Malware examples - Infographic: What are the different types?

By Comtact March 14, 2019

Simply put, malware (malicious + software) is any piece of software designed with the intent to..

Top 20 CIS Critical Security Controls (Part 1): What are they?

By Comtact March 4, 2019

Keeping one step ahead of cyber criminals requires expertise, technology and robust processes...

Understanding the Organisational CIS Critical Security Controls (Part 4)

By Comtact March 4, 2019

In the closing article of our 4-part CIS series, we look into the final set of CIS controls..

The 10 Foundational CIS Critical Security Controls (Part 3)

By Comtact March 4, 2019

The CIS Controls is a framework of 20 steps designed to protect your organisation from known..

Sign-up for weekly updates

Recent Posts