The other day I received a text message supposedly from revenue.ie saying to login to website.

The Revenue Commissioners have become aware of fraudulent mobile phone text messages, purporting to come from Revenue, containing a link to a website seeking personal information in connection with a tax refund.
These text messages did not issue from Revenue.
The Revenue Commissioners never send unsolicited text messages.
Anyone who receives an unsolicited text message purporting to be from Revenue and suspects it to be fraudulent or a scam should simply delete it. Anyone who is actually awaiting a tax refund should contact their local Revenue Office to check its status.
Anyone who provided credit/debit card information in response to these text messages should contact their bank or credit card company immediately.
Please see our Security page for further information.

Eircom PPOEPassword:
Default IP url: http://192.168.1.254
Password: broadband1
Basic Modem Config:
Username: eircom@eircom.net
Password: broadband1
Encapsulation: PPPoE
Multiplexing: LLC Based
VPI: 8
VCI: 35
 
Vodafone PPOE Password:

User Name: vodafone@vodafone.ie
(a.k.a. Network ID, PPP Username, Login or Login Username)
Password: broadband
Encapsulation: PPPoE (PPP over Ethernet)
Multiplexing: LLC-based
VPI: 8
VCI: 35
MTU: use default router setting, otherwise use 1492
DNS: set to automatically assigned
If there is a need to be specified use the following
Preferred DNS: 89.19.64.36
Alternate DNS: 89.19.64.164
 

Smart Telecoms:

Connection Protocol: PPPOE
Modulation Type: G.DMT(G992.1/3/5)
Multiplexing: LLC
VPI: 8
VCI: 35
Security Protocol: PAP
Username: Detailed in your welcome letter
Password: Detailed in your welcome letter
Wan IP: Automatically Assigned
Default Gateway: Automatically Assigned
DNS Server 1: 84.203.254.34
DNS Server 2: 84.203.255.34

Screen Shot 2013-10-17 at 11.53.22We have been seeing a lot more Google users getting phishing email message to steal your Google user name and password. If you receive the email message appearing as if it came from a friend, family member or business, asking you to view a document that was uploaded to Google Docs/Dropbox or any other shared services, please delete this message.
If you click on the link and login with your google account you will find that your account details will be sent to hackers to login using your account. Another ploy they have had is to setup and filter in Gmail to delete all messages in future. You should reset your password and associate your phone number with your account in case of any reset passwords.
 
 
Here is a copy of the phishing email,
Subject: Important Document
From: Customer Service
Google Drive Keep Everything, Share Anything.
Please check the document uploaded for you using Google docs.
Click here.
Adjust sign in with your email to view the document its very important.
Thank You.
Here is another one we received
Subject: Hi
From: Sarah
Hello,
Please view the document, CLICK HERE. and sign in with your email

Regards
Kind regards,
 
 
 

A Quick Response code or QR code is a two dimensional scannable bar code that stores a tremendous amount of information and which is being used by businesses across the world for a variety of purposes. In the past decade, QR codes have become mainstream in the fields of advertising of merchandising. Functionally QR codes link together real world objects (such as a product or advertisement) to the virtual world connections (such as a URL, a network connection, or an image). By using QR codes a business can really diversify and ramp up marketing and tracking campaigns.
QR codes are often used by businesses as a way of tracking data or setting up a ticketing system that can be easily counted using scanners. QR codes are designed to work across computing platforms and the iPhone, iPad, Android phones, windows phones, and blackberries all have a variety of scanning applications.
As an advertiser one of the best ways of using a QR code is to connect it to a website or to a video. For example, a concert promoter might put a QR code on all of his posters around town. When an interested party scans the code, the person will automatically be lead to a video on her phone. After the video is done, a form might pop up asking the interested customer to type in their name and email address to be entered into a free drawing or contest. QR codes can also be pushed from devices via social media.
Another example might be a restaurant that takes out print advertising. The restaurant can extend its reach electronically by allowing interested potential customers to view a menu or by offering a coupon for a weekly special. There are many other uses of QR codes in many industries; for example in the banking sector QR codes are being used for identity verification.
Planning an effective QR code campaign takes some work. Because consumers tend to have a short attention span, whatever the QR code’s final destination ends up being must be designed to quickly capture interest and information. Experts in QR marketing can assist you with setting up your campaign.

18 August

Remote Support

Uncategorized

When someone runs a business, it is important that they have the ability to resolve computer and network issues as quickly as possible. However, many companies are not able to afford an on site tech support team. To ensure that IT issues do not derail a business, many companies have started using remote IT support services. These services allow a tech support agent to log into computers and networks remotely to resolve technical issues.

