Skip to content
  • About Us
    • About CommSec
    • Careers
    • The Team
  • Partners
    • Security Partners
    • Telephony Partners
  • Resources
    • Blog
    • Case Studies
    • News
    • Newsletter Sign-up
    • Useful Links
    • Webinars
  • Contact
  • +353 1 536 7320
  • [email protected]
  • About Us
    • About CommSec
    • Careers
    • The Team
  • Partners
    • Security Partners
    • Telephony Partners
  • Resources
    • Blog
    • Case Studies
    • News
    • Newsletter Sign-up
    • Useful Links
    • Webinars
  • Contact
Sensible Cyber Security SolutionsSensible Cyber Security Solutions
    • Monitored Security
          • Business Secure

            Award Winning Cyber Security for SMEs

            MSOC+ Managed Detection & Response

            Outsourced Cyber Security Service

            Threat Hunting

            Be the Hunter not the Hunted

            Managed SIEM Service

            Real-time Analysis of Security Alerts Generated by Applications and Network Hardware

    • Security Testing
          • CheckScan+

            Vulnerability management for
            Web Apps &
            IT Infrastructure

            Penetration Testing

            Identifying and helping to resolve
            hidden weaknesses in your
            organisation's security

            Source Code Review

            Comprehensive code review to
            find errors in the application
            development lifecycle

    • Professional Services
          • CISO aaS

            Chief Information Security Officer
            (CISO) as a Service

            Digital Forensics Service

            Digital Forensics &
            Cyber Crime Incident
            Response Service

            DPO aaS

            Data Protection Officer
            (DPO) as a Service

            GDPR

            Providing a framework for improving
            Data protection posture

            Governance Risk & Compliance

            "Where do I start?"

            ISO27001 Assessment

            Advice, Guidance and Support
            at all stages of the certification process.

    • Solutions
          • Access Management and MFA

            Advanced Email Security

            Dark Web Monitoring

            Digital Risk Protection

            End Point Protection

            Mobile Device Protection

            Network Protection

            Password Security

            Security Awareness Training for Users

            Security Information & Event Mgmt

            Sophos Security Solutions

            Vulnerability Scanning

    • Under Attack
  • +353 1 536 7320
CONTACT US
dora and nis2
Understanding DORA, NIS2 and CER

The EU is fighting back against cybercrime and protecting critical infrastructure with some new legislation. [...]

25
Jan
credential stuffing password image
Everything you need to know about Credential Stuffing

What is Credential Stuffing? Credential stuffing is a type of cyber-attack in which an attacker [...]

13
Jan
Security Awareness Training for Higher Education: Safeguarding Educational Data

Security Awareness Training for Higher Education Security awareness training is a vital component of safeguarding [...]

05
Dec
SOC technologies
The 4 SOC Solutions IT Buyers Need to Know

As the list of cybersecurity acronyms and their functionalities, what cyber security tools are truly [...]

30
Nov
cybersecurity podcasts
Our Recommended Cybersecurity Podcasts

Whether you want to stay up to date with cyber trends or learn the InfoSec [...]

25
Nov
Black Friday Safety Tips Online
5 Cyber Security Tips for Black Friday

While Black Friday is designed to be a fun and exciting time of the year, [...]

18
Nov
4 affordable ways protect business
4 Affordable Ways to Protect your Business from Cyberattacks

Cyber security is one of the most important topics in today’s business environment as cyberattacks [...]

28
Sep
Cybersecurity Focus Special Report from The Irish Times

In Cybersecurity Focus special report, the Irish Times, CommSec and others look at how everyone [...]

05
Sep
password management
Is it time we killed off passwords?

Passwords are the most common type of account authentication. We use them to log into [...]

17
Aug
Why Cyber Security Training is So Important

Organisations are always looking for ways to enhance their security practices, and one of the [...]

26
Jul
Outsourcing Your Cyber Security

Outsourcing the IT and cyber security for your organisation is an excellent way to save [...]

28
Jun
threat intelligence
Our favourite threat intelligence blogs, news sites and resources

You need to keep up with the real-world threats to stay safe but cyber security [...]

