The Trends for MSPs to Watch Out For in 2019

Managed Service Providers (MSPs) continue to grow rapidly and the market is expected to grow from a little more than €133 billion this year to nearly €226 billion by 2022. The demand for managed services has never been higher, but service providers must keep an eye on emerging trends to avoid significant revenue drops caused […]

5 Tips for securing your Wi-Fi

You probably don’t give it much thought, but your wireless network is one of the most important aspects of conducting your day to day business and/or your personal affairs. Most business processes use a wireless network and without it, daily operations would slowly grind to a standstill. As Wi-Fi and internet technology has evolved and […]

Business Continuity – Make a List & Check it Twice

When it comes to business continuity, plans aren’t meant to cover every eventuality but rather provide a starting point and a guide as you work through the situation as it develops. That said, it is important that the plans deliver articulate, clear and concise procedures so if a business critical issue or disaster does occur, […]

The Thing is! (How to secure the IoT – Internet of Things)

Definition; Thing (noun) plural noun: things an object that one need not, cannot, or does not wish to give a specific name to. synonyms:   object, article, item, artefact, commodity; an inanimate material object as distinct from a living sentient being.   We are all familiar with the word “thing” it’s our go to word when […]

Phishing : Top Tips to stop you from getting reeled in

Warning! Please excuse the Puns and fish references! “Phishing” in cyber terms refers to the stealing of personal information that can lead to identity theft and financial fraud. Interestingly, phishing has been around for years and can manifest itself in many forms via phone calls and physical letter scams. However, with recent development in technology the most […]

APIs under PSD2: Mitigating the Risk

  Digital transformation is fully underway. With GDPR and PSD2 regulations in force, 2018 is certainly a year of significant changes. These EU regulations have a major impact on the processes and information systems that organisations have in place and businesses are facing the reality of complying with the requirements of these regulations. What is […]

Shirley Bassey “I AM what I AM”….Or is she?

I don’t want to make too many assumptions here, but I assume most of you have heard of Shirley Bassey? To be more precise Dame Shirley Veronica Bassey, born: 8 January 1937 (age 81 years), famous for Goldfinger · 1964 and of course I Am What I Am · 1984. But when it comes to […]

Becoming an MSP : 5 Steps on the Road to Success

Becoming a Managed Service Provider (MSP) makes sense in today’s IT environment as it can offer a value-added reseller (VAR) an immediate path to a wide range of higher-value services that naturally complement the services they already provide. Business owners and IT decision makers are beginning to see the value that MSPs bring to the […]

SSL Certificates – 5 Benefits to your Online Business

Online is a multi-Billion Euro marketplace, where there is money there is also crime! One of the first lines of defence for any online presence is your SSL (Secure Sockets Layer) certificate – electronic files used to identify people and resources over Internet. Serious websites must implement SSL security to protect themselves and users, web […]

The Elephant in the Sky – Cloud Security!

Traditional network security made sense when all your applications were hosted in your data centre and users were all on the network, there was a sense that you were in control, if you built your firewalls and protected the perimeter you felt secure. With the continuing progression of apps moving to the cloud, the masses […]

MSP Insights: Challenges and Solutions

Like the rest of the IT industry, the managed service market is evolving. Business owners and IT decision makers are beginning to see the value that managed service providers (MSPs) bring to the table and more and more Value-added resellers (VARs) are choosing to make the transition to the managed services industry. Becoming an MSP […]

The Rise and Fall of the humble Password – Authentication!

Ah, simpler times, a decade ago if you had your username and a password you could log in! Things started to get a little trickier when we saw the start of “remote users” who could “dial in” to access their accounts.   From this point things really changed, and that threat landscape grew. Connectivity expanded exponentially, […]

Endpoint Protection 101

Over the last year we’ve seen some of the most destructive cyber-attacks ever recorded and unfortunately things are set to get worse moving forward. The WannaCry ransomware was designed to compromise endpoints and caused chaos around the world infecting more than 200,000 computers in 150 countries. These endpoints represent key vulnerable points of entry for […]

VAR to MSP – The Game Changer!

