We’ve all had that moment — the mobile rings from a strange number, or a text pops up claiming to be from your bank. You pause, hesitate, and then the sinking feeling hits. “Is this legit… or a scam?”

Well, thankfully, the powers-that-be are doing something about it.

Ireland’s communications regulator, ComReg, has introduced a new “Likely Scam” warning system for mobile calls. It’s a step in the right direction — and a particularly important one for small and medium-sized businesses across the country who are on the frontlines of phone-based communication.

Let’s break down what’s happening, how it works, and what you can do to stay ahead of the curve.


What Is the “Likely Scam” Warning?

The new system automatically labels suspicious calls with a warning on your mobile screen. So, instead of just seeing an unknown number, you might now see:

📱 “Likely Scam”

This feature helps flag calls that appear to spoof real numbers, use known scam patterns, or exhibit suspicious calling behaviour — the kind we’ve seen rise sharply over the past few years.

It’s not blocking the call, just giving you a heads-up. You can still answer if you choose — but now with a much clearer idea of what might be waiting on the other end.


How Does the Scam Alert System Work?

The warning system is built into the mobile network layer. Here’s a simplified overview:

  1. Telecom providers monitor traffic patterns – These include high-volume, short-duration calls, or calls from numbers that look like Irish numbers but originate from abroad.
  2. Suspicious activity is flagged – If a call matches the behaviour of known scams, the network applies the “Likely Scam” label before the call reaches your device.
  3. The label appears on your screen – Just like “Private Number” or “No Caller ID,” it gives you a warning in advance.

This system has already rolled out across major Irish mobile networks like Vodafone, Three, and eir. No setup is required by the user — it’s all managed at the network level.


Why This Matters for Irish Businesses

If you’re running a business in Ireland — whether you’re in retail, services, trades, or tech — your phones are a lifeline. Scam calls aren’t just annoying; they can be dangerous.

Here’s how they cause real problems:

  • Wasted time: Staff lose productivity answering junk calls.
  • Data breaches: A well-timed phishing call might trick someone into giving out client or system info.
  • Reputation damage: If a scammer spoofs your number and contacts others, it reflects badly on your brand.
  • Stress and confusion: Constant spam calls erode trust in phone communication and lower morale.

Now, with the “Likely Scam” system in place, you’ve got another tool in the arsenal to defend your staff and your customers from fraudulent activity.


What You Can Do To Protect Your Team and Clients

While the ComReg update is brilliant, it’s just one piece of the puzzle. There are other steps Irish businesses should take to stay cyber-safe:

1. Educate your staff

Hold regular training sessions on how to spot scam calls, phishing texts, and dodgy emails. A five-minute chat could prevent a five-figure loss.

2. Review call handling procedures

Make sure staff verify unexpected requests, especially ones involving passwords, payment details, or system access.

3. Use secure communications platforms

If your team relies on mobile phones, consider pairing them with secure apps like Microsoft Teams or encrypted VoIP services.

4. Enable call filtering

Some mobile devices and VoIP platforms allow for automatic call blocking or routing unknown numbers to voicemail.

5. Have an IT policy in place

Include clear steps on how to report suspicious calls, texts, or voicemails. Quick action can prevent further risk.


How CK Computer Solutions Can Help

At CK Computer Solutions – Managed IT Services Dublin, we work with businesses across Ireland to secure their communications, devices, and systems.

Our managed services go beyond basic support:

  • Call Security: We help configure VoIP and mobile setups with added filtering and spam protection.
  • Staff Cybersecurity Training: We deliver tailored training sessions on recognising scam calls and social engineering tactics.
  • Incident Response: If a staff member does fall victim to a scam, we help contain the breach, investigate what happened, and patch the gap.
  • Policy Development: We work with you to create practical, realistic communication policies that protect both your staff and your reputation.

Think of us as your IT partner — not just a helpdesk, but an embedded part of your team, always watching your back.

Whether you’re a small office or a multi-site operation, CK Computer Solutions can help you stay ahead of emerging scams and tighten your tech defences.



We’re all guilty of quickly skimming through emails, especially on a Monday morning or just before clocking off. That’s exactly what cybercriminals are banking on. One of the more subtle phishing tactics doing the rounds lately is the “Task List” phishing email — a seemingly harmless message that pretends to help you stay productive, while quietly compromising your data or systems.

Let’s unpack what this scam looks like, how it works, and what your team can do to avoid falling victim.


What Is a “Task List” Phishing Email?

A “Task List” phishing email is a cleverly disguised message designed to look like a shared task update, project assignment, or a to-do list from a colleague or manager. It typically includes:

  • A subject line like:
    “Please see your updated tasks”
    “Tasks assigned to you this week”
    “[Project Name] Task List – Urgent”
  • A body that sounds generic but urgent:
    “Hi, please review the tasks assigned to you and mark what’s completed.”
  • A link to a malicious site, often masked as a Microsoft 365, Google Docs, or Trello board.
  • Sometimes a PDF, Excel, or even SVG file attached as a “task list”.

The moment you click the link or open the attachment? You’ve either been tricked into entering your login credentials, or malware has begun installing in the background.


Why This Works So Well

The brilliance (and danger) of the task list phishing email lies in its familiarity and timing. We’re all used to getting these kinds of emails, especially in hybrid or remote workplaces where teams rely on tools like Microsoft Teams, Monday.com, Asana, and Slack.

