and is once again on the rise, it's simply how the victims are targeted that has changed What is a brute force attack? Brute force attacks are when hackers attempt to compromise servers and endpoints by using bots to enter as many passwords as possible. The best way to explain this is to use a Game of Thrones (GOT) battle scene analogy. Even if you’re not a GOT fan, you should still understand this and if you are a GOT fan then you’ll probably agree that the final season was a major let down. Anyway back to the battle;... --- ### Clicking on links accounts for 99% of all of email attacks - Published: 2019-09-23 - Modified: 2023-03-29 - URL: https://it.ie/clicking-on-links-accounts-for-99-of-all-of-email-attacks/ - Categories: Scams, Security - Tags: Email Scams, phishing Share on facebook Share on twitter Share on linkedin Just over a year ago we published an article looking at how email is the number one threat vector and unfortunately this hasn’t changed. According to Danny Palmer of ZDNet, 99% of email attacks rely on the victims clicking on links. A very small number of attacks result from exploit kits and known software vulnerabilities to compromise your systems however, the vast majority require the victim to click on a link associated with the email. Another popular form of email attack is CEO Fraud where instead of clicking on links the victims are tricked into carrying out an action, such as unknowingly transferring money to an account, controlled by a scammer. You might find an email that was sent at 4am as suspicious however, what if the email arrives in your inbox during working hours and appears to be from a known colleague, customer, supplier, or even your boss? You are far more likely to trust this email, as the source seems legitimate and it was sent at a time you would likely receive an email from this source anyway. The use of social engineering is a key factor to a successful phishing campaign for cyber criminals. Social engineering is the psychological manipulation of people into performing actions such as clicking on an unsafe links or divulging confidential information. By sending emails from what appear to be known sources at sociable times, the criminals are lulling you into a false sense of security. Trust is... --- ### The IT.ie Trinity - Meet the Family - Published: 2019-09-15 - Modified: 2022-12-05 - URL: https://it.ie/the-it-ie-trinity-meet-the-family/ - Categories: Uncategorized Back in 2004 our journey began when PCtechnix was founded by Eamon Gallagher. We primarily operated as a break/fix IT Support Company, for clients in the Dublin region. From the very start we understood that if we wanted to be successful then we had to work hard to ensure that our clients IT was working to make them successful and over the next 12 years we worked hard to build our client base and reputation. We're Growing In 2015 we began to see the IT services had moved beyond, simple break/fix solutions. IT is wasn't simply a useful tool anymore. IT was now becoming a vital utility, just like water or electricity. You cant't run a business without electricity and you simply can't run a business without some form of IT infrastructure. In light of this Eamon decided to re-model the business to operate as a provider of subscription based managed IT services. The reality is that more and more of the services we use both in business and in our private lives are subscription based so why should IT be any different. To develop the business further we undertook a programme of expansion that saw us grow the business, in terms of employees. operating space and services offered. https://www. youtube. com/watch? v=v3662J5jSpk The IT. ie Trinity Remotesupport. ie You call, We Connect No call out charges and No waiting around for a call out. 100% safe, secure and reliable Office365. ie IT. ie are a registered Microsoft Partner who... --- ### Sextortion Email Scam - Published: 2019-08-25 - Modified: 2024-01-05 - URL: https://it.ie/sextortion-email-scam/ - Categories: Cyber Security, Scams, Security - Tags: Email Scam, sextorsion Sextortion email scams have been around for quite some time and every now and then a new wave will target the inboxes of unsuspecting victims. This once again appears to be the case and we have noticed an increase in requests for advice on how to handle this. Updated July 22 - Sextortion email scams have been around for quite some time and every now and then a new wave will target the inboxes of unsuspecting victims. This once again appears to be the case and we have noticed an increase in requests for advice on how to handle this.  The goal of this scam is to persuade you, by way of threat to part with funds by making payment to the scammers, usually in cryptocurrency. What makes this scam even more convincing is that the scammers may have an actual password you have previously used or possibly still use and that was harvested from one of several high-profile data breaches over the past several years. This is not uncommon, and I suggest you go to this website https://haveibeenpwned. com. and check if any of your email addresses have been compromised. Don’t be surprised if at least one has; over 3 billion email addresses have been compromised over the past several years.     The following is an example of a typical sextortion email from July 2022 Hi. How are you? I know, it's unpleasant to start the conversation with bad news, but I have no choice. A few months ago, I have gained access to your devices that used by you for internet browsing. Afterwards, I could track down all your internet activities.  Here is the history of how it could become possible: At first, I purchased from hackers the access to multiple email accounts (nowadays, it is a... --- ### Beware of the latest Phishing Scam that Targets Your Google Calendar - Published: 2019-07-02 - Modified: 2022-12-05 - URL: https://it.ie/beware-of-the-latest-phishing-scam-that-that-targets-your-google-calendar/ - Categories: Data Protection, Scams, Security, Virus - Tags: Google Calendar, phishing Share on facebook Share on twitter Share on linkedin No matter where you go online, you can expect the scammers to be waiting to try and take advantage of you. Most of us are used to seeing scams pop up in our inboxes on a daily basis. By now you know the drill, if in any doubt at all, don’t click on the link. As much as we like to think that these people are stupid, many are in fact very clever and devious, coming up with new and sometimes ingenious ways to trick us. A new study by threat intelligence firm Kaspersky has found that scammers have found a new way to target online users. Millions of people use Google Calendar on a daily basis to mange their busy private and professional lives and this new scam is using hyperlink-embedded events to gain access to your sensitive information. The scammers goal is to take advantage of default settings that automatically adds any event and trigger a notification from Google. With Google being a trusted application, the user clicks on the event link within the Google notification, infecting their machine with a malware that can target a single machine or infect an entire network. Mobile users a particularly vulnerable with this type of scam as most of us allow Google notification pop-ups on our mobile device screens. With mobile device a pop-up notification of the invitation appears on the device’s home screen with the recipient encouraged to click on the... --- ### Save my BT Email - Published: 2019-04-24 - Modified: 2023-03-31 - URL: https://it.ie/save-my-bt-email/ - Categories: Uncategorized This is a re-post from our partners at Blacknight and concerns anyone who still uses a BT email account.   Transferring Legacy Email Accounts from BT Ireland to Blacknight Originally these email accounts were provided as part of dial-up subscriptions or as free webmail accounts, by BT and by other companies which were acquired by BT. Now that BT is discontinuing the provision of this service, users are being offered the option of having their account terminated, or transferring it to Blacknight. Based in Carlow, Blacknight is the leading Irish provider of domain names, web and email hosting services. Users who opt to transfer their BT email accounts to Blacknight will receive the following: Upgraded 100MB mailbox storage. (BT legacy accounts have 50MB, and webmail is limited to 10MB) IMAP and POP3 access, and a modern Webmail How can I access my mail after the move? Read our knowledgebase guide on how to access your mail after the move. Why is my BT legacy email service being transferred to Blacknight? The email service was provided by BT as part of a contract which is no longer in force. The service may have been provided free of charge, or included as a bundle with an internet connection package which is no longer active. Blacknight has offered to take over legacy email services from BT, allowing users to continue to use their email. Alternatively, users can choose not to transfer their email to Blacknight, in which case BT will terminate the account. Is Blacknight... --- ### SIM Card Swap Scam - Published: 2019-03-21 - Modified: 2019-03-21 - URL: https://it.ie/sim-card-swap-scam/ - Categories: Data Protection, Mobile Devices, Scams - Tags: Mobile Scam, SIM Card Swap Fraud, SIM Card Swap Scam, SIM Scam Share on facebook Share on twitter Share on pinterest What is SIM Card Swap Scam? This isn’t a new type of fraud but up until recently it hasn’t been reported in Ireland. SIM Card Swap Scam is when criminals dupe a mobile service provider into assigning a mobile number to a new sim. The legitimate holder of the mobile account will see their service drop after the criminals have taken control of their number and will only discover that they have been targeted after they contact their mobile service provider. How can they do this? Unlike Phishing were the fraudster targets you directly, with SIM Card Swap they first contact your mobile phone service provider pretending to be you and attempt to trick them into swapping your phone number onto a card controlled by them. Once they get your number assigned to their SIM card; they can divert calls and intercept texts, effectively locking you out of your own network. Fraudsters use this type of scam when they already have access to your online banking but can’t transfer money out of your account. This is because many banks require two step authentications, before allowing any money transfers. This is normally a code that is send to your mobile number, that of course the fraudsters now control. This scam is often used in conjunction with phishing attacks that allow them access to your banking details, in the first place. To date there has only been one report of this type of... --- ### Domain Registration Scam - Published: 2019-01-10 - Modified: 2023-12-22 - URL: https://it.ie/domain-registration-scam/ - Categories: Data Protection, Scams, Security - Tags: Domain Registration Scam, Email Scam IT. ie would like to advise our clients to be on the lookout for a new email scam that's doing the rounds at the moment.   If you receive an email from DNS Ireland, you should simply ignore or right click and block the sender. This is an example of the email that is typically received. We have replaced the recipients domain details with our own. Dear Sir/Madam,We have received a request for the registration of the website www. it. org. Our system shows that you are the owner of www. it. ie. This can have far-reaching consequences for you in the future. We are therefore under the obligation to contact you, in order to offer you the first right of registration. This means that we will reject the application of the third party and the website:A number of our clients have contacted us about this over the past two days and the following is what we advise:Simply ignore the mailBlock the senderDo NOT reply to the mailIf you have replied, cease all contact and do NOT make any paymentsDo NOT click on any links or imagesIf in doubt; drop us a mailRead our article:  Email is the No 1 Threat Vector.   --- ### Avoid Malicious Spam and have a Very Merry Christmas - Published: 2018-12-19 - Modified: 2023-12-22 - URL: https://it.ie/avoid-malicious-spam-and-have-a-very-merry-christmas/ - Categories: Data Protection, Ransomware, Scams, Security - Tags: Christmas, Malicious emails, Spam Christmas is a particularly prevalent time for malicious spam messages.  In addition to the regular email phishing, phones are also targeted through SMS Phising (smishing) and malicious links embedded in popular messaging apps.  Another popular attack vector with cyber criminals is fake refund or shipment tracking sites that attempt to harvest credentials from unsuspecting members of the public.  The success of these tactics is based on the increased likelihood of users using an online platform to purchase goods over the period, coupled with the increased urgency people feel to track their purchased goods in order for them to arrive in time for Christmas.  This can lead some users to being less vigilant about clicking links and visiting sites than they might otherwise be throughout the year. IT. ie advises you to review the following points: Christmas messages from an untrusted source that asks a user to click a link, play a video/audio file etc. should not be viewed.  Even if the source is trusted extreme caution should be exercised as the source itself may have been compromised. Do not enter your account credentials if you receive an unsolicited email pertaining to be an online shipment company without verification first.  In the event of users wishing to query the status of a particular item they should take note of reference numbers etc provided at the time of original purchase and ensure that these match any subsequent correspondence. Be particularly vigilant around new-year and Christmas eve when the volume of messages both... --- ### Our Top Tips to Keep Your Data Safe - Published: 2018-11-13 - Modified: 2022-12-05 - URL: https://it.ie/our-top-tips-to-keep-your-data-safe/ - Categories: Data Protection, Ransomware, Scams, Security - Tags: CEO Fraud, Data P{rotection. Phishing, Data Security. ESET. Business Continuity, Miss Call Scam, Ransomware “It won’t happen to me”. Believe me, it probably will, so don't be a target. We're all at risk, no matter how vigilant we are, however the more vigilant you are the less likely you are to fall victim to a cyber-attack. The stakes are high, and you have a responsibility to protect your company’s data, just as you do to protect your own. The following tips below combined with vigilance will greatly reduce the risk.  