Slow antivirus? Solving the problem of the weekly AV scan

By Comtact February 18, 2019

It’s Friday afternoon. Deadline day. Everyone is dreaming of home, or post-work drinks at the..

Infographic: The 8 most common types of Cyber Attacks

By Comtact February 12, 2019

It doesn't matter whether you're an end user or a business - it's a difficult task to know how..

The 8 most common types of cyber attacks explained

By Comtact February 12, 2019

You can’t defend yourself from threats you don’t understand. While malware and phishing are..

What penetration testing certifications should you insist on?

By Comtact December 17, 2018

Penetration testing was born from murky beginnings, with hackers taking the wise move to avoid..

Key questions to ask your penetration testing provider

By Comtact December 13, 2018

More than ever, penetration testing is an essential tool for companies to assess their cyber..

Types of penetration test - what’s the difference?

By Comtact December 4, 2018

Penetration testing has become a vital part of a modern vulnerability management programme. Just..

What is SIEM? (Part 3): How does SIEM work?

By Comtact October 14, 2018

In parts 1 and 2 of this 3-part series, we answered the question 'What is SIEM?', plus also..

What is SIEM? (Part 2): Detection, response & recovery

By Comtact October 13, 2018

In the first part of this 3-part series, we answered the question "What is SIEM?". In part 2, we..

What is SIEM? (Part 1): Cyber Security 101

By Comtact October 12, 2018

In this 3-part series, we will not only answer the question "What is SIEM?" but also cover the..

The 5 best Third-Party Patching tips & strategies

By Comtact October 8, 2018

For many businesses, the discipline of patching only extends to Operating System level patching...

A buyer's guide to Patch Management Software

By Comtact October 1, 2018

Given the breadth of software in any given organisation and the volume of security patches being..

WSUS and SCCM Third-Party Patch Management

By Comtact September 25, 2018

At the heart of any sound IT security strategy, should be an effective Microsoft and third-party..

Sign-up for weekly updates

Recent Posts