Resources | Spector
Cyber Security


Spector works with clients across multiple industries. Our resources in this section reflect our experience and are meant to support and assist your path when learning more about IT, Cyber Security or GRC.

We are happy to share this with you and anyone you feel may benefit from this information. If there are other topics or areas that you feel are widespread issues feel free to run it by us. We will keep on updating this section and solving problems for those in need.

Digital Transformation

How technology can help your business grow faster than ever before

Many companies want to achieve automated, synchronised and efficient operations but fear to invest because of the cost and complexity of technology. This guide will teach you where to start and help you create a plan.

• The process is broken down in practical steps, to ensure clarity and facilitate execution.

• Apply the system to your reality and save time and money by focusing on what’s most important.

Digital or Technology Transformation doesn’t need to be a painful process, and if done correctly will ensure your business can leverage the power of technology. Download our guide or talk to us for specialist assistance.

The Challenge of Managing Technology Risk and Governance

For Financial Services and Companies regulated by the Central Bank of Ireland

Join our list to benefit from our 6 part series addressing IT Risk and Governance. The series is built on our ISO 27001 Lead Audit capabilities as well as extensive IT security audit experience over the past 12 years.

They will take the form of short videos, key documents as well as how-to guides. Contact us and receive everything on your inbox.

image 2

How to choose your IT Provider - The Checklist

A Checklist with the most important questions to ask

The process of finding the best IT provider can often seem complicated but it doesn’t have to be. We have complied the simple checklist below with the most important questions to consider and ask a potential partner:

• Do they have a dedicated team who will proactively monitor your systems to fix problems before they cause an issue for your business?

• Will you get to meet and strategically plan with an IT expert who understands your business at least every quarter?

For this and much more, download the checklist and bring it with you to your next partner prospect meeting.

An Essential Guide on How to Avoid Identity Theft

Identity Theft is the most prolific Cybercrime of the decade

Find out everything you need to know about protecting yourself against this threat with our essential guide.


  • How Identity Theft Happens
  • Cyber Security Self Assessment
  • How to Protect yourself
  • What to do if your Identity has been stolen
  • Useful tools and techniques against Identity theft

Contact us to find out more about Cyber Security Self Assessment through our Contact Us Page.

Cyber Security

Downtime Calculator

How much does Downtime costs you?

It’s easy to underestimate how much one or two days of outage can impact your organisation. Use our calculator for a rough estimate of the potential costs your business may face.

It only takes a few seconds to fill in the information and get results. Being prepared for Downtime and potential risks is vital for the continued success of your business.

If you want to know more about avoiding these costs, visit our Backup and Disaster Recovery page or Talk to Us and we can find a solution.

Multi Factor Authentication and Single Sign On

A Short Guide by Spector

Learn more about how these simple tools enhance your security, and create an extra layer of security for your business and employees.


  • What is Multi Factor Authentication?
  • What is Single Sign On?
  • How do these tools work?

Thirsty for more Knowledge? Read our Blog!

We have countless free articles and hints over there.