Site Map
If you would like to access a specific part of our website then please click on the relevant link below:
- Home
-
News & Blogs
- Preventing BEC Scams with Domain Registration
- Future Trends of the Dark Web
- Why Cyber Security Matters For Every Business
- Why Multi-Factor Authentication Matters
- The Impacts of Cyber Crime
- Why Paying a Ransom Fee Isn’t the Solution
- The Evolution Of The Dark Web
- The Impact Of A Cyber Attack On Your Business
- Cybersecurity Myths: Everyone Is A Target
- Why Cybersecurity Training Is Essential for Your Team
- Understanding the Dark Web’s Alleged Red Rooms
- Exploring Cyber Security Through Star Wars
- Cyber Essentials: Strengthening Your Digital Defences
- Beyond the Surface: An Introduction to the Dark Web
- Securing Success: Implementing Cybersecurity into Your Business Strategy
- Top Tips for Phishing Defense: Strengthening Your Cyber Armor
- Unlocking Cybersecurity’s Future
- Cybersecurity Predictions for 2024
- Illinois Hospital Blames Ransomware Attack for Unprecedented Closure
- Zero-Day Alert: Google Issues Patch for New Chrome Vulnerability – Update Now!
- SAS Airlines hackers ransom demand up again – now $10M
- Predator Android Spyware Researchers Uncover New Data Theft Capabilities
- Legion Malware Upgraded to Target SSH Servers and AWS Credentials
- Data Stealing Malware Discovered in Popular Android Screen Recorder App
- Serious Unpatched Vulnerability Uncovered in Popular Belkin Wemo Smart Plugs
- Discord discloses data breach after support agent got hacked
- U.K. Fraudster Behind iSpoof Scam Receives 13-Year Jail Term for Cyber Crimes
- What is Ransomware as a Service (RaaS)?
- What is Business Email Compromise (BEC)? Risks and Best Practices to Mitigate Against It
- Why You Need Cyber Security as a Service: The Benefits and the Impacts Cyber Threats Can Have on Your Business
- Former Uber Chief Security Officer Convicted for Concealing Cyber Hack
- Cyber Attacks Rise by 7% Across the Globe in Q1 2023
- Customer data may have been breached during cyber-attack, Capita admits
- Abuse victims’ data stolen in ransomware attack
- Uber suffers another data breach after law firm’s servers attacked
- UK Government outlines plan to secure NHS from cyber attacks
- Effects of cyber-attack still being felt at Gloucester City Council over a year later
- Acer suffers another data hack
- Popular password manager LastPass hacked with user data compromised
- Letterkenny Event: Protecting Your Business Profitability in 2023
- Cyber Essentials Grace Period Extended
- Hackers guessed the world’s most common password in under 1 second
- Areas to prioritise for cybersecurity
- Why You Should Consider Making The Move To Office 365
- Antivirus is no longer enough
- Newry Chamber Event: Protecting Your Business Assets From Cyber Threats
- The Scams To Be Wary Of This Christmas
- Exploring the Motives Behind Cybercrime
- Android ‘auto-starting’ malware discovered on millions of devices
- The Importance of Patch Management
- LoughTec wins place on public sector framework
- Top tips on keeping you safe from online hackers and cybercriminals
- #TeamLoughTec Mount Errigal Trek
- The top cyber defence actions for you and your business – Part 3
- The top cyber defence actions for you and your business – Part 2
- The top cyber defence actions for you and your business – Part 1
- Simple tips to improve your password security – World Password Day 2022
- SME + MDR & SOC = Protected
- The importance of having a disaster recovery plan in place for your enterprise data
- The Budget Item Missing From Your Budget for 2022
- Deane Public Works selects LoughTec to manage their business IT provision
- Deane Public Works Ltd achieve Cyber Essentials certification
- Testing the Strength of Your Passwords
- Is your business still running Windows 7?
- Does your business keep sufficient backups?
- Understanding IT security
- Why it’s important to stay vigilant online
- Why it’s important to update your system regularly
- What’s the difference between being hacked and spoofed?
- Holding Ourselves Accountable When Working Remotely
- Are you Up-to-Date?
- A new wave of attack on our digital world is happening now!
- I’m gonna catch you, little phishie…
- Microsoft plans next Win10 long-term release for 2021
- Windows 7 Support
- IT Support Services
- Why Use Managed IT Services?
