Services We Provide

Why online backup?


Your business data is growing:

Digital data is rapidly growing at a rate of 80% each year, and businesses like yours are responsible for maintaining 85% of that information. Data loss happens: Hard drive crashes, spilled drinks, and accidental file deletion can occur at any time and put your company's future in jeopardy. In fact, 93% of all companies that suffer significant data loss close down within 5 years! You need to do more with less: Traditional backup solutions can be expensive and take weeks to implement, leaving your business vulnerable to revenue and productivity loss. The MozyPro advantage Backup that's simple: Manage multi-user environments, schedule automatic backups, and monitor the health of your backups from the convenience of a single web-based admin console. Maximum security: You can count on Mozy's strict security policies, military-grade encryption, and world-class data centers for optimal data protection of your business' computers and servers. Ultimate affordability: Mozy's pay-as-you-go model saves you time and money with no setup fees, no hardware to purchase, and little management required.


avast! Advanced Suite is a package of products that provides virus protection for small and medium-size networks. The Advanced Suite contains the following components:

  • avast! Professional Edition 4.8 for workstation protection
  • avast! Server Edition for the protection of servers
  • avast! Exchange Server Edition (really an avast! Server Edition plug-in) for the protection of MS Exchange
  • avast! for Linux/Unix Servers for the protection of Linux based servers and MTA's
  • avast! Distributed Network Manager (ADNM) for central administration

avast! Advanced Suite is available for upwards of 10 licenses (which covers up to 10 machines, of which up to two are servers + 10 Exchange or Linux MTA mailboxes). Generally, the maximum number of servers is determined as the number of licenses divided by ten, plus one. For example, a 24-license Advanced Suite would cover up to 3 servers. A 100-license pack covers up to 11 servers, and so on.

Network Vulnerabilities
  1. Interception—The data that are transmitted over the network pass through some medium that consists of a carrier and other equipment, often in the physical control of other third parties. These data could be intercepted. Once intercepted, there is a risk of undesirable disclosure, i.e., someone stealing data or modifying the intercepted data, resulting in loss of integrity and consequent other, more material losses.
  2. Availability—As networks proliferate, more and more users are remote and access their applications over the network, crossing hundreds or thousands of miles. If network connectivity fails or becomes unavailable for any reason, there would be serious interruption to business and consequent damages.
  3. Access/entry points—The network extends a computer system beyond the box into the world. The network provides the ability to extend the system to users across geographical boundaries, resulting in conveniences and efficiencies otherwise impossible. Conversely, the same network provides the feasibility for access to the system from anywhere. A single weak point in the network can make all the information assets in the network vulnerable to intruders. The network can provide many points of entry for intruders, interceptors and malicious code-like viruses, worms and Trojan horses. The ability of the network to enable access to a system from anywhere is the most serious of a network's vulnerabilities. Given the fact that a major benefit of a network is its ability to provide access from elsewhere, the task at hand becomes discovering how best to devise controls around this access.
  • Fortunately, the problem is not as formidable as it sounds. Access control solutions for the network exist in many forms and products that have been successfully deployed and tested.


  • Having identified the vulnerabilities, let us look at the possible controls one by one:

    1. Interception—Good physical access controls at data centers and offices, and physical security over telecommunication equipment can act as deterrents to interception through sniffing. As a first step, the auditor could evaluate physical security, including all the points where the communication links terminate and where the network wiring and distributions points are located. However, there are limitations to the effectiveness of such controls, especially with increasing wireless communication. The most effective control to interception is encryption. When data are encrypted, even if they are intercepted, disclosure or modification cannot occur unless the scrambled data can be decrypted. Today, there exist many methods of encryption and many combinations of its use. Encryption can be done either by the application or at the communication level by a device such as a router, switch or a multiplexer. A virtual private network (VPN) is an example of the usage of encryption to tunnel data securely over a public or shared network. The use of digital certificates and digital signatures is another example.
    2. Availability—The control to ensure availability and reliability of a network is through good network architecture and monitoring. The design of the network should ensure that between every resource and an access point there are redundant paths and automatic routing to switch the traffic to the available path without loss of data or time. Every component in the network needs to be fault-tolerant or built with suitable redundancies. Complex and widespread networks need to be monitored and managed. This is often done by using network management software. The establishment of a network operations center (NOC) with software tools and a service desk often staffed 24/7 provides this capability. Such tools provide data for capacity management. They also ensure that the networks provide adequate bandwidth to enable the data to move along without bottlenecks and with the speed required by the users and applications. The IS audit review should cover all these aspects.
    3. Access points—Most controls in a network are built at the points where the network connects with an external network. These controls seek to limit the type of traffic that can come in or go out and also the origin and destination of the traffic. For example, to provide access to a web server that is inside the network to customers all over the world for placing orders, the network should accept only a certain type of traffic (HTTP) and not the kind of traffic that tries to log into the server (telnet). In another situation where a partner or vendor provides, for example, system development or maintenance services over a dedicated network from a fixed location, the network may allow traffic only from those systems with specific addresses. Such controls are implemented through suitable configuration of the rule base in a firewall and/or through access control lists in the routers. Antivirus software and intrusion detection systems can detect viruses and other malicious code at these entry points and take detective and corrective action.


    Priority On-Site Support
    Priority On-Site Support provides the client with On-Site Support from our engineers. We provide prompt response to ensure that downtime in critical business systems is kept to a minimum.

    Scheduled On-Site Support
    Scheduled On-Site Support is a support package for non critical applications at a time agreed between the client and Computer Central.

    Helpdesk Support
    A team of experienced Technical and Support Engineers are available for all your IT queries. A prompt service is provided by our helpdesk

    Remote Support
    Remote Support provides engineers with remote access to your infrastructure and eliminates the potential need for costly on site support. This service also enables our engineers to fix critical and non critical issues promptly.

    Pre-Emptive Maintenance
    This service provides the client with a high level of uptime by completing necessary preventative maintenance on required systems.

    Our technicians are:

    • Onsite when you need them most
    • Available by the half hour or by the day
    • Same engineer assigned to your business
    • Will take on your full IT requirements from installing software to installing servers to network cabling so you can concentrate on your business.
    • Proactive and reactive support available, we work in complete partnership with you.
  • Web design & Hosting

    Email Configuration
    Yes! All DreamHost accounts now come with free web-based access to email.
    You may access your email via the web at the following url:
    (make sure to replace "" with your domain)
    It's already set up, easy to use, and accessible from anywhere you can get to the web.
    To log in, enter your email address and password into the login form and submit.
    Looking for a way to manage all of your IT assets? Want it integrated with a help desk, network monitoring and more? With Computer Central and Spiceworks you can.
    The basic vulnerabilities associated with a network can be grouped into three categories 1) Interception 2) Availability 3) Access/entry points. more
    Connecting People
    Being active in BNI is like having up to 40 sales people working for you, because your fellow members will be carrying your cards and referring your business to people they meet, without you having to pay them any salaries or commission. Successful businesses depend on 'word-of-mouth' marketing as the best form of promotion more

    Software Support Computer central started in Aug 2009 to supply and support computer software, hardware and networking to businesses in Ireland. We are quickly becoming one of Ireland’s leading computer service IT providers .

    More information coming soon.