There are a variety of reasons that a company would want to take advantage of a remote support services, including: speed of resolution, low cost and the variety of expertise available. However, any company that uses these solutions should be sure to safeguard against the possibility of social engineers gaining access to business networks. Still, companies that are proactive can greatly reduce or eliminate the risk of unwanted people gaining access.For companies that use outsourced tech support, if they do not allow remote access to networks and computers, these companies have to wait until a tech support team arrives on site to resolve an issue. Waiting for an IT resolution team to arrive can take hours, which is an incredible amount of downtime for a business. However, remote IT services can log into a computer or network within minutes. Additionally, most remote support services are far less expensive than using IT services that require technicians to be on site. This is because remote services do not need to charge companies for travel time and cost of maintaining a fleet of vehicles.
Another advantage that remote IT services have over even in house tech support staff is the variety of expertise that is available to companies that use them. Remote services usually employ staff that are versed in repairing networks, computers, backup drives and many other devices. This means that no matter what issues a company runs into, remote support services will be likely to have someone who can resolve the problem.
While there are a lot of advantages to companies that use remote technical support services, there are some issues that are associated with using them. To begin with, remote support means that companies are allowing access to their computers and networks. It is important that only tech support teams be allowed entry through these channels. This is easily remedied by only turning on remote access when support is needed and requiring user names and passwords for access.
However, that does not eliminate concerns regarding social engineering. Social engineers gain access to networks and computers by gathering information from unsuspecting employees instead of hacking. To ensure that employees do not accidentally open the door for social engineers, companies need to make staff aware of the dangers of giving away this kind of information. Employees should understand that remote IT services will already have the information and credentials they need for access.
Using remote IT support is a great way for companies to save money and time, and as long as they are proactive, businesses can be sure that their networks and data are safe.

While the concept of highly available large scale computing systems is not new, powerful procesors, increased drive space, and the ability to easily virtualize computers has lead to a recent explosion of “cloud” computing offerings and services. As the popularity of cloud computing grows more and more software, computes, and data are being housed and maintained at data centers and delivered to end users via an internet connection.
As a potential cloud services customer it is important to evaluate the myriad of vendors and products. And not all clouds are created equal. A “true” cloud service is highly available, highly scalable, and highly redundant. While there providers who host applications which claim to be running “cloud” services all over the world wide web it is critical for the customer to distinguish who the right provider is for his/her needs.
Basically cloud services are services which are there when you need them, which can be turned up or down with ease, and which are located in a space that has provisions in the event of an internet or electricity outage. As a potential cloud customer its important to ask your IT provider key questions, after all its your data and business applications that make your business work.
Customers should asses where the data center is that is running these services? Does the data center have redundant air conditioning, internet, back up batteries, security, and fire suppression? Customers should determine if the applications they are running are working on a “cluster” of computers rather than on one virtual machine. And customers should determine what the fail over plan is should an internet connection go down, a computer fail, or a drive die.
Finally customers need to determine if the services that they are requesting are high quality services. Cloud computing doesn’t address the need for quality software; however, poorly designed software is likely to have its problems magnified in the cloud. Some typical Software as a Service (SaaS) offerings are email, collaboration, calendaring, file sharing, and video conferencing. Look for providers that have experience managing applications in a cloud environment and make sure that your provider offers excellent customer service. After all, without a human being to pick up the phone, an outage is nothing short of a nightmare.
While moving to the cloud can seem scary at first, the reality is that as consumers of smart phone, tablets, and web sites most people are already using cloud services on a regular basis. Because the concept of cloud computing has existed for a long time, as a potential customer you can feel confident in many of the newer, more recent enterprise products and solutions. Your Managed Services Provider can offer you some key advice about how to evaluate services and chose the solutions that best suit your needs.

Being able to share information quickly and accurately is always a priority in business. By being agile, a business owner is able to stay ahead of the competition and run his or her business effectively. That is exactly what Google Calendar allows you to do as a small business. From being able to monitor employee activity to sharing calendars and appointments among your team, Google Calendar will fill a much-needed role in your workplace
.
Time scheduling and appointment setting within the calendar is a breeze. Your employees can easily create their own appointments, time off or other activities within the calendar. The interface is straightforward and easy to use and usually requires no training at all. Once an appointment has been entered, the team can share their calendars or individual appointments among themselves.
At a glance you can quickly see the meta data for your company and decide what time is best to schedule team meeting and other important company activity. If your company uses an appointment setter or other individual, they can use the calendar to book appointments easily without double booking.
In addition to just seeing entire blocks of time marked off during a calendar period, Google Calendar also allows your team to view a breakdown of their entire day. This functionality allows the calendar to become a powerful time management tool. Employees can quickly enter in activities they need to accomplish for a given time period and see where their time will be spent.
It is not uncommon for an employee to need to access their calendar while at their desk. Whether they are traveling, with a client or at another of your locations, Google Calendar keeps them connected at all times. The calendar is truly cross-platform being able to be used on any system that can connect to the internet, meaning Macintosh, Windows, Linux, mobile or otherwise. Your employees can even check their schedules from home if they need to get prepared for the upcoming workday.
Finally, web presence is a must for companies of nearly any size these days. With Google Calendar, you are very easily able to integrate one or several of your calendars into your site. Choose from displaying individual calendars or an all-inclusive calendar and export it via HTML or XML . Sharing a Google Calendar in your business is a one stop solution for easy time management.