Lightning fast changes and volatility are hallmarks of the modern IT market. Business Executives have tospot opportunities which add value and differentiate their offerings, for their company’s survival and success in the future. The MSP model (Managed Service Provider) has not only emerged as an attractive business model but has facilitated organisational success in the current […]

Don’t Let Your Trash Become a Hackers Treasure

We are all familiar with deleting emails, files and documents to free up space on our computers. But where does it go? What really happens to it? Is it really gone forever? And most importantly, can cyber criminals get access to it? Many of us have at one time or another accidentally deleted items we […]

MSPs, How to Stand Out In A Crowd

There is a debate out there about whether companies in the cyber space should remain a traditional IT services provider or transition to offer managed security. Adding security offerings is almost a mantra across the managed service provider (MSP) business. Given the rise of ransomware and an ever-growing list of other threats, IT service providers […]

Sec_rity is nothing without “U”

Whether you are a multi-million-pound company or a local shop, work in the private sector or public sector, an IT professional or an independent internet user, everyone has a role to play in cyber security. A laissez-faire attitude toward cyber security is like a health epidemic, it only takes 1 person to infect the masses and then […]

We’ve Got Your Back Up!

We’ve all heard horror stories of companies going out of business due to data loss and breaches. We’ve also heard that the data loss and breaches could have been prevented by continuously backing that data. Back-ups are an integral part of any organisation’s business continuity or disaster recovery plan and should be implemented throughout the […]

Cyber Security – The Fast Facts

In a world of increasing complexities and complications, I wanted to keep this blog short, sweet and simple. The evolution and advancement in technology over the last decade has been revolutionary and has been the catalyst for more innovation today and into the future. However, the rise of the cybercrime has grown almost simultaneously as […]

GDPR – The need to know!

Many organisations will be aware of the General Data Protection Regulation (GDPR) and how it will completely change the way personal information is handled by organisations. The regulations will have far-reaching consequences for how organisations acquire, store and use personal data. The date for this new legislation; 25th May 2018. Its implementation has sparked many […]

Business Continuity – Keeping your Data Safe and Business Trading

Identity and Access Management (IAM) is one of the most important areas in IT security today and it’s only becoming more prominent as large-scale breaches within the private and public sector continue to shake consumer trust and provoke ever-increasing government regulation. What is it? Identity and access management (IAM) is the security discipline that enables the right individuals to access the […]

Taking the “F” out of Authentication

  Identity and Access Management (IAM) is one of the most important areas in IT security today and it’s only becoming more prominent as large-scale breaches within the private and public sector continue to shake consumer trust and provoke ever-increasing government regulation.   What is it? Identity and access management (IAM) is the security discipline that enables the right individuals to […]

Breakfast Bytes – Our Line Up of Speakers

The IT security landscape is evolving fast, very fast, and technology is constantly on the pursuit to protect against the latest threats in the world. One of the latest trends is in the modern day is Digital Identity; the online or networked identity adopted or claimed in cyberspace by an individual, organization or electronic device. […]

Breakfast Bytes | Digital Identity: Risk or Opportunity?

Information security remains one of the most critical IT disciplines in the modern day and it’s only becoming more prominent as large-scale breaches of corporate networks continue to shake consumer trust and provoke new regulations. However, the IT security landscape is evolving fast, and Identity and Access Management (IAM) initiatives have often required multiyear roll outs […]

Square or Round Wheels?

