Technology & Lifestyle

Technology & Lifestyle

Discover how exciting technology and innovative software introduces new ways to interact with all your devices wherever you are and whatever you want to achieve.

No articles available yet

Security Considerations for a Hybrid Working Environment

Security Considerations for a Hybrid Working Environment

Over the past 20 months, we’ve seen significant changes in the cyber security threat landscape that are having a major impact on organisations of every size in every sector. The frequency and sophistication of cyber events have increased significantly. Unfortunately, this has security implications, which need to be closely managed to mitigate the risks across the organisation. Microsoft recently released […]

Des Ryan

Des Ryan

Solutions Director

Building trust with rock-solid security at Crowleys DFK

Building trust with rock-solid security at Crowleys DFK

By completing the first phase of its journey to ISO 27001 certification with a Microsoft Intune implementation, leading Irish firm of chartered accountants and tax advisors, Crowleys DFK can reassure its clients of exceptional data security practices. As ISO 27001 certification is the gold standard internationally for information security management and GDPR compliance, it takes […]

Shirley Finnerty

Shirley Finnerty

M365 Business Group Lead

A room with Cyber defense operatins Center written on the floor

Ransomware and Malware attacks decline in 2018, as cyber criminals increasingly look to exploit people online using methods such as Phishing and Cryptocurrency Mining

Ransomware and Malware attacks decline in 2018, as cyber criminals increasingly look to exploit people online using methods such as Phishing and Cryptocurrency Mining The world has never been more connected than it is today with figures showing that nine out of ten European households are online. But when everything is connected, everything can also […]

Des Ryan

Des Ryan

Solutions Director

Security station

Data classification – the first step to protecting your companies sensitive data

Data classification – the first step to protecting your companies sensitive data  Data classification provides one of the most basic ways for organisations to determine and assign relative values to the data they possess. The process of data classification allows you to categorise your stored data by sensitivity and business impact so you understand associated […]

Ciara Gallagher

Ciara Gallagher

Technical Solution Professional for Identity and Information Protection

Microsoft Protect center

Data in motion – how to protect it – 5 Key Considerations

Data in motion – how to protect it – 5 Key Considerations  Now, more than ever, it’s critical to protect your data at the file level. Data is the most valuable asset you control. Losing intellectual property, a customer’s personally identifiable information (PII), financial information, and confidential memos can cause substantial damage. But it’s not […]

Ciara Gallagher

Ciara Gallagher

Technical Solution Professional for Identity and Information Protection

Make anywhere the most secure place to work

Make anywhere the most secure place to work

The workplace is changing. With new technology bringing smarter, more flexible ways of doing our jobs – working on the move or away from the office can be good for business. In fact, 55% of surveyed CIOs see the “anywhere” workplace as one of the biggest trends set to transform the business arena. But the […]

Lisa Hunt

Lisa Hunt

Surface Business Group Lead

No articles available yet