Blogs

Your Guide to Understanding DORA

The Digital Operational Resilience Act will come into effect on 17 January 2025. With just under a year to go, now is the perfect time to get your house in order.

Seven Cybersecurity Resolutions for the New Year

In this blog, our CISO, Paul Delahunty, offers seven cybersecurity resolutions for the year ahead. Although timeless, these recommendations are sure to help when it comes to setting the right tone for the year ahead.

Cyberattack affects 200 law firms across the UK

A cyberattack on an IT support company has affected over 200 legal practices across the UK. The attack has left 80 new home buyers in limbo, unable to complete transactions following the service outage affecting an IT provider.

Cybercrime is a billion-euro industry– what is the cost to your business?

Cybercrime is one of the most increasingly pervasive criminal enterprises in the world. From ransomware attacks to email phishing scams, it’s an industry that makes billions in stealing highly valuable data and assets to exploit the vulnerable.

How Seriously Should Law Firms Take Cybersecurity?

Stryve was proud to sponsor the business session of the Dublin Solicitors Bar Association (DSBA) Annual Conference. We would like to thank the DSBA President, Susan Martin, for extending the warm invitation.

Leadership failure, not human error puts 10,000 PSNI employees at risk.

Anyone reading the newspapers in the last week or so will be aware of another high-profile cyber-attack affecting Aer Lingus and the HSE. Stryve’s Chief Information Security Officer Paul Delahunty is breaking it down for you.

How to Get Cyber Insurance: A Provider’s Perspective

As cybercrime increases around the world so too do the challenges faced by those looking to mitigate its effects. That’s why we asked Paul Murphy, Director at Pembroke Insurance, for his advice on how to obtain cyber insurance, from a provider's perspective.

A Step-By-Step Guide to Pen Testing

This blog walks you through the six stages of pen testing, allowing you to comprehensively understand what is involved in each step of the process.

The latest HSE attack highlights the need for cyber resilience in Irish businesses.

Anyone reading the newspapers in the last week or so will be aware of another high-profile cyber-attack affecting Aer Lingus and the HSE. Stryve’s Chief Information Security Officer Paul Delahunty is breaking it down for you.

Cyber Essentials for SMEs Event

Year on year the value of data is increasing. Protecting both your company’s data and your clients’ must be a top priority for every organisation. Backing up onto disks is fading to a distant memory

Your Top Cyber Insurance Questions Answered

Even wondered what cyber insurance is, why you need it or how to get it? Our CISO, Paul Delahunty, sits down and answers your cyber insurance questions.

Your Top 5 Private Cloud Questions Answered

Five of our experts at Stryve sit down and answer - in plain English - the questions you have been googling for months.

The Top 5 Reasons to Opt for Private Cloud

Year on year the value of data is increasing. Protecting both your company’s data and your clients’ must be a top priority for every organisation. Backing up onto disks is fading to a distant memory

Making secure private cloud the bedrock of digital success

Andrew and the team at Stryve are delighted to announce that we have partnered with London based digital communications company, Atticus Creative. Having worked with the digital agency on several projects in the past,

Best Way to Improve Security Awareness? Train, Train and Train Some More.

In the final video in Stryve’s seven-part series, Paul Delahunty, our Information Security Officer, speaks to Kathleen Lucey, Client Director at Stryve, about the importance of training your employees.

Need to Protect Your Data in Case of an Emergency? Always Ensure You Have a Plan.

In the sixth video in Stryve’s seven-part series, Paul Delahunty, our Information Security Officer, chats to Kathleen Lucey, our Client Director, about what to do when – not, if – a cyberattack happens.

Protecting Your Data? Keep a Data Backup.

In the fifth video in Stryve’s seven-part series, Paul Delahunty, Stryve’s Information Security Officer, speaks to Kathleen Lucey, our Client Director, about the importance of having data backups.

Data Security: Protecting Your Business? Secure Your Devices

In the fourth video in Stryve’s seven-part series, Paul Delahunty, Information Security Officer at Stryve, and Kathleen Lucey, our Client Director, discuss how you can secure your business’s devices.

What can businesses do to protect against phishing attacks?

In the second video in Stryve’s seven-part series, Paul Delahunty, Information Security Officer at Stryve, and Kathleen Lucey, our Client Director, discuss phishing. Paul explains that phishing is when a hacker (or criminal)

What can businesses do to protect against cyber attacks?

In the first video in Stryve’s seven-part series, Paul Delahunty, Information Security Officer at Stryve, speaks to Kathleen Lucey, our Client Director about how you can protect against cyberattacks.

Do I Need to Do a Pen Test?

Over the past few years, “pen test” has become something of a buzzword. Some companies swear by pen tests, others perform multiple a year and certain cyber insurance providers won’t even talk to you unless you can verify that you’ve done one.

