At the heart of any sound IT security strategy, should be an effective Microsoft and third-party patch management process – a house keeping necessity to close known vulnerabilities and fix existing software problems, in order to keep your systems safe against malware and avoid exploitation by hackers. But, despite this repeated truth, many organisations still […]
It is no wonder that so many organisations are migrating over to Office 365, with clear user benefits of improved productivity, compatibility and security, as well as the big wins for IT – saving time, money and precious resource. Still, as organisations move their applications and services to the cloud, many are realising that their […]
Over the last year we’ve observed some of the largest cyber attacks in history – WannaCry and Equifax breaches being two examples making headline news. As more and more cyber attacks are reported, so too do the variety of aspects that define the overall security position of a company’s infrastructure. But perhaps, the single-most important […]
For many businesses, the discipline of patching only extends to Operating System level patching. Thanks to Microsoft’s “Patch Tuesday”, IT teams diligently push the latest critical Windows patches on a monthly basis and confidently say there’s a well thought out and executed plan for managing Microsoft patching. Good for you! But… what about all those third-party […]
Built 100% in the cloud, Zscaler delivers your ‘Security Stack-as-a-Service’ from the cloud – where your services and users now reside. By securely connecting users to their applications, regardless of device, location, or network, Zscaler has transformed enterprise security, providing… Unmatched security – Always-on protection. No appliance complexity. Secure network transformation – From ‘hub-and-spoke’ to […]
Remote teams are the biggest security risk to your organisation. The threats can be underestimated when considering your organisation’s cyber security risk, along with the potential consequences of an employee mis-managing corporate resources outside of your network. And if it’s information about your clients, GDPR requires you to keep their details safe.
SolarWinds’ formidable IT monitoring platform has helped Plymouth University adopt a ‘NOC culture’ to help deliver an ‘Always-On’ user experience for some 30,000 users across its multiple sites. With the help of a SolarWinds Managed Service, Plymouth University adopts a Network Operations Centre (NOC) culture to help deliver the ‘Always-On’ user experience. Developing a Network […]
Too many alerts? Learn how to configure SolarWinds alerts, intelligently. SolarWinds’ powerful IT monitoring platform provides critical visibility of your IT estate, to proactively detect, diagnose and resolve network performance issues. As the UK’s leading SolarWinds authority, Comtact Ltd. talk you through the essential do’s and don’ts in how to configure SolarWinds alerts, as part […]
As we’ve seen in the news with WannaCry and Petya/NotPetya, it is no surprise that ransomware is a term everyone is now familiar with. It is understandable why ransomware is popular amongst cyber criminals, as they’re realise the financial rewards from utilising this method. Despite the high profile of these cases, it might come as […]
Many companies assume their systems are secure, but this is difficult to know without performing regular in-depth audits of your security. And it’s not simply a requirement for your IT department either – security is the responsibility of all employees but the fact is, you’re unable to have a security baseline without an audit. Security […]
Penetration testing has become a vital part of a modern vulnerability management programme. Just like in today’s Hollywood thrillers, industrialised hackers around the world are trying to breach network defences – not just of national banks, Government organisations, or big corporate brands, but also of any company – of all sizes – with easily discovered […]
For any organisation, partnering with a Managed Security Service Provider (MSSP) is now a necessity given the frequency and complexity of the advanced cyber threats we face – daily. In addition to the cost and complexity of setting up and operating a 24/7 SOC (Security Operations Centre), organisations simply cannot keep pace with the sophistication, […]
As the UK’s leading SolarWinds authority, Comtact Ltd. has partnered with The University of Nottingham (UoN), providing its award-winning SolarWinds Managed Service to unlock the full potential of the University’s existing IT monitoring platform. As a hugely powerful and affordable network monitoring tool, SolarWinds’ IT monitoring platform enables you to quickly detect, diagnose, and resolve […]
Today, employees are demanding an ‘Always on, Always accessible’ user experience – and therefore rely heavily on their IT teams’ day-to-day operations. Using the best network monitoring tools is an essential requirement for any modern business, to provide a first line of defence when applications go down, or when performance begins to deteriorate. So, if you’re […]
With today’s user expectations of IT services being ‘always on’, it is more important to ensure you quickly detect, diagnose, and resolve network performance problems and outages – before you start getting calls asking if the network is down. As the UK’s foremost authority on SolarWinds, Comtact Ltd. works with the UK’s leading organisations to […]
In operating legacy, or hybrid network architectures, many enterprises have experienced unexpected performance issues after migrating to Office 365 – latency and jitter – as well as significant increases in bandwidth usage, resulting in a troublesome deployment and poor user experience. The underlying cause of the problem is the need to meet Microsoft’s network architecture […]
Given the breadth of software in any given organisation and the volume of security patches being released by vendors, building an effective patch management programme has become critically important – especially as we’ve seen the consequences of a well understood ransomware attack. Although we all recognise patch management as a critical IT function, many organisation […]
Cyber attacks are in the news every day. You can dedicate enormous amounts of time and energy towards protecting your company, for intruders to find a way in regardless. New threats appear every day and an attack on your company is almost inevitable, with hackers seemingly exploiting different vulnerabilities every time. That’s the shocking and […]
Deciding on your strategy to protect your organisation from cyber security threats we face today is an important task. As we’ve see all too often in the news headlines, traditional perimeter defences are easily compromised with today’s digitally-connected, mobile-enabled business. And with the UK’s adoption of GDPR – and the significant associated fines and data […]
A vulnerability scan is a technical security assessment which uses a set of tools to scan the network for known vulnerabilities (e.g. open ports, unpatched security updates) – sometimes incorrectly referred to as a Penetration Test. A penetration test is basically an ethical hacker, hired to try and get into your organisation; via physical access to […]
In order to adopt good practices in information security, the UK government Department for Business, Innovation and Skills released a government-endorsed scheme called Cyber Essentials in 2014.
Vulnerability scans, or vulnerability assessments are often confused with a Penetration test – but they are very different, and should be used in a very different way to assess and test your cyber security defences. So what’s the difference between a vulnerability scan and a penetration test?
Creating a well-considered BYOD policy (Bring Your Own Device) for your organisation’s employee-owned mobile devices is now more critical than ever. Full-time and temporary employees, contractors and other stakeholders possess an array of powerful smartphones and tablet devices, frequently used as a preference to corporate laptop and desktop PCs. With the increased frequency of cyber attack […]
Following analysis of the WannaCry ransomware attack, Zscaler determined that the initial delivery vector was not over HTTP/HTTPS, in this case. Still, multiple steps were taken to block payloads, avoiding post-infection activity for this Ransomware strain as it morphs. How Zscaler can help with preventative measures Firstly, make sure you have followed our guidance to protect yourself […]