Cloud migration cost calculator: What’s the total cost of ownership (TCO)? Moving to the cloud will realise untold benefits with significant cost advantages. But the reality is that cloud migration can be complex and without effective analysis and planning can leave you being faced with unexpected costs and a bit of a runaway train. Why […]
London, 22nd March 2016: Networking Plus Magazine – Information security is not keeping pace with growing risk, according to the Institute of Information Security Professionals (IISP).
London, 21st October 2015: Networking Plus Magazine – More than half of UK organisations look to managed services to improve customer experience, yet over 50 per cent of enterprise IT infrastructure is still entirely managed in-house, according to research by IDG.
Few will have missed the largescale ransomware attack on 12th May 2017, particularly affecting the NHS, but disrupting operations at more than 100,000 organisations in 150 countries. If we didn’t yet fully comprehend the existing threat from ransomware, we now do – unfortunately.
In Part 3 and final post in our Ransomware series, we take a look at how to defend against a ransomware attack. How do you best prime your defences?
Firms worldwide, major government departments and government infrastructure have been hit by yet another ransomware attack, affecting many European countries, particularly the Ukraine, but also in the Netherlands and the UK, amongst others – (as of Tuesday 27th June)
Already with an impressive set of features, SolarWinds’ Network Performance Monitor (NPM) sets the benchmark for performance monitoring to provide end-to-end visibility of your network, and reduce network outages and quickly detect, diagnose, and resolve network performance issues. SolarWinds NPM 12.3 features And with the release of NPM 12.3 (released 31st May 2018), the feature […]
How Cloud Computing can help organisations to succeed? With the widespread adoption of cloud services such as Office 365 and Salesforce.com, many businesses have already made the first step towards moving to the cloud. But the truth is, transitioning from an established IT infrastructure to a cloud-first business model was not top of the agenda […]
Threat Intelligence (CRITICAL UPDATE) Previously reported in 17 December 2019, a vulnerability has been identified in Citrix NetScaler ADC and Citrix Netscaler Gateway, which could allow an unauthenticated attacker to perform arbitrary code execution.
In a changing world, companies are looking to Virtual Desktops (VDI) to solve remote working challenges. However often come across further challenges such as network connectivity, user experience, functionality and performance issues. Today, a modern virtualisation solution such as Window’s Virtual Destop (WVD) is more than just a single piece of software, it is considered […]
Whether your are self-employed, work for a small business, or indeed a large multi-national, for a while, working from home is going to become the new norm. Yet even in these challenging times, we’ve seen cyber criminals preying on people’s fears, using the Coronavirus as just another opportunity. For this reason, it is essential for […]
In the past week, we’ve had a number of our customers requesting rapid, low cost and secure remote working solutions for their office-based employees… without a long-term commitment. – Low cost – Rapid to deploy – Easy to scale-up & scale down In challenging times, customers are looking for guidance on how to rapidly enable […]
March 2020 Threat Intelligence (CRITICAL ALERT)
Have you ever considered who’s there to help you when your network crashes or if you’re having trouble accessing your stored files? What about if your network goes down out of hours? Depending on your current company infrastructure, the answer could be a NOC (Network Operations Center) or an IT help desk. You may be […]
The World Health Organisation (WHO) has released an official statement to say we should all do more to prepare for a possible Coronavirus pandemic. The WHO have also said that all countries should be in “a phase of preparedness”. Of course, this means taking precautions when in public areas. But as a business, we need […]
This is not meant to seem complicated, but firstly, to understand what Zscaler Private Access (ZPA) is, what it does… and why, it may be useful to understand a little bit about Zscaler Inc., courtesy of Wikipedia: “Zscaler is a cloud-based information security platform delivered through more than 100 global data centres. To use Zscaler, […]
February 2020 Threat Intelligence (CRITICAL ALERT)
What’s the recommended network architecture requirement for Office 365? Many enterprises have experienced performance issues after migrating to O365, as well as significant increases in bandwidth usage. All of which has resulted in troublesome deployments and a poor user experience. The underlying cause of the problem is the need to meet Microsoft’s network architecture & […]
Security experts have recently shared their predictions, warnings and best practices for the new year. 2020 promises a wave of technology development that will transform the industry and the lives of many people in IT in ways you won’t believe. In 2019, there certainly wasn’t a lack of damaging, publicised security breaches. And given the […]
In the past 10 years, the network has changed. And security has changed. Both consumers and businesses consume and utilise cloud services. We’re all mobile, utilising multiple devices from multiple locations. Which in turn kicked off an explosion of very real security risks. First coined in 2010 by an Analyst at Forrester Research Inc., a […]
Penetration testing is the cyber equivalent of letting someone break into your house and rummage through your drawers to see how easy it all would be to steal. Your valuables are in that house. Your underwear is in those drawers. It goes without saying that you don’t want just anyone barging through the door and […]
January 2020 Threat Intelligence (CRITICAL ALERT)
You may have been led to believe that keeping your IT support department in-house is more efficient than outsourcing. It is difficult to weigh out the pro’s and con’s and decide which is the right choice for you. Comtact’s outstanding 24x7x365 IT Support service has helped us compose a list of reasons why outsourcing your […]