<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:g-custom="http://base.google.com/cns/1.0" xmlns:media="http://search.yahoo.com/mrss/" version="2.0">
  <channel>
    <title>it-infinity</title>
    <link>https://www.infinityit.ie</link>
    <description />
    <atom:link href="https://www.infinityit.ie/feed/rss2" type="application/rss+xml" rel="self" />
    <item>
      <title>Infinity IT Wins 2026 SonicWall Partner of the Year</title>
      <link>https://www.infinityit.ie/infinity-it-wins-2026-sonicwall-partner-of-the-year</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Partner+2026.png"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h1&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Infinity IT Wins 2026
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/company/sonicwall/" target="_blank"&gt;&#xD;
      
           SonicWall
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Partner of the Year 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h1&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           We’re thrilled to be recognised as SonicWall’s Partner of the Year for 2026!
            &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           And a special mention to our CTO,
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/in/gerrykernan/" target="_blank"&gt;&#xD;
      
           Gerry Kernan
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , who also earned the SonicWall Technical Hero of the Year! Congratulations Gerry on a well-deserved win!!
           &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           This award reflects the hard work and dedication of our incredible team and the trust of our loyal customers. We’re proud to continue our strong partnership with SonicWall, delivering top-tier cybersecurity solutions to protect businesses worldwide. If you’re reviewing your security setup or exploring SonicWall solutions, our award-winning team is ready to help.
           &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Thank you to everyone who’s been part of this journey. Let’s keep building a safer future together!
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Partner+2026.png" length="288887" type="image/png" />
      <pubDate>Thu, 05 Feb 2026 13:20:35 GMT</pubDate>
      <guid>https://www.infinityit.ie/infinity-it-wins-2026-sonicwall-partner-of-the-year</guid>
      <g-custom:tags type="string">News,Blog</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/partner2.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Partner+2026.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Still Running Office 2016 or 2019? The Clock Has Stopped</title>
      <link>https://www.infinityit.ie/still-running-office-2016-or-2019-the-clock-has-stopped</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h1&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Still Running Office 2016 or 2019? The Clock Has Stopped
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h1&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Infinity+IT.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Microsoft Office has been the backbone of business productivity for decades. From the contracts drafted in Word to the budgets built in Excel and the presentations polished in PowerPoint, these tools are woven into the daily operations of organisations across Ireland.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           But what happens when critical support for this software disappears?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           On 14th October 2025, Microsoft officially ended support for Office 2016 and Office 2019. There will be no extension. No extended security updates. For the many Irish businesses still running these versions, this isn't a distant concern - it's a present reality that demands attention.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
            
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           The Support Has Ended - But the Software Still Works. So, What's the Problem?
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This is the question we hear most often. Your Office applications will continue to open. Documents will still save. Emails will still send. On the surface, nothing has changed.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           But beneath that familiar interface, a clock is now ticking.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Microsoft will no longer patch security vulnerabilities discovered in Office 2016 or 2019. Any flaw found from this point forward - whether in how Outlook handles attachments, how Excel processes macros, or how Word renders embedded content - will remain open indefinitely.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cybercriminals know this. They actively target unsupported software because they understand that the vulnerabilities they exploit will never be fixed. It's not a question of whether these older Office versions will be targeted, but when.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
            
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Learning from Recent History
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Irish businesses don't need to look far for examples of what happens when organisations delay critical IT upgrades.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The 2021 HSE cyberattack demonstrated the devastating impact that can occur when systems aren't adequately protected. A single malicious email, opened in March 2021, ultimately led to months of disruption, with 70% of the HSE's IT servers requiring decryption and recovery efforts extending well into September.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           While that attack exploited different vulnerabilities, the underlying lesson is clear: outdated and unpatched systems create openings that attackers will find and exploit.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
            
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           The Risks Compound Over Time
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Running unsupported Office isn't a static risk - it grows worse with each passing month. Here's why:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Security exposure increases.
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Every vulnerability discovered after October 2025 remains permanently open. As security researchers and threat actors continue to probe these applications, the list of exploitable weaknesses will only grow.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Compatibility erodes.
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            New file formats, updated security protocols, and evolving integrations with services like Microsoft Teams, OneDrive, and SharePoint will increasingly cause friction. Email servers adopting newer TLS standards may eventually refuse connections from older Outlook clients.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Compliance becomes problematic.
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            For organisations operating under GDPR, DORA, or NIS-2 requirements, running unsupported software creates audit and compliance challenges. Cyber insurers are also scrutinising policyholder environments more closely - unsupported applications could affect your coverage or claims.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           The upgrade becomes harder.
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The longer you wait, the more complex the migration. File formats drift, user habits calcify around outdated workflows, and the gap between your current environment and modern platforms widens.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
            
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Windows 10 Reached End of Support on the Same Day
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           It's worth noting that Windows 10 also reached end of support on 14th October 2025 -the very same day as Office 2016 and 2019. Organisations running both face compounded risks and should consider addressing them together rather than piecemeal.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We wrote about this extensively in our previous article, Countdown to Windows 11: Why Upgrading Now is a Must Before Time Runs Out. The parallels are striking, and the solution is similar: plan early, execute smoothly, and don't wait for a security incident to force your hand.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
            
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Your Path Forward
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Microsoft offers several upgrade options, each suited to different organisational needs. It’s also worth noting that Microsoft Office 2021 remains supported until 13th October 2026, giving organisations on that version a limited window to plan their next move. Your options:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Microsoft 365
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            provides continuous security updates, the latest features, and seamless integration with Teams and collaboration tools. It's also AI-ready - Microsoft Copilot can assist with drafting, analysis, and presentations across Word, Excel, PowerPoint, and Outlook. These AI capabilities aren't available in perpetual Office versions.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Office 2024
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            offers a one-time purchase with support until October 2029, suitable for organisations that prefer to avoid subscriptions.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Office LTSC 2024
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            serves specialised environments requiring offline functionality, also supported until October 2029.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The right choice depends on your organisation's size, budget, compliance requirements, and how your team’s work. There's no one-size-fits-all answer.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           How Infinity IT Can Help
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           At Infinity IT, we've guided many organisations through technology transitions - from operating system upgrades to full cloud migrations. We understand that changing the tools your team relies on daily requires careful planning and clear communication.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Our approach starts with understanding your current environment: which devices are affected, what workflows depend on legacy features, and where the risks are highest. From there, we develop a migration plan that minimises disruption while ensuring your systems remain secure and compliant.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you're unsure which Office version your organisation is running, or if you've been putting off this conversation, now is the time to act.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Contact Infinity IT today
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            to discuss your options.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Infinity+IT.jpg" length="139073" type="image/jpeg" />
      <pubDate>Tue, 27 Jan 2026 08:37:59 GMT</pubDate>
      <guid>https://www.infinityit.ie/still-running-office-2016-or-2019-the-clock-has-stopped</guid>
      <g-custom:tags type="string">News,Blog</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Infinity+IT.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Infinity+IT.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Infinity IT Welcomes 14 New Clients in Year of Growth</title>
      <link>https://www.infinityit.ie/infinity-it-welcomes-14-new-clients-in-year-of-growth</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h1&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Infinity IT Welcomes 14 New Clients in Year of Growth
           &#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h1&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Infinity+IT+News+Article+14+New+Clients.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Infinity IT is delighted to announce significant growth over the past twelve months, with eleven new clients joining our managed IT services, alongside the successful completion of several major infrastructure modernisation projects.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Strengthening Our Credit Union Portfolio
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The past year has seen remarkable expansion within Ireland's credit union sector, with nine credit unions choosing Infinity IT as their trusted technology partner:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Cois Sionna Credit Union
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Palmerstown Credit Union
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Tallaght West Credit Union
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            St. Colman's Credit Union
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Life Credit Union
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Mallow Credit Union
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Affinity Credit Union
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Black Raven Credit Union
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Carrick-on-Suir Credit Union
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Ardee Credit Union
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Cavan Credit Union
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            St. Brigid’s Credit Union
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Additionally, we've been privileged to support the Community Credit Union merger with Rowlagh &amp;amp; Blanchardstown Credit Union, a complex integration requiring seamless technology consolidation and careful attention to operational continuity.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We're also proud to welcome Hair Restoration Clinic to our client portfolio, demonstrating our capability to deliver exceptional managed IT services across diverse industry sectors.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Powering Digital Transformation Initiatives
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Our technical teams have been working to deliver three cornerstone infrastructure programmes for our expanding client base:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Cloud Migration Projects
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            - Moving critical systems and data to secure cloud environments, delivering enhanced scalability, disaster recovery capabilities, and operational flexibility for organisations ready to embrace modern infrastructure.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Windows 11 Enterprise Rollouts
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            - Supporting clients through comprehensive operating system upgrades, ensuring compatibility, security, and access to the latest productivity features whilst minimising disruption to daily operations.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Penetration Testing Remediation
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            - Providing intensified security support to address vulnerabilities identified through rigorous penetration testing, hardening defences and ensuring robust protection against evolving cyber threats
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Looking Ahead
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As we continue to grow, Infinity IT remains committed to delivering innovative managed IT solutions and cybersecurity services that help organisations stay secure, compliant, and future-ready.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Infinity IT - We Manage Your IT So You Can Manage Your Business.
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Infinity+IT+News+Article+14+New+Clients.jpg" length="184263" type="image/jpeg" />
      <pubDate>Mon, 20 Oct 2025 20:34:35 GMT</pubDate>
      <guid>https://www.infinityit.ie/infinity-it-welcomes-14-new-clients-in-year-of-growth</guid>
      <g-custom:tags type="string">News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Infinity+IT+News+Article+14+New+Clients.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Infinity+IT+News+Article+14+New+Clients.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Infinity IT Strengthens Capabilities with Team Expansion</title>
      <link>https://www.infinityit.ie/infinity-it-strengthens-capabilities-with-team-expansion</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h1&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Infinity IT Strengthens Capabilities with Team Expansion
           &#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h1&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Infinity+IT+News+Article+New+Starts.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           At Infinity IT, we've bolstered our workforce with five new professionals as we scale operations to meet increasing demand for advanced cybersecurity and managed IT services.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The latest additions to our team - Ana, Thiago, Joel, Richard, and Robert bring specialised skills that will enhance service delivery and support our expanding portfolio of AI-powered security solutions.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Strategic Growth for Enhanced Service
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This growth reflects our focus on maintaining high service standards while accommodating growing demand from Irish organisations navigating an increasingly complex threat landscape.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Our expanded team will support our full suite of offerings, including the KnightGuard AI-powered cyber protection platform, KnightScan vulnerability scanning solution, and our 24/7 Security Operations Centre (SOC) services.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Building for the Future
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Alongside existing team members, the new recruits are already integrated into day-to-day operations, ensuring continuity of service while bringing fresh perspectives to emerging cybersecurity challenges.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As we continue to develop AI-driven security technologies and expand our managed services, this team expansion supports our commitment to delivering comprehensive support to clients in the private and public sectors.
           &#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Infinity+IT+News+Article+New+Starts.jpg" length="237690" type="image/jpeg" />
      <pubDate>Mon, 20 Oct 2025 20:31:43 GMT</pubDate>
      <guid>https://www.infinityit.ie/infinity-it-strengthens-capabilities-with-team-expansion</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Infinity+IT+News+Article+New+Starts.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Infinity+IT+News+Article+New+Starts.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Seamless IT Onboarding with Infinity IT</title>
      <link>https://www.infinityit.ie/seamless-it-onboarding-with-infinity-it</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Seamless+IT+Onboarding.png" alt=""/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Switching IT providers can feel daunting, with concerns about downtime, miscommunication, and disruptions.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           At Infinity IT, we eliminate these worries with a structured, client-focused onboarding process designed for a smooth and stress-free transition.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Why Choose Infinity IT?
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
            
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ✔ 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Proven Process
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      
            – Our refined onboarding blueprint ensures a seamless transition.
           &#xD;
      &lt;br/&gt;&#xD;
      
           ✔ 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Comprehensive Assessment
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      
            – We evaluate your IT environment to identify risks, document assets, and establish performance baselines.
           &#xD;
      &lt;br/&gt;&#xD;
      
           ✔ 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Clear Roadmap
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      
            – Actionable recommendations prioritised by urgency and impact.
           &#xD;
      &lt;br/&gt;&#xD;
      
           ✔ 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Risk Management
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      
            – Meticulous planning to mitigate potential disruptions.
           &#xD;
      &lt;br/&gt;&#xD;
      
           ✔ 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Stakeholder Engagement
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      
            – Involving key team members to address business-specific needs.
           &#xD;
      &lt;br/&gt;&#xD;
      
           ✔ 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Transparent Communication
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      
            – Regular updates and clear documentation every step of the way.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
            
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Client Success: Community Credit Union
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           "Infinity IT made our transition seamless with impeccable organisation, minimal disruption, and outstanding communication. A truly reliable IT partner!"
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;strong&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Andrew Higgs, CTO
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Onboarding+Blog+Image+-+Community+CU.png"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Make the Switch with Confidence
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
            
