Lantech

You get a request in an email. Do you action it?
Latest Posts
January 2023 Newsletter
We’re writing at the middle of January. All around us, people are setting new goals. Nothing wrong with that – a positive start is a good thing – but we’re sticking to something..
Lantech celebrates putting its clients first
Lantech’s pledge to serve and protect its clients is a key message on the company’s website, but it’s far more than words. It’s how the business operates. Now that approach has..
Is your IT company going bust?
Is your IT company going bust? No apologies for throwing that question straight at you. Your own business could be thriving – financially secure – but if your IT provider is on..
Boost Performance with SAP, Azure & Azure Virtual Desktop
Inis is an independent boutique perfumery based in County Wicklow. Its signature collection is sold all over the globe. Over 35 years, they have grown from a tiny farmhouse-based..
People plan: God laughs Lessons from Marathon training
Peter Strahan - CEO - Lantech IT Services I decided to run a marathon. Maybe I was a bit crazy. Maybe it was the perfect challenge, but this post isn’t about pounding out the 42.2..
Leinster Rugby – Playing the game under Azure Blue Skies
Struggling to make progress Back in 2007, Leinster Rugby was tackling a problem. Their mission to encourage, promote, grow and boost participation in the game across all twelve..
We urge you to ask one question about on-prem Exchange
The trouble with IT specialists is they don’t quite talk the same language as most people. We’re all a bit guilty of it – we’ll hold our hands up and admit that the phrase..
How does a cyber breach in healthcare impact services and what to do about it. (A real-life account)
Medical records are often a prime target for cybercriminals as they are perceived as high value. Ransomware and social engineering attacks are just a few examples of the different..
Migrating to Azure
There’s so much talk of “the cloud” however it can be difficult to understand the true benefits and total cost of ownership for the business amongst all the noise and hype. It’s..
Who is responsible for cloud data security and backup?
The Cloud, however much we rely on it, is an odd beast. Despite being so pervasive, so colossal in its sheer scale, it’s essentially invisible to the countless millions that use..
How cloud is changing the face of business
Cloud computing continues to involve and make a big impact on the business world. Using cloud computing solutions offers a wide range of benefits, whether it's improving..
Creating an incident response plan - a how to guide
An incident response program is an essential part of the overall information security management program. Being able to identify and respond to security incidents will help you..
Information security policies: why they are important to your business
Outdated, incomplete, and absent information security policies continue to plague organisations of all sizes. This article provides an overview of information security policies..
Essential Qualities of a Managed IT Service Provider That Are Often Overlooked
There are many qualities you need to look for when choosing a managed service provider for your business. We have covered many of these in: How to choose an IT services provider..
What is cyber hygiene and what does it mean for your business?
Did you know that most Cybersecurity incidents in the workplace occur due to human error. Identifying ways to avoid human error is key to preventing data breaches and limiting..
Developing an effective cyber security awareness training program
In one of the more recent and convincing phishing scams, attackers send authentic-looking emails that very closely resemble Outlook quarantine messages and provide links for..
8 Cyber Security tips for Small Businesses
Learning how to keep your small business protected from cyber threats is critical in today's work environment. A cybersecurity incident can impact your company in numerous ways,..
5 Quick Tips to protect your business from ransomware
Ransomware attacks are a major issue facing businesses, as Europe experienced a 234% surge in attacks in 2021. Small businesses are particularly vulnerable to ransomware schemes..
2FA & MFA: What’s the difference and Why You Need Them
Two-factor authentication and multi-factor authentication are essentially the same in that there is a requirement to use more than one factor for authentication. The subtle..
Subscribe
Get notified and receive a copy of our latest articles when they are published.