Peter Strahan - CEO - Lantech IT Services I decided to run a marathon. Maybe I was a bit crazy. Maybe it was the perfect challenge, but this post isn’t about pounding out the 42.2..
Struggling to make progress Back in 2007, Leinster Rugby was tackling a problem. Their mission to encourage, promote, grow and boost participation in the game across all twelve..
The trouble with IT specialists is they don’t quite talk the same language as most people. We’re all a bit guilty of it – we’ll hold our hands up and admit that the phrase..
How does a cyber breach in healthcare impact services and what to do about it. (A real-life account)
Medical records are often a prime target for cybercriminals as they are perceived as high value. Ransomware and social engineering attacks are just a few examples of the different..
The Cloud, however much we rely on it, is an odd beast. Despite being so pervasive, so colossal in its sheer scale, it’s essentially invisible to the countless millions that use..
An incident response program is an essential part of the overall information security management program. Being able to identify and respond to security incidents will help you..
Outdated, incomplete, and absent information security policies continue to plague organisations of all sizes. This article provides an overview of information security policies..
There are many qualities you need to look for when choosing a managed service provider for your business. We have covered many of these in: How to choose an IT services provider..
Did you know that most Cybersecurity incidents in the workplace occur due to human error. Identifying ways to avoid human error is key to preventing data breaches and limiting..
In one of the more recent and convincing phishing scams, attackers send authentic-looking emails that very closely resemble Outlook quarantine messages and provide links for..
Ransomware attacks are a major issue facing businesses, as Europe experienced a 234% surge in attacks in 2021. Small businesses are particularly vulnerable to ransomware schemes..
Two-factor authentication and multi-factor authentication are essentially the same in that there is a requirement to use more than one factor for authentication. The subtle..
The list of significant risks associated with using public a WiFi network is lengthy. Cybercriminals eavesdropping on unsecured networks steal sensitive data including account..
Finding an IT Support provider for your small to mid-size business is a big decision. However, searching through an almost endless amount of options can often feel overwhelming..
Constantly dealing with IT problems is a frustrating experience that makes it difficult for businesses to remain productive. These technical problems can often occur at the worst..