It taps into:

  • Routine – Most people won’t question an email titled “New Tasks Assigned”.
  • Hierarchy – When it looks like it’s from your boss or department head, you’re more likely to act.
  • Time pressure – Words like “urgent”, “overdue”, or “needs review today” add a false sense of urgency.
  • Imitation – Many phishing emails mimic real platforms (Microsoft 365, Notion, ClickUp) so they pass the visual sniff test.

Even an SVG Attachment Could Be a Trap

One of the more sneaky tricks in task list phishing emails is the use of SVG (Scalable Vector Graphics) attachments. These files look like harmless icons or images but can be embedded with dangerous code.

Unlike static image formats like JPG or PNG, SVG files are XML-based, meaning they can:

  • Contain clickable areas that redirect to phishing websites
  • Embed fake login forms designed to mimic Microsoft or Google portals
  • Launch JavaScript or HTML-based payloads when opened in a browser

Because most devices open .svg files in a browser by default, the attack can bypass email filters and trigger immediately — no need for the user to “enable macros” or download anything extra.

If you receive a file named something like TaskList.svg, Tasks_Review.svg, or Q3_Todo.svg, it should raise a red flag — especially if you weren’t expecting one.


Real-World Example

Here’s how one might look:

From: tasks@projectsupport365.com
Subject: You have 3 overdue tasks – immediate attention required

Hi [First Name],

Please review your pending assignments here: [View Tasks]

These are overdue and need feedback before end of day.

Regards,
Emma – Project Coordination

Sent via Microsoft Project Online

That [View Tasks] link might take you to a convincing Microsoft login screen — only it’s not Microsoft at all. It could be harvesting your credentials or redirecting you to a site where the SVG file runs malicious code in the background.


The Consequences of Falling for It

Clicking into one of these emails can unleash a chain reaction:

  • Credential theft – Login details are stolen and used to breach your email, cloud storage, or internal portals.
  • Business email compromise (BEC) – Attackers impersonate you to trick colleagues or customers into sending money or data.
  • Malware infection – Downloads that seem like spreadsheets or task templates could infect systems with ransomware or keyloggers.
  • Data loss or GDPR violation – Especially critical if client info, payroll, or contracts are compromised.
  • Downtime and financial loss – Recovery from a phishing attack can cost small businesses thousands in downtime, IT recovery, and potential fines.

How to Spot a Phishing “Task List” Email

Even the best of us can be fooled, but here are signs to look out for:

  • Unusual sender address – Looks close to a real address, but slightly off (e.g. @m1crosoftonline.com instead of @microsoft.com).
  • Generic language – “Dear colleague” or “Hi team member” with no personalisation.
  • Unexpected task emails – Especially if you don’t normally receive tasks this way.
  • Urgent tone – Tries to rush you into acting quickly.
  • Dodgy links – Hover over links before clicking. Do they go where they claim to?
  • SVG or other suspicious file types – If you weren’t expecting an attachment, don’t open it.

Practical Steps to Keep Your Business Safe

Here’s how to stop task list phishing emails in their tracks:

1. Train Your Team

Run phishing simulations or awareness sessions. Make sure staff know how to inspect emails carefully and report anything suspicious.

2. Use Multi-Factor Authentication (MFA)

Even if a password is compromised, MFA makes it harder for attackers to break in.

3. Lock Down Admin Access

Only give admin rights to staff who absolutely need it. Compromised accounts with admin privileges can do far more damage.

4. Use Email Filtering Tools

Configure Microsoft 365 or Google Workspace to filter out known phishing threats. Advanced threat protection is worth the extra few euro.

5. Implement Endpoint Protection

Modern antivirus or EDR (endpoint detection and response) software can catch dodgy attachments or links before they cause harm.

6. Verify Internally

If in doubt, double-check. A quick Teams message or call to your manager asking “Did you mean to send this task list?” can save a lot of grief.


How CK Computer Solutions Can Help

At CK Computer Solutions – Managed IT Services Dublin, we don’t just patch your PCs and walk away. As your trusted Managed Service Provider (MSP), we help protect your business from exactly these kinds of phishing scams.

Whether you’re a small team or a growing company, we offer:

  • Phishing awareness training tailored to your staff and industry
  • Email threat monitoring and filtering for Microsoft 365 and Google Workspace
  • Setup and enforcement of MFA and secure logins
  • Rapid response if something goes wrong – malware infection, account compromise, or suspected phishing
  • Regular security reviews and best practice IT policies to stop problems before they start

If you’ve ever had that gut feeling about an odd-looking email or want peace of mind that your team won’t get caught off guard, we’re here to help.

Talk to CK Computer Solutions today to secure your business, train your staff, and keep phishing threats out of your inbox.



Most businesses are just scratching the surface when it comes to Microsoft 365. Yes, they’re using Outlook, Word and maybe even a few Teams meetings—but that’s only the tip of the iceberg. What often gets missed is the suite’s true power: its ability to streamline workflows, automate tasks, and make daily operations smoother and more efficient.

Let’s delve into some of the lesser-known features of Microsoft 365 that could save your business hours each week, reduce errors, and make collaboration a breeze.


The Overlooked Value in Microsoft 365

When businesses sign up for Microsoft 365, they think they’re just getting Office apps in the cloud. In reality, they’re unlocking a powerful toolbox designed to improve productivity, communication, and workflow automation.

Many users aren’t aware they’re already paying for tools like Power Automate, SharePoint, and advanced Teams features. These aren’t extras—they’re included. But without guidance, they often go unused.

That’s money left on the table. Worse still, it means teams are missing out on simple ways to automate routine tasks or improve how they work together.