Tip 1 – Keep all software up to date. Make sure your system and programs are up to date and always install the latest security updates for all your devices. Turn on automatic updatesUse the most common web browsers, Chrome or Firefox, as they get frequent automatic security updates. Keep any browser plugins up to date. Tip 2 – Beware of Phishing Scams – DON’T CLICK Phishing scams are a constant threat and cybercriminals are getting better and more creative in how they trick and catch their victims.  Beware of suspicious emails and never click on unknown or untrusted links, no matter how legitimate they look. The links on the page are legitimate, however, if you don't trust them, don't click on them.  Never divulge financial information to a third party online and don’t get tricked by an email that claims to be from the boss or supplier that wants you to redirect funds or make a payment. Invoice Redirect FraudCEO Fraud ScamTip 3 – Don’t answer or call back numbers that you don’t recognise.... --- ### FilesL0cker Ransomeware - Published: 2018-10-25 - Modified: 2023-12-22 - URL: https://it.ie/filesl0cker-ransomeware/ - Categories: Data Protection, Ransomware, Security - Tags: Filesl0cker, Fileslocker, Ransomware SonicWall Capture Labs are reporting that a new variant of the FILESLOCKER ransomware is actively spreading.  FilesL0cker RAN$OMWARE (aslo known as FilesLocker) is a ransomware that encrypts files on your computer, effectively locking you out. As with all ransomware the cybercriminals will demand a ransom, payable in bitcoin, to allow you access your own files.   This is a new variant of malware that has been around for some time. Sonicwall Capture Labs states that it provides protection against this threat via the following signatureGAV: FILESLOCKER. RSM (Trojan). If you want to avoid falling victim to a ransomware attack then you should be extra vigilant when clicking on links or attachments. Most attacks happen because of an action carried out by a user. When in doubt, Don't Click. If you want to be certain that your files and system are secure then you need a reliable online backup or disaster recovery service. Security-as-a-ServiceDisaster Recovery as a ServiceOnline Backup eBook - Types of Cyber Attacks and How to Prevent ThemJohn Grennan --- ### Latest Email Scams - Published: 2018-09-25 - Modified: 2018-09-25 - URL: https://it.ie/latest-email-scams/ - Categories: Data Protection, Scams, Security - Tags: Email Fraud, Email Scams, Malware, Ransomware, Scam Emails Unfortunately the scammers aren't going away and I think it's fair to say that this is going to get worse before it gets better and that's if it gets better at all. The fact is that despite the efforts of the many security companies to stay ahead of the cyber-criminals, it can be extremely difficult to stop these emails entering your inbox owing to: They don't actually have any virus or malware attached (The link takes you to the source of the infection) A number of the images or links might actually hyperlink back to the authentic site. The problem with these type of emails is that the links they want you to, and encourage you to click on, will very likely result in you infecting your machine with malware that could result in the illegal harvesting of your data or allow the cyber-criminals take control of your machine, lock you out and force you to pay a ransom to regain access to your own data. This isn't something new and we've warned you about these types of scams on numerous occasions. Scammers rely on user complacency to find their victims and we're all guilty of getting a little complacent at times. You come into the office and open your email client to find that it's got a couple of dozen new mails. It's only natural that you'll want to work through them as quickly as possible to have a clear inbox before coffee break. Taking a few extra minutes examining the emails... --- ### How to check if your Twitter Account has been hacked - Published: 2018-09-13 - Modified: 2022-06-08 - URL: https://it.ie/how-to-check-if-your-twitter-account-has-been-hacked/ - Categories: Data Protection, Mobile Devices, Scams, Security, Social Networking How to Check if Your Twitter Account has been Hacked Have you ever wondered if your Twitter account has been hacked and who may have gained access to it? While a bit late to the party, after Google and Facebook, Twitter now lets you know any and all devices that have logged into your account. Twitter has also rolled out a new security feature for its users, dubbed Apps and Sessions. This allows you to know which apps and devices are accessing your Twitter Account along with  the location of those devices. To find out the current and all past logged in devices and locations, follow these steps. Check Twitter Login Sessions On a Smartphone  Open the Twitter app, and head on to your profileTap on 'Settings and privacy' sectionInside the section, select 'Account'Once inside the option, tap on 'Apps and sessions'   Check Twitter Login Sessions On Desktop Or Laptop The process is almost the same using a desktop or laptop. Open Twitter and tap on the photo icon on the top right corner where you find all the account settings. Tap on 'Settings and privacy' sectionInside the section, scroll down to 'Apps and devices'Once you tap 'Apps and sessions' on mobile or 'Apps and devices' option on desktop, you will be shown a list of all devices active on your Twitter account in the last month, as well as location they're in, along with a list of third-party apps that have access to your Twitter account. Now, you can... --- ### HERMES 2.1 Ransomware Advisory - Published: 2018-08-20 - Modified: 2023-12-22 - URL: https://it.ie/hermes-2-1-ransomware-advisory/ - Categories: Ransomware, Scams, Security, Virus - Tags: Cyber-Crime, Cyber-Fraud, Hermes, Rnasomware It has come to our attention via CSIRT-IE that there is current wave on Ransomware attacks taking place and urge everyone to be vigilant when in receipt of unsolicited emails. If you are unsure or suspicious as to the content of an email make sure you contact your IT department or IT Support Company. Opening unsolicited emails may result in a ransomware attack that will, at the very least, cost a large sum of money to retrieve encrypted file.   This particular wave of attacks concerns the receipt of a Word Doc that requires a password to open. It appears that a simple password of 1234 is provided, however don't trust any variant of this. The Word document contains a malicious macro that downloads AZORult malware. The AZORult malware reaches out from the compromised host and downloads the Hermes ransomware. The following screenshots depict the infection process.   Malware Deletes Certain File Types The malware then runs a file called window. bat which attempts to delete the following file types if they exist on the infected system, . VHD, . bac, . bak, . wbcat, . bkf, . set, . win and . dsk. In addition, any file names containing Backup or backup are deleted and it attempts to delete shadow copies.  It attempts to delete these files from the c:, d:, e:, f:, g: & h: drives. This gives the cybercriminal control of your device and prevents you from accessing your valuable data.   Backup, Backup, Backup The only... --- ### Invoice Redirect Fraud - Published: 2018-07-29 - Modified: 2022-06-08 - URL: https://it.ie/invoice-redirect-fraud/ - Categories: Scams, Security - Tags: Invoice Fraud, Invoice Redirect Fraud Invoice Redirect Fraud Invoice Redirect Fraud Gardai are warning businesses of all sizes to be vigilant of a new wave of invoice fraud, sweeping the country.  Invoice Redirect Fraud is a scam targeting businesses working with suppliers and who regularly perform online financial transactions. This has been widely reported in the media over this past week including The Independent, and Extra. ie  How does it work? The scammers will contact your business by way of email, letter or phone call purporting to one of your legitimate suppliers. They will inform you that their bank details have changed and request that all further payments should be sent to the new bank account.   Of course, the new bank details are not that of your supplier but instead are the details of an account controlled by the criminals.   Inevitably your legitimate supplier will send an invoice in the future for payment of goods or services and you will unwittingly make a payment to the criminals and not the the supplier. It may be sometime before you realise that you have fallen victim and it may only come to light when you receive a reminder from the legitimate supplier for non payment.   What should you do? All employees and particularly those who deal with accounts and payments should be made aware of this scam and the steps to take to avoid falling victim. At IT. ie we suggest that a safe word or phrase should be used in all correspondence relating to financial... --- ### Google are now marking HTTP sites as “Not Secure” - Published: 2018-07-22 - Modified: 2023-12-11 - URL: https://it.ie/google-are-now-marking-http-sites-as-not-secure/ - Categories: Data Protection, Hosting, Security Google are now marking HTTP sites as “Not Secure” At the start of July Google released the Chrome 68 update and since then they have been marking all HTTP sites as ‘not secure’. Google has been giving gentle nudges to users for a number of years to encourage them encrypt their sites with HTTPS starting in 2015 when they began to down-rank unencrypted sites. Site admins need to take action now or risk losing visitors, who will see their site as untrustworthy. Put yourself in the position of a potential site visitor. If there is any question of trust regarding a site you may have shown interest in visiting, then the likelihood is that, you won’t visit it then or in the future, even if it has addressed the HTTP issue.   Since early 2017 Google has been marking any HTTP site that collects personal and or financial data from its visitors as “not secure” According to Google the stats as of February 2018 are:Over 68% of Chrome traffic on both Android and Windows is now protectedOver 78% of Chrome traffic on both Chrome OS and Mac is now protected81 of the top 100 sites on the web use HTTPS by defaultLook at it this way. What if you passed a retail outlet on a high street and the sign in the windows says, “we sell great stuff but there’s a chance you might get ripped off if you shop here”. Of course, you’re not going to enter that shop... --- ### Email is the Number One Threat Vector - Published: 2018-07-05 - Modified: 2023-02-09 - URL: https://it.ie/email-is-the-number-one-threat-vector/ - Categories: Data Protection, Marketing, Ransomware, Scams, Security - Tags: C.U.B.E, Data protection, Email Threat Vector, Office 365 Security, phishing, Ransomware The greatest threat to your organisation is sitting in the inboxes of your employees. Email is still the number one threat vector and a major weak link in your IT security. The truth of the matter is that many of us have become complacent and just want to get through the many emails that clog our inbox, on a daily basis. Cybersecurity firms have come a long way in protecting your system, but more often than not they’re playing catch up to the latest threat. In a post I wrote over a year ago referring to ransomware, I explained that it’s us, the users of the computer systems that are the biggest threats (Ransomware – Common Bad Practices are Your Biggest Threat). The reality is that we’re all getting malicious emails on an almost daily basis, but they only become a danger to your systems, if you carry out an action, such as clicking on a link or opening an attachment. The current wave of malicious mails appears to target the users of Microsoft 365. The mails will usually urge you to take immediate action or face the loss of emails or termination of your account. You may also be asked to click on a link to verify your account. Some of these mails can look quite genuine but there are a number of things you can do immediately identify them as malicious. Look at the sender’s address. For example, I got one this morning that claimed to be from... --- ### Disaster Recovery as a Service (DRaaS) Explained - Published: 2018-05-20 - Modified: 2023-12-22 - URL: https://it.ie/disaster-recovery-as-a-service-draas-explained/ - Categories: Data Management, Data Protection, Ransomware, Security When you hear the phrase "Disaster Recover" your are probably thinking of inhospitable environments or locations that suffer from extreme weather events. Did you know that most “Disaster” events occur from system failures, human error or cyber-attack? Your data is your most valuable assets and the loss of data can have a detrimental effect on your business. Research has shown that, up to 60% of company's that experience a major data loss will likely go out of business within 6 months.  In fact, worldwide just 1% of data loss occurs from natural disasters. What is DRaaS DRaaS stands from Disaster Recovery as a Service which is a cloud-based service provided by a third-party vendor. What this means for your business, is that in the event of a partial or total data loss, this service will ensure business continuity, allowing for the rapid retrieval of the lost data.  