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Don’t let fear of change hold you back from better IT support. Infinity IT handles the complexities so you can focus on your business.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Ready for a stress-free onboarding experience?
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      
            Contact us today to start your smooth transition.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Infinity IT – We Manage Your IT So You Can Manage Your Business.
          &#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Seamless+IT+Onboarding.png" length="2874385" type="image/png" />
      <pubDate>Thu, 17 Apr 2025 10:53:14 GMT</pubDate>
      <guid>https://www.infinityit.ie/seamless-it-onboarding-with-infinity-it</guid>
      <g-custom:tags type="string">News,Blog</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Seamless+IT+Onboarding.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Seamless+IT+Onboarding.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Countdown to Windows 11: Why Upgrading now is a must before time runs out...</title>
      <link>https://www.infinityit.ie/countdown-to-windows-11-why-upgrading-now-is-a-must-before-time-runs-out</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Countdown to Windows 11: Why Upgrading now is a must before time runs out...
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As the technological landscape continues to evolve, so must our tools. The impending end of Windows 10's lifecycle marks a significant turning point, especially as 70% of computers worldwide apparently use Windows 10: it's time to embrace Windows 11. With only one year left to upgrade, it's crucial to understand why making the move now is essential for both individuals and businesses. Let’s explore the compelling reasons for upgrading to Windows 11 sooner rather than later.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           1. Smooth Transition: Avoid Last-Minute Rush
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Waiting until the last minute to upgrade can lead to several complications:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Increased Demand:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As the End-of-Life date approaches, demand for upgrades and technical support will surge, potentially leading to longer wait times and higher costs.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Hasty Upgrades:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Rushing the upgrade process increases the likelihood of errors, data loss, and compatibility issues.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Limited Time for Adjustment
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           : Upgrading now gives you ample time to familiarise yourself with Windows 11, ensuring a smooth transition.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           By upgrading early, you can avoid the last-minute rush and ensure a seamless, well-planned transition.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           2. Enhanced Security: Protecting Your Digital Realm
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Security should always be a top priority, and Windows 11 is built with advanced security features that surpass those of Windows 10. Here’s why upgrading now is vital:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Hardware-Based Security:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Windows 11 leverages TPM 2.0 (Trusted Platform Module) and Secure Boot, providing robust protection against firmware and hardware attacks.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           I
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ntegrated Threat Protection:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Enhanced malware protection, including cloud-based security and Microsoft Defender Antivirus, offers comprehensive defence mechanisms.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Zero Trust Model:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Windows 11 adopts a zero-trust security approach, ensuring stricter access controls and data protection measures.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           By upgrading now, you can immediately benefit from these advanced security features, safeguarding your data and devices against emerging threats.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           3. Continued Support and Updates: Stay Current and Supported
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Microsoft will cease to provide updates, security patches, or technical support for Windows 10 after October 14, 2025. This lack of support means:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            No Security Patches:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Without regular updates, your system becomes vulnerable to new security threats.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           No Feature Updates:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            You'll miss out on new features and improvements that enhance user experience and productivity.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           No Technical Support
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           : Troubleshooting issues without official support can be challenging and time-consuming.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Upgrading to Windows 11 now ensures you remain in the loop with ongoing updates and support, keeping your system secure and up to date.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           4. Performance and Productivity Boost: Work Smarter, Not Harder
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Windows 11 is designed to improve both performance and productivity. Here’s how upgrading now can transform your computing experience:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Faster Performance
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           : Optimisations in Windows 11 result in quicker boot times, faster app launches, and improved power management.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Enhanced Multitasking:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Features like Snap Layouts and Virtual Desktops streamline multitasking, allowing you to organise your work more efficiently.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Integrated Tools:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Seamless integration with Microsoft Teams and other productivity tools fosters better collaboration and communication.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Upgrading now allows you to start benefiting from these enhancements immediately, enabling you to work more effectively and efficiently.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           5. Compatibility with New Technologies: Future-Proof Your System
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As new software and hardware are developed with Windows 11 in mind, staying on an outdated OS can lead to compatibility issues. By upgrading now, you ensure:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Software Compatibility:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Access to the latest applications and software updates designed for Windows 11.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Hardware Compatibility:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Compatibility with new hardware technologies and peripherals, ensuring optimal performance and functionality.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Future-proofing your system by upgrading now minimises the risk of running into compatibility issues down the line.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Conclusion: Embrace the Future Today
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The impending end of Windows 10 signals a crucial moment: it’s time to embrace Windows 11. With only one year left to upgrade, the clock is ticking. Upgrading now offers numerous benefits, from enhanced security and ongoing support to improved performance and future-proof compatibility.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Don’t wait until it’s too late. Start planning your upgrade today and step confidently into the future with Windows 11. Your digital realm deserves the best—upgrade now and ensure it remains secure, efficient, and ready for whatever comes next.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Windows+10+End+of+Life.png" length="2983977" type="image/png" />
      <pubDate>Fri, 21 Mar 2025 15:19:24 GMT</pubDate>
      <guid>https://www.infinityit.ie/countdown-to-windows-11-why-upgrading-now-is-a-must-before-time-runs-out</guid>
      <g-custom:tags type="string">News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Windows+10+End+of+Life.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Windows+10+End+of+Life.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>You Still Need to Back Up Your Microsoft 365 Data</title>
      <link>https://www.infinityit.ie/you-still-need-to-back-up-your-microsoft-365-data</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h1&gt;&#xD;
    &lt;a href="null" target="_blank"&gt;&#xD;
      
           You
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Still Need to Back Up Your Microsoft 365 Data
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h1&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Multiple organisations have settled on cloud-based Software-as-a-service (SaaS) solutions from the Microsoft 365 (M365) family of products.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This is understandable as M365 provides rich applications and services that are easy to commission and onboard users without any on-premise infrastructure management. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Do you need to back up Microsoft 365 data, such as the emails in Office 365? It’s a question that’s often asked. And it’s a question that’s frequently answered in contradictory ways. Let’s not bury the lede — the answer, as far as we are concerned, is an emphatic yes. It’s your data in M365, and you are responsible for it. Microsoft delivers some protections via SLAs, site mirroring, and retention policies. But these are not backups in the traditional sense, and if you have to produce data for regulators at some point or for any other reason, you may discover they’re not good enough. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            One aspect of M365 and other cloud services from Microsoft that often surprises people is that having your data in M365 does not remove your responsibility for backing it up. Microsoft operates its cloud-based services on a shared responsibility model, and for data stored in its SaaS solutions like M365, the responsibility for data backup and integrity resides with the organisations using M365. Image 1 shows a table of responsibilities taken from Microsoft’s
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://learn.microsoft.com/en-us/azure/security/fundamentals/shared-responsibility" target="_blank"&gt;&#xD;
      
           Shared responsibility in the cloud
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            document on the Microsoft Learn site.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a href="/"&gt;&#xD;
    &lt;img src="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Chart.png" alt="A diagram showing responsibility always retained by the customer and responsibility transfers to cloud provider"/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Figure 1: Microsoft and Customer Responsibilities in the Microsoft Cloud. (Retrieved on May 1st 2024, from
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://learn.microsoft.com/en-us/azure/security/fundamentals/shared-responsibility" target="_blank"&gt;&#xD;
      
           https://learn.microsoft.com/en-us/azure/security/fundamentals/shared-responsibility
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .)
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In this blog, we outline why storing your data in M365 doesn’t mean you can forget about backups. Thankfully, many options are available to deliver backups for Microsoft 365 data. We encourage you to contact your current account manager in Infinity IT to discuss backing up your M365 data. You can also use our 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.infinityit.ie/#1558000648" target="_blank"&gt;&#xD;
      
           Contact Form
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            to start a conversation.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://snapsites.onlinepartners.online/site/a33e3c64/null" target="_blank"&gt;&#xD;
      
           M365
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Data Is Still Vulnerable to Loss
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Microsoft provides replication and retention policies to deliver service availability SLAs in M365. You can even specify that data in M365 should not get deleted. However, just because the data is flagged to be retained in M365 and replicated across multiple cloud data centres does not mean it’s safe from accidental damage, cyberattacks, or malicious insider activity. Issues that can cause data loss include:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ⁃        Human Error - Data is at risk of being lost if it is deleted or overwritten, and this does not get discovered within the M365 retention period.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ⁃        Malicious damage - Sometimes, staff intentionally destroy or corrupt data, which can result in permanent data loss if not discovered quickly and no backups are available.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ⁃        Synchronisation errors - When using M365, data is regularly exchanged between the platform and end-user devices. Due to the high number of devices and frequency of data exchanges, some errors are likely to occur. Even a few errors that result in data loss or corruption could negatively impact operations or decrease staff productivity.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ⁃        Cyberattacks - It’s important to note that M365 can be vulnerable to cyberattacks, data breaches, and loss due to criminal activities such as ransomware. If you rely solely on Microsoft for data retention, your business may suffer significant losses and harm to its reputation. Taking proactive measures to safeguard your data against any potential incidents is crucial.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ⁃        Natural disasters - There is a possibility, albeit small, that a catastrophe could cause a disruption in your access to M365 for several days or more. If you don’t have a backup of important data stored elsewhere, your organisation might be unable to function properly until M365 access gets restored.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://snapsites.onlinepartners.online/site/a33e3c64/null" target="_blank"&gt;&#xD;
      
           Microsoft's
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Native Data Retention Features
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Now that we’ve highlighted how you can lose M365 data due to corruption or deletion, let’s outline the features Microsoft includes to deliver partial data security, compliance, and availability.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Datacentre-to-Datacentre replication - Microsoft replicates data across multiple M365 data centres. However, it is important to note that this replication does not serve as a replacement for a dedicated backup solution. It cannot protect against some of the common data loss issues, such as accidental deletion or ransomware attacks. You still need a proper backup solution for comprehensive data security.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Retention policies - M365 provides retention policies that enable organisations to comply with regulations and internal policies by retaining or deleting content after a specific period. However, although these retention policies are helpful, they are not fool proof. Mistakes can occur when configuring retention policies, which can result in data loss. System Admins are susceptible to making errors, just like any other person.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Litigation hold - M365 allows organisations to put content on hold for legal cases, eDiscovery, or internal investigations. However, backups are vital to complement M365 legal holds to protect against user error or malicious deletion to preserve content needed for investigations.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Archive mailbox - Exchange email in M365 provides an archive mailbox with extra storage space to archive emails. However, this archive is subject to the same data loss risks as the primary mailbox, including accidental deletion and user error.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Microsoft Defender for Office 365 - While Microsoft Defender for Office 365 helps protect email with advanced protection against phishing, business email compromise, ransomware, and other cyber threats, it is not a substitute for backup. Backups are the ultimate safety net to protect your organisational data and shared knowledge from accidental and malicious damage.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://snapsites.onlinepartners.online/site/a33e3c64/null" target="_blank"&gt;&#xD;
      
           Proper
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Backups are required to Deliver Compliance
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Regulations such as GDPR require organisations to ensure data protection. This responsibility includes securing data while it is being stored, transmitted over networks, and even backed up. Hence, when choosing a backup solution to safeguard data, it is crucial to select a solution that allows the selection of target locations that align with each organisation’s regulations. For instance, when data must remain within the EU region to adhere to regulations.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://snapsites.onlinepartners.online/site/a33e3c64/null" target="_blank"&gt;&#xD;
      
           Quick
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Data Recovery is Vital
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           One of the most important aspects of data backup or retention policies is the ability to quickly recover vital emails or other information when needed. Often in pressured situations if a disaster or cyberattack has occurred. Even if you believe that Microsoft’s built-in data protection features are good enough (trust us - they really aren’t), experience shows that recovery of data using the native M365 tools can be slow and cumbersome. In some cases, restoring data to its original state may be extremely difficult, particularly across different user accounts.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Having a robust third-party backup of your M365 data, especially emails, ensures you can meet your Recovery Point Objectives (RPO) and Recovery Time Objectives (RTO), minimising downtime and enabling a swift return to normal operations after an incident.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://snapsites.onlinepartners.online/site/a33e3c64/null" target="_blank"&gt;&#xD;
      
           Conclusion
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           There is no doubt that Microsoft’s built-in M365 features provide some functionality for data security, compliance, and availability, but they do not replace the functionality in a comprehensive backup solution. As demonstrated in Figure 1 where Microsoft clearly states that the responsibility for information and data resides with their customers - the organisations that use M365 (and other Microsoft cloud services).
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            As the data owner, you are responsible for managing the risk of data loss due to issues like accidental deletion and ransomware. By implementing a dedicated backup solution for Microsoft 365, you can ensure that your critical data is always protected and recoverable, enabling business continuity and peace of mind in the face of ever-evolving threats. The Microsoft M365 and Azure experts in
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.infinityit.ie/" target="_blank"&gt;&#xD;
      
           Infinity IT
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            are here to help you choose, implement, and operate a backup solution that protects your M365 data.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Your
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           IT
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Upgrade Starts Here: Contact Us for a Complimentary Assessment
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/365+Backups.png" length="3866683" type="image/png" />
      <pubDate>Fri, 21 Mar 2025 14:19:58 GMT</pubDate>
      <guid>https://www.infinityit.ie/you-still-need-to-back-up-your-microsoft-365-data</guid>
      <g-custom:tags type="string">News,Blog</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/365+Backups.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/365+Backups.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Severe Storm Éowyn to hit Ireland Tomorrow: Are You Prepared?</title>
      <link>https://www.infinityit.ie/severestorm-eowyn-to-hit-ireland-tomorrow-are-you-prepared</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Infinity+IT+-+Storm+2.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Storm Éowyn is bringing more than just wind and rain – it’s also shaking up how we work.
            &#xD;
      &lt;br/&gt;&#xD;
      
           With Met Éireann issuing a red alert and many businesses shifting to remote work today. Remote access issues can be a major roadblock when you need to stay productive and it’s essential to stay connected, secure, and productive during these extreme conditions.
            &#xD;
      &lt;br/&gt;&#xD;
      
           We are here to support you in navigating challenges like these, ensuring your IT infrastructure is ready to handle anything – even a storm!
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Here are 4 Key Things to Check TODAY Before Working Remotely During the Storm:
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/strong&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           ✅ Power Backup: Sudden outages can happen. Ensure you have a fully charged phone/laptop, access to backup power sources, and offline access to critical files.
           &#xD;
      &lt;br/&gt;&#xD;
      