Power Automate: Free Up Time, Cut the Repetition

One of Microsoft 365’s most underrated features is Power Automate (formerly Microsoft Flow). It allows you to automate repetitive, manual tasks without writing a single line of code.

Here are a few ways businesses are using Power Automate to streamline operations:

  • Invoice Approvals: Automate invoice routing based on rules (e.g., amounts, departments), with notifications sent to the right approver. Once approved, the data is stored or forwarded automatically.
  • New Employee Onboarding: Trigger welcome emails, schedule Teams introductions, and assign permissions the moment HR fills in a form.
  • Customer Feedback Collection: Send surveys after meetings or purchases, collate responses in SharePoint, and alert relevant teams when there’s a negative rating.

These are just a few examples. With hundreds of templates available, most businesses can find at least a dozen tasks worth automating.


Smarter File Sharing with OneDrive

OneDrive isn’t just cloud storage. Used properly, it becomes a smart way to share, manage and secure files.

Here are some features you mightn’t be using yet:

  • Expiring Links: Share files that automatically become inaccessible after a certain date—great for time-sensitive projects or proposals.
  • Password-Protected Links: Add a layer of protection to sensitive documents when sharing outside your organisation.
  • Request Files Feature: Need input from multiple clients or contractors? Create a folder that allows them to upload directly without seeing other people’s files.
  • Known Folder Move (KFM): Redirect key Windows folders (Desktop, Documents, Pictures) to OneDrive for automatic backup and seamless access across devices.

These features help businesses tighten security, improve compliance, and reduce the chances of lost or misfiled documents.


Supercharging Collaboration with Microsoft Teams Automation

Teams is more than a video conferencing tool. It’s your digital workspace—and with a few tweaks, it can be automated to do the heavy lifting.

Examples of what Teams automation can do:

  • Auto-Create Teams/Channels: For new projects or clients, automatically generate a Team and relevant channels based on a form or trigger.
  • Daily Stand-Ups: Set up automated messages prompting team members to share updates each morning—perfect for remote teams or agile workflows.
  • Document Workflows: Use Teams to track document approval processes with visual indicators and alerts when action is required.

You can also integrate Teams with your CRM, HR systems, and task management tools. That means fewer app-switches and more seamless productivity.


Other Hidden Gems Worth Exploring

There’s more. Microsoft 365 is packed with hidden features that many businesses haven’t tapped into yet:

  • Microsoft Bookings: An online appointment scheduler that integrates directly with Outlook—ideal for service-based businesses.
  • Planner and To Do Integration: Create simple project boards for team tasks with notifications and due dates.
  • Forms: Build quick polls or surveys and collect structured responses in Excel or SharePoint.
  • Stream: Securely share training videos or recorded meetings within your organisation.
  • Delve: Discover what your colleagues are working on and quickly access relevant documents and insights.

When used together, these tools create a connected, cloud-based environment where information flows smoothly, and time is spent on meaningful work—not admin.


How CK Computer Solutions Can Optimise Your Microsoft 365 Setup

Microsoft 365 can be transformative—but only if it’s properly configured to suit your business. That’s where we come in.

At CK Computer Solutions, we don’t just support IT—we optimise it. As a trusted Managed Service Provider (MSP) based in Dublin, we work with small and medium-sized businesses across Ireland to get the absolute most out of their tech investments.

Here’s how we can help:

  • Free Consultation: We’ll review your current setup, identify underused features, and recommend tailored improvements.
  • Custom Automation Workflows: Let us design and deploy Power Automate flows that save your team hours every week.
  • Seamless Teams Integration: From setting up shared channels to linking your CRM, we’ll ensure Teams becomes the true hub of your workplace.
  • OneDrive Configuration & Security: We’ll implement smart sharing, backup policies, and data protection protocols that match your business needs.
  • Ongoing Support & Training: Our team is here to assist, update, and train your staff so they get the most out of every tool.

You’ve already paid for Microsoft 365—now it’s time to use it properly. Talk to CK Computer Solutions today, and let’s unlock its full potential together.


Need help optimising Microsoft 365 for your team?
Get in touch with CK Computer Solutions – Managed IT Services Dublin, and we’ll show you how to streamline your work, automate your tasks, and empower your business to do more—with less stress.



Many small and medium-sized business owners assume cyberattacks are something that only happens to large corporations. But that’s a dangerous myth. In truth, SMEs are seen as easier targets—fewer security measures, smaller IT teams, and limited budgets all make them appealing to cybercriminals.

Think of it this way: if a burglar knows one house has an alarm system and cameras while the other leaves the back door unlocked, which one do you think they’ll go for?

And when a breach does happen, the fallout for SMEs can be catastrophic. It’s not just about financial loss—there’s reputational damage, legal risk, and operational chaos. Having a data breach response plan isn’t just a best practice. It’s a lifeline.


Spotting the Signs Early

Some breaches hit like a sledgehammer—you’ll see ransom notes, system shutdowns, or public data leaks. Others are far more subtle, quietly worming their way through your systems for days, even weeks, before you notice.

Common warning signs include:

  • Unusual login activity, especially outside business hours
  • Sluggish system performance without a clear cause
  • Files being changed or moved without explanation
  • Security tools flagging unauthorised access attempts

Your first line of defence is a well-trained team. Employees who know what to watch for can report suspicious activity before things spiral.


Step-by-Step Guide: What to Do When It Happens

Step 1: Detect and Identify

First, confirm that a breach has actually occurred. That means checking logs, monitoring alerts, and investigating any red flags raised by your staff or systems.

