By

ITM Tech
Working from home is no longer only for a few employees in special circumstances. The pandemic pushed many businesses to enable remote work. The priority was getting it working and securing access. Now that it’s routine, it’s also time to consider how you back up work from home. Data backup creates a reliable copy of...
Read More
Every time you’re online and a site sends a separate code to check your identity, you’re using two-factor authentication. It’s become the norm. So, of course, hackers have figured out how to get around this, too. This article shows you how they do it and how to stay safe. With billions of usernames and passwords...
Read More
The Monty Python “Spam” sketch makes us laugh, but business emails filtered as spam do not. Your business wants to reach its prospects and customers. This article shares tips to help you ensure customers get your messages. Mail or internet service providers (ISPs) use algorithms, custom configurations, and/or machine learning to filter emails, and this keeps your...
Read More
We send an estimated 306 billion emails every day globally, personal and professional. Still, it’s not secure. Any private data, proprietary information or sensitive documents sent are at risk. Sending an email is convenient and quick, but when it comes to confidential data, you’re better off choosing another method of delivery, one that doesn’t have...
Read More
Hollywood would have us believe that cyberattacks are elaborately planned and use expensive, sophisticated tools developed by James Bond’s tech guru, Q. Yet in real life, most hacks are nothing like that. Cybercriminals often simply fool a human to gain access. Phishing remains a primary way to attack. A scammer sends an email that looks...
Read More
You’ll know if you’re a victim of ransomware. Often you’re met with a red screen telling you that your business files are encrypted. You probably won’t be able to do anything on the computer, although the cybercriminals will be sure to provide helpful instructions for how to pay up. If you’re the victim of a...
Read More
In light of everything that’s been happening with the HSE recently, we thought we would help people understand what ransomware is and how it works. Ransomware is an attack on the data, information and privacy of your computer by use of dangerous software. Typically, the security and access to a system is compromised. The attackers...
Read More
‘There’s an app for that!’ Even for business purposes, you can bet this is the case. Yet a small business may be using online applications without understanding the risks. Here’s help. Most businesses no longer have all their technology and software solutions on-site. The old cybersecurity perimeter around the IT premises is no longer going...
Read More
We are looking to recruit an experienced Level 2 Managed Services Engineer to join our rapidly growing team. As part of the ITM Tech team, you will work in house with the managed services team and directly on-site providing technical services, reporting directly to the Service Manager. The primary purpose of the role is to...
Read More
Cloud technology has created a revolution for small business, changing the way you store, share and backup files. While ‘the cloud’ is often hard to understand because it’s neither in the sky nor in a single location, there’s no arguing that it’s driving growth across the board. Storage concerns are a thing of the past...
Read More
1 2 3 9