Creating a BYOD policy? 8 points every policy must contain

By Comtact December 5, 2017

Creating a well-considered BYOD policy (Bring Your Own Device) for your organisation's..

Google Device Policy vs. IBM MaaS360 Mobile Device Management

By Comtact December 4, 2017

With the growth in the use of mobile devices, securing and managing your organisation's mobile..

How to prepare your IT Department for a Cyber Attack

By Comtact November 29, 2017

Cyber attacks are in the news every day. You can dedicate enormous amounts of time and energy..

Is IBM MaaS360 with Watson changing the way we manage mobile devices?

By Comtact November 23, 2017

There are a number of mobile device management (MDM) platforms that enterprises all over the..

Pros and cons of outsourcing your Cyber Security - In-house, MSSP, or Virtual SOC?

By Comtact November 22, 2017

Deciding on your strategy to protect your organisation from cyber security threats we face today..

5 steps to get your business ready for Cyber Essentials certification

By Comtact November 1, 2017

IT professionals need to stay ahead of the unprecedented tech changes and resulting IT security..

What is a Vulnerability Scan and does my company need one?

By Comtact October 19, 2017

A vulnerability scan is a technical security assessment which uses a set of tools to scan the..

Cyber Essentials vs Cyber Essentials PLUS: What's the Difference?

By Comtact October 17, 2017

In order to adopt good practices in information security, the UK government Department for..

The difference between a Vulnerability Scan and a Penetration test?

By Comtact July 18, 2017

Vulnerability scans, or vulnerability assessments are often confused with a Penetration test –..

GDPR - Essential information for IT security professionals

By Comtact July 5, 2017

With the forthcoming introduction of the EU's General Data Protection Regulations (GDPR) in May..

Petya ransomware attack spreads across Europe

By Comtact June 27, 2017

Firms worldwide, major government departments and government infrastructure have been hit by yet..

Part 3: 5 Steps to Defend Against a Ransomware Attack

By Comtact June 14, 2017

In Part 3 and final post in our Ransomware series, we take a look at how to defend against a..

Sign-up for weekly updates

Recent Posts