Comtact

News

  1. What’s the best way to quickly and securely deploy Office 365?

    The Challenge of Running Cloud Applications Securely Organisations are rapidly adopting Office 365 to improve employee productivity, increase flexibility and lower infrastructure costs. However, there are implications for network architecture, bandwidth management, and cloud application visibility. With a traditional hub and spoke architecture you had to backhaul traffic from remote sites and mobile users to the […]

  2. Explainer: How does Ransomware work? The 5 phases of an attack

    In PART 1 of our 3-part series on Ransomware, we look at the 5 distinct phases of a ransomware attack. Protection from attack starts with recognising the compromise indicators Your organisation’s success in defending against a ransomware attack is largely dependent on your level of preparation and the tools you deploy to monitor your systems […]

  3. Healthcare Technology of the Year: Award Shortlist

    Comtact’s specialist healthcare division, Comtact Healthcare, has been shortlisted for the National Technology Awards in the ‘Healthcare Technology of the Year’ category, for a project of change and improvement to revolutionise the technology infrastructure and capabilities of St. Andrew’s Healthcare – the UK’s largest charitable provider of secure mental healthcare. Improved Patient Care & Outcomes The […]

  4. EVENT: Public Sector Cyber Security Conference

    Learn how to safeguard sensitive data such as medical records and keep IT systems safe from cyber attacks by states, criminal gangs and cyber terrorists.to the help IT professionals understand the challenges of responding to a cyber attack. Defending the Public from Cyber Attacks Wednesday 17th May @ Old Trafford Stadium, Manchester Comtact Ltd. has […]

  5. WEBINAR: Threat Lifecycle Management – the critical phases of responding to a cyber attack

    Comtact Ltd. has teamed up with LogRhythm to help IT professionals understand the challenges of responding to a cyber attack. Threat Lifecycle Management – the critical phases of responding to a cyber attack Monday 13th March @ 11am GMT Register here Threat Lifecycle Management (TLM) is a series of aligned security operations, capabilities and processes, beginning […]

  6. NHS patients being put ‘at risk’ because of cybersecurity flaws

    London, 17th November 2016, Sky: A lack of investment by seven NHS trusts and systems which are out of date mean online security is weak, say experts. A Sky News investigation has discovered the NHS trusts putting patients at risk by not protecting their data online. Seven NHS trusts, serving more than two million people, spent nothing […]