It all boils down to 1 question, “Are you too busy to improve?” This is a great enabler for the discussion on how to improve. It’s so simple and a great way to start the discussion on any complex matters. I have seen it quoted, shared and commented on many times, which tells us 2 […]

Business Continuity – Communicating Effectively Internally In Times Of Disruption

It can be argued that a company’s most valuable, and sometimes most underestimated, resource is its employees. Communicating effectively with them in times of disruption can make the difference between a smooth recovery from a disaster or one that is plagued with further issues. In times of disaster or disruption, employees may need to work […]

8 Top Tips for Keeping Your IT in Great Shape

In one way or another, Information Technology (IT) is an integral part of any business and we often don’t realise how much we rely on it until it’s non-operational. When such a thing occurs, business day-to-day operations are slowed and can even grind to a halt. Luckily, you can reduce the stress and damage that […]

Not A Very Merry Christmas – Looking Back to 1987

Christmas Tree EXEC was the first widely disruptive computer worm which paralysed several international computer networks in December 1987. Christmas Tree EXEC was an early mass mailing worm coded by an unnamed student from Clausthal University of Technology. This was the first widely disruptive computer worm which paralysed several international computer networks including the European Academic Research […]


The Channel Tunnel Act 1987 authorised the construction of the Channel Tunnel that connects the UK with France, via an underground train tunnel. The idea of a tunnel was first proposed in 1802 but construction wasn’t started until 1987/88. Construction of the tunnel was completed in 1993 and services commenced in November 1994. The Channel […]


Atari Games was formed from Atari’s arcade division. They could use the Atari name on arcade releases, but not on console or computer games. When Atari Games wanted to enter the console-game market, it needed a new label that did not use the Atari name. Enter TENGEN! Going back to 1987… In 1987/88, TENGEN released its first […]


Everyone is bound to have used Microsoft Excel at some stage in their professional career, but for those who are lucky enough to have dodged spreadsheets until now, Excel is a spreadsheet developed by Microsoft for Windows, MacOS, iOS and Android. Microsoft Excel is one of the most familiar, flexible, and widely used business applications […]


Digital Audio Tape, what was it? What was it used for? Who used it? OK Let’s refresh the memory… DAT or Digital Audio Tape for short, was a signal recording and playback medium developed by Sony and introduced in 1987.  The recording was in digital rather than analog and used a 4mm tape in a cassette. Recording […]


“Across the Great Wall we can reach every corner in the world”   After a failed attempt on the 14th, on the 20th September 1987 the message above was sent via email by scholars at China’s Computer Application Technology Institute. A historic moment in China’s technological timeline! From 1983 to 1987 Chinese and German teams collaborated […]


Across the Great Wall we can reach every corner in the world”   After a failed attempt on the 14th, on the 20th September 1987 the message above was sent via email by scholars at China’s Computer Application Technology Institute. A historic moment in China’s technological timeline! From 1983 to 1987 Chinese and German teams collaborated […]

A Helping Hand – Looking Back to 1987

  ISO 9000… what began in 1987 has evolved over the years making it one of the most used management tools worldwide. The standard aims to help organisations satisfy their customers by meeting regulatory requirements and fostering continuous improvement. Although not a complete guarantee of quality, the standard can be of real benefit to an […]


Bill Of Rights – Looking Back to 1987

  The Constitution of the Republic of the Philippines was ratified by a nationwide plebiscite on February 2nd 1987, Section 1 of Article III of the Bill of Rights states the following… “No person shall be deprived of life, liberty or property without due process of law, nor shall any person be denied the equal protection […]

Data Security Mobility

The Nokia Cityman 1320 – Looking Back to 1987

The Nokia Cityman 1320 was launched in 1987 as Nokia’s first portable phone. At €2,258 for a device, you were the cool kid on the block of you owned one these! Back then, 50 minutes talk and 4 hours charging time was viewed as a luxury, even if you did have to put up with the […] Looking back to 1987

The domain went online 30 years ago on 19th February 1987. Registered for free, the web has fostered Apple’s growth and revenues of over 200 billion Euro. We can see just how much Apple ‘the brand’ has changed dramatically over the past 20 years. The colourful rainbow logo was swapped for a polished monochrome […]

Cyber Expo Ireland – A Thriving Success

The Irish Management Institute (IMI), Dublin was the setting on Wednesday 29th November, for Ireland’s 1st Cyber Data and Compliance Expo – Cyber Expo Ireland. With over 600 attending on the day, the delegates were welcomed into what can only be described as a practical but serious demonstration of the latest global Cyber Security software […]