           ✅ Cloud Accessibility: Ensure your team has seamless access to critical systems and files through a secure cloud solution – no delays, no excuses.
           &#xD;
      &lt;br/&gt;&#xD;
      
           ✅ Communication Tools: Stay in sync with your team using platforms like Microsoft Teams or Zoom. Have a backup channel in case one goes down.
           &#xD;
      &lt;br/&gt;&#xD;
      
           ✅ IT Support Readiness: Know how to reach your IT provider (that's where we come in!) for quick troubleshooting in case of unexpected disruptions.
           &#xD;
      &lt;br/&gt;&#xD;
      
           As we adapt to Storm Éowyn, it’s a good reminder of the importance of a robust IT strategy.
           &#xD;
      &lt;br/&gt;&#xD;
      
           Whether it’s disaster recovery, remote work setup, or cybersecurity, we’re here to help you weather any storm – literally and figuratively.
           &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           &amp;#55357;&amp;#56542; Need support during the storm?
           &#xD;
      &lt;br/&gt;&#xD;
      
           .Click here to reach out to our team today as there will be no onsite services during the red weather warning for the safety of our staff.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Infinity+IT+-+Storm+1.png" length="431704" type="image/png" />
      <pubDate>Thu, 23 Jan 2025 15:16:03 GMT</pubDate>
      <guid>https://www.infinityit.ie/severestorm-eowyn-to-hit-ireland-tomorrow-are-you-prepared</guid>
      <g-custom:tags type="string">News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Infinity+IT+-+Storm+1.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Infinity+IT+-+Storm+1.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>How Winter Time Change Affects Computer Systems</title>
      <link>https://www.infinityit.ie/how-winter-time-change-affects-computer-systems</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           How Winter Time Change Affects Computer Systems
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The transition to winter time (also known as daylight saving time (DST) ending) can have several negative impacts on computer systems, leading to various types of losses. Here are some of the main issues that arise:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           1. Time Inconsistencies and System Crashes
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Impact:
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Many computer systems, especially those dealing with real-time data (e.g., servers, databases, transaction systems), rely on accurate time synchronisation. The time change can introduce discrepancies where systems get confused by repeating or missing the same hour.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Losses:
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            This can lead to system crashes, service interruptions, and incorrect timestamps on transactions or logs, potentially resulting in data corruption or inconsistency.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           2. Scheduling Errors
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Impact:
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Systems that have scheduled tasks (such as cron jobs, backups, or automated processes) may face issues. Tasks scheduled during the hour that repeats may run twice, or miss their scheduled execution due to confusion over the time shift.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Losses:
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Redundant tasks can lead to duplicated data or operations, increased processing load, and possible overuse of resources. Missed tasks could affect business-critical operations, leading to downtime or financial loss.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           3. Data Integrity and Logging Issues
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Impact:
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Accurate timestamps are crucial for maintaining data integrity and for audit purposes, especially in sectors like finance, healthcare, and security. With time shifts, log files and event records may have overlapping timestamps, making it difficult to track events properly.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Losses:
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Inaccurate logs can complicate troubleshooting efforts and auditing processes, leading to longer downtimes, regulatory fines, and loss of trust in systems.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           4. Impact on Distributed Systems and Networks
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Impact:
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             In distributed computing environments, where multiple systems in different time zones interact, inconsistencies caused by the time shift can disrupt communication, data synchronisation, and transactions.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Losses:
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Transaction failures, data mismatches, and network downtime can result in decreased productivity and revenue loss, especially for businesses reliant on continuous, real-time operations (e.g., e-commerce or cloud services).
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           5. Human Error and Productivity Loss
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Impact:
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             IT administrators may need to manually adjust system clocks or verify that automated adjustments are working correctly, introducing room for human error. Users may also face confusion with the time shift, which can lead to miscommunication or missed deadlines.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Losses:
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             The need for manual intervention or additional troubleshooting due to errors increases labour costs and system maintenance time, leading to reduced productivity.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           6. Business and Financial Impact
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Impact:
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             For businesses that rely on trading or other time-sensitive operations (e.g., financial markets, airlines, and telecommunications), the one-hour discrepancy can cause disruptions in transactions, bookings, and customer services.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Losses:
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Missed trades, disrupted services, and unhappy customers could lead to financial losses and reputational damage.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Economic Losses from IT and Business Downtime
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Global Impact:
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             IT system errors, misconfigurations, and downtime due to DST changes cause disruptions in business operations. The International Data Corporation (IDC) estimates that the average hourly cost of IT downtime is anywhere between €100,000 to 1 million euros for businesses depending on size and industry.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Global Loss Estimate:
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Considering global companies affected by such downtimes, this could easily result in billions of euros annually in global losses, even if downtime is just a few hours across thousands of businesses.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Time drift can lead to transaction errors, data inconsistencies, and even security vulnerabilities—issues that can disrupt your business and cost you money. With our proactive approach, we detect and correct time drift before it causes problems, keeping your systems synchronised, secure, and reliable.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           At Infinity IT, we understand the critical importance of time accuracy in maintaining the smooth operation of your IT systems.
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           That’s why we offer comprehensive monitoring of your servers and computers for time drift, ensuring that any deviations in system clocks are spotted and resolved immediately.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Trust Infinity IT to keep your infrastructure running smoothly with real-time time drift monitoring and rapid resolution. Let us handle the technical details so you can focus on growing your business.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Your
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           IT
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Upgrade Starts Here: Contact Us for a Complimentary Assessment
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Winter+Time.png" length="2349028" type="image/png" />
      <pubDate>Thu, 24 Oct 2024 12:44:00 GMT</pubDate>
      <guid>https://www.infinityit.ie/how-winter-time-change-affects-computer-systems</guid>
      <g-custom:tags type="string">News,Blog</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Winter+Time.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Winter+Time.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Enterprise Ireland Cyber Review Grant – Your Complete Guide</title>
      <link>https://www.infinityit.ie/enterprise-ireland-cyber-review-grant-your-complete-guide</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h5&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Enterprise Ireland Cyber Review Grant – Your Complete Guide
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In today’s fast-paced digital world, cybersecurity is more important than ever. With the rise of cyber threats—especially those targeting smaller businesses—it’s crucial to protect your company’s data and reputation. To help businesses like yours, Enterprise Ireland (EI) has introduced the Cyber Review Grant. This grant not only helps you assess your current cybersecurity status but also provides a roadmap for improvement. But what does this mean for you? This blog breaks down the process and explains why now is the time to act.
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What is the Enterprise Ireland Cyber Review Grant?
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           The Cyber Review Grant is a new initiative designed to help Irish companies evaluate their cybersecurity readiness and create a plan to improve it. The grant covers 80% of the fixed project cost (€3,000), making it an affordable and essential step in protecting your business from cyberattacks.
           &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Who is it For?
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           This grant is available to Irish companies that are clients of Enterprise Ireland. If your business is engaged in exporting and leveraging digital tools, this grant can help secure your digital assets and ensure that your company meets the highest cybersecurity standards. With cyber threats growing in sophistication, this grant offers you a chance to strengthen your defences.
           &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Why Should You Apply?
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Cybersecurity isn’t just a technology issue—it’s a business imperative. Attacks can disrupt your operations, damage your reputation, and compromise customer trust. The Cyber Review Grant allows you to:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h5&gt;&#xD;
  &lt;h5&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/h5&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Identify vulnerabilities in your current systems
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Improve your defences by following expert recommendations
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Boost your international credibility with a secure and compliant setup
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Future-proof your business against evolving cyber threats
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;h5&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           With advancements in AI making businesses more vulnerable to cyberattacks, now is the time to take action. The grant offers a structured, expert-led process that’s tailored to your company’s specific needs.
           &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What Do You Get?
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           When you apply for the Cyber Review Grant, you gain access to certified cybersecurity experts, who will:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h5&gt;&#xD;
  &lt;h5&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/h5&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Interview your key personnel to understand your current practices
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Review your technology and digital processes, both onsite and in the cloud
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Provide a detailed report identifying vulnerabilities and offering actionable steps to improve your cybersecurity measures
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;h5&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           This report, based on the National Cyber Security Centre (NCSC) framework, will cover essential areas such as software updates, data backups, access management, and more. Each recommendation will have a clear, measurable action plan with designated owners within your company, ensuring you can address these vulnerabilities over the next 6 to 12 months.
           &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           How Much Does It Cover?
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           The total cost of the cybersecurity review is €3,000, but with Enterprise Ireland funding 80%, your business will only pay €600. This small investment could save your company from costly cyberattacks and help you comply with industry regulations.
           &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Application Process
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Applying for the Cyber Review Grant is quick and straightforward. Here’s how it works:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h5&gt;&#xD;
  &lt;h5&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/h5&gt;&#xD;
  &lt;ol&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Confirm Eligibility: Ensure your company is an Enterprise Ireland client and has an assigned Development Advisor.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Find a Certified Consultant: Infinity IT is a certified consultant and can guide you through the entire process.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Submit Your Application: Apply online, naming your chosen consultant (Infinity IT).
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Receive Your Offer: Once your application is approved, you will receive a letter of offer.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Complete the Review: Work with your consultant to carry out the review and receive a comprehensive report.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Claim the Grant: After paying your consultant, submit the required documents to claim back 80% of the project cost.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ol&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Who is Eligible?
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           The grant is open to Enterprise Ireland client companies. Only one grant is available per company, so it’s important to act quickly as the funding is limited and offered on a first-come, first-served basis.
           &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What’s Not Covered?
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Certain activities, such as routine software upgrades, physical security measures, or general management consultancy, are not eligible for the grant. The focus is on cybersecurity and protecting your company’s digital assets.
           &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Why Choose Infinity IT?
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           At Infinity IT, we are experts in Information Technology, providing Managed IT Support Solutions and Services both in the Cloud and On-Premise to a diverse base of customers in Ireland and beyond.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Our technical expertise with leading technologies ensures we deliver a superior level of customer service, helping you implement best practice IT strategies. We deploy and manage technologies that mitigate risks and improve productivity, allowing you to focus on running your business.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Choosing Infinity IT as your consultant means you’re partnering with a trusted Enterprise Ireland-certified cybersecurity expert who understands the grant process inside and out. We will ensure the review is comprehensive and actionable, tailored to your company’s specific needs.
           &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Ready to Apply?
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           If you’re ready to strengthen your cybersecurity defences and apply for the Cyber Review Grant, don’t wait—funds are limited, and demand is high.
            &#xD;
      &lt;br/&gt;&#xD;
      
           Contact Shane Casey at shane.casey@infinityit.ie today to start your application and secure your company’s future.
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Enterprise+Ireland+Cyber+Review+Grant+Blog.png" length="686191" type="image/png" />
      <pubDate>Sat, 19 Oct 2024 11:10:26 GMT</pubDate>
      <guid>https://www.infinityit.ie/enterprise-ireland-cyber-review-grant-your-complete-guide</guid>
      <g-custom:tags type="string">News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Enterprise+Ireland+Cyber+Review+Grant+Blog.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Enterprise+Ireland+Cyber+Review+Grant+Blog.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>How Old is Old? Understanding the Lifespan of Business Computers</title>
      <link>https://www.infinityit.ie/how-old-is-old-understanding-the-lifespan-of-business-computers</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           How Old is Old? - Understanding the Lifespan of Business Computers
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Technology plays a crucial role in maintaining productivity and efficiency. Computers are the backbone of any modern business, and their performance can significantly impact your operations.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           But how old is too old for a business computer?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In this blog post, we'll discuss why we recommend replacing computers once they reach five years old, the importance of budgeting and planning for upgrades, and how to future-proof your IT infrastructure.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Why Replace Computers Every Five Years?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Performance and Reliability
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Computers, like any other piece of technology, degrade over time. After five years, even the most robust business computers begin to show signs of wear and tear. Performance issues such as slower boot times, frequent crashes, and compatibility problems with new software become more common. By replacing computers every five years, you can ensure that your team has reliable, efficient tools that keep your business running smoothly.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Security Concerns
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Older computers are more vulnerable to security threats. As technology advances, so do the methods used by cybercriminals. Older systems may not support the latest security updates or software, leaving your business exposed to potential breaches. Replacing your computers regularly helps maintain a strong security posture by ensuring your hardware and software are up to date.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cost Efficiency
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           While it might seem cost-effective to extend the life of your computers, the hidden costs of maintenance, repairs, and lost productivity due to downtime can add up. Investing in new computers every five years can actually save you money in the long run by reducing these hidden expenses. Waiting longer to replace PCs does not save money but instead frustrates employees and uses up their time ineffectively. Outdated and slow computers affect productivity, leading to a decline in employee morale and efficiency.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Planning Your Upgrade: Budgeting and Timing
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Budget Planning
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Upgrading your business computers requires careful financial planning. To avoid a significant financial burden, start planning your budget at least one year ahead of the expected replacement date. This allows you time to allocate funds gradually and avoid a large one-time expense.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Timing Your Upgrade
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Timing is crucial when it comes to upgrading your computers. Coordinating your upgrade with Windows End of Life (EOL) dates can help you avoid compatibility issues and ensure continued support. For example, Windows 10 support is scheduled to end in October 2025. Planning your upgrade ensures that your systems remain secure and compatible with the latest software.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Futureproofing Your IT Infrastructure
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Hardware Requirements
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           When selecting new computers, consider futureproofing your hardware to extend its usability.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Focus on:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            CPU:
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Opt for the latest generation processors. While they might be more expensive, they offer better performance and longevity.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            RAM
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            : More RAM ensures better performance and multitasking capabilities. Aim for at least 16GB of RAM to handle future software requirements.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Disk Space
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            : Solid State Drives (SSDs) are faster and more reliable than traditional Hard Disk Drives (HDDs). Choose SSDs with sufficient capacity (at least 512GB) to handle your business data.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Software Planning
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Before purchasing new computers, plan what software will be installed on each PC. This ensures that all necessary applications are compatible and that there are no surprises post-purchase. Consult with your IT department/provider to identify the software requirements.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Ensure All New PCs Are Fully Updated
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           When you receive your new computers, make sure they come fully updated with all required software. This includes installing the latest operating system updates, antivirus software, and any other critical business applications. This proactive approach saves time and prevents disruptions during the transition.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Conclusion
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Replacing your business computers every five years is a strategic move that enhances performance, security, and cost-efficiency. By planning your budget and upgrades well in advance, coordinating with Windows EOL dates, and futureproofing your hardware, you can ensure a seamless transition and sustained productivity for your business.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Remember, investing in new technology is not just about staying current—it's about empowering your team with the tools they need to succeed. Avoid the frustration and inefficiency caused by outdated computers and prioritise regular upgrades to keep your business thriving.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Your
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           IT
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Upgrade Starts Here: Contact Us for a Complimentary Assessment
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Old+Computers2-0cc19f76.png" length="4097623" type="image/png" />
      <pubDate>Tue, 25 Jun 2024 12:17:36 GMT</pubDate>
      <guid>https://www.infinityit.ie/how-old-is-old-understanding-the-lifespan-of-business-computers</guid>
      <g-custom:tags type="string">News,Blog</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Old+Computers.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Old+Computers2-0cc19f76.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Midleton Credit Union Testimonial - Seamless Disaster Recovery Solution</title>
      <link>https://www.infinityit.ie/midleton-credit-union-testimonial-seamless-disaster-recovery-solution</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We cannot express enough gratitude to Infinity IT for their exceptional Disaster Recovery efforts following the unforeseen flooding of our Credit Union premises.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The flooding posed a significant threat to our daily operations and the safety of our members' financial assets.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           However, thanks to the meticulous disaster recovery planning and swift execution by Infinity IT, we were able to navigate through the crisis seamlessly.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Their emphasis on defining Recovery Point Objectives (RPO) and Recovery Time Objectives (RTO) proved invaluable, allowing us to maintain data integrity and resume operations swiftly.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Infinity IT demonstrated unparalleled efficiency by successfully transitioning our critical systems to our designated Disaster Recovery site within 24 hours.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This remarkable feat not only minimised downtime but also reassured our members of the unwavering reliability of our services.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We recommend Infinity IT to any Credit Union seeking reliable, comprehensive, and effective disaster recovery solutions.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           John Fenton,
           &#xD;
      &lt;br/&gt;&#xD;
      
