The Cyber Source blog

Cyber Security (and NOC Knowhow), in plain English

Next-gen antivirus: The move to a proactive security team

By Comtact April 10, 2019

Traditional antivirus solutions are a complete waste of time! They search through files, looking..

The problem with signature-based antivirus in a VDI environment

By Comtact March 26, 2019

We’ve reached a point where we expect to be able to work literally anywhere – a practice made..

What are the different types of Malware?

By Comtact March 14, 2019

The term malware is a contraction of malicious software.

Simply put, malware is any piece of..

Malware examples - Infographic: What are the different types?

By Comtact March 14, 2019

Simply put, malware (malicious + software) is any piece of software designed with the intent to..

Top 20 CIS Critical Security Controls (Part 1): What are they?

By Comtact March 4, 2019

Keeping one step ahead of cyber criminals requires expertise, technology and robust processes...

Understanding the Organisational CIS Critical Security Controls (Part 4)

By Comtact March 4, 2019

In the closing article of our 4-part CIS series, we look into the final set of CIS controls..

The 10 Foundational CIS Critical Security Controls (Part 3)

By Comtact March 4, 2019

The CIS Controls is a framework of 20 steps designed to protect your organisation from known..

Slow antivirus? Solving the problem of the weekly AV scan

By Comtact February 18, 2019

It’s Friday afternoon. Deadline day. Everyone is dreaming of home, or post-work drinks at the..

Infographic: The 8 most common types of Cyber Attacks

By Comtact February 12, 2019

It doesn't matter whether you're an end user or a business - it's a difficult task to know how..

The 8 most common types of cyber attacks explained

By Comtact February 12, 2019

You can’t defend yourself from threats you don’t understand. While malware and phishing are..

Sign-up for weekly updates

Recent Posts

Recent Posts