Hang On! Business Continuity and the Retail Sector

 “Business as usual” is the goal for every business continuity plan. Retailers come in many forms including supermarkets, department stores and clothing outlets but they also come in many sizes from your large multinational corporations (MNCs) such as Tesco right down to your SMEs such as your local newsagent. The one thing they have in common […]

Trusted Partners – Trust is Key

Trust is a fundamental principle of our business. We all know how to measure the value of tangibles such as equipment, stock, people and other resources, but what about the intangibles? Trust is difficult to measure due to its intangible nature because it has different value at different levels, for different individuals. A wise man once […]

Smartphones- The Love, Hate Relationship

We all do it. Smartphones, we all take them for granted these days. They have slotted in to our daily lives seamlessly both at home and work. It’s like they are a third arm! We love our smartphones, as we literally have our entire lives in our hands…Our work emails/personal/, family photos, documents, music, videos, […]

Defending Against Ransomware

Ransomware is constantly on the rise, attacking organisations large, small and everything in between, including the NHS which was hit by a ransomware attack in May 2017. Thus, it’s clear that no business is safe from the threat of ransomware attacks and that is why it will be a key theme at Cyber Expo Ireland. […]

Manufacturing and business continuity

Coming from the perspective of the manufacturing industry, business continuity is about ensuring products continue to reach customers, regardless of any internal problems or issues as that arise. Of course like us all in the business world manufacturers need to identify their critical value adding processes and business activities, focus on keeping them operational or […]

Cyber Expo Ireland – Bringing The Whole Cyber Secuirty Ecosystem Together

Today’s most active battlefield is taking place online. The idea of cyber warfare still seems like science fiction for many, however it’s happening every minute of every day. Of course, this has sparked a huge interest and need for Cyber Security to protect our personal data and company data from attack. At Renaissance, our focus […]

Business Continuity- Who You Gonna Call?

Following an incident, you may find that you can’t perform a recovery yourself, you may need a professional to help restore your business. So of course the question is… Who you gonna call?(Sorry, I couldn’t resist) Your first thought after an incident should be safety. If the workplace is unsafe for any reason, don’t allow […]

To install or not install that is the question (or is it?)

OK, so everyone has got the message… ‘new updates available – install now!’ However, the installation of updates has always been a hit and miss affair, we only typically look at updates when we are experiencing a problem. Of Course then when you add in something like Creators Update for Windows 10, Microsoft promised users […]

Business Continuity – Calling in the Experts (Part 2)

Before we get started, there’s a lot going on with clear crypt this month, They’re having a competition at the moment to win one of their ClearCrypt Secure 8GB Encrypted Storage Devices, to be in with a chance of winning click hereAlso for a limited time only their having 10% off their MSATA range of products, to […]

Competition Time!

Click Here to Enter our competition to be in with the chance to win one of our brand new ClearCrypt Secure 8GB Encrypted Storage Devices. It is a Slim, Secure and Reliable Storage device which is software free, ensuring multi platform support while on the move.Real-time AES 256bit encryptionSoftware freeAluminium CasingTrue Hardware EncryptionSuper Speed USB 3.0Compact

Data Deposit Box – Guardians Of Your Galaxy!

Beside individuals, an association’s most important resource is it’s DATA! In our own  world, regardless of how large or little, our DATA is vital… it supports our clients, it educates our staff, it makes us a profits and it protects us. It’s key that we guard it! I’m certain you have heard of or, maybe even, […]

Cloud 24X7- Next Generation

These days everyone’s talking about Millennials, the Millennial characteristics will vary by region and of course social and economic conditions. However, this generation is generally marked by an increased use and familiarity with communications, digital technologies and media. But what will the characteristics be for the new Millennials? What about the next generation?  I’m not going […]

Cloud Backups – It’s a matter of When? Not If!