Ask yourself:

  • What systems are impacted?
  • When did the issue first arise?
  • What type of data might be compromised?

Get a clear picture. Document every detail. You’ll need this later for both legal compliance and internal review.


Step 2: Contain the Breach

Once confirmed, your focus shifts to limiting the damage. This is your digital damage control.

Immediate actions may include:

  • Disconnecting infected machines from the network
  • Disabling user accounts showing suspicious activity
  • Blocking malicious IP addresses
  • Forcing password resets for affected users

Be careful not to delete anything just yet. Preserving evidence is vital for investigation and compliance.


Step 3: Assess the Damage

Next, you need to dig into the “what” and “how much.” Collaborate with your internal IT team or Managed Service Provider (MSP) to audit the breach.

Areas to check:

  • Personal data (customers or staff)
  • Financial information
  • Login credentials
  • Internal business documents or communications

Again, document everything. This not only helps with the remediation but ensures you’re ready if regulators come knocking.


Step 4: Notify Affected Parties

If personal or sensitive data has been compromised, transparency is essential. Depending on the nature of the breach, you may be legally required to inform customers and other third parties.

A good breach notification should include:

  • What happened
  • What data was involved
  • What actions you’re taking
  • What they can do (e.g. password reset, fraud monitoring)

In Ireland, the Data Protection Commission (DPC) must be notified of any notifiable breach within 72 hours. Miss that window and you could be hit with steep fines.


Step 5: Report to the Authorities

On top of your DPC notification, criminal breaches (such as ransomware or theft) should be reported to An Garda Síochána. This step shows due diligence and helps national efforts to track cybercrime trends.

Keep a record of all communications—it’s a key part of demonstrating compliance under GDPR.


Step 6: Remediate and Recover

Once the immediate threat is under control, it’s time to patch things up. That doesn’t mean slapping on a sticking plaster and hoping for the best.

Recovery might include:

  • Restoring systems from secure, clean backups
  • Updating software and applying security patches
  • Reviewing and tightening firewall and access settings
  • Rolling out refresher training for staff
  • Reviewing third-party integrations and limiting exposure

If you’re working with a Managed Service Provider, they’ll help with both the tech and the admin burden of recovery.


Step 7: Review, Learn, and Improve

Now’s the time to hold a proper post-incident review. This isn’t about pointing fingers—it’s about learning and getting stronger.

Your review should examine:

  • The full timeline of the breach
  • Key decisions and actions taken
  • Communication gaps or delays
  • Weak points in your existing security or response plan

Update your data breach response plan based on the lessons learned, and—crucially—test the updated plan. If it just sits in a folder, you’re no better off than before.


Incident Response Checklist for SMEs

Here’s a simple, printable checklist you can keep handy:

  • Confirm the breach
  • Contain the affected systems
  • Notify internal stakeholders
  • Assess what data or systems were affected
  • Notify affected individuals (and DPC if required)
  • Report to Gardaí if criminal activity is suspected
  • Remediate systems and update security
  • Document every step taken
  • Conduct a post-incident review
  • Update your response plan and train staff

Print it. Stick it on the wall. Make sure your team knows where to find it when it matters.


Free Data Breach Response Plan Template

To save you time (and stress), we’ve created a free downloadable response plan template tailored for SMEs. It includes:

  • Defined roles and responsibilities
  • Key contact lists
  • Communication templates
  • Step-by-step breach action items
  • Notification timelines to stay GDPR compliant

You can customise it for your industry and business size, making it a ready-to-go tool in your cybersecurity toolkit.


How CK Computer Solutions Can Help

Creating and managing a solid data breach response plan might seem like a big ask—especially if you don’t have a full-time IT department. That’s where we come in.

At CK Computer Solutions – Managed IT Services Dublin, we partner with small and medium-sized businesses across Ireland to strengthen cybersecurity and prepare for the unexpected.

Here’s how we can help:

  • Develop and test a bespoke breach response plan for your business
  • Monitor your systems 24/7 for suspicious activity
  • Respond instantly when something goes wrong—no waiting, no delays
  • Provide secure, encrypted backups and rapid disaster recovery
  • Deliver ongoing staff training to reduce human error
  • Keep you GDPR-compliant with breach reporting support and documentation

We’re not just your IT provider—we’re your safety net. When a breach hits, you’ll be glad you’ve got CK in your corner.

Need help building your plan or recovering from a breach? Let’s chat.



This post will walk you through the process of adopting the UXG Max Gateway into your network. Follow these steps carefully to ensure a smooth setup.

1. Unboxing and Initial Inspection

  • Carefully unpack the UXG Max Gateway.
  • Check for any physical damage.
  • Verify that all accessories (power adapter, Ethernet cable, etc.) are included.

2. Physical Connection

  • Connect the WAN port of the UXG Max to your internet service provider’s modem or existing network.
  • Connect a computer or switch to one of the LAN ports.
  • Plug in the power adapter and turn on the UXG Max.

3. Accessing the UniFi Network Controller

  • Ensure your computer is connected directly to the UXG Max.
  • Open a web browser and navigate to the IP address 192.168.1.1. The UXG Max default IP address is 192.168.1.1.
  • If you don’t have a UniFi Network Controller, you will need to set one up. You can download and install it on your computer, or use a UniFi Cloud Key, or you have to have a cloud controller.
  • We are using our cloud controller for this guide. You could follow the steps below.  