- 25 Worst Passwords
- Windows 10 is coming……………release date 29th of July 2015
- Big fish in a small pond: Why it pays to consider smaller suppliers
- Dundalk Institute of Technology selects LoughTec to deliver secure remote access
- Letterkenny Institute of Technology selects LoughTec to deliver remote working capability to 4500 students and staff
- LoughTec wins framework contract with higher education institutions in Ireland
- WFH – Working From Home
- Tips while remote working
- Why RDP/RDS is not enough
- My work applications and data, available anywhere, on any connected device !!
- Virtualization Project of the Year!
- How Small Businesses Fall Victim to BEC Scams
- Understanding Cyber Crime Risks for Small Businesses
- The Power of AI in Cyber Security
- Understanding Phishing: A Critical Cybersecurity Threat
- Staying Competitive With Cyber Security Training
- How Cyber Defences Are Your Business’s Digital Dam
- Understanding the Threat of Ransomware to Public Safety
- Strengthening Domain Registration: Help Prevent BEC Scams
- The Parallels Between Business Cyber Security & Family Safety
- Cyber Security trends of 2024
- 5 Cyber Incident Response Scenarios to Test Your Team
- Data Centers are now Critical Infrastructure
- World Record Ransom Payment
- Railways Wi-Fi Cyber Attack
- Deep Fake Scam
- How will AI increase the surface of cyber security attacks?
- CASIO Ransomware Attack
- Password Security
- Cyber Security - How to Stay Safe from Christmas Cyber Attacks
- Testimonials
- Company Profile
-
Solutions
- IT Solutions
-
Cyber Security Solutions
- Cyber Attack Assessment
- Security Operations Centre SOC
- Cyber Security Training
- Internal Infrastructure Assessment
- File Transfer Automation
- Operational Technology Security
- Data Security
- Email Anti-Virus
- Remote Browser Isolation
- Email Spam Filters
- Firewall Security
- Cyber Essentials
- Cyber Essentials Plus
- Secure Communications Platform
- Secure Email File Ingestion
- Web Browsing Security
- Penetration Testing
- Multi Factor Authentication MFA
- Secure Remote Access
- Ransomware Protection
- External Vulnerability Assessment
- Web Application Testing
- Experiencing a Cyber Attack
- Industry Solutions
-
Resources
-
News & Blogs
- Preventing BEC Scams with Domain Registration
- Future Trends of the Dark Web
- Why Cyber Security Matters For Every Business
- Why Multi-Factor Authentication Matters
- The Impacts of Cyber Crime
- Why Paying a Ransom Fee Isn’t the Solution
- The Evolution Of The Dark Web
- The Impact Of A Cyber Attack On Your Business
- Cybersecurity Myths: Everyone Is A Target
- Why Cybersecurity Training Is Essential for Your Team
- Understanding the Dark Web’s Alleged Red Rooms
- Exploring Cyber Security Through Star Wars
- Cyber Essentials: Strengthening Your Digital Defences
- Beyond the Surface: An Introduction to the Dark Web
- Securing Success: Implementing Cybersecurity into Your Business Strategy
- Top Tips for Phishing Defense: Strengthening Your Cyber Armor
- Unlocking Cybersecurity’s Future
- Cybersecurity Predictions for 2024
- Illinois Hospital Blames Ransomware Attack for Unprecedented Closure
- Zero-Day Alert: Google Issues Patch for New Chrome Vulnerability – Update Now!
- SAS Airlines hackers ransom demand up again – now $10M
- Predator Android Spyware Researchers Uncover New Data Theft Capabilities
- Legion Malware Upgraded to Target SSH Servers and AWS Credentials
- Data Stealing Malware Discovered in Popular Android Screen Recorder App
- Serious Unpatched Vulnerability Uncovered in Popular Belkin Wemo Smart Plugs
- Discord discloses data breach after support agent got hacked
- U.K. Fraudster Behind iSpoof Scam Receives 13-Year Jail Term for Cyber Crimes
- What is Ransomware as a Service (RaaS)?