When I attended Digital DNA at St George’s Market, I noticed a recurring theme… Data. Everywhere I looked, people were talking about data and how it was being used – from Google marketing through to driverless cars. What I didn’t hear people talking about was how we manage that data! I was reading a Gartner […]

The top 5 business continuity questions

1.     Who is responsible for running exercise scenarios? It’s everyone’s responsibly to get involved, but you need someone to ‘take charge’ and orchestrate the whole thing. Depending on the size of the organisation, that person should be a senior manager or specifically, a business continuity manager. Don’t just focus your attention on the people who are […]

The history of backups

Here goes… from earliest man we have tried to find ways to store and preserve information. In today’s technological age when people hear the words ‘storage’ or ‘computer storage’ they normally think about USB, NAS or SAN’s. Technology such as the floppy disk or even the punch card are nearly forgotten. If we look even […]

A series of unfortunate events

Part of your planning is sitting down and essentially predicting and planning for your worst nightmare! Sounds bad, doesn’t it? Sitting down and thinking about a ‘series of unfortunate events’ isn’t something that makes us jump for joy. It is however essential to develop effective exercise scenarios… (they must be realistic, no alien scenarios allowed!) […]

WannaCry Ransomware

Is WannaCry a Wake Up Call?

Over the weekend deadly WannaCry virus, the biggest attack of its kind ever recorded, swept the globe which has resulted in sleepless nights for many IT and security professionals in over 150 countries. With the ransom clock steadily ticking choices had to be made… to pay or not to pay? As the attack begins to […]

The big three

I guess it’s an occupational hazard! But I have read a lot of articles about data security.  Admittedly it can be overwhelming at times, so what I do like is short bursts of information. I have picked 3 security threats and some practical advice and kept it high level, hope it helps! 1.     Mobile Devices Data […]

Got your back (up)

We’ve all heard the term ‘have someone’s back’ but what does it mean? Urban Dictionary definition (because of course)… “You watch out and be a second set of eyes for someone. You look out for their best interests and let them know if they have missed something. You will stick up for them” I was flicking […]

Practise makes perfect

In our last Business Continuity blog, We talked about the importance of validating recovery procedures Practice makes perfect of course… let’s discover the 4 different exercise levels we can implement to find the holes in our plans. The whole point is to learn from exercises so that you can apply the same knowledge to a […]

The Belts And Braces Approach

Going ‘belt and braces‘ is a double assurance against having one’s trousers fall down. In today’s digital age, if we think of trousers as your organisation’s data, then a ‘belt and braces‘ approach is it’s storage. I don’t think I need to say too much about the rise of cyber risks!       ·        In […]

But Why Validate Your Recovery Procedures

Athletes need to prepare with training, planning and of course, stretching before a big race. That way, they know they will perform at their very best. The same goes for Business Continuity, with the right planning and preparation your business can continue to perform well, even during a crisis. The reality is, disruptions don’t give […]

Validate your Business Continuity plan

An important way of avoiding a crisis in the first place is to ensure your readiness for a disruptive event. We have broken down this critical task so you can be confident the business continuity (BC) system you are putting in place will work effectively when it matters: Although people often use the terms  “test” […]

What’s Next For Cyber Security This Year

The world of Cyber Security has had a busy year, we have seen numerous high-profile incidents, below are a few of the headline grabbers… Apple v FBI Ukraine Power Grid Attack – Phishing Attack Tesco Bank TalkTalk Ransomware – The sheer volume and creativity There is new legislation coming into force in 2018 and with […]

Crisis recovery guidlines

In our last blog we looked at what a crisis actually is, today we will examine how we move on when the dust begins to settle! Just when you thought it was safe to go back into the water… The first thing to remember is to NOT to unilaterally decide the crisis is over. Assess […]

Issues becoming crisis

Crisis is a word you will hear a lot when it comes to business continuity. So what is a crisis? A crisis is: Unexpected Hard to manage Very serious indeed There are four crucial aspects of crisis…   Sudden crisis This Happens without warning Escalates rapidly Has a high profile & impact   Slow-onset crises […]

