Skip to content
  • About Us
    • About CommSec
    • Careers
    • The Team
  • Partners
    • Security Partners
    • Telephony Partners
  • Resources
    • Blog
    • News
    • Case Studies
    • Webinars
    • Newsletter Sign-up
  • Contact
  • +353 1 536 7320
  • [email protected]
  • About Us
    • About CommSec
    • Careers
    • The Team
  • Partners
    • Security Partners
    • Telephony Partners
  • Resources
    • Blog
    • News
    • Case Studies
    • Webinars
    • Newsletter Sign-up
  • Contact
Sensible Cyber SecuritySensible Cyber Security
  • Security Operations Centre
  • Penetration Testing
  • CheckScan+
  • Services
    • Business Secure
    • CISO aaS
    • Cyber Security Testing
    • Digital Forensics Service
    • DPO aaS
    • GDPR
    • Governance Risk & Compliance
    • ISO27001 Assessment
    • Managed Detection & Response
    • Source Code Review
    • Threat Hunting
  • Solutions
    • Access Management and MFA
    • Advanced Email Security
    • Dark Web Monitoring
    • Endpoint Protection
    • Mobile Device Security Management
    • Network Protection
    • Password Security
    • Security Awareness Training for Users
    • Security Information & Event Mgmt
    • Sophos Security Solutions
    • Vulnerability Scanning
  • Under Attack
  • +353 1 536 7320
CONTACT US

Blog

Follina MS Word Vulnerability – all you need to know
June 7, 2022

Follina – it’s just a clever name The name Follina comes from an area not far from Venice, in the North West of Italy. While this seems interesting the name [...]

Blog

The HSE Attack – 1 Year On
May 17, 2022

May 14th, 2022, marked the first year anniversary of the HSE attack. In our new on-demand webinar, our panel of Cyber Security experts takes a deep dive into the key [...]

Blog

The Most Dangerous Web-based Vulnerabilities
April 27, 2022

[...]

APIs Blog

Securing your Single Page Applications and API Endpoints  
March 29, 2022

Much of the web is made up of multi-page and single-page applications. SPAs are exploding in popularity because they perform a lot of real-time functionality such as updated content, facilitating [...]

Blog

Secure your IT multiverse with Managed Detection and Response (MDR)
February 24, 2022

Multiple IT environments are the norm for most businesses. The rapid transition from on-premises to cloud is growing, with the pandemic advancing online technology exponentially in the past 2 years. [...]

Blog

Modern Cyber Security for SMBs: Expectations vs. Reality
January 21, 2022

  2021 was the year were cyber security made its mark on Ireland like no other. The HSE attack was the event that pushed cyber awareness to the front of [...]

Blog

New Changes Coming to Cyber Essentials on 24th January 2022 – Will you be ready?
January 5, 2022

[...]

Blog

Apache Log4j 2 Vulnerability (CVE-2021-44228)
December 13, 2021

What is CVE-2021-44228? CVE-2021-44228 is a remote code execution vulnerability that is affecting multiple versions of the Apache Log4j 2 library. This vulnerability is being actively exploited in the wild [...]

Blog

Are you on the Naughty, Nice or Breach list this Christmas?
December 13, 2021

A Christmas breach Santa’s list has just been stolen! A list of all the children’s Personally Identifiable Information (PII) – Name, Address, details of good behaviour, best-friend facts, desired toys, [...]

Blog

Small Device, Big Risk- Why employees’ phones are threatening your business security
December 8, 2021

[...]

Blog

You have a vulnerability scan report, now what?
November 25, 2021

You have a vulnerability scan report, now what? A great way to identify your IT security weaknesses is to run a vulnerability scan against your applications and/or infrastructure. Now that [...]

Blog

Cyber Security Tips for Black Friday Weekend
November 17, 2021

2021 has been another strange year. Since 2020, the COVID-19 pandemic has changed our everyday lives – particularly the way we celebrate the festive season. As a SOC Analyst at [...]

Blog

So You Clicked On A Phishing Link – Now what?
November 5, 2021

“November & December” is the time where many vendors promote their products with offers as well as the time for baiting into suspicious promotion links (phishing emails). Most of us [...]

Blog

The Game has Changed – Strengthen Your Cyber Security with SOC
October 8, 2021

In the words of Yeats, the state of cyber security in Ireland has “all changed, changed utterly”. The attack on our HSE was a national wake-up call to the potential [...]

Blog

Cyber Security Quiz 2021
October 4, 2021

Welcome to our Cyber Security Quiz 2021. To celebrate Cyber Security Awareness Month in October, we are running a weekly quiz to see who has the best cyber trivia knowledge. [...]

Blog

Are you being hacked through WiFi networks?
May 28, 2021

Criminals use insecure WiFi to steal passwords and put viruses and spyware on your device. WiFi has been around for 22 years. That’s long enough that millions of people can’t [...]

Blog

Why you should stay on guard against mobile phishers
May 28, 2021

You might spot a phishing email on your computer, but it’s much harder on your phone. Why is mobile phishing so successful, and how can you stay safe? Imagine this: [...]

Blog

Demystifying mobile security
May 28, 2021

Your one-stop guide to mobile security acronyms and how the solutions fit together The tech industry loves acronyms. Analyst firms thrive by defining new ones to describe complex product subcategories. [...]