27
Jun
    Blog Subjects
    Certification Cyber Security for SMEs Mobile Device Security Password Management Security Awareness Training SOC Vulnerability Scanning
    Search Posts
    Latest Posts
    • 25
      Jan
      Understanding DORA, NIS2 and CER Comments Off on Understanding DORA, NIS2 and CER
    • 13
      Jan
      Everything you need to know about Credential Stuffing Comments Off on Everything you need to know about Credential Stuffing
    • 15
      Dec
      Why Zero Trust Is The Future Of Cyber Security Comments Off on Why Zero Trust Is The Future Of Cyber Security
    • 06
      Dec
      The Differences Between Penetration Testing and Vulnerability Scanning Comments Off on The Differences Between Penetration Testing and Vulnerability Scanning
    • 05
      Dec
      Security Awareness Training for Higher Education: Safeguarding Educational Data Comments Off on Security Awareness Training for Higher Education: Safeguarding Educational Data
    Sign up for Newsletter


    Our Top Pages
    • About
      • Webinars
    • Access Management and MFA
    • Advanced Email Security
    • AppCheck
    • Blog
    • Business Secure
    • Case Studies
    • CheckScan+ Get a Demo
    • CheckScan+ Introduction
    • CheckScan+ Service Overview
    • Checkscan+ Technical Features
    • CheckScan+ Vulnerability Scanning & Vulnerability Testing Service
    • Cyber Security Awareness Training for the Hybrid Workplace
    • Cyber Security ISO27001 Assessment
    • Cyber Security Maturity Assessment
    • Cyber Security Testing
    • Dark Web Monitoring
    • Digital Risk Protection
    • Email and Web Access Protection
    • Endpoint Protection
    • Governance Risk Compliance
      • CISO aaS
      • DPO aaS
      • GDPR
      • Security Audit
    • Hidden Threats of The Dark Web
    • How to Implement a Cybersecurity-first Culture for the Modern Workplace
    • IT Consultancy
    • IT Security Services
    • Managed Detection & Response
    • Mobile Device Protection
    • Mobile Device Security Management
    • MSOC+ Managed Detection and Response
    • MSOC+ Managed Detection and Response
    • News
    • Newsletter Sign-up
    • Password Security
    • Passwordless Authentication
    • Phishing
    • Public Sector Base Line Standards Webinar Watch
    • Ransomware
    • Security Infrastructure Management
    • Security Operations Centre
    • Security Partners
    • Services
      • CheckScan+ Vulnerability Management Platform
      • Digital Forensics Service
      • IT Consultancy
      • Penetration Testing
      • Project Management
      • Resource Fulfilment
      • Secure Code Testing Services
      • Security Awareness Training
      • Source Code Review
      • Threat Hunting
    • Small Device Big Risk Mobile Threat Protection On-demand Webinar
    • Solutions
      • Data Protection
      • Network Protection
      • Security Information and Event Management -SIEM
    • Sophos Security Solutions
    • Team Members
    • Telephony Partners
    • The problem with passwords – password management webinar
    • Useful Links
    • Webinar Exploiting the Impossible: Security Vulnerabilities in the Wild

 

LOCATION

We are happy to host our clients in the comfort of our meeting facilities at our offices. Please call or email to arrange a meeting.

Suite B109,
The LINC, TUD,
Blanchardstown,
Dublin D15 VPT3

CALL US

Our phones are open during normal business hours, 9am to 5:30pm, Monday to Friday, excluding Bank and Public Holidays.

+353 1 536 7320

CONTACT US

For enquiries at any time, please contact us via email. For emails received out-of-hours, you will receive a response during normal business hours on the following working day.

[email protected]

Copyright 2023 © Commsec Communications & Security Limited Company No. 535407
  • Privacy Policy
  • Website Visitor Policy
  • Monitored Security
    • Business Secure
    • MSOC+ Managed Detection and Response
    • Threat Hunting
    • Managed SIEM Service
  • Security Testing
    • CheckScan+
    • Penetration Testing
    • Source Code Review
  • Professional Services
    • CISO aaS
    • Digital Forensics Service
    • DPO aaS
    • GDPR
    • Governance Risk Compliance
    • ISO27001 Assessment
  • Solutions
    • Access Management and MFA
    • Advanced Email Security
    • Dark Web Monitoring
    • Endpoint Protection
    • Mobile Device Security Management
    • Network Protection
    • Password Security
    • Security Awareness Training
    • Security Information and Event Management -SIEM
    • Sophos Security Solutions
    • Vulnerability Scanning