The Cyber Source blog

Cyber Security (and NOC Knowhow), in plain English

INFOGRAPHIC: The Life Cycle of a Penetration Test

By Comtact October 17, 2019

Penetration testing is the safest way of finding out how well your security protocols protect..

The Life cycle of a Penetration Test

By Comtact October 17, 2019

Penetration testing is the safest way of finding out how well your security protocols protect..

HACKER PERSONAS:  Inside the mind of a cyber criminal

By Comtact October 14, 2019

Do you know who would be most likely to hack your information system?  It’s quite possible..

Risk Identification - A crucial first step to improved cyber security

By Comtact September 27, 2019

Cyber security is a constantly evolving field with no easy quick fix.  News headlines attest to..

The Rise of Spear Phishing Attacks

By Comtact September 24, 2019

Today, most individuals and organisations are familiar with what phishing attacks are and the..

Cyber Security Risks - What comes first?

By Comtact September 17, 2019

An essential stage of improving your overall cyber security strategy is assessing and..

Zscaler cloud security - A list of 'must-have' resources

By Comtact September 11, 2019

With more and more users working remotely and apps rapidly moving towards the cloud, it's..

Zscaler introduction to secure cloud transformation

By Comtact September 4, 2019

We all remember the days when cyber security was simple, when firewalls and Anti-Virus provided..

Real life cyber crime Video - #4 Phishing attack affects healthcare provider

By Comtact September 3, 2019

#4 "Big Phish"

Phishing attack affects major healthcare supplier.

Cyber criminals continue to..

Sign-up for weekly updates

Recent Posts

Recent Posts