The Cyber Source blog

Cyber Security (and NOC Knowhow), in plain English

Coronavirus: Are your employees ready for remote working?

By Comtact February 25, 2020

The World Health Organisation (WHO) has released an official statement to say we should all do..

What is Zscaler Private Access (ZPA)?

By Comtact February 17, 2020

This is not meant to seem complicated, but firstly, to understand what Zscaler Private Access..

Office 365 architecture: Solving network latency issues

By Comtact February 10, 2020

What's the recommended network architecture requirement for Office 365?

Many enterprises have..

Threat Intel: Citrix NetScaler (CVE-2019-19781)

By Comtact February 4, 2020

Threat Intelligence (CRITICAL UPDATE)

Previously reported in 17 December 2019, a vulnerability..

What is a Zero Trust Network?

By Comtact January 29, 2020

In the past 10 years, the network has changed. And security has changed. Both consumers and..

CREST Accreditation: Why it's important for Penetration Testing

By Comtact January 21, 2020

Penetration testing is the cyber equivalent of letting someone break into your house and rummage..

Top reasons why you should outsource your IT Support in 2020

By Comtact January 8, 2020

You may have been led to believe that keeping your IT support department in-house is more..

Top security predictions for 2020

By Comtact January 2, 2020

Security experts have recently shared their predictions, warnings and best practices for the new..

10 reasons why security is moving to the cloud

By Comtact December 9, 2019

Cloud computing is quickly changing enterprise IT with applications like Salesforce and Office..

Sign-up for weekly updates

Recent Posts

Recent Posts