Business Continuity; An Innovative Answer

Ever hear the phrase ‘the true ones are the best?’ well we tend to agree. Probably the best way to emphasise a point is through real life experiences, so today we’re sharing the real life experiences of a business continuity client that we recently visited and their efforts to embrace business continuity and the advances […]

Strategies for Business Continuity

Ok, so let’s look at selecting the right Business Continuity Strategies for your business. Gather what you need Put simply, for a good business continuity strategy, all your critical activities need to be considered and a continuity and recovery plan that suits be put in place. To help here is some easy to remember business […]


How does the cyber security industry get its message across? Regardless of whether it’s charity, donor or compassion there is a constant risk of audience fatigue.   US National Institute of Standards and Technology (NIST) recently released a report which found that people are beginning to recoil from the constant bombardment of “cyber advice” This […]

Half Baked Business

What matters most to your business? Perhaps it’s something you never thought of in terms of this exact question. So how do we answer this question?Well let’s look at it with regards to Business Impact Analysis (BIA). Don’t worry, put simply, this is where we look at the potential effects of an interruption to business […]


SO… The title is a little controversial right? Now-a-days banning cars is pretty much not an option due to there being 1.2 Billion of them driving around (give or take a couple). Where am I going with this? Well! As a species, we accept ‘Risk v Benefit’ as part of our lives. We, as humans, […]


There is a great mythos behind passwords and the first ever use of one. They have become the bane of every computer user for years, the frustration of having to remember one, the thought that goes into making one and of course there’s the dreaded ‘forgot password’ button for when things get desperate! So who’s […]


Lets take some time to discover how you can really get to grips with your Business Continuity Plan. The same simple rules apply regardless of the size and complexity of your business. As with everything, it is always best to start at the beginning… ..And again, as with everything, to fix something you must first know […]


A new way of doing things in recent years has become the ‘as a service’ way of thinking. This gives people the opportunity to plug into services that deliver intelligent, simple operations whenever you need them. Something that is expected nowadays is an ‘On Demand’ service. You only have to look down at your hand […]


In today’s blog I want to talk about the team, after all the team is the foundation of any business, they understand the workings of the business and they understand the realities of what it takes to keep the company running. Some members of your team probably know more about your business “operationally” than you […]


In the ever more demanding field of cyber security, Gartner has assumed an advisory stance – Shadow IT & Bimodal are two methods devised recently. Shadow IT is one way of describing a company’s IT systems and solutions whilst remaining “outside” the usual restraints.  These solutions are business-driven and are defined and executed by non-IT business units.   Bimodal is a […]

An introduction to business continuity – disaster survival & recovery

continuity involves incident prevention, surviving disruption and recovery planning.’ If an organisation is to survive a period of disruption and recover from it, they must effectively plan ahead – this is the essence of business continuity. All organisations should implement business continuity practices, in order to understand all processes/systems and promote continuous improvement. Maximise Recovery […]

Four steps to an effective patch management plan

Patch management is the process of utilising a suitable strategy to uncover vulnerabilities within a computer, system or network. Simple antivirus software will not protect against all forms of malware; therefore, a multi-layer approach is needed in order for full network protection. Patching works to cover up the ‘holes’ in which a hacker can gain […]

The human factor behind compromised passwords

A lot has been written on passwords and their role in keeping our networks and data safe and secure, with malware infections spreading more rapidly than ever (it is estimated that 1 in 4 people will fall victim to a data breach by 2020 – “Naked Security”). In the immortal words of Alexander Pope “To […]

Ransomware Threats Prevalent in UK and Irish Organisations

Crypto-ransomware threats are increasing extensively on a global scale. However, a study carried out in November 2015 has revealed that approximately half of internet users cannot diagnose and establish the harm that this malware can cause to their machines and networks. There have been 1.7 million known users affected by ransomware scams in the UK. […]