Here at IT. ie we are delighted to announce our partnership with leading data protection specialists Datastring. Datastring DRaaS appliances (5 or 20TB) snapshots all of your data both locally and to the Datastring Cloud, ensuring rapid recovery of lost data and minimal downtime for your business. How it Works Our DRaaS lets you protect anything, anywhere — systems, apps and data — whether it’s physical, virtual or in the cloud. Our expert team configure the correct DRaaS appliance for your requirements. The appliance snapshots servers and applications both locally and to the Datastring Cloud. Servers can be recovered and booted locally to... --- ### Double Up On Your Displays and Never Go Single Again. - Published: 2018-04-16 - Modified: 2023-12-22 - URL: https://it.ie/double-up-on-your-displays-and-never-go-single-again/ - Categories: Miscellaneous - Tags: Dual Desk Mounts, Dual Display, Dual Monitors You may have noticed that there is an increasing adoption of dual or multiple display set ups in business and even homes. I’ve been using a dual display both in work and at home for over a year now and I honestly don’t know how I ever managed with a single monitor. There are six reasons why I think you simply can’t function without a dual display. Enhanced productivity – Studies have shown that working with dual displays increases productivity between 30 and 50%. Sounds a bit unrealistic, doesn’t it but think about it. With dual monitors, you no longer having to toggle back and forth between tabs, saving time and reducing errors. Multitasking – To multitask efficiently, you need adequate screen space to keep more than one application simultaneously visible. If you work with a computer, then the odds are that you will be required to multitask. This simply can’t be done effectively with a single screen. For example, if you are editing a photo in let’s say Photoshop. You can have the application open on one display and your photo library open on the other. You can now easily drag and drop the pics from one screen into the application on the other. Cross referencing information – One of the obvious benefits of using dual displays is that it allows staff to cross reference information between documents more efficiently. This negates the need to having to open and close documents or use split screen view. Most roles require... --- ### 50% of all search will be voice search by 2020 - Published: 2018-02-24 - Modified: 2018-02-24 - URL: https://it.ie/50-search-will-voice-search-2020/ - Categories: Internet & SEO - Tags: Bixby, Featured Snippets, Google Home, Samsung Galaxy S8, SEO, Voice Search I heard something last week that may be common knowledge to many but came as a bit of a surprise to me. By 2020, 50% of all global search queries, will be voice. That’s right 50% in just two years’ time, or at least that’s the prediction of ComScore. I personally haven’t used voice search before and looked on it as a bit of a gimmick if I’m to be honest. The first time I did a voice search was this week. I have a Samsung Galaxy S8 and the phones AI “Bixby” suggested that I try voice search. It’s almost as if my phone is reading my mind or is it listening to my conversations? I think I’ll leave that conspiracy theory, or not, for another day. Oh, and by the way, I’m at Bixby level 3, whatever that means. So, I’ve been doing a bit of reading on voice search and it appears it really is the way forward. I did find it a bit strange speaking out load to the phone on my desk saying, “Ok Google” and I did get one or two strange looks although that may be nothing to do with Google. Looking back to the early 90’s; I didn’t think I would ever own a mobile phone and thought anyone who had one was a bit of a poser. Now admittedly, I am a bit of a tech geek, lack of knowledge on Voice Search aside. What is Voice Search? Voice search “does exactly... --- ### Meltdown and Spectre - Published: 2018-01-08 - Modified: 2023-12-22 - URL: https://it.ie/meltdown-and-spectre/ - Categories: Data Protection, Microsoft, Mobile Devices, Security, Virus What is Meltdown and Spectre We’re only at the start of 2018 and already we have two security risks to contend with. Meltdown and Spectre are two security vulnerabilities discovered in modern microprocessor chips that may allow attackers to exploit the chips common features and puts your personal data, including passwords, at risk. People are concerned about this troubling revelation and rightly so. Daniel Gruss who is one of the researchers who discovered the Meltdown bug stated that, "it is probably one of the worst CPU bugs ever found”. To be fair to Gruss and the other researchers at Graz University, they did inform Intel about their discovery before releasing their results. It allegedly took Intel a week to respond to the researchers who were then informed, that they were in fact the fourth team to discover a vulnerability, that included the related, but separate, Spectre flaw. It’s important to understand that, to date, there is no evidence to suggest that any attacks have taken place, however it's a race against time as no doubt, hackers are working on ways to exploit these vulnerabilities. Should an attack take place your passwords and other sensitive data are likely at risk. The image blow shows some information of the two threats. What should you do? Processor manufacturers are working with the hardware companies that incorporate their chips in their product lines to release patches and firmware updates, where necessary. Both IBM and Apple have released updates or firmware patches to protect against... --- ### Do you know where that USB device came from - Published: 2017-12-14 - Modified: 2022-10-05 - URL: https://it.ie/where-did-that-usb-device-come-from/ - Categories: Data Protection, Security, Virus - Tags: USB Security, USB Virus STOP! ! – Do you know where that USB stick or memory card came from? Was it delivered in the post? Did you simply find it on the ground and thought “What better way to establish who owns it than to plug it into my computer and see the owner’s details are on it”. Did you know that the biggest cyber-attack in the history of the U. S. military happened in 2008 when a non-U. S. intelligence agency left a USB flash drive in the car park of a U. S. military facility in the Middle East. An employee found the drive and most likely through curiosity or in an effort to establish the owner of the drive, connected it to his laptop. This resulted in the spreading of infection across both classified and unclassified systems and was described as the “Most dangerous attack in U. S. history. While not the most prevalent in the current wave of cyber-attacks, the possibility of your systems being infected by a USB drive or SD card haven’t gone away. You probably already know that you shouldn’t plug an unknown device into your computer but let’s be honest, human nature takes over. You get curious or just plain nosy. What harm can this little device in your hand do? I’ll have a peek at what’s contained on it. It might be important and I don’t want someone to get into trouble for losing it.  Stop, Stop, Stop! ! You don’t even have to open... --- ### Don't ignore the elephant in the room - Published: 2017-11-02 - Modified: 2022-12-05 - URL: https://it.ie/dont-ignore-elephant-room/ - Categories: Data Protection By now I'm sure you've heard of the impending apocalypse known as GDPR. Or at least that's what some advisors would have you believe.   In truth, a lot of it is interpretation. How much you change your business to achieve some semblance of compliance depends entirely on your unique set of circumstances. The important thing is that GDPR is now the elephant in the room and it's vital you acknowledge its existence. It really is amazing how unprepared many small business owners are for GDPR. There appears to be thinking that this will only affect big companies. GDPR will affect almost every business in the country and the clock is counting down rapidly.   My piece "GDPR and Your Business" is a comprehensive but not exhaustive guide to GDPR with an infographic on 12 steps to prepare for GDPR. If you aren't prepared for GDPR, don't panic and don't put it on the long finger either. Here are a few suggestion to get you started:Take the lead - GDPR will just be another part of running a business. Take this opportunity to make your business truly customer-centric by putting in place a GDPR compliance framework across your entire organisation. Think Consent - GDPR will make your customers more aware of their rights regarding the permissions you have to collect a retain their personal data. This is a good thing; however your customers will likely question you on it. You should look at opt-in versus opt-out . GDPR will also... --- ### BadRabbit Ransomware - Published: 2017-10-26 - Modified: 2023-12-22 - URL: https://it.ie/badrabbit-ransomware/ - Categories: Data Protection, Ransomware, Scams, Security Writing about ransomware is starting to feel like a full-time job and unfortunately only days after my latest ransomware piece, I find it necessary to warn you, once again about the latest threat. BadRabbit ransomware attacks started on October 24th and are currently ongoing. At the time of writing, attacks have so far taken place in Russia, Ukraine, Germany, Turkey and Japan and is likely to spread. Security experts have likened it to the recent WannaCry and Petya attacks. This attack appears to be hitting devices in what is known as drive-by attacks. While visiting a legitimate website you may be met with a pop up suggesting that you need to download a necessary Adobe Flash Update. Do not, under any circumstances click on any part of this pop up. Just exit and navigate away from the page. Ransomware payment is typically demanded in Bitcoins, with BadRabbit supposedly set at $280. This may seem a small price to pay to unlock your encrypted files however, IT. ie and leading security experts worldwide would strongly advise against making payment. There is no guarantee that you will have your files unlocked and you are more likely to fall victim again. The best way to ensure data continuity is to employ a reliable and secure online data backup service. BadRabbit has already caused travel delays in the effected countries by targeting critical infrastructure.    The malware attacks are disturbing because attackers quickly infected critical infrastructure, including transportation operators, indicating it was a "well-coordinated" campaign,... --- ### Cyber Security - Top Tips - Published: 2017-10-19 - Modified: 2022-06-08 - URL: https://it.ie/cyber-security-top-tips/ - Categories: Data Protection, Ransomware, Scams, Security, Virus It seems that there is a new cybersecurity threat emerging, every other day with ransomware and other phishing scams being the most prevalent. In that past I have written in detail about ransomware and the steps you should take to minimise your likelihood of attack. I recommend reading my piece “Ransomware – The complete survival guide” for a good understanding of the threat and how to mitigate your chances of attack. You should also look at my most recent post on the “Do’s and Don’ts of Ransomware”. This piece however is more generic in nature in that it’s a general guide of what to do to help protect you from a variety of cyber threats. This isn’t an exhaustive guide but a simple list of practical steps that you and your team should implement. Antivirus – No matter what antivirus solutions you use, it is of no value if it isn’t up to date. While there are some pretty good free solutions out there, many of them require a manual update, leaving you open to possible attack. I would highly recommend that you invest in a trusted and reliable anti-virus solution to protect your business. Ensure that your firewall is on – A good anti-virus solution should also have a good firewall and as the name suggests, a firewall is a wall between your system and the internet. It is designed to protect you from any number of malicious threats and it is therefore vital to ensure that it is... --- ### Keep your Passwords Secure - Published: 2017-10-14 - Modified: 2022-05-05 - URL: https://it.ie/keep-passwords-secure/ - Categories: Data Protection, Security We all have a multitude of passwords for a multitude of logins to a multitude of websites. What most don't do, however, is make each and every password unique, strong, and random (series of letters and numbers that don't relate to anything). While it's very easy for me to tell you that every login password should be unique, the reality is that most people use the same small number of passwords with slight variations across various websites. With the ever-increasing instances of cyber-attacks across the web the likelihood of you getting attacked across several websites is increasingly likely. Every website is vulnerable to a cyber-attack and if your data is compromised on one website, cyber-criminals can use your login details and/or passwords to compromise you on other sites.  Having your personal data compromised is "Pants". Follow these 3 easy steps to help keep your passwords and data, safe and secure:Change them often - While I'm not saying that you should change them every day (I mean passwords; I really do think you should change your underwear daily) it would be highly advisable that you change your passwords regularly using random characters and symbols and not common words or phrases.  Don't share with anyone - It isn't always good to share. You probably shouldn't share your underwear and never share your passwords. Don't leave them lying around - I'm sure most people wouldn't be comfortable with their underwear lying around and the same is true of your passwords. Don't write them... --- ### Check if your email address has been compromised in a data breach - Published: 2017-10-01 - Modified: 2017-10-01 - URL: https://it.ie/check-if-your-email-address-has-been-compromised-in-a-data-breach/ - Categories: Uncategorized It's almost unimaginable how much of your personal data has accumulated online. Every day most of use, login to accounts, sign up to forums and eCommerce sites or simply browse the web. Every interaction you have online results in the collection of data. With so much of your personal data held on the servers of numerous companies and online entities, you shouldn't be surprised when you hear that your personal information has been compromises by scrupulous characters. A data breach is defined as the intentional or unintentional release of secure, private or confidential information to an untrusted environment. The implementation of the General Data Protection Regulation (GDPR) will have a positive effect for citizens of the EU in that it will enforce the data protection rights of EU citizens and give them greater control of the retention and use of their personal data (I recommend reading my previous post titled (GDPR and Your Business). I recently came across a handy website that allows you to enter you email address and immediately inform you if your account has been compromised. It also has the facility to warn notify you should you account fall victim to a compromise in the future. Simple navigate to Pwned Homepage and give it a try. Fingers crossed you will get the same positive response that I did. --- ### Popular Computer Optimisation Software CCleaner Hacked - Published: 2017-09-23 - Modified: 2017-09-23 - URL: https://it.ie/popular-computer-optimisation-software-ccleaner-hacked/ - Categories: Security, Software, Virus Computer optimisation software is supposed to keep your computers running smoothly. Unfortunately it turns out that one of the most popular software tools out there, CCleaner from Avast Pitform is not doing "Exactly what it says on the tin". Last week, It was discovered that CCleaner had become infected with Malware and may effect approx 2. 3 million machines. What does the malware Do? The malware gathers a host of information including, your IP address, computer name, a list of installed software on your computer, a list of active software and a list of network adapters and sends it on to a third party computer server. It appears that financial information such as credit card numbers are safe. So, who was infected? It is believed that the infected version of the software affects about 2. 