Moving to Office 365? Critical Steps to Get Your Network Ready

By Comtact December 11, 2017

Many companies make the move to Office 365 because - as Microsoft says - you can access your..

Creating a BYOD policy? 8 points every policy must contain

By Comtact December 5, 2017

Creating a well-considered BYOD policy (Bring Your Own Device) for your organisation's..

Google Device Policy vs. IBM MaaS360 Mobile Device Management - Worlds Apart

By Comtact December 4, 2017

With the growth in the use of mobile devices, securing and managing your organisation's mobile..

How to prepare your IT Department for a Cyber Attack

By Comtact November 29, 2017

Cyber attacks are in the news every day. You can dedicate enormous amounts of time and energy..

How IBM's MaaS360 with Watson is changing the way we manage mobile devices

By Comtact November 23, 2017

There are a number of mobile device management (MDM) platforms that enterprises all over the..

Pros and cons of outsourcing your Cyber Security - In-house, MSSP, or Virtual SOC?

By Comtact November 22, 2017

Deciding on your strategy to protect your organisation from cyber security threats we face today..

5 steps to ensure your business is Cyber Essentials ready

By Comtact November 1, 2017

IT professionals need to stay ahead of the unprecedented tech changes and resulting IT security..

What is a Vulnerability Scan and does my company need one?

By Comtact October 19, 2017

A vulnerability scan is a technical security assessment which uses a set of tools to scan the..

Cyber Essentials vs Cyber Essentials PLUS: What's the Difference?

By Comtact October 17, 2017

In order to adopt good practices in information security, the UK government Department for..

What’s the difference between a Vulnerability Scan and a Penetration test?

By Comtact July 18, 2017

Vulnerability scans, or vulnerability assessments are often confused with a Penetration test –..

GDPR - Essential information for IT security professionals

By Comtact July 5, 2017

With the forthcoming introduction of the EU's General Data Protection Regulations (GDPR) in May..

Petya ransomware attack spreads across Europe

By Comtact June 27, 2017

Firms worldwide, major government departments and government infrastructure have been hit by yet..

Recent Posts

Subscribe to Email Updates