4. Adopting the UXG Max

  • Once in the UniFi Network Controller, you will see the UXG Max listed as “Pending Adoption.”
  • Click “Adopt” and follow the on-screen instructions.
  • The UXG Max will go through the adoption process, which may take several minutes.

5. Configuration

  • After adoption, access the UXG Max settings through the UniFi Network Controller.
  • Configure your network settings, such as IP address range, DHCP server, and firewall rules.
  • Update the firmware to the latest version.

6. Verification

  • Test your internet connection.
  • Ensure all devices on your network can connect to the internet.
  • Monitor the network performance and make adjustments as needed.

Troubleshooting Tips

  • If the UXG Max does not appear for adoption, check the physical connections and ensure it is powered on.
  • If you cannot access the UniFi Network Controller, verify your computer’s IP address and network settings.
  • Refer to the official UniFi documentation for more detailed troubleshooting steps.
StepActionNotes
1UnboxingCheck for damages
2Physical ConnectionConnect the WAN and the LAN
3Access ControllerNavigate to the IP address
4AdoptionClick “Adopt”
5ConfigurationSet up IP, DHCP, and firewall
6VerificationTest the internet connection


For any small or medium-sized enterprise (SME), your Wi-Fi network is the backbone of your business operations. However, if not properly secured, your network can also be your Achilles’ heel, leaving you vulnerable to cyber threats, data breaches, and unauthorised access. Ensuring robust Wi-Fi security should be a priority for every business owner. Here’s how to keep your network safe and secure.

Why SMEs Should Hide Their Wi-Fi SSID

Your Wi-Fi network’s Service Set Identifier (SSID)—the network name visible to anyone scanning for available networks—is the first thing potential intruders see. By hiding your SSID, you significantly reduce the visibility of your network to outsiders.

Although experienced hackers can still detect hidden networks, it adds an extra layer of security that deters casual snoopers. By implementing hidden SSIDs, SMEs can minimise the risk of opportunistic cyber-attacks, keeping sensitive business information safer.

WPA3 Encryption: Your Network’s Best Defence

Encryption is your network’s frontline defence against unauthorised access. WPA3, the latest and strongest Wi-Fi security protocol available, offers robust protection by addressing the vulnerabilities present in its predecessor, WPA2.

WPA3 encryption provides enhanced cryptographic strength, tougher password protections, and better resistance to brute-force attacks, making it essential for SMEs serious about protecting their business data.

Smart Trick: Create a Separate Guest Network

One simple yet highly effective way to boost your Wi-Fi security is by setting up a separate guest network. This practice isolates visitor and customer access from your main business network, significantly reducing potential threats.

A dedicated guest network ensures visitors have internet access without granting them access to your sensitive company data, internal resources, or equipment. This isolation prevents malware or threats introduced by guest devices from impacting your primary network, adding a valuable extra layer of security.

Isolating Networks with VLANs

For businesses with more complex needs or multiple departments, implementing VLANs (Virtual Local Area Networks) is a powerful way to isolate traffic within your network. VLANs allow you to segment your network into different zones—for example, separating accounting systems from general employee devices or isolating IoT devices from core business infrastructure.

This network segmentation limits access between zones, so even if one part of the network is compromised, it won’t affect the rest. VLANs are especially useful for managing bandwidth, enhancing performance, and enforcing tighter access controls.

Setting up VLANs typically requires compatible networking equipment and some configuration, but the security benefits are well worth the effort. It’s a smart, scalable solution for SMEs that want to future-proof their IT infrastructure.

Quick Guide to Checking Your Router Security Settings

Regularly checking and updating your router’s security settings is essential for maintaining robust network security. Here’s a quick guide to help you ensure your settings are optimised:

  1. Access Router Settings:
    • Open a web browser and enter your router’s IP address (usually printed on the router itself).
    • Log in using your admin username and password.
  2. Check Security Protocol:
    • Navigate to the wireless settings page.
    • Verify that WPA3 is selected. If not available, ensure WPA2 with AES encryption is enabled as a minimum.
  3. Change Default Credentials:
    • Always update the default router username and password. Choose a strong, unique password.
  4. Hide Your SSID:
    • Look for the option “Hide SSID” or “Disable Broadcast” in the wireless settings.
  5. Create a Guest Network:
    • Enable the guest network option in your router’s settings.
    • Ensure it uses a unique password and appropriate security settings.
  6. Enable VLAN Support (if available):
    • Check if your router or managed switch supports VLAN configuration.
    • Create VLANs for different departments or device types.
    • Assign ports and set access rules to enforce segmentation.

How CK Computer Solutions Can Enhance Your Wi-Fi Security

At CK Computer Solutions – Managed IT Services Dublin, we specialise in securing your IT infrastructure so you can focus on your core business. Our experienced team can:

  • Evaluate your current network security.
  • Assist with upgrading to WPA3 encryption.
  • Configure hidden SSIDs for added security.
  • Set up isolated guest networks.
  • Design and deploy VLANs for network segmentation.
  • Continuously monitor and manage your network to safeguard against emerging threats.

Partnering with CK Computer Solutions ensures your Wi-Fi network remains secure, reliable, and resilient, giving you peace of mind to confidently run your business.



What Is SSO?

SSO, or Single Sign-On, is a user authentication process that allows individuals to access multiple applications or systems with just one set of login credentials.

Think of it like having a master key to all your digital doors — email, CRM, HR systems, cloud storage, and so on. Instead of remembering dozens of passwords, a user logs in once, and that session grants access to all integrated platforms.

