fbpx

News

The Blog

IT Managed Services
Mobile Device Management webinar: MDM essentials for 2018

Watch on-demand in a short and informative 30-minute session. Join Comtact Ltd. and IBM Security for an essential introduction in our Mobile Device Management on-demand webinar. With the power of today’s smartphones / tablets, coupled with increased compliance requirements from GDPR, Mobile Device Management provides is the best way to simplify the MDM headache and … Continued

Cyber Security
Facing the mobile security threat – Mobile malware statistics 2017

In the not too distant past, mobile security was not considered a security threat, or even an excessive concern over data loss for many organisations. However, the prevalence of mobile security threats has changed the conversation entirely, bringing mobile security into much needed focus. And with the introduction of GDPR, organisations now need strict governance … Continued

Cyber Security
Types of penetration test – what’s the difference?

Penetration testing has become a vital part of a modern vulnerability management programme. Just like in today’s Hollywood thrillers, industrialised hackers around the world are trying to breach network defences – not just of national banks, Government organisations, or big corporate brands, but also of any company – of all sizes – with easily discovered … Continued

IT Managed Services
IT infrastructure monitoring service helps 45,000+ University students

As the UK’s leading SolarWinds authority, Comtact Ltd. has partnered with The University of Nottingham (UoN), providing its award-winning SolarWinds Managed Service to unlock the full potential of the University’s existing IT monitoring platform. As a hugely powerful and affordable network monitoring tool, SolarWinds’ IT monitoring platform enables you to quickly detect, diagnose, and resolve … Continued

IT Managed Services
10 signs you’re not using the best Network Monitoring tools

Today, employees are demanding an ‘Always on, Always accessible’ user experience – and therefore rely heavily on their IT teams’ day-to-day operations. Using the best network monitoring tools is an essential requirement for any modern business, to provide a first line of defence when applications go down, or when performance begins to deteriorate. So, if you’re … Continued

IT Managed Services
Solving network latency issues with Office 365 migration

In operating legacy, or hybrid network architectures, many enterprises have experienced unexpected performance issues after migrating to Office 365 – latency and jitter – as well as significant increases in bandwidth usage, resulting in a troublesome deployment and poor user experience. The underlying cause of the problem is the need to meet Microsoft’s network architecture … Continued

Cyber Security
A buyer’s guide to Patch Management Software

Given the breadth of software in any given organisation and the volume of security patches being released by vendors, building an effective patch management programme has become critically important – especially as we’ve seen the consequences of a well understood ransomware attack. Although we all recognise patch management as a critical IT function, many organisation … Continued

Cyber Security
Pros and cons of outsourcing your Cyber Security – In-house, MSSP, or Virtual SOC?

Deciding on your strategy to protect your organisation from cyber security threats we face today is an important task. As we’ve see all too often in the news headlines, traditional perimeter defences are easily compromised with today’s digitally-connected, mobile-enabled business. And with the UK’s adoption of GDPR – and the significant associated fines and data … Continued

Cyber Security
Creating a BYOD policy? 8 points every policy must contain

Creating a well-considered BYOD policy (Bring Your Own Device) for your organisation’s employee-owned mobile devices is now more critical than ever. Full-time and temporary employees, contractors and other stakeholders possess an array of powerful smartphones and tablet devices, frequently used as a preference to corporate laptop and desktop PCs. With the increased frequency of cyber attack … Continued

Cyber Security
What is Zscaler Cloud Sandbox? Defending against ransomware

Following analysis of the WannaCry ransomware attack, Zscaler determined that the initial delivery vector was not over HTTP/HTTPS, in this case. Still, multiple steps were taken to block payloads, avoiding post-infection activity for this Ransomware strain as it morphs. How Zscaler can help with preventative measures Firstly, make sure you have followed our guidance to protect yourself … Continued

IT Managed Services
Using SolarWinds’ Network Traffic Analyser to monitor file sharing

IT Directors striving to understand the effect of “consumerisation of the enterprise” effect on their business operations. While Comtact Ltd. recognises Dropbox’s role as a powerful file sharing tool, the so-called “Dropbox effect” and its rapid rise in popularity is having a hidden effect on some organisations’ network performance and security – particularly given the … Continued