           Manager, Midleton Credit Union
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Your
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           IT
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Upgrade Starts Here: Contact Us for a Complimentary Assessment
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/INFINITY+CLIENT+LOGOS2.png" length="175286" type="image/png" />
      <pubDate>Thu, 07 Mar 2024 17:02:52 GMT</pubDate>
      <guid>https://www.infinityit.ie/midleton-credit-union-testimonial-seamless-disaster-recovery-solution</guid>
      <g-custom:tags type="string">Testimonial</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/INFINITY+CLIENT+LOGOS2.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/INFINITY+CLIENT+LOGOS2.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Wellington Eye Clinic</title>
      <link>https://www.infinityit.ie/wellington-eye-clinic</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Liz.webp" alt="A woman with long hair is wearing a black and white jacket and smiling."/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           We have worked with Infinity IT for a number of years now and I would highly recommend them.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           The team at Infinity IT have worked with us to upgrade our IT systems; significantly improving our IT security and business continuity plans in that time.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           They have also been able to identify cost saving measures for us in terms of our email and licensing packages.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           The Infinity IT support team are quick to resolve any queries for us through their dedicated support desk and the monthly security reports provide great oversight and reassurance that our IT systems are secure and efficient.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Liz Hogan, 
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Clinic Manager, Wellington Eye Clinic
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Your
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           IT
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Upgrade Starts Here: Contact Us for a Complimentary Assessment
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/clinic+banner.png" length="5050053" type="image/png" />
      <pubDate>Wed, 28 Feb 2024 15:55:14 GMT</pubDate>
      <guid>https://www.infinityit.ie/wellington-eye-clinic</guid>
      <g-custom:tags type="string">Testimonial</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/INFINITY+CLIENT+LOGOS5.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/clinic+banner.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Why Healthcare needs to do more: Learning from Past Attacks</title>
      <link>https://www.infinityit.ie/why-healthcare-needs-to-do-more-learning-from-past-attacks</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The healthcare industry remains one of the prime targets for external and internal cyber attacks, as protected health information (PHI) is in high demand on the dark web.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The frequency and sophistication of attacks continue to rise, posing significant challenges to the healthcare sector.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Malware Attacks by Industry - Sonicwall CyberThreat report 2023
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ol&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Education
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Healthcare
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Finance
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Retail
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Government
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ol&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Key Challenges facing healthcare
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Keeping critical infrastructure covered and continuously available
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Protecting patient privacy from insider risks
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Preserving the integrity of healthcare data
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Preventing data breaches originating from ransomware and phishing attacks
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           HSE Attack
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This attack highlighted the devastating impact of cyber attacks on healthcare infrastructure in Ireland disrupting operations and compromised patient data.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            MARCH 2021:
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             An email was sent on the 16th of March, opened on the 18th of March 2021 which delivered the lethal blow.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            MARCH 2021:
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             The HSE antivirus software detected malicious activity on 31st March 2021, monitor only mode.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            MAY 2021:
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Mid May HSE operations were finally alerted to the attack by a service provider.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            JUNE 2021:
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             At least three quarters of the HSE's IT servers had been decrypted and 70% of PC’s were back in use.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            SEPTEMBER 2021:
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             90% of systems were recovered.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Impact of an Attack
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The consequences of such attacks extend far beyond financial losses, affecting patient care and safety. Patients don’t get the care they need when healthcare providers are taken offline due to ransomware attacks.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Surgeons postpone surgeries because the information necessary to perform a life-saving surgery becomes inaccessible.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Failures in diagnostic procedures and laboratory tests result in delayed medical treatment.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Emergency Room (ER) bypass causes ambulances to diverge to healthcare facilities miles farther, leading to degraded and irreversible outcomes.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What can you do to protect your healthcare organisation from similar attacks:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Implementing a multi-layer protection platform can help mitigate vulnerabilities and defend against evolving cyber threats.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Healthcare organisations must invest in robust security measures to safeguard critical infrastructure, protect patient privacy, and prevent data breaches.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Infinity IT and SonicWall have worked with healthcare providers to help build a healthier system.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Our innovations and comprehensive strategies have allowed us to meet new expectations regarding improving security, increasing operation efficiencies, and reducing IT costs.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Our knowledge and wealth of experience helps us to help Healthcare Organisation’s to avoid surprises and spend more time focused on their primary mission: ensuring the health and well-being of the communities they serve.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            As threats continue to evolve, the healthcare industry must remain vigilant and proactive in addressing cybersecurity risks. By learning from past attacks and investing in effective security measures, healthcare organisations can better protect their systems, safeguard patient data, and uphold the trust and integrity of the healthcare system.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The time to act is now – the health and well-being of patients depend on it.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Case Study:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           “Our improved security performance coupled with simplified security management has reduced costs and time spent on administrative tasks. The whole process has been a very positive experience!”
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Steve Jackson
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           IT Director
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Kingdom Services Group
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Your
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           IT
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Upgrade Starts Here: Contact Us for a Complimentary Assessment
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/healthcare.png" length="4723751" type="image/png" />
      <pubDate>Thu, 08 Feb 2024 14:29:49 GMT</pubDate>
      <guid>https://www.infinityit.ie/why-healthcare-needs-to-do-more-learning-from-past-attacks</guid>
      <g-custom:tags type="string">News,Blog</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/healthcare.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/healthcare.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Lifesaving Security for the Healthcare Industry</title>
      <link>https://www.infinityit.ie/lifesaving-security-for-the-healthcare-industry</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Recent data breaches across healthcare organisations highlight the urgency for robust cybersecurity measures.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In this blog post, we explore the challenges faced by the healthcare industry and how Infinity IT's comprehensive cybersecurity solutions are helping organisations protect their digital infrastructure.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Alarming Rise of Healthcare Cyberattacks:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Hacking incidents, particularly targeting network servers and emails, account for over 80% of attacks, posing significant threats to electronic health records (EHR) and personal health records (PHR).
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Understanding the Impact:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The implications of healthcare data breaches extend beyond compromised records. Cyberattacks can lead to severe consequences, affecting the efficiency of medical procedures, increasing mortality rates, and causing long-term financial and mental distress for patients. The evolving tactics of cybercriminals demand a proactive and resilient cybersecurity approach to ensure the safety of patient care.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Infinity IT and SonicWall have joined forces to address this challenge.
           &#xD;
      &lt;br/&gt;&#xD;
      
           For the past three decades, SonicWall has been at the forefront of cybersecurity, working closely with healthcare providers to enhance security, and operational efficiency, and reduce IT costs.
           &#xD;
      &lt;br/&gt;&#xD;
      
           Our Boundless Cybersecurity approach integrates security, central management, advanced analytics, and unified threat management across their entire security solutions portfolio, forming the robust Capture Cloud Platform.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Essential Cybersecurity Solutions for Healthcare Organisations:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           In the face of advancing threats and government-backed ransomware assaults, our cybersecurity solutions emerge as a vital lifeline. These solutions strengthen networks, secure IoT medical devices, and safeguard patient data. Our portfolio comprehensively addresses the intricate security requirements of the healthcare sector, providing a crucial defense against cyber threats.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           To Summarise:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Healthcare organisations must prioritise cybersecurity to ensure patient safety and the uninterrupted delivery of care.
           &#xD;
      &lt;br/&gt;&#xD;
      
           Our Cybersecurity approach and comprehensive solutions offer a strategic advantage, empowering healthcare providers to proactively defend against evolving threats and secure the future of healthcare delivery. As the healthcare industry navigates the challenges of an increasingly digital landscape, SonicWall stands as a trusted partner, dedicated to closing the cybersecurity gap for enterprises, governments, and SMBs worldwide.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Case Study:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            “The SMA device rapidly allowed our newly deployed workforce complete access to their internal applications. We now have physicians working from home without problem. We extended our physicians reading environment to their homes, and we’ve moved our scheduling department from in-house to at-home workers.”
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Michael Brown, IT Director, Women’s Center for Radiology
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Your
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           IT
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Upgrade Starts Here: Contact Us for a Complimentary Assessment
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/blog+big.png" length="3315436" type="image/png" />
      <pubDate>Thu, 01 Feb 2024 12:11:50 GMT</pubDate>
      <guid>https://www.infinityit.ie/lifesaving-security-for-the-healthcare-industry</guid>
      <g-custom:tags type="string">News,Blog</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/blog-ddb24dce.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/blog+big.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Community Credit Union</title>
      <link>https://www.infinityit.ie/community-credit-union</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Fantastic experience with Infinity IT for the on-boarding of their Managed IT Support Service!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Smooth and efficient on-boarding process! Credit to the team for their impeccable organisation and attention to detail.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           They made the transition seamless, ensuring no disruption to our daily operations.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Exceptional communication throughout the on-boarding journey.
           &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           The Infinity IT team was always responsive and kept us informed at every step.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We are thoroughly satisfied with the on-boarding experience and are confident that Infinity IT is the right partner for our Managed IT Support.
           &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Looking forward to a long and successful collaboration with a team that truly understands our IT needs.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Andrew Higgs, 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           CTO, Community Credit Union
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Your
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           IT
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Upgrade Starts Here: Contact Us for a Complimentary Assessment
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Community+small.png" length="4189398" type="image/png" />
      <pubDate>Mon, 29 Jan 2024 17:32:43 GMT</pubDate>
      <author>linda.barry@infinityit.ie (Linda Barry)</author>
      <guid>https://www.infinityit.ie/community-credit-union</guid>
      <g-custom:tags type="string">Testimonial</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/INFINITY+CLIENT+LOGOS6.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Community+small.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Byrne Wallace – Law Firm</title>
      <link>https://www.infinityit.ie/byrnewallace-llp-full-service-law-firm</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Here at Byrne Wallace, we have found that Infinity IT’s prompt response to any technical challenges we face has minimised disruptions and allowed us to focus on serving our clients and running the business effectively.
           &#xD;
      &lt;br/&gt;&#xD;
      
           This was highlighted when they worked with us during the Covid outbreak to ensure we could keep all our staff working safely from home from day one and to ensure we could keep on advising our clients without any disruption.
            &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Some of the IT team members had experience with Infinity IT in previous companies and quickly brought them in as part of a key IT provider. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What sets Infinity IT apart is not only your technical expertise but also your commitment to customer satisfaction. Your team takes the time to listen to our concerns and tailor solutions that align with our business goals.
           &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Over the years, Infinity IT has proven themselves with their proactive approach to security measures and has helped us stay ahead of potential threats, giving us confidence in the integrity of our data.
           &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In a fast-paced industry, your reliability and dedication to staying updated with the latest technological advancements have been invaluable. Byrne Wallace is proud to be associated with Infinity IT, and we look forward to continuing this partnership for years to come. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           John Kelly, 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Head of IT, Byrne Wallace. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Your
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           IT
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Upgrade Starts Here: Contact Us for a Complimentary Assessment
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/byrne+wallace+big.png" length="2916156" type="image/png" />
      <pubDate>Mon, 29 Jan 2024 17:18:01 GMT</pubDate>
      <author>linda.barry@infinityit.ie (Linda Barry)</author>
      <guid>https://www.infinityit.ie/byrnewallace-llp-full-service-law-firm</guid>
      <g-custom:tags type="string">Testimonial</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/INFINITY+CLIENT+LOGOS3.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/byrne+wallace+big.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Johnson Stevens</title>
      <link>https://www.infinityit.ie/johnson-stevens</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Johnson Stevens has been working with Infinity IT over the last 20 years and throughout this time they have supported us to grow and expand our business. One aspect that stands out prominently is the consistent effort your team puts into staying up-to-date with the latest industry trends and advancements.
            &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           This commitment to continuous learning is reflected in the innovative solutions they provide, keeping my business on the cutting edge of technology.
           &#xD;
      &lt;br/&gt;&#xD;
      