For businesses juggling a mix of cloud-based tools, internal systems, and remote teams, SSO is more than just a convenience — it’s a smart move.


How SSO Works

SSO is made possible through a central authentication server. When a user logs in, the system checks their identity via this server. Once confirmed, a token (a digital stamp of approval) is issued and passed around to each service the user wants to access.

Popular protocols that support this include:

  • SAML (Security Assertion Markup Language)
  • OAuth
  • OpenID Connect

These protocols ensure that the user’s identity can be verified safely across different services, without requiring multiple logins.


Key Benefits of SSO for Businesses

1. Improved Security

Contrary to the old idea that more passwords mean better security, SSO actually reduces security risks.

  • Users only need to remember one strong password, reducing the temptation to reuse weak ones across platforms.
  • SSO can be paired with Multi-Factor Authentication (MFA), adding an extra layer of protection.
  • It also centralises access control — if a user leaves the company, disabling one account cuts off access to everything. No more forgotten logins lying around on old systems.

2. Boosted Productivity

How much time do your staff waste entering passwords or trying to reset forgotten ones? It adds up. With SSO:

  • Login times are slashed.
  • Users can jump straight into work without hurdles.
  • Admins aren’t constantly firefighting password issues.

It’s a productivity win across the board, especially for businesses that rely on several digital tools daily.

3. Better User Experience

We’re all users at the end of the day, and there’s nothing more frustrating than being locked out of a platform because you forgot a password — again.

SSO creates a smoother, faster experience for:

  • Employees
  • Remote contractors
  • Temporary users
  • Clients accessing portals

This ease-of-use is particularly crucial in customer-facing systems, where delays can directly impact satisfaction and reputation.

4. Easier Compliance

Data protection laws like GDPR, HIPAA, and others require organisations to tightly control access to personal data.

SSO simplifies this by:

  • Making it easier to track and audit user activity across platforms.
  • Centralising access policies and credentials.
  • Enabling role-based access control, ensuring staff only access what they need.

Being audit-ready is a lot easier when everything runs through a unified access system.

5. Reduced IT Helpdesk Burden

Ask any IT team what eats up their time and you’ll likely hear: password resets. In fact, studies show that up to 50% of helpdesk calls are password-related.

With SSO:

  • There’s only one password to manage.
  • Support calls drop.
  • Your IT team can focus on more strategic tasks.

It also lowers the risk of human error — such as accidentally resetting the wrong account or missing critical updates across multiple platforms.


Challenges Without SSO

Many SMEs still run without SSO, often because they assume it’s only for large enterprises. But the challenges speak for themselves:

  • Password fatigue leads to reused credentials and weak security.
  • Onboarding and offboarding are clunky, time-consuming, and risky.
  • Compliance checks become a nightmare when access isn’t centrally logged.
  • User frustration rises, hurting productivity and morale.

Every additional system with a separate login is another potential security gap.


Why Your Business Should Consider It Now

The shift to hybrid work and cloud platforms has expanded the number of apps businesses rely on. If you’re using tools like Microsoft 365, Salesforce, Dropbox, Xero, or even industry-specific systems, SSO can tie them all together under a single access policy.

The longer you delay, the more unwieldy and risky your access management becomes.

And importantly — SSO is no longer the exclusive domain of large corporations. Solutions like Azure AD, Okta, and Google Workspace Identity now offer SSO features tailored to SMEs.


How CK Computer Solutions Can Help

At CK Computer Solutions – Managed IT Services Dublin, we help businesses like yours roll out practical, secure, and cost-effective tech solutions — and SSO is a game-changer.

We can:

  • Assess your current systems and recommend SSO-compatible integrations.
  • Implement and configure SSO platforms like Azure Active Directory or Okta.
  • Set up MFA to strengthen security alongside SSO.
  • Train your team on how to use the new system effectively.
  • Provide ongoing support and monitoring so your access remains secure and seamless.

Whether you’re a growing business tired of password chaos or an established firm looking to tighten your security posture, we’ll make sure your SSO rollout is smooth and hassle-free.

Ready to take the next step in simplifying and securing your business IT? Talk to CK Computer Solutions today – your local IT experts here in Dublin, always ready to help you work smarter.



Here are the PPPoE (Point-to-Point Protocol over Ethernet) settings typically used for Vodafone Ireland and Eir (formerly Eircom) fibre broadband connections. These details are needed if you’re setting up your own router instead of using the one provided by your ISP.

Vodafone Ireland – Fibre Broadband PPPoE Settings

  • Username: vodafone@vodafone.ie
  • Password: vodafone
  • Encapsulation: PPPoE
  • VLAN ID: 10
  • Connection Type: Routed PPPoE
  • MTU: 1492 (standard for PPPoE)
  • DNS: Can be set to automatic, or use public DNS like Google (8.8.8.8 / 8.8.4.4)

Note: For Gigabit fibre (FTTH), VLAN tagging is essential and must be enabled on your router.


Eir (Eircom) – Fibre Broadband PPPoE Settings

  • Username: eircom@eircom.net (may vary depending on legacy or new accounts)
  • Password: eircom
  • Encapsulation: PPPoE
  • VLAN ID: 10
  • Connection Type: Routed PPPoE
  • MTU: 1492
  • DNS: Use automatic, or set to Google (8.8.8.8) or Cloudflare (1.1.1.1)

Again, VLAN ID tagging is required for most fibre setups.

Sky Ireland uses MER (MAC Encapsulated Routing) for their standard routers, but you can use PPPoE with third-party setups under certain conditions.