- What is Business Email Compromise (BEC)? Risks and Best Practices to Mitigate Against It
- Why You Need Cyber Security as a Service: The Benefits and the Impacts Cyber Threats Can Have on Your Business
- Former Uber Chief Security Officer Convicted for Concealing Cyber Hack
- Cyber Attacks Rise by 7% Across the Globe in Q1 2023
- Customer data may have been breached during cyber-attack, Capita admits
- Abuse victims’ data stolen in ransomware attack
- Uber suffers another data breach after law firm’s servers attacked
- UK Government outlines plan to secure NHS from cyber attacks
- Effects of cyber-attack still being felt at Gloucester City Council over a year later
- Acer suffers another data hack
- Popular password manager LastPass hacked with user data compromised
- Letterkenny Event: Protecting Your Business Profitability in 2023
- Cyber Essentials Grace Period Extended
- Hackers guessed the world’s most common password in under 1 second
- Areas to prioritise for cybersecurity
- Why You Should Consider Making The Move To Office 365
- Antivirus is no longer enough
- Newry Chamber Event: Protecting Your Business Assets From Cyber Threats
- The Scams To Be Wary Of This Christmas
- Exploring the Motives Behind Cybercrime
- Android ‘auto-starting’ malware discovered on millions of devices
- The Importance of Patch Management
- LoughTec wins place on public sector framework
- Top tips on keeping you safe from online hackers and cybercriminals
- #TeamLoughTec Mount Errigal Trek
- The top cyber defence actions for you and your business – Part 3
- The top cyber defence actions for you and your business – Part 2
- The top cyber defence actions for you and your business – Part 1
- Simple tips to improve your password security – World Password Day 2022
- SME + MDR & SOC = Protected
- The importance of having a disaster recovery plan in place for your enterprise data
- The Budget Item Missing From Your Budget for 2022
- Deane Public Works selects LoughTec to manage their business IT provision
- Deane Public Works Ltd achieve Cyber Essentials certification
- Testing the Strength of Your Passwords
- Is your business still running Windows 7?
- Does your business keep sufficient backups?
- Understanding IT security
- Why it’s important to stay vigilant online
- Why it’s important to update your system regularly
- What’s the difference between being hacked and spoofed?
- Holding Ourselves Accountable When Working Remotely
- Are you Up-to-Date?
- A new wave of attack on our digital world is happening now!
- I’m gonna catch you, little phishie…
- Microsoft plans next Win10 long-term release for 2021
- Windows 7 Support
- IT Support Services
- Why Use Managed IT Services?
- 25 Worst Passwords
- Windows 10 is coming……………release date 29th of July 2015
- Big fish in a small pond: Why it pays to consider smaller suppliers
- Dundalk Institute of Technology selects LoughTec to deliver secure remote access
- Letterkenny Institute of Technology selects LoughTec to deliver remote working capability to 4500 students and staff
- LoughTec wins framework contract with higher education institutions in Ireland
- WFH – Working From Home
- Tips while remote working
- Why RDP/RDS is not enough
- My work applications and data, available anywhere, on any connected device !!
- Virtualization Project of the Year!
- How Small Businesses Fall Victim to BEC Scams
- Understanding Cyber Crime Risks for Small Businesses
- The Power of AI in Cyber Security
- Understanding Phishing: A Critical Cybersecurity Threat
- Staying Competitive With Cyber Security Training
- How Cyber Defences Are Your Business’s Digital Dam
- Understanding the Threat of Ransomware to Public Safety
- Strengthening Domain Registration: Help Prevent BEC Scams
- The Parallels Between Business Cyber Security & Family Safety
- Cyber Security trends of 2024
- 5 Cyber Incident Response Scenarios to Test Your Team
- Data Centers are now Critical Infrastructure
- World Record Ransom Payment
- Railways Wi-Fi Cyber Attack
- Deep Fake Scam
- How will AI increase the surface of cyber security attacks?
- CASIO Ransomware Attack
- Password Security
- Cyber Security - How to Stay Safe from Christmas Cyber Attacks
- Testimonials
-
Case Studies
- LoughTec Security Operations Centre stops hack on well known NI-based Contractor on day 1
- LoughTec Security Operations Centre protects Woodvale Construction from cyber threats
- Euro Auctions deploy LoughTec Security Operations Centre
- LoughTec Security Operations Centre Stops Cyber Attack on Agricultural Organisation
- BidX1
- EMEA Based Public Sector Client
- Landsbankinn
- Ballymore Services
- Countryside Services
- L.W. Surphlis & Son
- Champions Travel
- Tesab Engineering
- Belmore Dental
- Woodvale Construction
- Village Blinds
- Deane Public Works
- Dundalk Institute of Technology
- Letterkenny Institute of Technology
- Partnerships
- Referrals
-
News & Blogs
- Contact Us
- Event Information