           It's this forward-thinking approach that reassures me that I've made the right choice by entrusting my IT needs to Infinity. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           I wholeheartedly recommend Infinity IT to any business seeking reliable, knowledgeable, and customer-centric IT services. 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Dermot O’Connor, 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Director – Johnson Stevens
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
             
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Your
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           IT
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Upgrade Starts Here: Contact Us for a Complimentary Assessment
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/JSI+big.png" length="5840513" type="image/png" />
      <pubDate>Mon, 29 Jan 2024 17:07:05 GMT</pubDate>
      <author>linda.barry@infinityit.ie (Linda Barry)</author>
      <guid>https://www.infinityit.ie/johnson-stevens</guid>
      <g-custom:tags type="string">Testimonial</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/INFINITY+CLIENT+LOGOS4.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/JSI+big.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Killarney Credit Union</title>
      <link>https://www.infinityit.ie/killarney-credit-union</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Killarney Credit Union recently decided to re-establish our relationship with Infinity IT as they have a unique focus on the needs of a dynamic Credit Union.
            &#xD;
      &lt;br/&gt;&#xD;
      
           From their Helpdesk staff to senior management, Infinity IT provides a bespoke service that has been built on years of experience in serving the Credit Union Sector.
            &#xD;
      &lt;br/&gt;&#xD;
      
           We have already completed several projects with Infinity IT. While implementing these they worked closely with other credit union vendors and this process has been very efficient from start to finish.
           &#xD;
      &lt;br/&gt;&#xD;
      
           We look forward to working with them in the coming years. 
            &#xD;
      &lt;br/&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Mark Murphy,
            &#xD;
      &lt;br/&gt;&#xD;
      
           CEO, Killarney Credit Union.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Your
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           IT
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Upgrade Starts Here: Contact Us for a Complimentary Assessment
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Michael+Killarney.png" length="1622627" type="image/png" />
      <pubDate>Mon, 29 Jan 2024 13:58:16 GMT</pubDate>
      <author>linda.barry@infinityit.ie (Linda Barry)</author>
      <guid>https://www.infinityit.ie/killarney-credit-union</guid>
      <g-custom:tags type="string">Testimonial</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/INFINITY+CLIENT+LOGOS.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Michael+Killarney.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Technology in Healthcare Leaders Summit 2024</title>
      <link>https://www.infinityit.ie/technology-in-healthcare-leaders-summit-2024</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Infinity IT is delighted to announce that we are attending the prestigious Technology in Healthcare Leaders' Summit on 22 February 2024 at Barberstown Castle, Co. Kildare.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Together with 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/in/ACoAAAOIbcMBCxwX4uLd37ojGRVxWonGGnvoGUw" target="_blank"&gt;&#xD;
      
           Daniel Carr
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            from 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/company/sonicwall/" target="_blank"&gt;&#xD;
      
           SonicWall
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , we are looking forward to discussing the latest advancements in Multilayered CyberSecurity, which protect Healthcare organisations.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We are a multi-award-winning MSSP provider and understand the unique challenges faced by the Healthcare industry.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Infinity IT AI-Powered Cyber Protection Platform provides real-time 360-degree visibility into your Network, allowing us to detect and respond to potential threats quickly and effectively.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Join us at the summit to explore how our innovations can elevate your organisation's security posture.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Let's secure the future of healthcare together!
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Big thanks to 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/company/investnetevents/" target="_blank"&gt;&#xD;
      
           Investnet 
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           and 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/company/future-health-summit/" target="_blank"&gt;&#xD;
      
           Future Health Summit 2024
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Your
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           IT
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Upgrade Starts Here: Contact Us for a Complimentary Assessment
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/TekHealthSummitlogo.png" length="758598" type="image/png" />
      <pubDate>Tue, 23 Jan 2024 12:42:42 GMT</pubDate>
      <author>linda.barry@infinityit.ie (Linda Barry)</author>
      <guid>https://www.infinityit.ie/technology-in-healthcare-leaders-summit-2024</guid>
      <g-custom:tags type="string">News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/TekHealthSummitlogo.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/TekHealthSummitlogo.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>A Guide to Physical Security in the Office</title>
      <link>https://www.infinityit.ie/a-guide-to-physical-security-in-the-office</link>
      <description>Loose Lips Sink Ships</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           It's easy to overlook the importance of physical security in the workplace. As the saying goes, "loose lips sink ships," and in the context of an office environment, this couldn't be truer. From casual conversations in public places to the threat of tailgating, and the risks associated with neglecting basic security measures like locking screens and protecting against shoulder surfing, this article explores the critical aspects of physical security that every office should prioritise.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Loose Lips Sink Ships: Guarding Against Internal Threats
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The phrase "loose lips sink ships" originated during World War II to emphasize the importance of not disclosing sensitive information. While we may not be at war, the principle holds true in the office setting. Employees should be mindful of what they discuss, especially when it comes to confidential or sensitive matters. Casual conversations in common areas can inadvertently expose sensitive information to unintended ears.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           To mitigate this risk, organisations should instil a culture of awareness. Regular training sessions on the importance of discretion and the potential consequences of sharing sensitive information can go a long way in fostering a security-conscious environment.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Public Spaces: Keeping Secrets Where They Belong
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Public places, such as coffee shops or restaurants near the office, might seem like harmless locations for a quick chat or a working lunch. However, discussing sensitive information in these areas can expose your organisation to the risk of eavesdropping.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Employees should be educated on the importance of choosing secure locations for discussions involving sensitive information. If confidential matters must be discussed outside the office, consider using private meeting rooms or taking precautions like speaking in hushed tones to minimise the risk of information leakage.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Tailgating: Beware of Uninvited Guests
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Tailgating, or piggybacking, occurs when an unauthorised person follows an employee into a secure area by closely trailing them through access-controlled doors. This can happen when an employee holds the door open for someone without proper identification, unintentionally compromising the security of the office.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           To prevent tailgating, employees should be trained to adhere strictly to access control policies. Implementing measures such as keycard access and ensuring that employees are attentive to who is entering the premises can significantly reduce the risk of unauthorised access.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Locking Screens: A Simple Step for Enhanced Security
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           One of the most basic yet often neglected aspects of physical security in the office is the habit of locking computer screens when not in use. Leaving screens unlocked can expose sensitive information to anyone passing by, making it an easy target for prying eyes.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Encourage employees to develop the habit of locking their screens whenever they step away from their desks. This simple action adds an extra layer of protection against unauthorised access and helps maintain the confidentiality of the information displayed on their computers.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Shoulder Surfing: Protecting Against Prying Eyes
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Shoulder surfing involves someone looking over your shoulder to gain unauthorised access to sensitive information, such as passwords or confidential documents. This low-tech but effective method of information theft can be mitigated through employee awareness and proper workstation setup.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In the modern workplace, flexibility often leads employees to work remotely, whether it's at the airport, a coffee shop, or any other public space. While this provides a convenient way to stay productive, it also introduces additional challenges when it comes to physical security, particularly in the context of shoulder surfing.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Employees should be advised to position their computer screens in a way that minimises visibility from neighbouring desks. Additionally, the use of privacy screens can further deter shoulder surfing attempts, ensuring that sensitive information remains confidential.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Conclusion:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           While digital security measures are crucial, physical security in the office should not be overlooked. By fostering a culture of awareness and implementing simple yet effective measures, organisations can significantly reduce the risk of internal threats and unauthorised access. Remember, in the world of office security, an ounce of prevention is worth a pound of cure.
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Your
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           IT
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Upgrade Starts Here: Contact Us for a Complimentary Assessment
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Blog+big.png" length="4072461" type="image/png" />
      <pubDate>Wed, 22 Nov 2023 12:49:17 GMT</pubDate>
      <guid>https://www.infinityit.ie/a-guide-to-physical-security-in-the-office</guid>
      <g-custom:tags type="string">Blog</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Blog+big.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Blog+big.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Enhancing Password Security and Authentication Practices</title>
      <link>https://www.infinityit.ie/enhancing-password-security-and-authentication-practices</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Enhancing Password Security and Authentication Practices
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Authentication, as defined by the National Institute of Standards and Technology (NIST, 2023), is the process of verifying the identity of a user, process, or device, typically required before granting access to information system resources. Traditionally, this has been accomplished through one-factor authentication—something you know, such as a password or PIN. However, the evolving threat landscape has led to the adoption of multifactor authentication, which combines two or more authentication factors, enhancing security significantly.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Multifactor Authentication: Strengthening Identity Verification
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Multifactor authentication typically involves combining something you know (like a password) with something you have (like a mobile token or key) or something you are (such as facial recognition or fingerprints). For instance, a common multifactor approach is combining a password (something you know) with a one-time PIN sent to your mobile phone (something you have). While multifactor authentication provides heightened security, it's essential to understand that it may impact system availability.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Password Policy: A Critical Element
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Password policy plays a vital role in access administration. It sets the rules for password parameters, including length, complexity, age, and reuse. Recent Microsoft research highlights the importance of well-designed password policies, as overly frequent password changes can lead to predictability, with users selecting easily guessable passwords. Effective password policies and user training are essential to ensure that users grasp the responsibility they bear for safeguarding their passwords.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Learning from Real-World Incidents
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Recent headlines, such as the Colonial Pipeline attack by the Darkside hacker group, underscore the significance of password and security policies. In this case, an employee's use of their company username and password on a compromised external site led to the breach, emphasising the need for robust security controls like two-factor authentication (2FA). This incident serves as a stark reminder of the potential consequences of lax password practices.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Role of Encryption
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Beyond password security, the way passwords and sensitive data are stored is crucial. Storing passwords in plain text or without encryption poses significant confidentiality and integrity risks if compromised. Encryption, the process of converting human-readable text into incomprehensible ciphertext, plays a pivotal role in modern IT systems. Various encryption techniques, including Secure Socket Layer (SSL) for web traffic and Advanced Encryption Standard (AES) for files, serve different purposes, utilising symmetric or asymmetric encryption methods as needed.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Harnessing the Power of Hashing
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Hashing, though distinct from encryption due to the absence of a key and its non-reversible nature, is a valuable tool for document verification, digital signatures, and ensuring data integrity (NIST, 2022). Hash functions calculate a unique output, known as a hash digest, for input data of any size, making it a fundamental component of modern security practices.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In conclusion, adopting multifactor authentication, implementing robust password policies, learning from real-world security incidents, and ensuring data encryption and hashing are fundamental steps toward enhancing your organisation's security posture in an ever-evolving digital landscape. Stay vigilant and informed to protect your digital assets effectively.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Author: Shane Casey
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Your
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           IT
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Upgrade Starts Here: Contact Us for a Complimentary Assessment
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Blog+Big+image.png" length="1892900" type="image/png" />
      <pubDate>Thu, 16 Nov 2023 11:53:58 GMT</pubDate>
      <guid>https://www.infinityit.ie/enhancing-password-security-and-authentication-practices</guid>
      <g-custom:tags type="string">Blog</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Blog+Big+image.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Blog+Big+image.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Understanding DPI SSL: Protecting Your Network from Encrypted Threats</title>
      <link>https://www.infinityit.ie/understanding-dpi-ssl-protecting-your-network-from-encrypted-threats</link>
      <description>DPI SSL is a technology used to inspect and secure encrypted internet traffic. DPI SSL traffic is intercepted by the firewall and decrypted. Once the traffic is decrypted, the firewall can apply various security and content filtering policies to the traffic, including Content Filtering, Intrusion Prevention, Antivirus Scanning and Application Control. Neglecting DPI SSL can leave your network vulnerable to hidden dangers, compliance violations, and productivity issues.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Why do you need to observe encrypted traffic?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In today's interconnected digital world, securing your network has become more critical than ever. With the increasing amount of sensitive information transmitted online, it's essential to have robust security measures in place. One such measure is DPI SSL (Deep Packet Inspection of Secure Socket Layer). In this article, we'll break down what DPI SSL is, how it safeguards your network, and the risks of not using it.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What is DPI SSL?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            DPI SSL is a technology used to inspect and secure encrypted internet traffic. When you visit a secure website (those starting with
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://" target="_blank"&gt;&#xD;
      
           https://
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           ) or use any other secure service or application with SSL/TLS, your data is encrypted to protect it from eavesdroppers. While encryption is essential for your privacy, it can also be used by malicious actors to hide their activities.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           DPI SSL is like an X-ray machine for your network traffic. It decrypts and examines the data passing through your network in real-time, even if it's encrypted. This process allows your Firewall to identify potential threats, malware, and other suspicious activities that might otherwise go unnoticed.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           How Does DPI SSL Protect Your Network?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           1.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Traffic Intercept:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            When a user on the network initiates an SSL/TLS encrypted connection (e.g., HTTPS), the traffic is intercepted by the firewall or security appliance. This means that instead of the encrypted traffic flowing directly from the client to the server, it passes through the firewall device.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            2.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           SSL Decryption:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            The intercepted encrypted traffic is decrypted by the firewall appliance using a SSL/TLS certificate that is issued by the firewall itself. This certificate acts as a middleman, allowing the firewall to decrypt and inspect the traffic without the end user or the server being aware of it.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           3.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Traffic Inspection:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Once the traffic is decrypted, the firewall can apply various security and content filtering policies to the traffic.
           &#xD;
      &lt;br/&gt;&#xD;
      
