Skip to content

Lantech

An image showing that Lantech have won the MSP award

Lantech celebrates putting its clients first

Read More

Latest Posts

Is your IT company going bust?

Is your IT company going bust? No apologies for throwing that question straight at you. Your own business could be thriving – financially secure – but if your IT provider is on..

Read More

Boost Performance with SAP, Azure & Azure Virtual Desktop

Inis is an independent boutique perfumery based in County Wicklow. Its signature collection is sold all over the globe. Over 35 years, they have grown from a tiny farmhouse-based..

Read More

People plan: God laughs Lessons from Marathon training

Peter Strahan - CEO - Lantech IT Services I decided to run a marathon. Maybe I was a bit crazy. Maybe it was the perfect challenge, but this post isn’t about pounding out the 42.2..

Read More

Leinster Rugby – Playing the game under Azure Blue Skies

Struggling to make progress Back in 2007, Leinster Rugby was tackling a problem. Their mission to encourage, promote, grow and boost participation in the game across all twelve..

Read More

We urge you to ask one question about on-prem Exchange

The trouble with IT specialists is they don’t quite talk the same language as most people. We’re all a bit guilty of it – we’ll hold our hands up and admit that the phrase..

Read More

How does a cyber breach in healthcare impact services and what to do about it. (A real-life account)

Medical records are often a prime target for cybercriminals as they are perceived as high value. Ransomware and social engineering attacks are just a few examples of the different..

Read More

Migrating to Azure

There’s so much talk of “the cloud” however it can be difficult to understand the true benefits and total cost of ownership for the business amongst all the noise and hype. It’s..

Read More

Who is responsible for cloud data security and backup?

The Cloud, however much we rely on it, is an odd beast. Despite being so pervasive, so colossal in its sheer scale, it’s essentially invisible to the countless millions that use..

Read More

How cloud is changing the face of business

Cloud computing continues to involve and make a big impact on the business world. Using cloud computing solutions offers a wide range of benefits, whether it's improving..

Read More

Creating an incident response plan - a how to guide

An incident response program is an essential part of the overall information security management program. Being able to identify and respond to security incidents will help you..

Read More

Information security policies: why they are important to your business

Outdated, incomplete, and absent information security policies continue to plague organisations of all sizes. This article provides an overview of information security policies..

Read More

Essential Qualities of a Managed IT Service Provider That Are Often Overlooked

There are many qualities you need to look for when choosing a managed service provider for your business. We have covered many of these in: How to choose an IT services provider..

Read More

What is cyber hygiene and what does it mean for your business?

Did you know that most Cybersecurity incidents in the workplace occur due to human error. Identifying ways to avoid human error is key to preventing data breaches and limiting..

Read More

Developing an effective cyber security awareness training program

In one of the more recent and convincing phishing scams, attackers send authentic-looking emails that very closely resemble Outlook quarantine messages and provide links for..

Read More

8 Cyber Security tips for Small Businesses

Learning how to keep your small business protected from cyber threats is critical in today's work environment. A cybersecurity incident can impact your company in numerous ways,..

Read More

5 Quick Tips to protect your business from ransomware

Ransomware attacks are a major issue facing businesses, as Europe experienced a 234% surge in attacks in 2021. Small businesses are particularly vulnerable to ransomware schemes..

Read More

2FA & MFA: What’s the difference and Why You Need Them

Two-factor authentication and multi-factor authentication are essentially the same in that there is a requirement to use more than one factor for authentication. The subtle..

Read More

The risks of using public wi-fi and how to minimise them

The list of significant risks associated with using public a WiFi network is lengthy. Cybercriminals eavesdropping on unsecured networks steal sensitive data including account..

Read More

Choosing an IT Service Provider - A Guide to getting it right

Finding an IT Support provider for your small to mid-size business is a big decision. However, searching through an almost endless amount of options can often feel overwhelming..

Read More