3 million users. The compromise to the system is believed to have started on 03 July prior to Avast buying the company and the problematic version of the software was released on the 15th of Aug. It also appears to specifically affect users of Windows 10 32 bit systems although it has not be ascertained for certain that other version of Windows have not been effected. What are the corrupted versions of CCleaner? The effected versions are CCleaner v5. 33. 6162 or CCleaner Cloud v1. 07. 3191 for 32 bit Windows machines. It doesn't appear to affect the Android version of the software. Avast say that 730,000 users are still using the infected version of... --- ### Missed Call (Wangiri) Scam - Published: 2017-08-21 - Modified: 2022-08-24 - URL: https://it.ie/missed-call-wangiri-scam/ - Categories: Scams, Security - Tags: Missed Call Scam, Mobile Phone Scam, Wangiri This post was originally published in August 2017 at the height of the last wave of what is know as the “Wangiri Scam” or “Missed call scam”. Unfortunately it has become necessary to re-post this piece with reports of thousands of scam mobile phone calls are being received throughout the country.   While the call prefixes may change, the negative impact on your bank balance, should you call back has not. A mobile phone scam that has being doing the rounds for a number of years now has hit the headlines over the past week with numerous reports in Ireland of phone users being targeted. Internationally it is known as the Wangiri Scam that originated in Japan back in the early 2000’s with Wangiri literally meaning “one ring and cut”. How it Works The scammers buy up a range of numbers and then use automated machines to randomly make quick missed calls to different numbers. You’ll receive a call from an overseas number that you don’t recoginse, however your phone will only ring a couple of times before the caller hangs up.  Don’t call back – the scam is only successful if you do. You will almost immediately be put on hold all the while connected to a premium rate number and left with the mother of all phone bills.   The current wave of calls appear to originating from Africa with numbers beginning with +224 Guinea, +252 Somalia, + 235 Chad, however the number could be any combination, with numbers... --- ### CEO Fraud Scam - Published: 2017-07-30 - Modified: 2023-04-24 - URL: https://it.ie/ceo-fraud-scam/ - Categories: Data Protection, Scams, Security - Tags: Email Scam, phishing, Social Engineering Over the last few weeks, we have seen a significant increase in reports of companies being targeted by a particular type of email scam that has been doing the rounds for a couple of years now. CEO Fraud is a scam in which cybercriminals spoof company email accounts and impersonate executives to try and fool an employee in accounting or HR for example, into executing unauthorised wire transfers, or sending out confidential tax information.   Meath County Council, the most high-profile victim in Ireland was targeted in late 2016 when cybercriminals spoofed the identity of chief executive Jackie Maguire and tricked the council into transferring €4. 3 million into a bank account in Hong Kong. Luckily the scam was discovered in time and the money was frozen in the Hong Kong bank account. Meath County Council confirmed in June 2017 that the money has since been returned.   There are Four Attack Methods 1. Phishing Phishing emails are sent to a large numbers of users simultaneously with the intention to “fish” sensitive information by posing as known and reputable sources. These emails will liklely have legitimate looking graphics and logos included. Banks, credit card providers, An Garda Síochána and revenue are a few of the common ones. A phishing campaign typically sends out emails to huge numbers of users. Most recipients don’t use that bank, card provider etc, that the mail purports to be from but by sheer weight of numbers, these emails arrive at a certain percentage of likely candidates. 2. Spear... --- ### GDPR and Your Business - Published: 2017-07-22 - Modified: 2022-12-05 - URL: https://it.ie/gdpr-and-your-business/ - Categories: Data Protection Is your Business GDPR Ready A new regulation relating to data that can be used to identify an individual comes into force in May next year. All customer organisations need to be aware of the rules or risk huge penalties. In this special feature, we look at the essentials of GDPR and help our clients and friends address the challenges. General Data Protection Regulation (GDPR) is coming and it can’t be avoided or ignored. After 25 May 2018 organisations that don’t know what personal data they hold, or don’t do enough to protect it, face potential fines of up to 4% of their turnover, or €20 million. Many businesses have very little understanding about what GDPR is, what it means and what is required. After May 25th, 2018 businesses will need to show that they know what information they’ve got and are protecting data sufficiently.  Denial of Service Week Under GDPR, the regulator as well as individual citizens will be entitled to ask organisations what information is being held – and every business or organisation will be expected to respond swiftly and appropriately. One major concern, especially for large organisations, public-sector departments and county councils is that come 25 May 2018, there will be thousands of requests being made by members of the public. In security circles, this is being referred to as “Denial of Service Week” because it is believed that some organisations will be totally swamped by requests, to which they will have to respond within a set period.... --- ### Enforce a Strong Password Policy with Windows Server - Published: 2017-07-18 - Modified: 2017-07-18 - URL: https://it.ie/enforce-strong-password-policy-windows-server/ - Categories: Security No matter how secure you make a user’s password initially, she will eventually choose her own password. Therefore, you should enforce strong password policies that define a secure password for your systems. Account policies are a subset of the policies configurable in Group Policy. Here’s a look at the key settings you will work with. Enforce Password History This sets how frequently old passwords can be reused. With this policy, you can discourage users from alternating between several common passwords. Windows Server 2008 R2 can store up to 24 passwords for each user in the password history. To disable this feature, set the value of the password history to 0. To enable this feature, set the value of the password history using the Passwords Remembered field. Windows Server 2008 R2 then tracks old passwords using a password history that’s unique for each user, and users aren’t allowed to reuse any of the stored passwords. Note: To prevent users from working around the Enforce Password History settings, you should prevent users from changing passwords immediately. This stops users from changing their passwords several times to wipe the history and get back to the old password. You can set the time required to keep a password with the Minimum Password Age policy. Maximum Password Age This determines how long users can keep a password before they have to change it. The aim is to force users to change their passwords periodically. Generally, you use a shorter period when security is very important and... --- ### Beware of fake purchasing order scam - Published: 2017-07-08 - Modified: 2017-07-08 - URL: https://it.ie/beware-fake-purchasing-order-scam/ - Categories: Scams - Tags: Purchase Order Scam Gardaí are warning businesses of a purchase order scam, following a spate of incidents in Cork recently. In this scam the fraudsters will attempt to order items from suppliers by providing them with a fake purchasing orders purporting to come from a legitimate and trusted buyer. How does it work? You, the supplier will receive an email from a fake domain, for example @companyname. com as opposed to the legitimate @companyname. ie requesting a quote for an item or number of items. This will then be followed up by a purchase order that will look almost identical to the one you would expect from the legitimate and trusted company. You are then asked to have the items delivered to an address in Ireland that is not affiliated with the legitimate company. If you are unfortunate enough to be fooled by this scam, you will never receive payment or see the items again. How to identify the fraudulent emails: Incorrect email domain names are being used. The delivery address is not the actual address of the legitimate company in question. Emails are being written with poor grammar and spelling. Unusually large quantities of items are being ordered. Use of a fake phone number from the company. If you receive any purchase orders that you are not 100% confident is coming from a trusted source it is highly recommended that you follow up the order with a phone call to the trusted company to confirm. “Do not contact that name or number... --- ### Cybercrime Part 3 - Fighting the Attack - Published: 2017-06-14 - Modified: 2017-06-14 - URL: https://it.ie/cybercrime-part-3-fighting-attack/ - Categories: Data Protection, Ransomware, Scams, Security, Virus - Tags: Data protection, Online Backup, Ransomware In Part 2 of this series on cybercrime I explained what Phishing is and how a particular form of phishing, known as ransomware has come to prominence and accounts for a reported 97% of all phishing attacks. In this section I will explain the steps we at IT. ie highly recommend that you immediately take to reduce the effect of the attack on your IT systems. OK, so you've received a mail from a source that may or may not be known to you. The mail heading looks genuine enough, in that it may seem relevant to the department you work in, accounts, procurement etc. Anyway,  when you open the mail, you find that there is a link or a number of links you are encouraged to click on.  You click on the link and in this example, nothing happens. You move on to your next email. Then anything from a  few hours to approximately 3 days (depending on the amount of files) you are  met with a message similar to this.   Congratulations, you are now the unlucky winner of a ransomware attack. For all intents and purposes, your computer is unusable to you and some, or more likely, a large amount of all of your folders have now been encrypted.           Immediate actions on discovering a ransomware attack? Disconnect: Without doubt the first thing you must do is disconnect the infected computer from the network and even power down everything. Don't panic, the instant... --- ### Cybercrime Part 2 - Prepare for the Attack - Published: 2017-06-06 - Modified: 2017-06-06 - URL: https://it.ie/cybercrime-part-2-prepare-attack/ - Categories: Data Protection, Ransomware, Scams, Security, Virus In part 1 of this series on cyber crime, I explained its origins and that in its infancy, hacking was a tool used to improve early computer programs and not originally designed with theft in mind. To be fair to hackers, the majority have no interest whatsoever in engaging in illegal activity. In fact many large institutions, both government and financial engage the services of hackers to test vulnerabilities in their systems, in what is known as ethical hacking. At the end of this series, I will go into a little detail on the other forms of cyber crime, but for now the biggest threat to your business is from what is known as “Phishing”. I hear you ask, “What is “Phishing”? Phishing is defined as “the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers”. This definition while still relevant, is a little outdated. Yes, cyber criminals do still spread emails purporting to be from reputable sources with the sole purpose of obtaining personal or financial information from you, however, it is reported that up to 97% of phishing emails are now of the ransomware variety. So, rather than steal information from you, they simply encrypt your data both business related and private and then demand a ransom. Their bounty is usually payable in Bitcoin. So, how do you prevent a ransomware attack? In part one, I explained in blunt terms, that... --- ### Cybercrime Part 1 - A Brief History - Published: 2017-05-30 - Modified: 2022-10-05 - URL: https://it.ie/cyber-crime-part-1-brief-history/ - Categories: Ransomware, Scams, Security, Virus - Tags: Cybercrime, Hacking, IT Scams, IT Security, Ransomware Share this article? Share on facebook Share on Facebook Share on twitter Share on Twitter Share on linkedin Share on Linkdin Share on pinterest Share on Pinterest In light of the recent global ransomware attack by the Wannacry virus, I have decided to put together a series of posts to help you, the business owner greatly reduces your chances of a cyber-attack. Before I get into this, let me be very clear - nobody can give a guarantee that you won’t fall victim to cyber-criminals. “This can’t be”, I hear you say. “Surely the anti-virus solution I have and the IT company I pay will guarantee my protection”. Let me be blunt; if your IT Support is telling you that they can guarantee you protection from cyber-criminal, they are quite misguided! The truth of the matter is, the cyber-criminals, while immoral and highly unethical, are in the large part extremely clever and make it their mission to be several steps ahead of the very best antivirus & firewall solutions. This doesn’t mean, however, that you should go it alone without expert IT guidance. IT systems are one of the most, if not the most vital components of each and every business today, irrespective of size. Put simply, if your IT systems are compromised in any way whatsoever, your business is at risk. So, no matter what the nature of your business may be: if you have IT systems connected to the internet, you are attractive to the bad guys and... --- ### Get The Most Out Of Microsoft Office 365 - Published: 2017-05-21 - Modified: 2017-05-21 - URL: https://it.ie/get-microsoft-office-365/ - Categories: Microsoft, Office 365 - Tags: Microsoft Office 365, Office 365 Tips So, I’ve purchased a Microsoft Office 365 subscription for my business. Great  Ok, so I have Word, excel and PowerPoint etc. in the cloud. Got that.    