  • Username: Typically not required or varies per account – you may need to contact support
  • Password: Typically not required
  • VLAN ID: 10
  • MTU: 1500 (or 1492 for PPPoE fallback)

Important: Sky often requires DHCP Option 61 (client identifier string) to authenticate. This isn’t supported natively by UniFi devices at this time without workaround firmware or bridging the Sky router.

If you’re using Sky Broadband, especially over FTTH, it’s worth noting that:

  • Sky typically authenticates using DHCP Option 61 (MER), not PPPoE.
  • UniFi routers do not support DHCP Option 61 by default.
  • For Sky, most users will need to:
    • Use the Sky router in bridge mode
    • Or keep the Sky router as the gateway, and place the UniFi device behind it in a double-NAT setup (not ideal)
    • Or use a different router that supports Option 61 to act as a bridge

If you’re on Sky and want a clean UniFi setup, get in touch with us first to assess your options — we’ve worked around this for a few of our business clients.


Helpful Notes

  • If you’re using a third-party router (like a TP-Link, Ubiquiti, ASUS or MikroTik, Unifi ), make sure:
    • VLAN Tagging is turned on and set to ID 10.
    • You enter the PPPoE username and password exactly as shown.
    • You disable the modem/router provided by Vodafone or Eir to avoid double NAT issues.
  • Some ISPs may lock services to the MAC address of their own modem, especially on FTTH. If you have issues connecting, try cloning the MAC address of the original device into your new router.

Need Help Setting This Up?

At CK Computer Solutions – Managed IT Services Dublin, we regularly configure third-party routers and business-grade firewalls for both home and small business fibre broadband connections across Ireland.

Whether you’re upgrading your home setup for better Wi-Fi, or connecting a multi-site network for your business, CK can:

  • Configure your PPPoE connection correctly.
  • Install and manage advanced routers and firewalls.
  • Optimise VLAN and QoS for VoIP, CCTV, and smart devices.
  • Offer ongoing managed IT support and remote monitoring.

Let us take the headache out of broadband setup – we’ll make sure it’s fast, secure, and tailored to your needs. Get in touch with us today for a smoother connection and proper IT peace of mind.




Microsoft 365 Grants Are Changing – What Irish Nonprofits Need to Know

There’s a major shake-up on the way for charities and nonprofit organisations that rely on Microsoft 365. From 1st July 2025, Microsoft will end the free grant licences for both Microsoft 365 Business Premium and Office 365 E1. If your organisation is using these products, it’s time to reassess your setup and plan ahead.

Ignoring these changes could leave you scrambling at renewal time — or worse, facing downtime or data loss. But with the right strategy, you can transition smoothly and continue to benefit from Microsoft’s cloud tools.


What Exactly Is Changing?

For years, Microsoft has supported the nonprofit sector with free access to powerful business tools through their Tech for Social Impact programme. These included:

  • Microsoft 365 Business Premium
  • Office 365 E1

However, from 1st July 2025, these grant-based (free) licences will be phased out at renewal. If your renewal date falls on or after this date, the free versions of these products will no longer be available.

Instead, Microsoft is offering new options to ensure nonprofits can still access the tools they need:

  • Up to 300 Microsoft 365 Business Basic licences – completely free
  • Discounts of up to 75% on Business Premium, Office 365 E1, and other plans

What’s in Microsoft 365 Business Basic?

This is now the main free offering for eligible nonprofits. It includes:

✅ Web and mobile versions of Word, Excel, PowerPoint
✅ Microsoft Teams (online collaboration and meetings)
✅ Exchange Online (email hosting)
✅ OneDrive (1TB cloud storage per user)
✅ SharePoint (document management and intranet features)

However, it does not include:

❌ Desktop Office apps (like Word or Excel installed on PCs)
❌ Advanced security and threat protection
❌ Device management and compliance tools

If your team is comfortable working via browser and mobile apps, Business Basic may cover most of your needs.


What If You Need More?

Some nonprofits depend on desktop Office apps, enhanced security, or mobile device management. In that case, you’ll want to explore the discounted versions of:

  • Microsoft 365 Business Premium
  • Office 365 E1
  • Enterprise licences

Microsoft is offering up to 75% off for these products — a significant saving, especially for midsize or larger nonprofits with multiple users and more complex IT requirements.


What Should You Do Now?

It’s important not to leave this until the last minute. Here’s a practical roadmap:

1. Audit Your Current Licences

Look at your Microsoft 365 Admin Centre. Identify:

  • How many users you have
  • What type of licences they’re using
  • What features are essential (desktop apps, advanced security, compliance, etc.)

2. Segment Users Based on Needs

Not every staff member or volunteer needs the full suite. You could mix and match plans:

  • Use Business Basic for users who just need Teams and email
  • Use Business Premium for those managing sensitive data or devices

3. Reassign Licences

Start shifting users from the soon-to-expire grant licences to Business Basic or discounted paid plans. Microsoft provides migration tools and licence reassignment guides to help.

4. Budget for Paid Features

While some licences will still be free, others will incur a cost. Start factoring this into your budget now, so you’re not caught off guard next summer.

5. Ensure Data Safety During Transition

Make sure emails, OneDrive files, and SharePoint sites are fully backed up. Licence transitions shouldn’t delete your data — but don’t take any chances.


What If You’re Not Sure Where to Begin?

Transitioning Microsoft 365 licences might sound straightforward, but there are always curveballs — compatibility issues, data retention rules, or users accidentally locked out of email. That’s where a bit of expert help goes a long way.