            This includes:
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Content Filtering:
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             firewall can inspect the decrypted traffic for specific keywords, patterns, or known malware signatures. If it detects any malicious content or policy violations, it can take appropriate actions like blocking or logging the traffic.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Intrusion Prevention:
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             The firewall can apply intrusion prevention techniques to the decrypted traffic, identifying and blocking any potential threats or attacks.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Antivirus Scanning:
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             The decrypted traffic can also be scanned for viruses and other malware. If any malicious files or attachments are detected, they can be quarantined or blocked.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Application Control:
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Firewall can identify the specific applications or services being used within the encrypted connection. This allows administrators to control access to specific applications or services based on policies.
            &#xD;
        &lt;br/&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            4.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Re-Encryption:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            After the traffic has been inspected and any necessary actions have been taken, the firewall re-encrypts the traffic before sending it to its intended destination. It uses the original server's SSL/TLS certificate to do this, so the end server receives the traffic as if it had been encrypted from the client.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           5.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Delivery to Destination:
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Finally, the re-encrypted traffic is sent to the destination server, and the server responds in the usual way. The entire process is transparent to both the client and the server, as they are unaware that their communication was intercepted and decrypted by the firewall.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Risks of Not Using DPI SSL
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Now that we've covered how DPI SSL protects your network, let's explore the risks associated with not using it:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ol&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Hidden Threats:
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Without DPI SSL, encrypted threats can pass through your network undetected. Malicious software, phishing attempts, and other cyberattacks can go unnoticed, leading to data breaches and significant damage.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Data Leakage:
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Sensitive information, such as customer data or financial records, may be exposed if not properly inspected. This can result in legal and financial consequences.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Compliance Violations:
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Failing to inspect encrypted traffic can lead to non-compliance with industry regulations and legal requirements. This can result in hefty fines and reputational damage.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Loss of Control:
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Without DPI SSL, you lose control over what enters and exits your network. This lack of visibility can make it challenging to manage and secure your network effectively.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Productivity Issues:
           &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
             Inappropriate or non-work-related content can impact employee productivity and lead to bandwidth congestion. DPI SSL helps you filter out such content.
            &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ol&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           DPI-SSL is an essential feature for ensuring the security of encrypted traffic within a network.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           However, it's important to configure and manage it properly.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Neglecting DPI SSL can leave your network vulnerable to hidden dangers, compliance violations, and productivity issues.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           To protect your digital assets and maintain a safe and efficient network, consider implementing DPI SSL as part of your cybersecurity strategy.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Author: Alan Kluba
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Your
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           IT
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Upgrade Starts Here: Contact Us for a Complimentary Assessment
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/DPI+SSL+blog.png" length="5327697" type="image/png" />
      <pubDate>Wed, 04 Oct 2023 10:40:56 GMT</pubDate>
      <guid>https://www.infinityit.ie/understanding-dpi-ssl-protecting-your-network-from-encrypted-threats</guid>
      <g-custom:tags type="string">Blog</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/DPI+SSL+blog.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/DPI+SSL+blog.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Ensuring Your Servers Never Go Down: The Power of High Availability</title>
      <link>https://www.infinityit.ie/ensuring-your-servers-never-go-down-the-power-of-high-availability</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           High Availability
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           What is it? What does it do for my business?
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           We are all familiar with the term “High Availability”.
           
                      &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
                      
           Most InfinityIT sites implement HA Firewall solution to mitigate against a Firewall failure. Why?
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Because Internet and inter-site connectivity is very important, and we all want to minimise the possibility of downtime – right?
           
                      &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
                      
           But what happens if your server fails? What safeguards have you in place to ensure an effective business continuity plan?
           
                      &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
                      
           Remember that server fault which we spent 1 hour troubleshooting?
           
                      &#xD;
      &lt;br/&gt;&#xD;
      
                      
           Well, now it requires a replacement part which will take at least 4-5 hours to arrive and could take the engineer another 1 – 2 hours to fit it.
           
                      &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
                      
           If you are lucky the part will fix the issue and you’ll be able to open as normal tomorrow. But what about your “business image”, what about the inconvenience to your customers?
           
                      &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
                      
           Your data is probably the most important asset you own, without it you cannot function. That is why we take backups locally to NAS, and offsite to Cloud. It’s the reason we have AntiVirus, Firewalls, and Servers, It's why we do Pen Tests and DR Tests, It's why you hire people like us, It is all done to ensure your data is safe, secure, and readily accessible, but only to those that should have access to it!
           
                      &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
                      
           A huge portion of your business data is held on your servers, So if your only server fails then you are effectively shut down until your IT people can get you up and running.
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           High Availability Servers 
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;br/&gt;&#xD;
        
                        
            At any point in time, your Data exists on both servers. Your VM's can be moved to the 2nd host in seconds with no downtime. If 1 server fails, VM's can be booted up on another host with little or no downtime and more importantly, no data loss. 
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a href="/"&gt;&#xD;
    &lt;img src="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/image1.png" alt="High Availability Server"/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            ﻿
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Imagine the following scenario
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/I+Can-t+Access+My+Servers%21.png" alt="A man in a suit and tie is standing in front of a speech bubble that says i can 't access my servers"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Single Server failure
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Typical downtime – up to one day
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            All Systems are down resulting in you having to close your doors.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Cons:
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Possibility of 4-5hrs before replacement part can be onsite, Depending on the nature of the fault there may be data loss, and backup restores may be required further adding to downtime. If a single server goes down due to hardware failure, your business will most likely be closed for a full day.
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Point in time replication (Veeam)
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/image4.jpg" alt="A red x is crossed out next to two hard drives"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Typical downtime 2-4 hours
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Replications are taken at regular intervals, i.e VM’s on server 1 are copied to server 2. At all times you have VM’s ready to boot up.
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Pros:
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
                      
           You have a working system “ready to go” on the 2nd host, albeit the data can be up to 1 hr old
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Cons:
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           1.
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Data on the 2 servers will be inconsistent, it can take considerable time and effort to bring Server 2 up to date before going live.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           2.
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            You potentially have 1 idle server (at least until 1 fails)
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           3.
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Hypervisor and Firmware updates will require downtime
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Server Cluster / vSAN
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/image5.jpg" alt="An x is crossed out in front of two hard drives"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Typical downtime 3 – 4 mins
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           ,
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           If host 1 fails all the VM’s on it will begin booting up on host 2 automatically.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Pros:
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           1.
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            No data loss,
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           2.
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Server 1 can be repaired and brought back into production with no further downtime.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           3.
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Server 2 can be fully utilized as a second server and VM’s moved between both hosts as required
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           4.
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Patching and firmware updates can be done to hypervisors and hardware with no downtime of services
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Cons:
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Storage requirement are doubled, both hosts need to have enough storage for all the VM’s on each host 
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           What sets our solution above others
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           1.
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Some HA solutions require a 3rd node, adding to the cost of hardware, Ours requires only 2.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           2.
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            We don’t require specially certified hardware If your hardware can run VMWare, Microsoft, Oracle or Redhat Hypervisors, we can use our solution to give you HA. We can even run it on an Azure stack.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           3.
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            We can usually provide HA at a fraction of the cost of the proprietary vendor such as VMWare
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           4.
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Our Solution is backed by a 24/7 NOC, we don’t just monitor outages, we monitor and get alerts on things like storage latency and re-sync issues on the cluster.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           5.
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            As a testament to the robust and cost-effective nature of the solution We have implemented it across over one third of our financial customers in the last 2.5 years.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Questions and Answers
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Q. We have Disaster Recovery in the Cloud, We test it every year and never have an issue during testing, Why do I need a solution like this?
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            A.
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           DR tests are generally done in a very controlled manner, In reality, they rarely replicate the “unknown” of a real disaster. For example, Cloud backups are not real time. After we boot up the VMs in the cloud, You still need to figure out what data you have versus what data you need before you can open the doors, There will be data to be re-entered, this might involve the help of 3rd parties. DR is not intended to be a quick fix to any business outage, there are a huge number of things to consider before, during, and after you decide to move your production to the cloud in a DR situation. In fact, your DR solution should only be considered as a last resort option. Remember once your server is fixed everything now working in the cloud needs to be copied back to your server, this means further downtime.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Q. Aren't hardware failures very rare?
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           A.
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Yes, but that doesn’t mean they won't happen..
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            In the past few years, there has been a huge focus on security which often means applying patches and firmware updates that may not have been done on a
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           regular basis before. Applying updates in particular firmware updates, is a risk.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           If firmware updates fail often the only solution is to replace the part, That could mean a day's downtime.
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Can you deal with the negative publicity of having to close your doors due to technical difficulties?
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Have you the resources and procedures in place to recover from 15 minutes to 1 hour data loss?
           
                      &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Author: Jason Keane
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Your
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           IT
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Upgrade Starts Here: Contact Us for a Complimentary Assessment
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Blog+image.png" length="1924446" type="image/png" />
      <pubDate>Tue, 19 Sep 2023 11:11:26 GMT</pubDate>
      <guid>https://www.infinityit.ie/ensuring-your-servers-never-go-down-the-power-of-high-availability</guid>
      <g-custom:tags type="string">Blog</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Blog+image.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Blog+image.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Windows Server 2012 - End Of life: 10th October 2023</title>
      <link>https://www.infinityit.ie/windows-server-2012-end-of-life-10th-october-2023</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What do You need to Know?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Keeping your systems up to date is not just a good practice; it's often crucial for security, performance, and compliance reasons. One significant event that highlights this necessity is the End of Life (EOL) of Windows Server 2012. In this article, we'll explore what Windows Server 2012 EOL means, the risks of not migrating to a newer version, and how to plan a successful migration.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           When is Windows Server 2012 End of Life?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Windows Server 2012, initially released in September 2012, has served organisations well for nearly a decade. However, all good things must come to an end, and Windows Server 2012 will reach its official end of life on October 10, 2023. This EOL date signifies that Microsoft will no longer provide updates, security patches, or support for this operating system.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Risks of Not Migrating
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Continuing to run Windows Server 2012 after its EOL comes with significant risks and challenges:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           1. Security Vulnerabilities:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           One of the most critical concerns is the increased susceptibility to security threats. Without regular updates and patches, your server becomes an attractive target for cyberattacks, putting your organisation's data and operations at risk.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           2. Compliance Issues:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Many industries have regulatory requirements that mandate running supported operating systems. Staying on an unsupported platform can lead to non-compliance, which could result in fines and legal consequences.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           3. Limited Performance and Compatibility:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As technology advances, software and hardware vendors focus their efforts on compatibility with newer operating systems. Staying on Windows Server 2012 may limit your ability to run modern applications and take advantage of improved performance and features.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           4. Lack of Support:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Without Microsoft's support, you won't have access to technical assistance when facing issues or outages, potentially leading to longer downtime and increased costs for troubleshooting.
            &#xD;
        &lt;br/&gt;&#xD;
        
             
             &#xD;
        &lt;br/&gt;&#xD;
        
             
            &#xD;
        &lt;br/&gt;&#xD;
        
             
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           How to Plan Your Migration
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Migrating from Windows Server 2012 to a newer version is a complex process that requires careful planning and execution. Here's a step-by-step guide to help you navigate the migration process successfully:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           1. Assessment and Inventory:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Start by taking an inventory of all your servers running Windows Server 2012. Identify the roles and applications they support, as well as any dependencies.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           2. Choose the Target Version:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Decide which version of Windows Server you'll migrate to. Options include Windows Server 2019, Windows Server 2022, or the latest version available at the time of migration.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           3. Backup and Disaster Recovery Plan:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Before making any changes, ensure you have robust backup and disaster recovery procedures in place. This will help safeguard your data during the migration process.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           4. Application Compatibility:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Assess the compatibility of your applications and services with the target version of Windows Server. You may need to update or replace certain applications to ensure a smooth transition.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           5. Create a Migration Plan:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Develop a comprehensive migration plan that outlines timelines, responsibilities, and key milestones. Ensure all stakeholders are aware of the plan and their roles in the migration process.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           6. Migration Execution:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Begin the migration process following your established plan. This may involve in-place upgrades, hardware replacements, or clean installations, depending on your specific scenario.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           7. Testing and Validation:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           After migration, thoroughly test and validate all systems and applications to ensure they function correctly in the new environment.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           8. Training and Documentation:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Provide training to your IT staff on the new environment and document the changes and configurations for future reference.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           9. Monitor and Maintain:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Continuously monitor the performance and security of your new Windows Server environment. Implement regular maintenance and updates to keep it secure and efficient.
           &#xD;
      &lt;br/&gt;&#xD;
      
            
           &#xD;
      &lt;br/&gt;&#xD;
      
            
            &#xD;
      &lt;br/&gt;&#xD;
      
