REAL-LIFE
CYBER CRIME STORIES

Every day, the UK's mid-sized businesses are facing new cyber threats. As part of a 'Voice of Cyber UK' campaign, we're bringing the stories of real-life cyber attacks to life - together with expert guidance to help keep you secure »

#1 "The Ransomware Heist"

UK mid-sized law firm hit by ransomware attack, £2 million ransom paid.

Previously thought of as a mass market attack, the shift towards more targeted ransomware attacks represents a major escalation [ more » ]

Speech Marks

With targeted ransomware attacks, the cyber criminals really go out of their way to ensure their actions have the maximum impact on the victim, leaving the business with no choice but to pay the ransom.

Joe Bertnick
CTO, Comtact Ltd.

#2 "The Inside Job"

Financial services company face an internal data theft.

Is data security at the heart of your operations? Protecting yourself from inside threats is difficult to predict and hard to identify...


#3 "Risky Business"

Ransomware epidemic at UK top 40 university.

7-10% of your IT budget should be allocated towards cyber security (Forrester, 2018). Discover the budget challenges a UK university faced and the impact of a crippling ransomware attack infecting 40,000 computers.


#4 "Big Phish"

Phishing attack affects major healthcare supplier.

It just takes one click. 91% of cyber attacks start with a phishing email. Discover what happened to this firm when someone unknowingly clicked on a phishing email.

CIO Guide to Cyber Security Improvement

CIO's Guide to Cyber Security Improvement

Tick
OUR MOST POPULAR GUIDE: 30 pages packed full of expert tips and advice.

Tick
LEARN how to build a board-level strategy to measurably improve your cyber security.

Tick
IDENTIFY your likely attackers – and your overall risk profile.

Tick
DISCOVER how to prioritise identified risks - and build an effective improvement plan.

READ THE GUIDE

The Cyber Source™ blog »

The cyber security resource for the UK's mid-sized businesses.

Threat Intelligence

Keep up to date with the latest critical security advisories.
[ READ MORE ]

Types of cyber attack

The 8 most common types of cyber attacks, explained.
[ VIEW INFOGRAPHIC ]

Create strong passwords

Always use the same password? Create strong passwords you can remember.
[ VIEW INFOGRAPHIC ]

The top CIS critical security controls

What are the top 20 critical security controls?

The CIS top 20 critical security controls provide an effective framework to develop your security and defend against the most prevalent types cyber attack.

LEARN MORE
Types of penetration test - What's the difference?

Types of penetration test

What are the different types? It's important to know the differences to understand which type meets your requirements. and objectives.

LEARN MORE
What is SIEM? How does SIEM work?

What is SIEM? (part 1 of 3)

SIEM (or Security Incident and Event Management) seeks to provide a holistic approach to an organisation's security monitoring.

LEARN MORE

VIDEO: What is the CIA Triad of information security?

What is the CIA Triad?

Confidentiality, Integrity and Availability are the three key principles which must be guaranteed in information security.

LEARN MORE
SOC team roles & responsibilities in a Security Operations Centre

SOC roles & responsibilities

Within a Security Operations Centre (SOC), teams work 24/7 to keep an Enterprise's digital assets secure. They’re both the front-line and the strategic command centre.

LEARN MORE
Guide to social engineering

Human hacking: guide to social engineering

Humans are the weakest link in your security defences and cyber criminal know it - which is why >90% of successful cyber attacks start with a phishing email.

LEARN MORE

Subscribe to The Cyber Source™ and keep up to date.

About Comtact Ltd.

Secure & specialist SOC services - 24x7x365

We've built our reputation helping extend the abilities of the UK's leading organisations, providing the trusted expertise and support to scale and secure your critical security operations.

Comtact Ltd. - Working 24/7 to secure the UK's mid-sized businesses.

We're here to help you overcome the complex and ever-changing cyber security threats. Operating 24/7 from a state-of-the-art UK Security Operations Centre (SOC), Comtact’s experience and security capabilities extend your resources to help you prevent, detect and respond swiftly.

Secure

Operating 24/7 from a secure Tier 3 UK data centre.

Experience

Certified and experienced IT service team.

Flexible

Cost-effective & flexible credit-based system.

Technology

Highly integrated 'best-of-breed' technologies.

Service Quality

ISO27001-accredited operations, UK-staffed.

24/7 security operations centre

Solving the cyber security challenge.

We're here to help you overcome the complex and ever-changing cyber threats, working in trusted partnerships to extend your capabilities and improve your security defences.

  • Highly experienced security team.
  • UK focused, UK staffed, UK governance.
  • Best-in-class services - on first name terms.

Test

NEWS

Mid-sized firms at significant threat of targeted ransomware, warns NCSC.

Read more

FREE TRIAL

Sign-up for a FREE simulated phishing test...

Sign-up today!

Subscribe and keep your knowledge up to date.