I can use it across and download on several devices. All good. But, what makes it so different from the old Microsoft Office package   Office 365 is a cloud based office software package that is designed with intelligent features that focuses on collaboration and productivity. I have put together some simple tips and tricks to help you get the most out of your 365 subscription. Remote and Collaborative Editing Collaboration is very important to any business and so, Office 365 allows users to edit the same document at the same time, thus making collaborating easier? As long as you have an internet connection, both you and your colleague(s) can work on the same document. You Can Skype While You Type Sending documents back and forth is now finally over with the Word Online integration of Skype for Business. Skype for Business offers live chat feature when you are working on a document. It also allows you to see when your fellow editor is typing, copying and pasting, in the document, as you can see their names beside their cursors. It’s Accessible on Any Device Office 365 is designed to increases overall productivity It’s features are available even if you are working on your phone, tablet, desktop PC, or the web. Its easier to access your resources from anywhere and from any device. You... --- ### The Battle Between HDD and SSD – And The Winner Is? - Published: 2017-05-09 - Modified: 2023-12-22 - URL: https://it.ie/battle-hdd-ssd-winner/ - Categories: Data Management - Tags: Hard Disk Drive v Solid Disk Drive, HDD v SSD In conclusion, the threat of cryptojacking is both real and immediate. Understanding its mechanisms, impact, and prevention strategies is crucial for safeguarding our digital space from malicious actors. As people are often the primary targets of cyber-attacks, their actions play a pivotal role in determining the outcome of such attacks. By fostering a culture of cyber awareness, individuals can be better prepared to respond appropriately when faced with potential threats. It's likely that the computer system you are using today is still equipped with the traditional spinning Hard Disk Drive (HDD) and while there is no urgent rush to change them, just as VHS was replaced by DVD, HDD drives are slowly being replaced by Solid State Drives (SSD). How do they differ?   A HDD with magnetic platter (left) and a SSD with microchips (right). The main difference between HDD and SSD is that a HDD drive (left of image) has moving parts and records information on a storage platter by moving a mechanical arm with a read/write head over a spinning platter. The SSD (right of image) on the other hand has no moving parts and stores information on microchips. The familiar USB memory stick is a form of SSD and therefore the SSD you can expect to find in a laptop or desktop computer is simply a larger, more sophisticated version of your traditional thumb drive. So, what are the other differences between the two? Storage capacity and priceIt isn’t difficult to find affordable HDDs with several terabytes... --- ### Ransomware Market Share - Published: 2017-05-04 - Modified: 2017-05-04 - URL: https://it.ie/ransomware-market-share/ - Categories: Ransomware - Tags: C.U.B.E, Cerber, Cloud Backup, Internet Security, Online Backup, Online Storage, Ransomware Yes, this is a thing now! I can’t believe I’m writing a post about the leader in Ransomware. But it is 2017 and we’re now entering the formative years of this relatively new threat... Cerber, has been one of the most active malware families over the past year and has increased its share of the ransomware market to 87% in the first quarter of 2017. What’s significant for business’s is the fact that Cerber is primarily targeting corporate machines over home users, reports Microsoft. The Cerber threat accounted for 70% of the ransomware market in January and has continually increased its share through February and March, amid a major decrease in the traditional Locky attacks. Malwarebytes, "Cybercrime tactics and techniques Q1 2017" report (PDF) reads. What is Cerber? The Cerber Ransomware is an infection, similar to Locky, Spora, Sage and the now defunct TeslaCrypt, that is used to encrypt the victims' files. The Cerber Ransomware adds the extension CERBER to every file it encrypts. After the Cerber has encrypted some of the files of the victim, it demands the payment of a ransom (usually by Bitcoin) in exchange for the decryption key. According to Cerber Ransomware's ransom note, computer users have one week to pay the ransom amount before this amount is doubled. Cerber’s sole reason for existence is to extort money illicitly from you and your business. The creators of Cerber have designed it to work as a business model for cybercriminals and is also available as a Ransomware as... --- ### Introducing Microsoft To-Do—now available in Preview - Published: 2017-04-22 - Modified: 2017-04-22 - URL: https://it.ie/introducing-microsoft-now-available-preview/ - Categories: Microsoft, Office 365 Microsoft have introduced a new, intelligent task management app that makes it easy to plan and manage your day. Say hello to Microsoft To-Do—now available in Preview. To-Do comes from the team behind the Wunderlist app, and delivers a smarter, more personal and intuitive way to help people stay organised and get the most out of every day. Powered by Office 365 integration and an intelligent algorithm, it is the first step on the journey to simplify task management and help you achieve more. All your to-dos in one place To-Do helps you create a list for anything—for work, home projects or just your groceries. You can keep track of deadlines by adding reminders, due dates and notes, and personalise each list with colourful themes. You can access your lists from anywhere with the To-Do apps for iPhone, Android phone, Windows 10 devices and the web. Plan your day with Intelligent Suggestions Managing your to-dos and lists can sometimes take as much effort as completing them. To-Do helps you focus and plan your day from the moment you open the app. Every morning, your My Day list starts out with a clean slate, allowing you to be more intentional about what you want to get done. You can also tap Intelligent Suggestions for ideas on what’s most important. Just tap the lightbulb, and you’ll see any to-dos from the day before, what’s due or upcoming, and other helpful suggestions based on To-Do’s smart algorithm. Just add the ones you want... --- ### SharePoint Virtual Summit 16 May 2017 - Published: 2017-04-15 - Modified: 2017-04-15 - URL: https://it.ie/sharepoint-virtual-summit-16-may-2017/ - Categories: Microsoft, Office 365 - Tags: Microsoft, Office 365, SharePoint, Virtual Summit With more than 85 million active users, Office 365 empowers individuals, teams and entire organizations with the broadest and deepest toolkit for collaboration. Office 365 is designed to meet the unique workstyle of every group with purpose-built, integrated applications: Outlook for enterprise-grade email; Yammer for networking across the organization; Skype for Business as the backbone for enterprise voice and video; Microsoft Teams, the new chat-based workspace; and SharePoint for intelligent content management and intranets. The Future of SharePoint virtual event held last May was viewed by over 50,000 people, where Microsoft unveiled a new vision and roadmap for SharePoint and OneDrive. Since then they have delivered on new innovations, including: The first ever SharePoint app across all mobile platforms and a new SharePoint home experience in Office 365. Modern SharePoint Team Sites seamlessly connected to Office 365 Groups and Microsoft Teams. A new OneDrive Sync client with support for SharePoint files and shared folders. PowerApps and Microsoft Flow integration to support rapid app and business process development. SharePoint Framework, a modern, client-side development model and toolchain to usher in the next generation of custom development on SharePoint. New security and compliance capabilities such as data loss prevention (DLP), Conditional Access and Mobile Device Management (MDM). At this year’s SharePoint Virtual Summit, you’ll learn how to take advantage of SharePoint, OneDrive and the rest of the Office 365 collaboration toolkit to create a connected workplace, empowering you to securely connect to the people and content you need, to transform business processes, to... --- ### Windows 10 Creators update is now available - Published: 2017-04-14 - Modified: 2017-04-14 - URL: https://it.ie/windows-10-creators-update-now-available/ - Categories: Microsoft, Software, Windows 10 After much beta testing and new feature additions, Microsoft's Windows 10 Creators Update is finally rolling out. You can either wait for it to hit your machine, which could take months, or use the Update Assistant and get it now. Just beware that with the latter option, you'll want to pay rapt attention to the privacy screen -- otherwise, it will reset your carefully chosen settings to the default ones. The privacy screen (below) does force you to "accept" the settings, or it won't let you continue the update. Even if you do make changes, however, you'll likely have to tweak them further afterwards, as the installation screen just includes general tweaks to categories like "location" and "speech recognition. " In Windows 10 Creators Update, though, there are at least 18 different categories. Some of the key featuresGame Mode Microsoft is focusing on improving the gaming experience in Windows 10 Creators Update. A new Game Mode in the Xbox app will prioritize CPU and GPU resources for a game. It’s designed to reduce background tasks and other apps from hogging all the system resources, and ultimately make sure that games run as best as they can on a Windows 10 PC. New Game Mode feature in Windows 10. Microsoft has also added Beam streaming (similar to Twitch) to the Xbox app for Windows 10, so all users have the ability to stream their gaming sessions to friends. Game Mode will need to be enabled on a game-by-game basis, but publishers... --- ### IT.ie - Coming in 2017! - Published: 2017-03-31 - Modified: 2017-03-31 - URL: https://it.ie/ie-coming-2017/ - Categories: Marketing We don't clown around. Our IT Support is frighteningly good :) ! ! https://it. ie/wp-content/uploads/2017/03/IT. ie-Movie-Poster. jpg --- ### Remote IT Support - Published: 2017-03-28 - Modified: 2022-05-31 - URL: https://it.ie/remote-it-support/ - Categories: PC Repairs, Remote Support - Tags: IT Support. Business IT Support --- ### We're Hiring - Field IT Engineer Required - Published: 2017-03-20 - Modified: 2017-03-20 - URL: https://it.ie/were-hiring-field-it-engineer-required/ - Categories: Careers, Vacancies Field IT Engineer Required.  Salary commensurate with experience. This position is available to the individual who wants to gain vast experience in the IT Industry. Applicants must have at least 3 years experience in a similar Field IT Support role. Must have experience: Active Directory, MS Server Suite, Exchange, Office 365, VPN, RAID, Port forwarding  and Backup Systems. Duties & responsibilities:- Field- Based IT Technician. - Server experience is a must. - Install Servers, Desktops & Laptops, etc. - Configuration of various software & hardware systems. - Provide remote Technical Support. - Install Windows Servers, Deployment, etc - Account Management. Candidate: - Highly Motivated. - Excellent Work Ethic. - Full Driving Licence - 6 Month probationary period. - Confident, personable and well-rounded individual. Salary/Benefits - Laptop and Mobile Phone. - Company Car \ Fuel Allowance provided (negotiable) - Salary will meet experience. CV’s to be sent to careers@it. ie We currently do not require the assistance of agencies. --- ### Windows 10 Snip Tool - Published: 2017-03-19 - Modified: 2017-03-19 - URL: https://it.ie/windows-10-snip-tool/ - Categories: Windows Tips - Tags: Screen Capture, Snip Tool Windows 10 Snip Tool In our last post we explained briefly the benefits and uses of the Windows Snipping Tool. In windows 10 however, Microsoft have taken it to a new level with the Snip Screen Capture Tool. Essentially, it's the older Snipping Tool on steroids. The Snip tool has three primary functions -Capture, Whiteboard and Camera  The plain captures are copied to clipboard and if you add audio to the file, then it will automatically be converted to a MP4 file. The converted file can be embedded on websites and can also be viewed as a standalone video from Microsoft’s servers.  Here are some of it's features explained. TheCapture buttoncan be used to capture screen shots by either cropping section desired or simply by capturing the entire screen by pressing enter. Once the screenshot is captured,  it automatically navigates to the Snip Editor. This editor consists of several tools to make your screenshot better and more intuitive. TheRecord buttonwill not just record the annotations and the other actions you carry out on the screenshot but it can also record your voice allowing us to explain better. The screen is saved locally by default and it can also be shared through email. Whiteboardis more like an extended paint tool and it will let you scribble your thoughts and simultaneously explain them through voice recording. And finally, theCamera capture button, which simply switches on your webcam and allows you to take a picture of yourself. The editing options here are same for... --- ### Snip Snip - Published: 2017-03-19 - Modified: 2017-03-19 - URL: https://it.ie/snip-snip/ - Categories: Windows Tips - Tags: Screen Capture, Snipping Tool   Windows Snipping Tool "Why did I never hear about this tool before now". "I'll never get back the hours I've wasted before I discovered this tool" Two fairly common statements made by windows users when first introduced to the simple but essential Snipping Tool Sometimes the easiest way to make a copy of something is to take a snapshot of your screen—this is what Snipping Tool does. An essential toll for presentations or if you simply want to add a screen grab or portion of your screen to an email as an image file. Capture part or all of your PC screen, add notes, save the snip, or email it right from the Snipping Tool window. You can capture any of the following types of snips: Free-form Snip. Draw a free-form shape around an object. Rectangular Snip. Drag the cursor around an object to form a rectangle. Window Snip. Select a window, such as a browser window or dialog box, that you want to capture. Full-screen Snip. Capture the entire screen. After you capture a snip, it's automatically copied to the Snipping Tool window. From there, you can annotate, save, or share the snip. Simply type Snipping Toll into your search window and snip away.   --- ### Confidentiality Agreements - Published: 2017-03-19 - Modified: 2017-03-19 - URL: https://it.ie/confidentiality-agreements/ - Categories: Data Protection, Security We're an IT Support & Services company who deals with confidential & sensitive client information on a daily basis. We treat the protection of this data as paramount to the successful relationship between IT. ie and its' clients.  Did you know. . We offer all clients an electronically signed confidentiality agreement! Please email info@it. ie to receive yours.   --- ### IT.ie, proud sponsors of Erins Isle - Published: 2017-03-14 - Modified: 2017-03-14 - URL: https://it.ie/proud-sponsors-erins-isle/ - Categories: Uncategorized We are extremely proud to announce our sponsorship of the Erins Isle Junior Football Team. Erins Isle is a Finglas institution with a proud tradition of supporting the local community. We sincerely hope this is merely the beginning of our relationship with the club.  “Having both played and worked  for Erins Isle in the past, it is a genuine honour to sponsor the junior football team. I'm extremely grateful for everything the club has done for me and delighted now that IT. ie is involved.  I also think it’s vitally important for local businesses to support the local community and I look forward to many years of a successful partnership between IT. ie and Erins Isle”,  said Eamon Gallagher, founder & Managing Director of IT. ie. Eamon Gallagher and John Grennan of IT. ie along with some of the local players and coaching staff at Erins Isle. --- ### Are you ready for GDPR? - Published: 2017-03-08 - Modified: 2023-12-22 - URL: https://it.ie/are-you-ready-for-gdpr/ - Categories: Data Protection - Tags: Data protection, Data Protection. GDPR The General Data Protection Regulation ("GDPR") will come into effect on 25 May 2018 replacing the existing data protection framework under the EU Data Protection Directive. It has been described as the most ground-breaking piece of EU legislation in the digital era. The aim of GDPR is to make businesses more accountable in data privacy compliance and offers citizens extra rights and more control over their personal data. The Data Protection Commissioner has published a useful guide entitled “The GDPR and You” (Found Here). What follows are some of the key elements effecting organisations under GDPR. Full details are available from www. eugdpr. orgTerritorial Scope: Any organisation, whether established in the EU or not, processing the personal data of data subjects located in the EU, and data controllers and processors established in the EU, will be subject to the GDPR. This will also affect non-EU businesses with websites directed at the EU, such as online advertisers and e-commerce businesses. Data Protection Impact Assessments (“DPIAs”): DPIAs will be mandatory in respect of any project where “high risk” data processing is envisaged, including profiling, large scale processing of special (sensitive) categories of personal data or large scale processing of public areas. Consent: Data subjects must freely give specific, informed and unambiguous consent to the processing of their data. The GDPR also gives EU member states discretion to decide what the minimum age will be for data subjects to consent to processing of their personal data. Privacy by Design: Privacy by design as... --- ### Online Backup v Online Storage - Published: 2017-03-01 - Modified: 2017-03-01 - URL: https://it.ie/online-backup-v-cloud-storage/ - Categories: Ransomware, Scams, Security, Virus - Tags: Cloud Storage, Online Back up, Online Storage, Ransomware It can be tricky understand the difference between online backup services vs cloud storage service. Both services effectively store your information in the cloud but offer a very different feature set. Knowing the difference between the two is vital to helping you understand what you can expect when you look to the cloud for storage. What is Online Backup? Online backup secures your data in the cloud, thus ensuring business continuity in the event of disaster. A program makes a copy of your files and saves them on a secure online server. If you have a system crash or are the victim of ransomware attack you simply restore your files from your online backup. Data is secured by redundant backups, is encrypted with enterprise level security and maintained by highly trained IT administrators. Online backup is relatively inexpensive and IT. ie offer a very reliable service starting from €30 a month. Our slogan is; “Backup is cheap but recovery is expensive”. Studies have shown that 60% of companies that have lost their data will likely close within 6 months. What is Online Storage? Online storage is the little brother of Online Backup. Whereby the online backup protects your files from disaster, the online storage allows you to access and sharing of your files from any device anywhere. It provides a space where you can access, modify, share and transfer files online. The main difference is that with online or cloud storage you can collaborate with others on a document or... --- ### New Office 365 capabilities help you proactively manage security and compliance risk - Published: 2017-02-22 - Modified: 2017-02-22 - URL: https://it.ie/new-office-365-capabilities-help-proactively-manage-security-compliance-risk/ - Categories: Microsoft, Office 365, Security - Tags: Compliance, Microsoft, Office 365, Office 365 Security   Missing a key security signal could mean not catching a breach, but the number of security signals is increasing exponentially. It’s becoming impossible to manually prioritize them. That’s why Office 365 applies intelligence to help you proactively manage risk and ward off threats. Today, we’re pleased to introduce several new capabilities in Office 365 that help you manage risk and stay ahead of threats: Office 365 Secure Score—A new security analytics tool that applies a score to Office 365 customers’ current Office 365 security configuration. Office 365 Threat Intelligence Private Preview—Service that leverages billions of data points from the Microsoft Intelligent Security Graph to provide actionable insights to the global threat landscape and help customers stay ahead of cyber threats. Office 365 Threat Intelligence is now in private preview, with general availability planned for later this quarter. Office 365 Advanced Data Governance Preview—Applies machine learning to help customers find and retain the most important data to them while eliminating redundant, obsolete and trivial data that could cause risk if compromised. Office 365 Advanced Data Governance is now in preview, with general availability planned for later this quarter. Know your Office 365 Secure Score Do you know how you’d be rated if someone were to evaluate your security configuration? To give you better visibility into your Office 365 security configuration and the security features available to you, we’re pleased to introduce Secure Score—a new security analytics tool. Secure Score helps you understand your current Office 365 security configuration and shows... --- ### RANSOMWARE: Common Bad Practices Are Your Biggest Threat - Published: 2017-02-09 - Modified: 2017-02-09 - URL: https://it.ie/ransomware-common-bad-practices-biggest-threat/ - Categories: Ransomware, Scams, Security, Uncategorized, Virus     2016 was without doubt, the year where ransomware became a real threat to business’s worldwide. Ireland has not escaped the reach of global cybercriminals. Dell EMC has described it as one of the biggest cyber threats ever, to both SME’s and large multinationals. Unlike phishing, up 115% in the second quarter of 2016, and where cybercriminals attempt to obtain passwords and other sensitive information using social engineering and malware: ransomware attacks prevent you from accessing your own information.  “Generally speaking, ransomware is activated in the same way as any other malware: users are duped into opening an email attachment or following a suspicious link,” said Gerry Murray, Country Manager, Dell EMC Ireland. The ransom demanded can be in the high €100’s or high €1000’s with no business immune from the threat. IT. ie engineers have many years’ experience in supporting SME’s in Dublin and throughout Ireland and have been on the front line of every cyber threat over the past decade. Our clients often ask us “Can you 100% prevent ransomware from entering our office IT systems”? The honest answer is NO; it is not possible for any IT support service to absolutely prevent an attack on your systems. With our assistance, however, we can help you, the business owner or manager to greatly reduce your chances of an attack. Most attacks, are successful because of the common bad practices by IT systems users. CUBE (See below) is a short guide from IT. ie as to what you should... --- ### Sole Trader Splurges on Tech Domian - Published: 2016-09-27 - Modified: 2023-12-13 - URL: https://it.ie/sole-trader-splurges-on-tech-domian/ - Categories: Online Press Publication Pithy domain names are hot property and it’s not unusual for large sums of money to be paid to secure them. After one and two-letter domain names became available last year, a small Dublin IT services firm decided to shell out €10,800 for IT.ie. https://businessplus. ie/sme/sole-trader-splurges-tech-domain/ --- ### Business Plus Publication - Published: 2016-09-08 - Modified: 2016-09-08 - URL: https://it.ie/business-plus-publication/ - Categories: Marketing Business Plus Publication. --- ### IT.ie | Same IT Company. Shorter Name - Published: 2016-08-01 - Modified: 2016-08-01 - URL: https://it.ie/ie-company-shorter-name/ - Categories: Uncategorized --- ### PCtechnix is now IT.ie - Published: 2016-05-25 - Modified: 2016-05-25 - URL: https://it.ie/pctechnix-now-ie/ - Categories: Uncategorized What a year 2016 is shaping up to be. Having moved to a larger modern premises at the start of the year to accommodate our ever growing client base, we are now re-branding and PCtechnix will now be known as IT. ie. As PCtechnix we have earned a solid reputation for our proven ability with installing, supporting, repairing and maintaining computer systems. We are customer focused, honest, efficient and always professional. PCtechnix was a leader in the field with over 600 active clients and IT. ie will be the leader in the future of IT solutions. A leader needs a challenge, so talk to us today about your IT needs. You set the challenge and IT. ie will provide the solution. --- ### IMPORTANT TIP: Business Online Banking - Published: 2016-03-18 - Modified: 2016-03-18 - URL: https://it.ie/important-tip-2-step-verification-business-online-banking/ - Categories: Message --- ### We Have Moved - Published: 2016-01-31 - Modified: 2016-01-31 - URL: https://it.ie/moved/ - Categories: Message PCtechnix. ie Unit 36 Finglas Business Centre, Jamestown Road, Finglas, Dublin 11 D11 FY07 --- ### Happy Christmas from PCtechnix - Published: 2015-12-06 - Modified: 2015-12-06 - URL: https://it.ie/happy-christmas-pctechnix/ - Categories: Uncategorized See our Christmas newsletter here. --- ### PCtechnix.ie - Drawing in your Business - Published: 2014-05-14 - Modified: 2014-05-14 - URL: https://it.ie/pctechnix-ie-drawing-business/ - Categories: Marketing - Formats: Video --- ### Windows XP: Time to Upgrade? - Published: 2014-03-31 - Modified: 2014-03-31 - URL: https://it.ie/windows-xp-end-of-an-era-time-to-upgrade/ - Categories: Uncategorized For obvious reasons, we've had a lot of calls from customers looking for advice on what to do with their Windows XP machines. Hopefully, for those concerned, this brief article will help. What exactly is 'end of support' ? After 12 years, support for Windows XP will end on April 8, 2014. This effectively means that there will be no more security updates, patches, hotfixes or technical support for the Windows XP operating system. What does this mean? To be blunt, it means you should be looking at replacing your computer as soon as possible. You will be running on an unsupported system and although the likelihood of any major catastrophic event occurring is fairly low, you are putting your business at unnecessary risk. Chances are, that the computer(s) in question is extremely slow and is already beyond any economical upgrade. I'm not Upgrading. . Ok, you're not alone. Some final advice then. Make sure you have all of the final updates, patches, etc from Microsoft properly installed. Update your Internet Security Suite. DO NOT USE ANY FREE PRODUCTS. Get a paid subscription. Regularly backup your Data. Some industry experts are predicting that hackers may well be waiting until after April 8th to release their windows XP exploits.   For queries relating to upgrading your desktop or laptop, please call (01) 8424114 or email us at info@pctechnix. ie --- ### Domain Scam - Data Assortment Ireland - Published: 2014-03-11 - Modified: 2014-03-11 - URL: https://it.ie/internet-directory-scam-data-assortment-ireland/ - Categories: Scams Here's another scam which surfaced in January of this year. This one is very similar to the Internet Register Ireland scam. Note the discreet advertisement payment of €958 which it seems is "valid for the next three years".  You should promptly assort this data into your bin!     --- ### Happy with your IT? They are... - Published: 2013-11-18 - Modified: 2013-11-18 - URL: https://it.ie/happy-with-your-it-they-are/ - Categories: Marketing --- ### CryptoLocker Ransomware. Your Files held to Ransom! - Published: 2013-10-08 - Modified: 2013-10-08 - URL: https://it.ie/cryptolocker-ransomware-your-files-held-to-ransom/ - Categories: Scams - Tags: Malware, Ransomware, Virus If you are unlucky enough to have been hit by the CryptoLocker ransomware virus, I’m afraid you’re not going to receive any solace from this article. In a nutshell, this software encrypts all office related documents and in some cases images on your desktop pc or laptop. Worse again, if you’re connected to an office shared drive, it will encrypt all the files there too. I’ve seen the destruction first hand and trust me I know when I’m beaten. After some exhaustive research across various well established tech forums, there doesn’t seem to be any known method of recovery other than actually paying the ransom money.   