            
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Conclusion:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Windows Server 2012 End of Life presents both challenges and opportunities. While it marks the end of official support, it also provides a chance to modernise your infrastructure, enhance security, and improve overall efficiency. By carefully planning your migration, you can ensure a seamless transition to a supported and secure Windows Server version, helping your organisation thrive in today's dynamic IT landscape.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Your
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           IT
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Upgrade Starts Here: Contact Us for a Complimentary Assessment
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Blog+2.png" length="152215" type="image/png" />
      <pubDate>Mon, 11 Sep 2023 10:11:25 GMT</pubDate>
      <guid>https://www.infinityit.ie/windows-server-2012-end-of-life-10th-october-2023</guid>
      <g-custom:tags type="string">Blog</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Blog+10+October+2012.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Blog+2.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Blue Screen of Death (BSOD)</title>
      <link>https://www.infinityit.ie/why-monitoring-for-the-blue-screen-of-death-bsod-is-crucial-for-windows-devices</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Why Monitoring for the Blue Screen of Death (BSOD) is Crucial for Windows Devices
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Introduction
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The infamous Blue Screen of Death (BSOD) has been the bane of Windows users for decades. It's that dreaded moment when your computer crashes, leaving you with an intimidating blue screen filled with error codes and cryptic messages. But what if we told you that monitoring for BSODs can be a game-changer for your Windows devices? In this blog post, we'll delve into why monitoring for BSOD is crucial and how it can benefit you.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Identifying the issue
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           BSODs are notorious for striking unexpectedly, disrupting your work, and leaving you in a state of frustration. However, these crashes are not just random events; they often signify underlying issues with your hardware or software. By implementing BSOD monitoring, you can gain valuable insights into the root cause of these problems.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Is it a faulty hardware component like a malfunctioning RAM module, disk, problematic graphics card, or outdated drivers? Alternatively, is it a software issue, such as a corrupted system file or a poorly coded application that's causing conflicts? Monitoring for BSOD helps you pinpoint the culprit, allowing you to take the necessary steps to rectify the issue.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           This proactive approach can prevent future BSODs from occurring, significantly improving the overall stability of your system, and minimising disruption to the user.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Safeguarding Your Data
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           One of the most concerning aspects of a BSOD is the potential for data loss. When your system crashes during a critical operation, such as writing data to the hard drive, it can lead to corrupted files and lost work. However, BSOD monitoring can act as a guardian angel for your data.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           By identifying potential issues before they escalate into catastrophic failures, you can take prompt action to safeguard your data. Monitoring provides an opportunity to minimise data loss and keep your important files intact.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cost and Time Efficiency
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Dealing with BSODs can be a time-consuming and costly affair. Imagine the hours lost troubleshooting, the potential need to seek professional help, or even replacing damaged hardware components. It's a headache that no one wants to endure.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           However, by implementing BSOD monitoring, you can catch potential issues early in their development cycle. This means you can address them before they evolve into major problems that require extensive time and financial investments. In essence, BSOD monitoring is an insurance policy for your Windows devices, saving you both time and money in the long run.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Boosting System Performance
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           BSODs are not just a source of frustration; they can also be indicative of issues that hamper your system's performance. Factors like driver conflicts, memory leaks, or other software-related problems can contribute to these crashes. But here's the silver lining – BSOD monitoring can help optimise your system's performance.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           By identifying and addressing these underlying issues, you can achieve faster boot times, smoother application performance, and an overall better user experience. Your Windows device will run like a well-oiled machine, and you'll enjoy improved productivity and reduced downtime.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Conclusion
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           BSOD monitoring is not just a precautionary measure; it's a proactive strategy to ensure the reliability and longevity of your Windows devices. By identifying and addressing issues before they escalate, you can enjoy a smoother and more productive computing experience while safeguarding your valuable data and resources. So, don't let the Blue Screen of Death catch you off guard – start monitoring today and reap the benefits of a more stable and efficient Windows environment.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you want to learn more, please contact us.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Your
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           IT
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Upgrade Starts Here: Contact Us for a Complimentary Assessment
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/blog.png" length="2537963" type="image/png" />
      <pubDate>Wed, 06 Sep 2023 15:39:04 GMT</pubDate>
      <guid>https://www.infinityit.ie/why-monitoring-for-the-blue-screen-of-death-bsod-is-crucial-for-windows-devices</guid>
      <g-custom:tags type="string">Blog</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/blog.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/blog.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Assessing The Threat Landscape</title>
      <link>https://www.infinityit.ie/copy-of-the-triple-defence-against-email-impersonation-spf-dkim-and-dmarc</link>
      <description>This Threat Landscape post underscores the importance of a proactive approach to security, emphasizing the need for asset understanding, threat awareness, and effective controls in today's ever-evolving security landscape. Stay informed and take action to protect your organization from emerging threats and vulnerabilities.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Evaluating the Security Environment
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Assessing the Threat Landscape: Safeguarding Your Organization
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In today's digital age, protecting your organization from potential threats is more crucial than ever. When navigating the intricate world of cybersecurity, several key factors must be carefully considered. In this blog post, we'll delve into these critical aspects to help you fortify your defences.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           1. Identifying Your Assets
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The first step in building a robust cybersecurity strategy is gaining a comprehensive understanding of your assets. These assets go beyond just your IT infrastructure; they encompass your system, network, data, physical machines, and may extend to facilities, personnel, and even intangibles like your reputation. As the European Union Agency for Cybersecurity (ENISA) emphasizes, "A proper mitigation strategy starts from the knowledge of the assets that can be the target of an attack, as well as a proper risk assessment is at the basis of a proper data security posture."
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           2. Recognizing Emerging Threats
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The threat landscape is constantly evolving, making it imperative for organizations to stay informed about new threats, attack methods, and trends. Recent years have witnessed the rise of geopolitical conflicts and hacktivism alongside perennial challenges like ransomware, malware, and social engineering attacks. Notably, the threat actors themselves have evolved, with state-sponsored hackers and well-resourced hackers-for-hire becoming increasingly prominent. Their motivations vary, but financial gain often takes centre stage, although disruptions and data exfiltration remain their primary goals in some cases.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           3. Zero-Day Vulnerabilities: A Growing Concern
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Vulnerabilities within IT systems can be either inherent or a result of misconfigurations. When these vulnerabilities are exposed, and no fix or patch has been released, they are termed "Zero-Day Vulnerabilities." As noted by Trend Micro Security Predictions for 2022, witnessed a significant surge in such vulnerabilities, with predictions hinting at an even larger number in 2023. Threat actors eagerly pounce on these vulnerabilities to exploit them for their own gain.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           4. Implementing Controls and Countermeasures
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           To safeguard against vulnerabilities and mitigate risks, organizations must employ a range of controls and countermeasures. One effective technical control involves promptly applying patches as they become available to thwart potential attackers from exploiting vulnerable systems. However, controls can also take the form of policies and procedures, such as access restrictions and regular cybersecurity training for staff. Cultivating a cybersecurity-conscious culture within the organization is key to enhancing overall security.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           5. Partnering with Infinity IT
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If this discussion on cybersecurity raises questions or concerns for you or your organization, remember that you don't have to navigate this complex landscape alone. Infinity IT is here to assist you in assessing your Threat Landscape comprehensively. Our expertise and commitment to cybersecurity can help you build robust defences and protect your organization from evolving threats.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Don't hesitate to reach out to us for a tailored assessment and proactive solutions to safeguard your digital assets and secure your future. Your organization's cybersecurity is our priority.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Your
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           IT
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Upgrade Starts Here: Contact Us for a Complimentary Assessment
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/image012.png" length="2602939" type="image/png" />
      <pubDate>Wed, 30 Aug 2023 16:30:17 GMT</pubDate>
      <guid>https://www.infinityit.ie/copy-of-the-triple-defence-against-email-impersonation-spf-dkim-and-dmarc</guid>
      <g-custom:tags type="string">Blog</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/image012.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/image012.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>The Triple Defence Against Email Impersonation</title>
      <link>https://www.infinityit.ie/the-triple-defence-against-email-impersonation-spf-dkim-and-dmarc</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           All you need to know about: SPF, DKIM, and DMARC
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In today's digital age, where cyber threats are increasingly sophisticated, protecting sensitive information and maintaining online security has become paramount. Among the many tactics employed by cybercriminals, email impersonation remains a prevalent concern for individuals and businesses alike. To combat this threat, three essential email authentication protocols have emerged: SPF, DKIM, and DMARC. In this article, we'll break down what these acronyms mean and why their combined use is crucial for safeguarding against email impersonation.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What is SPF?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           SPF (Sender Policy Framework) is an email authentication technique that helps prevent unauthorised senders from using a domain's identity to send fraudulent emails. Think of it like a digital bouncer at a club's entrance, checking the guest list to ensure only legitimate partygoers are allowed in. SPF works by creating a record in the domain's DNS (Domain Name System) settings, listing authorised email servers that are allowed to send emails on behalf of that domain. When an email is received, the recipient's server can cross-reference the sender's IP address with the SPF record to verify if it's genuine.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What is DKIM?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           DKIM (DomainKeys Identified Mail) is another layer of email authentication that adds a digital signature to each outgoing email from a domain. This signature is generated using a private key held by the sending server and can be verified by the recipient's server using the corresponding public key stored in the domain's DNS. It's like sealing an envelope with a unique wax stamp. When the recipient's server receives an email, it can check the DKIM signature to ensure the message hasn't been tampered with and genuinely comes from the claimed sender.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           What is DMARC?
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           DMARC (Domain-based Message Authentication, Reporting, and Conformance) is the glue that binds SPF and DKIM together to provide a comprehensive email authentication solution. DMARC enables domain owners to specify how their emails should be handled if they fail SPF or DKIM checks. They can set policies to either quarantine or reject failed emails. Additionally, DMARC provides valuable reporting mechanisms that allow domain owners to monitor email authentication activity, identify sources of abuse, and refine their authentication policies.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Why SPF and DKIM Alone Aren't Enough
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           While SPF and DKIM individually provide a solid foundation for email authentication, they each have limitations that cybercriminals can exploit. SPF doesn't cover the entire email journey, as it only checks the "MAIL FROM" domain against the sending IP address. It doesn't validate the content of the email or the "FROM" address that recipients see. Similarly, DKIM can fail to protect against phishing attacks if the private key is compromised, and it doesn't prevent someone from sending an email on behalf of the domain without signing it.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Power of Combined Protection
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The real magic happens when SPF, DKIM, and DMARC work together in harmony. By combining these three protocols, businesses can significantly reduce the risk of email impersonation and phishing attacks. DMARC acts as the coordinator, enforcing policies based on SPF and DKIM results. If an email doesn't pass either authentication method, DMARC can instruct the receiving server to take appropriate action, such as moving the email to a spam folder or outright rejecting it. This layered approach ensures a comprehensive defence against malicious actors seeking to exploit email vulnerabilities.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In Conclusion
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           DMARC helps protect both your business and your clients. It stops fake emails from reaching your clients' inboxes and pretending to be from you. This way, your clients can trust that the emails they get from your business are actually from you and not from someone trying to trick them.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In a nutshell, DMARC is like a bouncer for your emails, making sure that only the legitimate ones get inside your clients' inboxes, while keeping the fakes out. This helps maintain trust and security for your business and your client
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           If you want to learn more please contact us.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Your
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           IT
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Upgrade Starts Here: Contact Us for a Complimentary Assessment
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/image006.png" length="2177136" type="image/png" />
      <pubDate>Wed, 30 Aug 2023 16:23:57 GMT</pubDate>
      <guid>https://www.infinityit.ie/the-triple-defence-against-email-impersonation-spf-dkim-and-dmarc</guid>
      <g-custom:tags type="string">Blog</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/image006.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/image006.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>SonicWall recognises Infinity IT for outstanding achievement in Cybersecurity</title>
      <link>https://www.infinityit.ie/sonicwall-recognises-infinity-it-for-outstanding-achievement-in-cybersecurity</link>
      <description>Infinity IT have been awarded the 2023 Sonicwall Managed Security Services Provider Award. this is the second year Infinity IT have been selected for this achievement.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;a href="https://www.linkedin.com/company/sonicwall/" target="_blank"&gt;&#xD;
      
           SonicWall
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            recognises 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/company/infinity-it/" target="_blank"&gt;&#xD;
      
           Infinity IT
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            for outstanding achievement in Cybersecurity.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Infinity IT is delighted to announce that, for the second year in a row, it has been recognised by Sonicwall for its continued excellence in protecting customers in a challenging cyber threat landscape by earning the 2023 Sonicwall Managed Security Services Provider Award. The award honours Infinity IT for having gone above and beyond delivering cybersecurity solutions to their customers.
           &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
            “We are delighted to acknowledge our SonicWall SecureFirst partners who consistently deliver first-class security services to organisations of all sizes. We are extremely grateful and humbled by our global network of over 17,000 partners and distributors, and these awards recognize their outstanding work” said SonicWall CEO and President Bob VanKirk.
           &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           At Infinity IT we put your protection at the heart of everything we do as we design, develop and maintain the appropriate cyber security solutions for your business.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/IMG_7048.jpg" length="442879" type="image/jpeg" />
      <pubDate>Tue, 25 Apr 2023 16:04:54 GMT</pubDate>
      <author>linda.barry@infinityit.ie (Linda Barry)</author>
      <guid>https://www.infinityit.ie/sonicwall-recognises-infinity-it-for-outstanding-achievement-in-cybersecurity</guid>
      <g-custom:tags type="string">News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/IMG_7048.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/IMG_7048.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>CUMA - Infinity Prize Winner - Tracey Thunder from Lucan CU</title>
      <link>https://www.infinityit.ie/cuma-infinity-prize-winner-tracey-thunder-from-lucan-cu</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           CUMA 2023 - InfinityIT Prize Winner - Tracey Thunder from Lucan CU
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Congratulations to Tracey Thunder Lucan Credit Union winner of the Samsung Tablet @ 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/company/cuma-credit-union-managers-association/" target="_blank"&gt;&#xD;
      