Blog

Mobile Security and GDPR
May 28, 2021

If you access company info on your phone, you need think about GDPR GDPR applies to personal data and defines that term broadly. It includes everything from name and address through to [...]

Blog

Are employee phones leaking your customer data?
May 28, 2021

A data breach can cost your organisation heavily in fines, reputation, lost customers. MTD protects your remote workforce from data theft and loss. You have anti-virus on every work computer [...]

Blog

6 reasons why cybercriminals want to target your smartphone
May 28, 2021

The data is in, and it doesn’t look good: mobile devices are a primary target for online criminals. Checkpoint’s Mobile Security Report 2021 found that 97% of organizations are facing mobile threats [...]

Blog

So what is MFA all about?
November 3, 2020

MFA (Multi Factor Authentication) or 2FA (2 Factor Authentication) is a simple yet effective way of improving the security of application services by adding another means of checking your identity [...]

Blog

Setting a standard
September 13, 2020

“The nice thing about standards is that you have so many to choose from” – Andrew S. Tanenbaum. Standards, sensibly implemented, can be a boon for your business. They are [...]

Blog

Five Common IT Security Vulnerabilities and How to Avoid Them

In this article, technical experts from our partners Appcheck are looking at five of the most common IT security vulnerabilities and how to avoid them. Remote Command/Code Execution (RCE) We [...]

03
Jul

Blog

Gone Phishing

Anatomy of a Phish Phishing. We hear about it all the time, with warnings abounding from IT and security experts. We know we will be targeted by it. We know [...]

10
Jun

Blog

Understanding Hash Values

What is that MD5/SHA-1/SHA-256 thing I see when I go to download an application? When you download an application installer, you will often see file information listed beside the download [...]

05
Jun

Blog

Four simple tips to avoid being the low hanging fruit for cyber criminals

Before we start, relax! I’m not selling anything. If anything, I’m unselling. I’m not a fan of throwing money at something that can be done with a little elbow grease. [...]

26
May

Blog

Advice from the front line of Security – the SOC analyst
May 15, 2020

Security Operations Threat Analysis As we are all aware many organisations have adopted working from home in response to the Covid 19 lockdowns. In  most cases, it is the first [...]

Blog

I’ve asked a forensics company to do some work for us. What should I expect back from them?

The background: Mary from Accounts, having fallen under suspicion for her snack purchases, has been responsible for kicking off a major internal investigation in your company. It looks like she [...]

05
May
Security Operations

Blog

The Importance of Rebooting

Why is reboot required? Rebooting helps the device to work better by clearing the temporary files stored in RAM, clears any process that is stuck inside the memory due to [...]

05
May

Blog

What is digital forensics all about anyway?

It’s a fair question. You might think something has happened on an electronic device, and maybe it’s something really dodgy. So why not just go ahead and look at it [...]

17
Apr

Blog

Free Security Protection for Your Mobile Phone

Your mobile phone holds much of your sensitive and personal data and believe it or not, Smartphones are as much a target for the cyber-criminals as your PC or laptop [...]

17
Apr
    Blog Subjects
    Certification (1) Cyber Security for SMEs (5) Mobile Device Security (5) SOC (3) Vulnerability Scanning (6)
    Latest Posts
    • 16
      Jun
      SOC Analyst Comments Off on SOC Analyst
    • 07
      Jun
      Follina MS Word Vulnerability – all you need to know Comments Off on Follina MS Word Vulnerability – all you need to know
    • 29
      May
      CommSec shortlisted for Two Tech Excellence Awards – update we won! Comments Off on CommSec shortlisted for Two Tech Excellence Awards – update we won!
    • 18
      May
      CommSec and Fortinet Provide Solution To Protect Manufacturing Supply Chains from Cyber-Attacks Comments Off on CommSec and Fortinet Provide Solution To Protect Manufacturing Supply Chains from Cyber-Attacks
    • 17
      May
      The HSE Attack – 1 Year On Comments Off on The HSE Attack – 1 Year On
    Sign up for Newsletter


 

LOCATION

We are happy to host our clients in the comfort of our meeting facilities at our offices. Please call or email to arrange a meeting.

Suite B109,
The LINC, TUD,
Blanchardstown,
Dublin D15 VPT3

CALL US

Our phones are open during normal business hours, 9am to 5:30pm, Monday to Friday, excluding Bank and Public Holidays.

+353 1 536 7320

CONTACT US

For enquiries at any time, please contact us via email. For emails received out-of-hours, you will receive a response during normal business hours on the following working day.

[email protected]

Copyright 2022 © Commsec Communications & Security Limited Company No. 535407
  • Privacy Policy
  • Website Visitor Policy
  • Security Operations Centre
  • Penetration Testing
  • CheckScan+
  • Services
    • Business Secure
    • CISO aaS
    • Cyber Security Testing
    • Digital Forensics Service
    • DPO aaS
    • GDPR
    • Governance Risk & Compliance
    • ISO27001 Assessment
    • Managed Detection & Response
    • Source Code Review
    • Threat Hunting
  • Solutions
    • Access Management and MFA
    • Advanced Email Security
    • Dark Web Monitoring
    • Endpoint Protection
    • Mobile Device Security Management
    • Network Protection
    • Password Security
    • Security Awareness Training for Users
    • Security Information & Event Mgmt
    • Sophos Security Solutions
    • Vulnerability Scanning
  • Under Attack