Apparently, the encryption is created using a unique RSA-2048 public key. The decryption key is located on a secret server somewhere on the internet and there is a countdown on the infected machine which will let you know how long you have until this key will no longer be available. The clock is literally ticking from the moment you receive this ransomware. My observations are as follows; Do not remove this malware. Refer the matter to an IT Professional immediately. Removing it will most likely inhibit the ability to recover data. If you have any form of backup, you need to act fast. You need to be careful that the backup is not overwritten with the newer encrypted files. If you’re lucky enough to have a backup in place, I would recommend that the pc be formatted for good measure. I’m not sure if... --- ### Windows XP. Support ends April 08th 2014. - Published: 2013-03-31 - Modified: 2013-03-31 - URL: https://it.ie/windows-xp-support-ends-april-08th-2014/ - Categories: Windows 8   --- ### Bank of Ireland Phishing Scam - Published: 2013-01-24 - Modified: 2013-01-24 - URL: https://it.ie/bank-of-ireland-phishing-scam/ - Categories: Scams Last week a client of mine had €6000 taken from their online bank account. In fact, it was €3000 on a Wednesday and €3000 the day after. Bank of Ireland flagged the unusual behaviour and called my client to inform him of the potential theft of the money from his account. This money was actually transferred to an Irish account (read on). So this blog post raises a few questions, makes a couple of assumptions and congratulates Macra. ie on their response to illegal image linking. First off. The scam. The people behind this are smart. I dread to think how much money they have appropriated from Irish bank users. I know these emails are common but the entire scam still seems unbelievable somehow. The email arrives to the victims' inbox like below; My client received something like this; Let's start with the Bank of Ireland logo at the top. The image is embedded in the email using HTML and is pulled in from the Macra. ie website. Was the image there already on the Macra. ie website? Or did the scammer inject the image there? At time of writing this blog post, the location of this image is here. My guess is that the image was there already and the scammers found it via a simple google image search. Next, the link which reads "Log in to Online Banking" brings the victim to an Asian website which I can only assume has been hijacked for the purpose of this... --- ### Windows 8 Essential HotKeys - Published: 2013-01-18 - Modified: 2013-01-18 - URL: https://it.ie/windows-8-hotkeys/ - Categories: Windows 8 - Tags: Windows 8 Windows 8 HotKeys are extremely useful to jump to where you need to go on Microsofts newest operating system.   Here's a condensed list of the more useful ones. Windows logo key‌ + start typing to Search your PC. Windows logo key‌ +C to open the charms menu. Windows logo key‌ +D to activate desktop mode. Windows logo key‌ +E to open file explorer. Windows logo key‌ +F to open the Search charm for searching files. Windows logo key‌ +H to open the Share charm. Windows logo key‌ +J to switch the main application and the snapped application. Windows logo key‌ +K to open the Devices charm. Windows logo key‌ +L to lock the PC. Windows logo key‌ +O to lock the screen orientation (portrait or landscape). Windows logo key‌ +P if you want to connect a second screen or projector. Windows logo key‌ +R to open the RUN command. Windows logo key‌ +Tab to cycle through open applications. Windows logo key‌ +Ctrl+Tab to toggle through and snap any open apps. Windows logo key‌ +PgUp to move the Start screen and apps to the left monitor. Windows logo key‌ +PgDown to move the Start screen and apps to the right monitor. Windows logo key‌ +Shift+period (. ) to snap an app to the left. Windows logo key‌ +period (. ) to snap an app to the right. Windows logo key‌ +X to bring up the Admin menu (The same as right-clicking in the bottom left corner).   --- ### Life is too short to Remove USB Safely - Published: 2013-01-07 - Modified: 2013-01-07 - URL: https://it.ie/life-is-too-short-to-remove-usb-safely/ - Categories: Humour Happy New Year everyone. Here's some light humour to get 2013 started :)         --- ### Switching Broadband Providers - Published: 2012-02-29 - Modified: 2012-02-29 - URL: https://it.ie/switching-broadband-providers/ - Categories: Broadband So you've just has a visit from the broadband salesperson. They've told you that you're spending too much money on your landline, mobiles and broadband and have decided to save you from these unnecessary charges. In theory, there is nothing wrong with this. Cutting costs is essential in all businesses irrespective of whatever times we live in. However, after the salesperson has made the deal to move you over, they're gone. You're now on your own. He or she will not hold your hand during the changeover. At this point, there are very few instances where the transfer is simple. If you are thinking of taking advantage of these savings you should consult very closely with your IT support on the potential risks, required changes & possible downtime. Also, remember you will almost certainly incur IT costs as part of this transfer so you should factor this into your cost savings. Here are some basic questions you need to ask yourself, your IT person and/or the salesperson; - Will I need a new broadband router? - If no, will I need to change the settings on my existing router? - If yes, will I need to reconfigure for my internal IP addressing, port forwarding, wireless, etc. - Do I need to change my email MX record? - Do I need to change my SMTP settings? On the server or all office pc's? - What will my new static IP address be? Lead time? - Are there any DNS or A records... --- ### Online Backup - Buy Online - Published: 2011-05-06 - Modified: 2011-05-06 - URL: https://it.ie/online-backup-buy-online/ - Categories: Data Management Customers can purchase their online backup plan from the options below. Payment options. Prices include VAT at 21% 10gb per month : €12. 10EUR - monthly 20gb per month : €24. 20EUR - monthly 30gb per month : €36. 30EUR - monthly 40gb per month : €48. 60EUR - monthly 50gb per month : €60. 50EUR - monthly --- ### Laptop Encryption; Understand This? Neither Can He! - Published: 2011-02-21 - Modified: 2011-02-21 - URL: https://it.ie/understand-this-neither-does-he/ - Categories: Marketing, Message, Security --- ### Online Backup - Cheap As Chips - Published: 2011-01-27 - Modified: 2011-01-27 - URL: https://it.ie/online-backup-cheap-as-chips/ - Categories: Data Management, Marketing --- ### Wishing You All a Very Happy Christmas - Published: 2010-12-14 - Modified: 2010-12-14 - URL: https://it.ie/wishing-you-all-a-very-happy-christmas/ - Categories: Message Wishing you all a very Merry Christmas and successful 2011! This year we will again be skipping the Chrimstas cards and will instead be making a small donation to the Temple Street Children's Hostpital. --- ### RemoteSupport.ie is Green for Go! - Published: 2010-11-02 - Modified: 2010-11-02 - URL: https://it.ie/remotesupport-ie-is-green-for-go/ - Categories: Marketing --- ### You don’t get the sweats with Online Backup - Published: 2010-10-14 - Modified: 2010-10-14 - URL: https://it.ie/you-dont-get-the-sweats-with-online-backup/ - Categories: Data Management, Marketing --- ### Office Copy and Scanner Machines - The Unknown Hard Drive - Published: 2010-07-01 - Modified: 2010-07-01 - URL: https://it.ie/office-copy-and-scanner-machines-the-unknown-hard-drive/ - Categories: Data Management, Security Not many business owners are aware that since 2002 almost all office copy machines and scanners contain a standard hard drive similar to an ordinary desktop computer or hard drive. This hard drive essentially stores every single scan to memory. Take a look at the video below for more information. If you have any questions relating to hard drive data destruction please call us on 01-8424114. --- ### Fake Indian Computer Repairs Claiming to be from Microsoft – www.onlinepccare.com [SCAM] - Published: 2010-06-14 - Modified: 2010-06-14 - URL: https://it.ie/fake-indian-computer-repairs-claiming-to-be-from-microsoft-www-onlinepccare-com-scam/ - Categories: Scams The scam: Person of Indian extraction calls a home user claiming to be from Microsoft declaring that the users pc is infected, slow, sending out spam, and basically needs to be repaired. They then proceed very forcefully to try and direct the user to a website where they will remote on to their computer and ‘repair’ the problems for which they have suggested exist. They use strong misleading language, switching to and from their supervisors,  and any means necessary to try to extract or extort up to €159 from their victim. They’ll use language like; “Your licensing is invalid”, “You’re sending out Viruses”, etc,etc. This is occurring all around the country at the moment from what I can tell. I know of 5-10 people who have been approached by this company in the last 3-4 weeks. Ironically, we have also received over 10 phone calls from this company who are amazingly brazen and bully-like in their approach. One of our customers was directed to the Microsoft Event Viewer  in an attempt to point out their terrible pc plight. The Event Viewer is, even at the best of timesloaded with of errors, and any trip here is going to show such messages.  When or if they call you, HANG UP and don’t let them waste your time. These people should be avoided at all times for various reasons; You don’t know who they are or what they are going to do with your pc once they gain control of it. You... --- ### LMFM Radio Advertising - Published: 2010-04-07 - Modified: 2010-04-07 - URL: https://it.ie/lmfm-radio-advertising/ - Categories: Marketing We've a new radio advert going live next week on LMFM. Have a listen below. --- ### Irish Revenue Phishing Scam - Published: 2010-03-12 - Modified: 2010-03-12 - URL: https://it.ie/irish-revenue-phishing-scam/ - Categories: Scams - Tags: phishing The other day I wrote an article to explain what the term Phishing meant. Somewhere in the middle of the piece I figured that it would be a good idea to use an example of a phishing mail that I myself have received in the past. Having received hundreds maybe thousands, I indexed through over 10 years of emails and could not find one single example. Seems I might be too fast with the delete button when it comes to spam. Then – Not even 24 hours after hitting the ‘Publish’ button, a beauty of one arrived! The example I had been looking for came hurtling through my inbox. The scam claims to come from the Irish Revenue who are telling me I was due a VAT refund of €734. 21.   All I had to do was follow the link and claim my long lost hard earned cash. As you can see when I hover over the ‘Click here’ link, I can see that the real link is not in fact www. revenue. ie and is instead all the way from Kazakhstan (. KZ). As I click on the link, I’m taken on another journey to the link below. The final part of the voyage takes me to a complete replica of the Irish Revenue webpage (see below)  where surprise surprise, to complete the refund process, I need to handover my credit card details.  Effectively, this means that I can say ‘Sau bol’ (Goodbye in Kazakhstan) to my chances of receiving... --- ### Phishing – Don’t Become Cyber Bait - Published: 2010-03-09 - Modified: 2010-03-09 - URL: https://it.ie/phishing-dont-become-cyber-bait/ - Categories: Scams   What is it? Phishing is the act of sending a fraudulent mail to someone under the disguise of a legitimate name or organisation. The intention is to dupe the recipient of the mail into believing they are accessing a bonifide website when they are in fact unintentionally handing over private and confidential information to cyber criminals. What does it look like? Most current phishing mails are designed to take you to a fake copy of a well established business. They achieve this by asking you to reset your password or to inform you of new banking services. In other cases, they use their own form of irony; "We suspect someone may have tried to illegally access your online banking account in the past 24 hours. Was this you? Please check your account now. Visit http://www. yourbank. ie and reset your password to protect your account".  After clicking on the link, the user is taken to an exact copy of their bank where they begin to enter their online passwords. After a few unsuccessful attempts, the criminals will now have enough information to access your real online bank account. Chances are, they'll have emptied the real account while you're still wondering why after 10 years of using the same online password, it has now suddenly decided to not work! How to avoid? Any request asking you to 'please verify your account' or to 'confirm your login details', that you yourself have not initiated is almost definitely a scam. To avoid... --- ### Is peer-to-peer software killing your network? - Published: 2010-02-04 - Modified: 2010-02-04 - URL: https://it.ie/is-peer-to-peer-software-killing-your-network/ - Categories: Broadband, Internet & SEO In recent weeks, various customers have reported issues with their broadband connections where it can disconnect intermittingly throughout the day. The problem may only even manifest itself on certain days creating huge difficulties in narrowing down its cause. Obviously this creates a huge strain on the working day and we've only recently managed to find the cause. We found that peer-to-peer software such as uTorrent, Bitcomet, Bearshare and Limewire have been the primary source of the problem. In all cases, the software was not even in use. This means that simply by having the software on the pc can impact the stability of your network. There are also different symptoms of having this software installed such as fluctuations in the actual speed of your internet access. Again, this can all occur without even using the software.  The fact that it's running in the background chewing up bandwidth is one thing but the number of 'open connections' it creates are ultimately being persecuted by the Internet Service Provider. For each of the symptoms there are varying fixes, such as patches to the software, tweaks to its configuration and modifications to the port settings on the router. None of which will be suggested here. . The only fix on offer here is to remove the software from your pc.   Once removed, your network stability will return to normal. For more information regarding this topic, we have posted the solution to I Found A Fix. I hope you too have Found A Fix. --- ### Joining the rest of the Twit – terrers.. - Published: 2010-01-12 - Modified: 2010-01-12 - URL: https://it.ie/joining-the-rest-of-the-twitterrers/ - Categories: Social Networking Last year I suggested in this article that the over use of social networking for business was a bad idea. I still stand by my assertion that its "all a bit much" and have previously stuck to my own advice insofar as not to embrace every possible social networking trend just because everyone else is... Also, I have categorically stated (mainly offline) on several occasions that I wouldn't even discuss Twitter for PCtechnix. This may turn out to be one of those "practice what you preach" moments but this morning I signed up to a Twitter account against my better judgement. My main objective here was to protect the account so that someone else could not register it or as it is now known to "twitterjack" the account. The first tweet even reads "Our first ever tweet! Promised we wouldn't join another social media thingy but protection is better than cure :)". For now, I plan on using it for educational purposes only (I swear! ). Truth be told, there isn't much choice. With a current growth rate of over 1350%, Twitters' popularity is showing no signs of slipping. I've decided for now to use it in very basic mode until we at least pickup a few followers. To start, I've integrated our twitter account with this blog so that with every new blog post created, the site will automatically tweet a link back to the post. What appeals to me here is that, we can advertise our tweetcred to... --- ### SEO Scam - Marc Shneider - Published: 2009-12-23 - Modified: 2009-12-23 - URL: https://it.ie/seo-scam-marc-shneider/ - Categories: Scams The scams section of the blog is growing fast! Here's another spam, scam or as I call it 'mailware' to add to the list.  