The Cyber Source blog

Cyber Security (and NOC Knowhow), in plain English

The difference between Endpoint Protection and Traditional Antivirus

By Comtact April 16, 2019

In the ever-changing world of cyber security, technologies never stand still. So as a customer..

The 5 critical security controls of Cyber Essentials PLUS

By Comtact April 15, 2019

Cyber Essentials is a government-backed certification scheme that enables you to demonstrate..

PRESS RELEASE: Comtact announces the addition of SentinelOne as a technology partner

By Comtact April 11, 2019

» Specialist Cyber Security & IT Managed Service Provider, Comtact Ltd, is delighted to announce..

6 steps to a successful cyber security improvement programme

By Comtact April 10, 2019

We all know cyber-crime is a serious and growing threat. According to Cisco, 31% of..

Next-gen antivirus: The move to a proactive security team

By Comtact April 10, 2019

Traditional antivirus solutions are a complete waste of time! They search through files, looking..

Infographic: How to calculate the cost of network downtime

By Comtact March 28, 2019

A primary function of most businesses is to maximise revenue, while keeping associated running..

The problem with signature-based antivirus in a VDI environment

By Comtact March 26, 2019

We’ve reached a point where we expect to be able to work literally anywhere – a practice made..

Infographic: Top 5 benefits of a Mobile Device Management (MDM) platform

By Comtact March 18, 2019

It can be challenging to maintain a growing mobile estate - from enforcing policy and compliance..

What are the different types of Malware?

By Comtact March 14, 2019

The term malware is a contraction of malicious software.

Simply put, malware is any piece of..

Malware examples - Infographic: What are the different types?

By Comtact March 14, 2019

Simply put, malware (malicious + software) is any piece of software designed with the intent to..

Top 20 CIS Critical Security Controls (Part 1): What are they?

By Comtact March 4, 2019

Keeping one step ahead of cyber criminals requires expertise, technology and robust processes...

Sign-up for weekly updates

Recent Posts

Recent Posts