Passwords, Finger prints, Iris ScanS – Oh my! With all the security types to verify our identity, how is it that hackers are winning the cyber war? YOU. Yes YOU. How you say? Well if you’re on Social Media and you post some innocuous information, Hackers can easily take that information and start weaving a…
Discover MoreACS attended the Dublin Chamber of Commerce event which was an early morning talk by Senior Lecturer and Head of the Department of People and Organisations at The Open University, Dr Peter Bloom. Are we in the dawn of a new era? Technology is rapidly changing both our work and lives. Many experts…
Discover MoreThinking your network is secure is different than your network actually being secure. Spear phishing emails are an attack technique that cybercriminals have been leveraging for quite some time. It’s a much targeted attack using corporate email communications that are very effective. Due to the approach’s ease of infiltration, spear phishing emails continue to pose…
Discover MoreWhat is botnet and how do you counter these attacks when you don’t know you’re being attacked and used? Botnets make an army out of your systems, attack other relevant networks and shutting them down causing chaos, and can stop your business. Downtime equates to dollars and productivity loss for the entire company causing thousands…
Discover MoreComputer worms aren’t as sweet as gummy worms they are NOT so obvious until… you’ve been hit!!! A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. So that ONE keystroke or click is all it takes to infect the entire network. You could have clicked…
Discover More