You'll most likely see variations of the mail I received (see below).    See scam mail below dotted line. ---------------------------------------------------------------------------------------------------------------------------- Did you receive the e-mail which I sent to you recently (copied here-below)? Please confirm since I have had problems lately with emails intercepted by spam-filters set too high. Cordially, Marc Shneider, Ph. D. marcshneider@mplw. net  I am Dr. Marc Schneider and I work for Multilingual Search Engine Optimization Inc. in Washington DC ( Tel: 1 202 250-3645) - I would like to speak with the person in charge of your international clientele. Who is my contact? Who should I speak to? ? In fact, after visiting http://www. pctechnix. ie . , I have noticed that your website cannot be found on foreign search engines (I tested it on Hispanic search engines, German search engines, Asian search engines, etc. ) Our company is specialized in multilingual search engine promotions in 28 languages . From the Japanese Google to the German Yahoo, from the AOL in Spanish to the MSN in Chinese, we can show you how to develop a true international online presence by promoting your website on foreign search engines. Let us show you how to develop a presence on the multilingual web without having to translate your website: It is not necessary to translate your website in order to submit to foreign search engines, however, you need to... --- ### Five Years On... - Published: 2009-11-25 - Modified: 2009-11-25 - URL: https://it.ie/five-years-on/ - Categories: Message I'm absolutely delighted to announce that PCtechnix is now five years in business! Thank you to all our customers who have worked with us over the last number of years. It's been an interesting 5 years, all of which I can honestly say that I have fully enjoyed.  During this period, we’ve grown alongside the emergence of broadband in Ireland (2002 to present) and seen firsthand how the marketplace has embraced the various new technologies that have made their way into the mainstream of the business world.   Many of our customers have allowed us the opportunity to take on board these new technologies through their own sheer innovation, willingness to adapt and the consistent ambition to accept change whenever it has presented itself.   Without our loyal customer base, none of this would have been possible and I would like to take this opportunity to thank you all! I look forward to our next 5 years in business together! Sincerely, Eamon Gallagher.        --- ### Chinese Intellectual Property Scam on Domain Names - Published: 2009-09-22 - Modified: 2009-09-22 - URL: https://it.ie/chinese-intellectual-property-scam-on-domain-names/ - Categories: Message, Scams - Tags: chinese, pxsolutions.cn, scam It seems that Internet scams are alive and well in China.  I've noticed there are a few scams going around now which has prompted me to setup a new Scams section on our blog. Many of our customers (including ourselves) have received the following email regarding the protection of their company domain name across different domain extensions. This email plays on the fears of the recipient, especially since China isn't as strict or regulated when it comes to domain ownership. Our Advice: Add senders domain to your list of blocked senders , and delete Jacks e-mail. 100% scam artist. Original Mail below: From: jack wu Sent: 14 July 2009 10:59 To: info Subject: Dispute--concerning the intellectual property rights in China Importance: High (If you are NOT CEO,please forward this to your CEO, because this is urgent. Thanks. ) Dear CEO, We are the department of registration service in China. We have something need to confirm with you. We formally received an application. One company which called "MID Design SPA" are applying to register "PCTECHNIX" as internet brand and CN domain names as below : - pctechnix. asia - pctechnix. cc - pctechnix. com. cn - pctechnix. hk - pctechnix. info - pctechnix. me - pctechnix. mobi on July 14th,2009. After our initial examination, we found that the internet brand applied for registration are as same as your company's name and trademark. These days we will deal with it, hope to get the affirmation from your company. If your company has... --- ### Locking down employee internet access - Published: 2009-08-14 - Modified: 2009-08-14 - URL: https://it.ie/locking-down-employee-internet-access/ - Categories: Broadband, Internet & SEO, Software How much time do you think your average employee spends on the Internet during office hours? The answer, if taken from legitimate studies, is an astounding 2 hours per day. That's 10 hours a week! From updating their Facebook profile, to sending out Twitter alerts, checking personal emails, tracking eBay items, or simple day-to-day internet browsing, YOUR EMPLOYEE'S are spending vast amounts of YOUR TIME on the World Wide Web. Why not prevent this at source? You can simply enable web filtering at the broadband level and remove access to specific sites instantly. You can choose from a range of categories such as ‘Gambling , ‘Social Networking', or ‘Violence', etc and block all such sites at once. If a website has been included by mistake, you can specify that it never be blocked. Say Goodbye to IrishJobs. ie or Daft. ie and setup Web Filtering today! No Server required, we only need to change your internet settings on the company router, setup your account and implement your criteria for future web browsing in the workplace. --- ### Best of Luck to Willows Cancer Caring Team! - Published: 2009-08-12 - Modified: 2009-08-12 - URL: https://it.ie/best-of-luck-to-willows-cancer-caring-team/ - Categories: Charity, Message We would like to wish Richard Greene and the rest of the Willow Cancer Caring team, the very best of luck in their 200km charity cycle for cancer.  We were more than happy to purchase a spot on their team jersey and If anyone else would like to sponsor  or make any enquiries to the charity, just let us know . The event takes place on Friday 04th & Saturday 05th of September and the course goes from Dublin to Carlingford and back. Good luck to everyone! --- ### The Social Networking Feature Creep. - Published: 2009-05-07 - Modified: 2009-05-07 - URL: https://it.ie/the-social-networking-feature-creep/ - Categories: Social Networking Today, more than ever, companies are using every conceivable method possible to engage with their customers, to reach new prospective clients and ultimately to expand their reach beyond their present place in the marketplace. We too, have played somewhat into the social networking frenzy with our Business I. T Blog, that in truth, takes more time to oversee than initially envisaged. All too often, businesses become bogged down with the feature creep. I can picture the boardroom meetings; "Right Folks! , how do we improve our customer service? " "What about this Twitter thing? " , says Barry. "It's been on Oprah and everything" he claims. "No LinkedIn! ", says Lisa, quick as a button.  The office manager asks if anyone has used Facebook or Bebo before, unaware that Bebo is only useful if your audience happens to like Hannah Montana and that Facebook is king of the feature creep. Skype, Youtube and Instant Messaging are also offered as suggestions. Barack Obama championed the use of these services during his presidential campaign and companies are scrambling to also find ways of using social networking to their competitive advantage. I would always advise companies or individuals to use these methods but to remember the most important rule is to 'Engage' with your customers. Do not use social networking to spout weekly offers and marketing nonsense.  Don't use them all at once. It's better to build up a reputation with one at a time, or better still, choose one that's most relevant... --- ### What’s eating your disk space? - Published: 2009-02-20 - Modified: 2009-02-20 - URL: https://it.ie/whats-eating-your-disk-space/ - Categories: Data Management, Software For servers that are, let's say ‘maturing in age', business owners & management are often faced with the task of having to free up disk space and very often don't know where to begin.   Understandably, most people faced with his prospect usually begin with a gentle email reminding staff that the shared drive isfor office use only. Initially, this will reduce space to a small degree and it may remind employee's that the server is not a dumping ground for mp3 files, photographs, movies and various other space hungry file formats. This is good practice but it very rarely yields any dramatic reductions in space. Instead, a simple program like Tree Size Free or the professional version will enable you to scan your disk drive or folder and inform you instantly where the bulk of the disk space is being used. The professional version for example, will not only give you excellent reports and graphs but it will tell you the last time certain files were even accessed, thereby giving you some insight into whether the file(s) are actually in use. A lack of active data management not only leads to disk capacity issues, but it will almost always affect your backups and their ability to run reliably.   --- ### The Day I Just Lost Control !! - Published: 2008-10-21 - Modified: 2008-10-21 - URL: https://it.ie/the-day-i-just-lost-control/ - Categories: Humour - Tags: Humour --- ### dot ie or dot com? - Published: 2008-02-12 - Modified: 2008-02-12 - URL: https://it.ie/dot-ie-or-dot-com/ - Categories: Uncategorized If it's cheaper and quicker to setup a dot com domain name, then some people might ask why choose a dot ie address for your company domain name? For starters, if you are an Irish Company operating mainly in Ireland a dot ie address can come across as much more credible and advantageous from a business perspective. For example; - Anyone can setup a dot com address in a matter of minutes. Register. com for example The IEDR will only approve (with the exception of personal domain names) a dot ie address if your business is properly registered. There are strict policies in place. See here for more information. You will need to provide proof along with your application which can be made and retrieved from the Company Registrations Office. A dot ie addresses ranks higher in regional searches. i. e Looking for an estate agent in the West of Ireland... . There is much more availability and scope of domain names. Other companies will instantly recognise you as "Irish" My advice: RegisterBoth! Use the dot ie address as your primary domain name for your email and website. You can then park the dot com address to yourwebsite. ie and forward all email from that domain to an email address of your choice. --- ### ICE Broadband just doesn't deliver - Published: 2008-02-01 - Modified: 2008-02-01 - URL: https://it.ie/ice-broadband-just-doesnt-deliver/ - Categories: Broadband The Irish Broadband Service Providers generally irritate me. As a small Irish Company providing IT Solutions, we are often asked to recommend to our clients where they should get their broadband from. I would love nothing more than to be able to say, "Try X Company - They are brilliant! " The reality is much different. My current home broadband provider is from Eircom. I wanted to switch as I don't need a house phone and I don't like Line Rental. The idea of renting a phone line is ludicrous. So when I noticed that ICE Broadband were in my area I decided to give them a try. On paper it seemed like a good idea; No line rental:   No download limit: Speed offering of 3mb download and 1mb upload Installation Fee is €0 if you take a 24 Month Contract. Price per Month €37. 99 I made the call. By the end of the week I was genuinely impressed that the Engineer was on my roof installing the Broadband Aerial. The aerial itself is a bit oversized and indiscreet but overall the installation was professional. When it came to checking the quality of the service however, this is where ICE Broadband couldn't deliver. I insisted on doing a Speedtest as all broadband customers should and we learned that the speed was only 600kbs. Put simply, I was only receiving 20% of the service I had paid for. The engineer got on his phone back to the helpdesk, did what... --- ### Employee Password Complexity & Policies - Published: 2008-01-23 - Modified: 2008-01-23 - URL: https://it.ie/employee-password-complexity-policies/ - Categories: Data Management, Security When it comes to your employee password policy, you should decide whether your I. T system requires strict policing or not. If you are a company that is regularly audited, you hold sensitive or private information, etc then this a bit of a no-brainer. A decent policy requires that you use a complex password, it should expire at least every 30 days and you should not be allowed to use up to 5 of your previous passwords.   See below for recommended password complexity. Password Rules A strong password contains the following characteristics: A combination of at least eight characters in length and contains upper and lowercase letters, numbers, and non-alphabetic characters At least three characters from each of the previous character types It should be different from other previously used passwords by more than one character A strong password should not contain the following: Your user name, real name, or company name A complete dictionary word Do not leave the password blank For best practive on password Do's and Don'ts click here. In my experience though, after enforcing these policies, it means that your employee's will inevitably use more IT resources than usual. In today's world we simply have too many pin numbers, online banking credentials and passwords to remember which invariably means that we will forget them from time to time. So this means you can leave it up to your employee's, trusting them to initiate their own strong passwords or enforce it centrally from your network domain... ---