Watch on-demand in a short and informative 30-minute session. Join Comtact Ltd. and IBM Security for an essential introduction in our Mobile Device Management on-demand webinar. With the power of today’s smartphones / tablets, coupled with increased compliance requirements from GDPR, Mobile Device Management provides is the best way to simplify the MDM headache and … Continued
In the not too distant past, mobile security was not considered a security threat, or even an excessive concern over data loss for many organisations. However, the prevalence of mobile security threats has changed the conversation entirely, bringing mobile security into much needed focus. And with the introduction of GDPR, organisations now need strict governance … Continued
Many companies assume their systems are secure, but this is difficult to know without performing regular in-depth audits of your security. And it’s not simply a requirement for your IT department either – security is the responsibility of all employees but the fact is, you’re unable to have a security baseline without an audit. Security … Continued
Penetration testing has become a vital part of a modern vulnerability management programme. Just like in today’s Hollywood thrillers, industrialised hackers around the world are trying to breach network defences – not just of national banks, Government organisations, or big corporate brands, but also of any company – of all sizes – with easily discovered … Continued
For any organisation, partnering with a Managed Security Service Provider (MSSP) is now a necessity given the frequency and complexity of the advanced cyber threats we face – daily. In addition to the cost and complexity of setting up and operating a 24/7 SOC (Security Operations Centre), organisations simply cannot keep pace with the sophistication, … Continued
As the UK’s leading SolarWinds authority, Comtact Ltd. has partnered with The University of Nottingham (UoN), providing its award-winning SolarWinds Managed Service to unlock the full potential of the University’s existing IT monitoring platform. As a hugely powerful and affordable network monitoring tool, SolarWinds’ IT monitoring platform enables you to quickly detect, diagnose, and resolve … Continued
Today, employees are demanding an ‘Always on, Always accessible’ user experience – and therefore rely heavily on their IT teams’ day-to-day operations. Using the best network monitoring tools is an essential requirement for any modern business, to provide a first line of defence when applications go down, or when performance begins to deteriorate. So, if you’re … Continued
With today’s user expectations of IT services being ‘always on’, it is more important to ensure you quickly detect, diagnose, and resolve network performance problems and outages – before you start getting calls asking if the network is down. As the UK’s foremost authority on SolarWinds, Comtact Ltd. works with the UK’s leading organisations to … Continued
In operating legacy, or hybrid network architectures, many enterprises have experienced unexpected performance issues after migrating to Office 365 – latency and jitter – as well as significant increases in bandwidth usage, resulting in a troublesome deployment and poor user experience. The underlying cause of the problem is the need to meet Microsoft’s network architecture … Continued
Given the breadth of software in any given organisation and the volume of security patches being released by vendors, building an effective patch management programme has become critically important – especially as we’ve seen the consequences of a well understood ransomware attack. Although we all recognise patch management as a critical IT function, many organisation … Continued
Cyber attacks are in the news every day. You can dedicate enormous amounts of time and energy towards protecting your company, for intruders to find a way in regardless. New threats appear every day and an attack on your company is almost inevitable, with hackers seemingly exploiting different vulnerabilities every time. That’s the shocking and … Continued
Deciding on your strategy to protect your organisation from cyber security threats we face today is an important task. As we’ve see all too often in the news headlines, traditional perimeter defences are easily compromised with today’s digitally-connected, mobile-enabled business. And with the UK’s adoption of GDPR – and the significant associated fines and data … Continued
Many companies make the move to Office 365 because – as Microsoft says – you can access your office remotely every day of the year. No longer are you tied to hardware and software in a physical building. Office 365 also shifts the burden of storing vast amounts of information, data, software, and other components … Continued
A vulnerability scan is a technical security assessment which uses a set of tools to scan the network for known vulnerabilities (e.g. open ports, unpatched security updates) – sometimes incorrectly referred to as a Penetration Test. A penetration test is basically an ethical hacker, hired to try and get into your organisation; via physical access to … Continued
In order to adopt good practices in information security, the UK government Department for Business, Innovation and Skills released a government-endorsed scheme called Cyber Essentials in 2014.
Vulnerability scans, or vulnerability assessments are often confused with a Penetration test – but they are very different, and should be used in a very different way to assess and test your cyber security defences. So what’s the difference between a vulnerability scan and a penetration test?
Creating a well-considered BYOD policy (Bring Your Own Device) for your organisation’s employee-owned mobile devices is now more critical than ever. Full-time and temporary employees, contractors and other stakeholders possess an array of powerful smartphones and tablet devices, frequently used as a preference to corporate laptop and desktop PCs. With the increased frequency of cyber attack … Continued
With the forthcoming introduction of the EU’s General Data Protection Regulations (GDPR) in May 2018, there is now a definite move toward privacy by design, meaning organisations will have to build data security safeguards into processes – from beginning to end.
Following analysis of the WannaCry ransomware attack, Zscaler determined that the initial delivery vector was not over HTTP/HTTPS, in this case. Still, multiple steps were taken to block payloads, avoiding post-infection activity for this Ransomware strain as it morphs. How Zscaler can help with preventative measures Firstly, make sure you have followed our guidance to protect yourself … Continued
IT professionals need to stay ahead of the unprecedented tech changes and resulting IT security challenges, often seeking to simplify IT security as much as possible, especially when their company’s critical data is on the line. Cyber attacks cost businesses thousands of pounds in lost work days, revenue, in lost data, as well as the … Continued
The Challenge of Running Cloud Applications Securely Organisations are rapidly adopting Office 365 to improve employee productivity, increase flexibility and lower infrastructure costs. However, there are implications for network architecture, bandwidth management, and cloud application visibility.
London, 8th May 2016: BBC News Two-thirds of big UK businesses have been hit by a cyber attack in the past year, according to government research. Most of the attacks involved viruses, spyware or malware, the Cyber Security Breaches Survey says. A quarter of large firms experiencing a cyber breach did so at least once … Continued
IT Directors striving to understand the effect of “consumerisation of the enterprise” effect on their business operations. While Comtact Ltd. recognises Dropbox’s role as a powerful file sharing tool, the so-called “Dropbox effect” and its rapid rise in popularity is having a hidden effect on some organisations’ network performance and security – particularly given the … Continued