What is the Internet of Things?

Simply put, the Internet of Things (IoT) is the concept of connecting all types of things to the internet. To illustrate this concept, imagine the following scenario: you leave work and hop into your internet-connected smart car.

Stryve is Certified as Carbon Neutral

Stryve’s CEO, Andrew Tobin, speaks to The Independent about the organisation’s recent certification as carbon neutral. He discusses his surprise when he learned how high the carbon emissions were for a small company like Stryve,

The Hidden Costs of Public Cloud

Over the past number of years, “the cloud” has entered the dictionary to the excitement of many and the bewilderment of many more. In the early days, products offered by big players (AWS, Google) ensured that the public cloud was the cloud of choice.

5 Major Cyber Security Threats You Need to Watch Out For – Stryve

When you start a conversation with someone about Information Security, it will almost immediately turn towards phishing, ransomware, hackers, data protection/the GDPR and other common threats.

Secure email: Protect Your Microsoft 365 Email

Microsoft 365 has 258 million corporate users: a figure greater than one third of Europe’s population. This will startle most readers, yet many will also find it easy to understand why gaining access to an organisation’s...

Why You Need a Solution to Back Up Microsoft 365

There is a common misconception that Microsoft takes care of its clients’ data backups. Therefore, the automatic response, when most clients when asked if their Microsoft 365 data is backed up, is, “of course it is.”

What Exactly Is Phishing?

Cybercrime has been around for over 20 years, however, cybersecurity threats are constantly changing and evolving. Today, phishing attacks account for over 90% of security breaches. As the technology to combat this issue becomes more advanced and sophisticated, so too do the forms that phishing attacks take.

How The UK and Ireland Compare When it Comes to Cybersecurity?

How The UK and Ireland Compare When it Comes to Cybersecurity? Ireland ranks 7th out of 28 EU member states in the European Commission Digital Economy and Society Index (Europe Commision , 2019). It is, undoubtedly,

How SMEs Can Cope with the Growing Threat from Cyber Attacks

How SMEs Can Cope with the Growing Threat from Cyber Attacks Over the past few years, there has been a steady rise in cybercrime across the world. As more and more secure software products are produced each day

Key Differences Between a Risk Assessment and Penetration Test

Key Differences Between a Risk Assessment and Penetration Test We often hear terms such as “Risk Assessment”, “Penetration Testing” and “Vulnerability Scanning” thrown around interchangeably,

CISO – Business Enablement

CISO – Business Enablement Business Enablement Although a Chief Information Security Officer, or CISO, is a vital component of any organisation, most companies are still unfamiliar with the role.

Top Ten Security Tips for Working from Home

We all face a period of ongoing certainty as we deal with the fall out from Covid-19. One of the many secondary effects has been the change in how we work.

The Journey of a CISO

The Journey of a CISO With the global cost of cybercrime set to reach $6 trillion by 2021, it is becoming imperative for every organization to have a Chief Information Security Officer, or CISO, at the top table.

Legal and Regulatory Elements of a CISO’s Role

Legal and Regulatory Elements of a CISO’s Role With such a diverse range of responsibilities, the path to becoming a Chief Information Security Officer, or CISO, appears long and winding.

Is there a Chief Information Security Officer on your Board?

It Is Time for a Chief Information Security Officer at the Top Table Cyberattacks are becoming a major issue within our modern world. Data breaches and malware threaten the security of a company and it’s customers,

Why Security Compliance is so Important for Businesses

Why Security Compliance is so Important for Businesses Security Compliance IT or Data Security Compliance to legal requirements should be viewed as an absolute minimum for organisations today.

The Essentials of Cybersecurity Solutions

The Essentials of Cybersecurity Solutions It is now well established that cybersecurity solutions are challenging for organisations because of their critical nature,

Top 16 Benefits of Private Cloud Computing

As the CIO or IT manager of a medium or large company you will most certainly have heard the term Cloud Computing on numerous occasions, but are you fully familiar with the benefits of private cloud service providers?

DRaaS Disaster Recovery as a Service

Strategy and planning are at the heart of the most successful business ventures, yet business continuity and disaster recovery, fall short of most organisations‘ consideration.

12 Steps to Effective Cyber Security

The 12 Steps to Cyber Security Report, issued by the National Cyber Security Centre, breaks down and outlines the steps needed for companies to implement an effective cybersecurity system.

91% of Cyber Attacks Start with a Phishy Email

Despite its frightening definition, and even more frightening impacts, hacking does not normally receive the attention it deserves. This is surprising when we consider how of the 15 largest data breaches in history,

GDPR and Marketing

GDPR and the Effect on Marketing Communications “Nothing was your own except the few cubic centimetres inside your skull.” – George Orwell