At CK Computer Solutions – Managed IT Services Dublin, we work closely with Irish nonprofits to ensure they get the most out of Microsoft technologies — securely, affordably, and with minimal disruption. Here’s how we can support you:

  • Licence audits: We’ll help you map out who needs what — and avoid paying for tools you’re not using.
  • Smooth transitions: Whether you’re moving from E1 to Business Basic or need a hybrid setup, we’ll manage it all.
  • Data protection: We make sure no critical data is lost during migration, with secure backups and Microsoft 365 best practices.
  • Ongoing support: Questions come up. We stay with you long after the switchover to keep your systems running smoothly.

Whether you’re a charity, social enterprise, or voluntary group, CK Computer Solutions is ready to guide your nonprofit through this Microsoft licensing shift — and set you up for long-term success.


📅 Don’t wait — July 2025 may seem far away, but planning now could save you stress (and money) down the line. Reach out to CK Computer Solutions today for expert guidance on navigating these changes with confidence.

Email to users:

Your Microsoft 365 Business Premium grant is being discontinued

Your Microsoft 365 Business Premium grant will expire on April 25, 2026.

The Microsoft 365 Business Premium grant will be discontinued on your next renewal on or after July 1, 2025. Your licenses will expire on April 25, 2026. We will continue to provide up to 300 granted licenses of Microsoft 365 Business Basic and discounts of up to 75 percent on many Microsoft 365 offers to nonprofits, including Microsoft 365 Business Premium.

We strongly advise transitioning your users to a different Microsoft 365 offer for nonprofits before the subscription is canceled to avoid disruption and data loss. Learn more about what happens to your data and access when your subscription ends.

More information

To ensure a smooth transition and avoid any impact on your data and users, we recommend transitioning your users from the legacy Microsoft 365 Business Premium grant to the Microsoft 365 Business Basic grant or another Microsoft 365 offer for nonprofits. To transition users, you will need to manually complete the following steps within the Microsoft 365 admin center:

1.     Select the Microsoft 365 Business Basic grant or another Microsoft 365 offer for nonprofits through the Microsoft 365 admin center,

2.     Confirm the licenses are present in your tenant,

3.     Replace the licenses, by selecting all of your users with a Microsoft 365 Business Premium license and choose to replace these users’ licenses with Business Basic or another Microsoft 365 offer for nonprofits, and

4.     Select your Microsoft 365 Business Premium subscription and choose to cancel the subscription.

More guidance about how to manually change Microsoft licenses can be found in this support article: Change Microsoft 365 for business plans manually | Microsoft Learn.



Passwords are your first line of defence against cyber threats, yet many people still underestimate the importance of using secure passwords. Weak passwords are one of the primary entry points for hackers, potentially leading to severe business disruptions, financial losses, or reputational damage. To keep your personal information and business data safe, adopting robust password practices is essential.

Creating Strong Passwords: Key Guidelines

Creating strong passwords doesn’t have to be complicated, but it does require a disciplined approach. Follow these simple guidelines to strengthen your passwords effectively:

  1. Length Matters
    • Aim for passwords that are at least 12 characters long. Longer passwords are significantly harder for attackers to crack using brute force attacks.
  2. Use a Mix of Characters
    • Combine upper and lower case letters, numbers, and special symbols (e.g., !, @, #, $, %) to increase complexity.
    • Example: Instead of “password123”, try something like “P@ssw0rd#20211!”
  3. Avoid Predictable Patterns
    • Stay away from easily guessable passwords like “123456”, “password”, or your birthdate.
    • Avoid common phrases or sequential characters, as these are among the first combinations hackers try.
  4. Unique Passwords for Each Account
    • Never reuse passwords across different platforms. If one account is compromised, all your accounts with the same password become vulnerable.

Risks of Reusing Passwords Across Platforms

Reusing passwords across multiple platforms is one of the most dangerous password practices. If a website or app gets hacked, cybercriminals often test stolen passwords across other services, a practice known as “credential stuffing”. If your passwords are reused, a single breach can expose multiple accounts, including sensitive ones like email, banking, or your company’s cloud infrastructure.

Potential consequences include:

  • Identity Theft: Cybercriminals accessing sensitive personal information.
  • Financial Loss: Hackers accessing bank accounts or making unauthorised purchases.
  • Operational Disruption: Business accounts compromised, causing data breaches and downtime.

Password Managers: The Smart Way to Securely Manage Passwords

Managing multiple complex passwords can be overwhelming. Password managers, such as Bitwarden or 1Password, simplify this process by securely storing your passwords and automatically filling them into login forms. They use strong encryption methods, keeping your credentials safe from attackers.

Benefits of using password managers include:

  • Enhanced Security: Generate and securely store highly complex passwords automatically.
  • Convenience: Easy access to your passwords across multiple devices and platforms.
  • Team Management: Centralised password sharing and access control within teams, improving overall security posture.

How CK Computer Solutions Can Help

At CK Computer Solutions, our Managed IT Services based in Dublin specialise in enhancing cybersecurity practices for businesses of all sizes. We help businesses:

  • Implement robust password management systems.
  • Educate employees on best password practices through tailored cybersecurity training.
  • Regularly monitor for credential leaks and vulnerabilities.
  • Provide seamless integration and ongoing support for password managers like Bitwarden or 1Password.

Our proactive approach ensures your business remains secure, efficient, and resilient against evolving cyber threats.

Get in touch with CK Computer Solutions today, and take the first step towards strengthening your organisation’s cybersecurity.


Contact Us