Incident Response

This white paper contains advice to help to guide organisations of all sizes to build strong incident response capacity for whatever risks may occur.
Email Security

There are many risks associated with email: just as it can distribute legitimate business communications, it can also send non-business related material such as malicious software, copyrighted material, spam, or content of an illegal, immoral or racist nature. It is also a very effective attack vector for criminals and fraudsters. That is why it is […]
Ransomware

We created this white paper to help companies and public agencies of all sizes to recognise signs of a possible ransomware infection, and take measures to take to prevent it from spreading and causing damage. This document details several recommendations to help you in reducing the likelihood of future infection by ransomware, or indeed any […]
Irish businesses must be vigilant as risk of cyber attacks rises amid Ukraine-Russia crisis, says expert

It comes amid concerns that criminal groups will take advantage of people donating to victims of the war in Ukraine Read More ›
5 Criteria to Evaluate the Security of a Cloud Provider

Migrating to the cloud provides many advantages for organizations. Careful consideration of security and governance issues relating to cloud service providers will enable those advantages to be gained. Read More ›
Hell to pay: the rise of ransom attacks and what to do about them

Such attacks are ransoming businesses and taking them offline. Róisín Kiberd asked the experts how to survive them Read More ›
Security experts warn of cyber attacks following invasion of Ukraine

Irish consumers and businesses advised to be on high alert for cyber attacks. Read More ›
DPO FAQ: answering key data protection questions: part two

As we saw in part one of this series, every organisation handling personal data must comply with the GDPR, but not all need to appoint a data protection officer (DPO). In this second of our two-part blog, we take a closer look at the nature of the role, and the part they play in activities […]
DPO FAQ: answering key data protection questions

Every organisation needs to comply with the EU General Data Protection Regulation (GDPR) when it comes to personal data. However, not every organisation needs a designated data protection officer (DPO). This blog is the first of a two-part series looking at what kinds of organisations need a DPO, who is suitable to fill the role, […]
Security Roundup February 2022

Curated advice, guidance, learning and trends in cybersecurity and privacy, as chosen by our consultants. How to take the pulse of your security efforts/health check As any seasoned infosec professional knows, the security landscape shifts constantly. At times of elevated threat levels, it can be useful to take the pulse of important security controls, to […]