           CUMA Credit Union Managers Association
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            Spring Conference 2023
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/TraceyThunder.jpg" length="145145" type="image/jpeg" />
      <pubDate>Thu, 13 Apr 2023 10:08:45 GMT</pubDate>
      <author>linda.barry@infinityit.ie (Linda Barry)</author>
      <guid>https://www.infinityit.ie/cuma-infinity-prize-winner-tracey-thunder-from-lucan-cu</guid>
      <g-custom:tags type="string">News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/TraceyThunder.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/TraceyThunder.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>CUMA Conference 2023</title>
      <link>https://www.infinityit.ie/cuma-conference-2023</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           CUMA Conference 2023
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Great to see so many familiar faces at the 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/company/cuma-credit-union-managers-association/" target="_blank"&gt;&#xD;
      
           CUMA Credit Union Managers Association
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            conference!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Come to see us at Stand 54 and enter our draw to win Samsung Tablet!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/6+-+Copy.png" length="3022198" type="image/png" />
      <pubDate>Wed, 29 Mar 2023 11:47:42 GMT</pubDate>
      <author>linda.barry@infinityit.ie (Linda Barry)</author>
      <guid>https://www.infinityit.ie/cuma-conference-2023</guid>
      <g-custom:tags type="string">News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/6.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/6+-+Copy.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Irish Independent: InfinityIT Article</title>
      <link>https://www.infinityit.ie/irish-independent-infinityit-article</link>
      <description>Infinity IT is delighted to have been featured today in the Cyber Security and Business Resilience supplement of the Irish Independent.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Irish Independent - InfinityIT Article
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Exciting news! 
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.linkedin.com/company/infinity-it/" target="_blank"&gt;&#xD;
      
           Infinity IT
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            is delighted to have been featured today in the Cyber Security and Business Resilience supplement of the 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/company/irish-independent/" target="_blank"&gt;&#xD;
      
           Irish Independent
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           .
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We are proud to share this recognition of our expertise in the field of cybersecurity and our commitment to helping businesses stay protected in the face of ever-evolving threats.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We would like to invite everyone to read the full article on:
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;a href="https://lnkd.in/ehpiYKjw" target="_blank"&gt;&#xD;
      
           https://lnkd.in/ehpiYKjw
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;span&gt;&#xD;
      
           InfinityIT’s dedication to cybersecurity has been recognised again by being awarded the 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/company/sonicwall/" target="_blank"&gt;&#xD;
      
           SonicWall
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            Managed Security Service Provider for the second year in a row in 2023.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We believe that cybersecurity is everyone's responsibility, and we are dedicated to helping our clients navigate the complex and constantly changing landscape of cyber threats.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Whether you are a small business owner or a large enterprise, we are here to provide you with the customised solutions you need to protect your sensitive information, networks, and systems.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Contact us today to learn more about how we can help you stay secure and resilient in the digital age.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/linda.jpg" length="175542" type="image/jpeg" />
      <pubDate>Fri, 24 Mar 2023 12:13:59 GMT</pubDate>
      <author>linda.barry@infinityit.ie (Linda Barry)</author>
      <guid>https://www.infinityit.ie/irish-independent-infinityit-article</guid>
      <g-custom:tags type="string">News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/linda.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Alan1.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Bantry Credit Union</title>
      <link>https://www.infinityit.ie/bantry-credit-union</link>
      <description>A business relationship that can survive and thrive for 35 years in the rapidly changing world of Credit Unions and IT capability must be based on a few sound foundation blocks. And ours is: trust, reliability, technical expertise, decades of experience and excellent service delivery.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;a href="https://www.linkedin.com/company/st--dominic-credit-union/" target="_blank"&gt;&#xD;
      
           Bantry Credit Union
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           “
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/company/bantry-credit-union/" target="_blank"&gt;&#xD;
      
           Bantry Credit Union
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            has been doing business with 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/company/infinity-it/" target="_blank"&gt;&#xD;
      
           Infinity IT
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            since 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/in/ACoAAAAQTaEBo5XpUNyTxvcERpyu7ctnLaL7SJ8" target="_blank"&gt;&#xD;
      
           John Murphy
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            and 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/in/ACoAAAN77uABJftK7dSpO8KrqwEQCRHv3c9uZJM" target="_blank"&gt;&#xD;
      
           Dan Kenny
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            set up the company 20 years ago. But Bantry CU was working with John for over 15 years before that. So John Murphy/Infinity IT have been our IT hardware and support service provider for over 35 years. 
           &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           A business relationship that can survive and thrive for 35 years in the rapidly changing world of Credit Unions and IT capability must be based on a few sound foundation blocks. And ours is: trust, reliability, technical expertise, decades of experience and excellent service delivery. 
           &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Whenever Bantry CU needs them, Infinity IT are there. That gives us tremendous peace of mind in an area that is so critical to our operations and yet potentially so fraught with difficulty. And since this is a once-in-20-years event, I want to mention and say a sincere thank you to the Infinity IT guys and gals that have helped us in Bantry so often over the past two decades. Thank you one and all!”
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.linkedin.com/in/ACoAAA7HCQEBIY5wQ7N5hHZ_HkIJWSBA50CXRJw" target="_blank"&gt;&#xD;
      
           Finbarr O'Shea
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Manager
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
      
           Bantry Credit Union
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/1657711707802.jpeg" length="42158" type="image/jpeg" />
      <pubDate>Thu, 27 Oct 2022 09:41:49 GMT</pubDate>
      <author>shane.casey@infinityit.ie (Shane Casey)</author>
      <guid>https://www.infinityit.ie/bantry-credit-union</guid>
      <g-custom:tags type="string">Testimonial</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/INFINITY+CLIENT+LOGOS+102.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/1657711707802.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>St. Dominic Credit Union</title>
      <link>https://www.infinityit.ie/st-dominic-credit-union</link>
      <description>“I wouldn’t hesitate in recommending Infinity IT for their exceptional customer focused IT services and support.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;a href="https://www.linkedin.com/company/st--dominic-credit-union/" target="_blank"&gt;&#xD;
      
           St. Dominic Credit Union
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           “I wouldn’t hesitate in recommending Infinity IT for their exceptional customer focused IT services and support.
           &#xD;
      &lt;br/&gt;&#xD;
      
            
           &#xD;
      &lt;br/&gt;&#xD;
      
           We have been fortunate to have been a customer for the last 20 years and despite the immense changes that have occurred in our IT landscape and the challenges those changes have presented - we have never considered changing to another provider. The main reason for our loyalty is the quality of support we receive. We have experienced our fair share of ‘hairy’ IT crises and major projects over the last 20 years and every time Infinity IT have gone above and beyond to help and support us in timely resolution and delivery.
           &#xD;
      &lt;br/&gt;&#xD;
      
            
           &#xD;
      &lt;br/&gt;&#xD;
      
           In addition to that they have developed their offering in tandem with the changing needs and regulatory expectations in the Credit Union world. We avail of the Monthly Network reporting that distils complex IT information into easily understood language and visual representation which is ideal for Boards and committees. 
           &#xD;
      &lt;br/&gt;&#xD;
      
            
           &#xD;
      &lt;br/&gt;&#xD;
      
           We are delighted to continue our relationship with Infinity IT and congratulate them for 20 successful years in business.”
           &#xD;
      &lt;br/&gt;&#xD;
      
            
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/in/ACoAAAVr2csBy9gA48P-wo90CVgiW8slpCO0UOc" target="_blank"&gt;&#xD;
      
           Patrick Lawlor
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Chief Executive Officer
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/company/st--dominic-credit-union/" target="_blank"&gt;&#xD;
      
           St. Dominic Credit Union
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/1647947276348.jpeg" length="62068" type="image/jpeg" />
      <pubDate>Thu, 27 Oct 2022 09:37:18 GMT</pubDate>
      <author>shane.casey@infinityit.ie (Shane Casey)</author>
      <guid>https://www.infinityit.ie/st-dominic-credit-union</guid>
      <g-custom:tags type="string">Testimonial</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/INFINITY+CLIENT+LOGOS+2.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/1647947276348.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Infinity IT join forces with Cyber Ireland</title>
      <link>https://www.infinityit.ie/infinity-it-join-cyber-ireland</link>
      <description>Infinity IT are delighted to announce we have joined forces with Cyber Ireland.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Infinity IT join forces with Cyber Ireland
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.linkedin.com/company/infinity-it/" target="_blank"&gt;&#xD;
      
           Infinity IT
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            are delighted to announce we have joined forces with 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/company/cyber-ireland/" target="_blank"&gt;&#xD;
      
           Cyber Ireland
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . This shows our continued support for the cybersecurity industry here in Ireland. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/company/infinity-it/" target="_blank"&gt;&#xD;
      
           Infinity IT
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            continually keeps up to date with the latest industry standards and develops best cybersecurity practices within our customer base. 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/company/cyber-ireland/" target="_blank"&gt;&#xD;
      
           Cyber Ireland
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            brings together Industry, Academia and Government to represent the needs of the Cyber Security Ecosystem in Ireland. We look forward to working with 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/in/ACoAAAfJou8BwSxMAghFg_Zt_GMVX3wTXOCAT5A" target="_blank"&gt;&#xD;
      
           Eoin Byrne
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            and his team to increase awareness and standards across the sector.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Cyber+Ireland+Logo.jpg" length="224171" type="image/jpeg" />
      <pubDate>Thu, 10 Feb 2022 08:43:04 GMT</pubDate>
      <author>shane.casey@infinityit.ie (Shane Casey)</author>
      <guid>https://www.infinityit.ie/infinity-it-join-cyber-ireland</guid>
      <g-custom:tags type="string">News</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Cyber+Ireland+Logo-Small.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Cyber+Ireland+Logo.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Douglas CU - Enhance their Cybersecurity Posture</title>
      <link>https://www.infinityit.ie/douglas-cu-enhance-their-cybersecurity-posture</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Douglas Credit Union enhance their Cybersecurity Posture
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In a week where IT infrastructure security is making all the news headlines, 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/company/infinity-it/" target="_blank"&gt;&#xD;
      
           Infinity IT
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            have completed the latest roll out of our Next Generation Anti-Virus, Ransomware and Malware Protection at 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/company/douglas-credit-union/" target="_blank"&gt;&#xD;
      
           Douglas Credit Union
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           . This will integrate with the Credit Union’s current security infrastructure and will enhance endpoint protection using the latest in Artificial Intelligence and Behavioural Monitoring software against zero-day Ransomware attacks.
           &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/company/douglas-credit-union/" target="_blank"&gt;&#xD;
      
           Douglas Credit Union
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
            continues to implement the latest security and resilience technologies to enhance the Credit Union’s overall cybersecurity posture. Due to the current threat landscape, this is critical to mitigate against risk to ensure Douglas Credit Union’s financial services are available to its Members 24/7. We would like the thank 
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/in/ACoAAAU89-8BKtDI9O-s2WyuonOse-hoOmFNH4w" target="_blank"&gt;&#xD;
      
           Roy McKnight
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , CEO, the IT Committee, and the Board of Directors of Douglas Credit Union for all their support during this project.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Picture1.jpg" length="426712" type="image/jpeg" />
      <pubDate>Thu, 10 Feb 2022 08:40:50 GMT</pubDate>
      <author>shane.casey@infinityit.ie (Shane Casey)</author>
      <guid>https://www.infinityit.ie/douglas-cu-enhance-their-cybersecurity-posture</guid>
      <g-custom:tags type="string">Testimonial</g-custom:tags>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/INFINITY+CLIENT+LOGOS+10.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/a33e3c64/dms3rep/multi/Picture1.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Deployment of our new Live Replication and Cloud Disaster Recovery Solution at Access Credit Union</title>
      <link>https://www.infinityit.ie/make-the-most-of-the-season-by-following-these-simple-guidelines</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.linkedin.com/company/infinity-it/" target="_blank"&gt;&#xD;
      
           Deployment of our new Live Replication and Cloud Disaster Recovery Solution at Access Credit Union
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            We have just completed the deployment of our new Live Replication and Cloud Disaster Recovery Solution at
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/company/skibbereen-credit-union/" target="_blank"&gt;&#xD;
      
           Access Credit Union
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            . This new Business Continuity Solution will underpin the existing high availability networking in place and ensure members have access to transactions and essential services 24x7, provided by the Credit Union. With the Credit Union’s continued commitment to investing in the latest technologies and with a clear IT strategy in place, it will facilitate the growth of the Credit Union in the coming years.
            &#xD;
        &lt;br/&gt;&#xD;
        &lt;br/&gt;&#xD;
        
            We would like the thank 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/in/ACoAAAVlJHgBQz78MldzsE7iv9zZOnuH0hkYAzI" target="_blank"&gt;&#xD;
      
           Elma Casey
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            - CEO, 
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/in/ACoAACSxFfABoHnC3FmhS95u2FAQ7CSu-DY2tbI" target="_blank"&gt;&#xD;
      
           William Casey
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            - IT Manager, the Board of Directors at Access Credit Union, along with
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.linkedin.com/company/progress-systems/" target="_blank"&gt;&#xD;
      
           Progress Systems
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
           , for all their support during this project.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/a33e3c64/dms3rep/multi/Infinity+in+Skibb-5636%281%29.jpg" length="385478" type="image/jpeg" />
      <pubDate>Thu, 18 Mar 2021 16:34:22 GMT</pubDate>
      <guid>https://www.infinityit.ie/make-the-most-of-the-season-by-following-these-simple-guidelines</guid>
      <g-custom:tags type="string">News</g-custom:tags>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/a33e3c64/dms3rep/multi/Infinity+in+Skibb-5636%281%29.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/a33e3c64/dms3rep/multi/Infinity+in+Skibb-5636%281%29.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
  </channel>
</rss>
