Archives

About Martin Quinn

Here are my most recent posts

How To Get The Most From Your Firewall

February 7th, 2017 (No Comments)

By Samantha Woollard (Internet Security Specialist) 6 February 2017 Firewalls are the first line in defense to protecting your network. Their main aim is to keep the bad guys out and let the good guys get on with their jobs; preventing threats to your network 24/7. From averting entry of malware to prohibiting hacking attempts. […]

The Importance Of Continuous Monitoring And Vulnerability Management

January 30th, 2017 (No Comments)

By Samantha Woollard (Internet Security Specialist) 30 January 2017 Companies may be aware that they need to have penetration tests and vulnerability assessments at least annually, but what about your security every other day during the year. Security is an ongoing process and while both these measures help to secure your company, new vulnerabilities are […]

Why Your Security Depends On Your Employees

January 23rd, 2017 (No Comments)

By Samantha Woollard (Internet Security Specialist) 23 January 2017 It may be a surprise that 59% of breaches within a company happen due to employees. This is not because all your employees are turning against you, (perhaps some), but due to a lack of awareness about information security. With more than half of employees stating […]

Declassified Report States Russia’s Involvement In US Election

January 16th, 2017 (No Comments)

By Samantha Woollard (Internet Security Specialist) 16 January 2017 Vladimir Putin, President of Russia, enforced a campaign to sway the votes in the 2016 US election in Donald Trump’s favour, boosting his chance of winning, according to a declassified report released on Friday 6th of January. The report did not state how exactly the campaign […]

Top Security Threats In 2017

January 9th, 2017 (No Comments)

By Samantha Woollard (Internet Security Specialist) 9 January 2017 2016 seen the rise of cyber security attacks, resulting in nearly a third of all computer users experiencing some sort of attack. However, 2017 has been described to be the year of creative malicious hacks. Cyber security is no longer classed as only the IT departments […]

Malware: What Is It And How You Can Defend Against It

December 26th, 2016 (No Comments)

By Samantha Woollard (Internet Security Specialist) 26 December 2016 Malware, short for ‘malicious software’, are programs that are designed to cause damage to a computer. There are various types of malware which are discussed below. Over many years it has caused chaos for all kinds of organisations, large and small, infecting computers, devices and mobiles. […]

Vulnerability Assessment & Penetration Test – What’s the Difference?

December 19th, 2016 (No Comments)

By Samantha Woollard (Internet Security Specialist) – 19 December 2016 Vulnerability assessment or penetration test? Both are often confused and sometimes thought to be the same thing. However there are some major differences between them which are important to know when it comes to the security of your business. A vulnerability assessment consists of detecting […]

IF YOU ARE PAYING OVER $10,000 FOR A BASIC PEN TEST YOU ARE PAYING TOO MUCH.

December 8th, 2015 (No Comments)

By Anthony Ousback (Business Development Manager) 8 December 2015 There are a number of large players with in the IT security Industry, charging a premium for services. This does not have to be the case. The down side of dealing with the big firms is that many times you will not have direct access to […]

Christmas Time = Cyber Crime!

November 30th, 2015 (No Comments)

By Anthony Ousback (Business Development Manager) 30 November 2015 What do you think of when you think of Christmas? Winding down for the year? quality family time and putting your feet up?…well, I hate to be the barer of bad news, much like Santa bringing you a dodgy scooter when really all you wanted off […]

JobActive IRAP – how to get clued in with Intact Security

July 30th, 2015 (No Comments)

By Martin Quinn (Principal Consultant) 29 July 2015 With the introduction of the Department of Employment’s (DoE) JobActive initiative, the way job services providers work with the department has been turned on its head. The Department of Employment JobActive program requires providers to be certified and compliant with the minimum requirements of Information Security Manual […]