Preventative IT support is a growing field that offers companies ways to safeguard technology, processes, and employees from attacks on a firm’s information infrastructure.
The reason that preventative IT support is preferred is based on the fact that the cost of preparation upstream is much less than having a problem occur later.
Over the past decade, large firms have gone from focusing solely on adding services to protect technology to a combined approach that helps develop practices in all three areas.
The need is apparent. It was only a few years ago that a government agency in the UK noticed a USB stick in the parking lot of one of their high security buildings managed by a defense contractor. The USB stick contained a lot of what would be considered top-secret information. The contractor was not fired, but they certainly gained new religious beliefs that included moving all of their client’s servers into remotely-controlled facilities that humans were not allowed in.
Airgapping, which is removing people or networks from direct contact with a computing device, is therefore one way to remove a potential threat.
Other techniques that are typically used by preventative IT support specialists are to audit processes and implement ITIL, which is a set of IT processes that were developed in Europe to help ensure stronger process decision-making with regard to security and ethics.
When it comes to people, one of the largest threats to security is social engineering.
Everyone knows the story of the London hospital nurse who committed suicide after mistakenly passing on a phone call from some radio disc jockeys who wanted to get personal medical information about Prince William’s wife during her stay there. Both the nurse and the hospital were victims of social engineering.
Preventative IT support specialists can train your staff regarding social engineering attempts and help them to setup processes that will help blunt social engineering attempts. Their efforts can shore up your staff’s behaviors as they transact business.
One method of stopping social engineering is to raise awareness within your firm by training and then auditing the staff. For example, employees should know the e-mail policies so they are not tricked by phishing or virus attacks. Clicking on an e-mail from an unknown sender that appears suspicious or has an attachment that got through the firewall seems like it would not often occur. On the other hand, without training, it has been shown that the percentage of employees in firms that do click on such messages is higher than it would be had they been trained. The same is true for employees that use the phone. Training and auditing has been confirmed to decrease the number of employees in organizations that will hand out their password if a fictitious IT person calls them and uses social engineering to solicit it.
Another way to combat it is to educate executives about the whole range of social engineering exploits in order to drive individual company change from the top down. One Irish company is noted for doing this by arranging data breach forums for executives and by executives at Irish consulates overseas.

5 July

Digiweb outage

Uncategorized

Lots of calls today from new customers looking to move from Digiweb massive complaints from many users slow websites, emails being slow to send and receive and just a very generic email from Digiweb.
We have been customer of Digiwebs for last 5 years with not a day of bother very quick response but not much help over past 2 months of issues. We have been quite lucky having almost none of our present customers using email on digiweb, another reason to move to Google Apps.
Digiweb you might try communicate your outage a bit more to your customers
Screen Shot 2013-07-04 at 22.54.48Screen Shot 2013-07-04 at 23.05.40

We all obviously know how powerful the internet is in many ways. We also know that how fast information can travel via online. Much faster say then radio and television. With all the social media buzz and many different social sites news can travel even quicker. With that comes millions of responses from the general public. News outlets utilize social media and many internet sites to show video and other info that they know the public will be able to see. News can be found in a matter of seconds from a computer, smartphone, and tablet. Even persons at work can have an idea of what is going on. Many of the government sections and departments utilize the internet to attack each other with many ways. They know that certain information can be portrayed different and maybe harsher online rather then radio and television. This is especially true during elections. Election season are perfect storms for internet attacks throughout different governments. As you may know elections are very important in the United States. Every citizen has the right to vote by choice. During the time you will be presented with many candidates fighting for your vote for certain spots. Of course they are broken down to either democratic or republican parties. This day an age you with all the technology you will see many different video postings from candidates, blogs, articles, social media events like on Facebook and Twitter. All this will also interact with the public. The certain parties will be able to go in greater detail then on television and radio. War games will also arrays through the internet with a lot of back and forth commenting on certain subjects. As always this is a reality and takes place all the time. Yes at some points it can get a little nerve racking for the public and confusing with all the flip flopping on certain subjects. Some information that do have attacks on them via the internet is never true. Since its the internet there are thousands of sources where information can leak to.
In conclusion governmental war games via the internet will only get bigger and have even more information. From videos, to pictures, blogs, commenting, articles. There are many different ways in which information can be posted. As for the public you will just have to find the legit valid confirmed sources and what you believe is the correct information.