News

Important Articles worth reading

more articles

Awareness of being a Data Controller/Processor and Relevant Obligations:

blog

Read our latest Blog/ News items

Passwordless – the new MFA

“Passwordless” authentication is a recent addition to the cybersecurity arsenal of combatting credential theft. Microsoft, Apple and Google have recently ...

Zero Day Vulnerability identified in Office Products

Vulnerability in Microsoft Office products, called “Follina”, that bypasses many of the built-in security protections found. This vulnerability leverages the ...

3 out of 10 Irish Law Firms Subject to Cyber Attacks in 2016

It was announced in a study by Amárach Research today that there has been a major increase (approximately 50%) in ...
IT systems Security Vulnerability Identification Henocon Limited

In what ways does hacking affect your business?

Protect your business IT systems from malicious attack with Henocon Ltd. Know the risks!
Henocon - Online Security

Network Penetration Testing

A penetration test (Network Penetration Testing), is a simulated attack on a computer system that looks for security weaknesses, with ...
hacker

Network Infrastructure Hardening

Network Infrastructure Hardening is usually the process of securing a system by reducing its vulnerability, which is larger when a ...
hacker

Security Strategy Planning

Put a proactive plan in place to help avoid a disaster occurring, and how to deal with a disaster should ...