Every day, the UK's mid-sized businesses are facing new cyber threats. As part of a 'Voice of Cyber UK' campaign, we're bringing the stories of real-life cyber attacks to life - together with expert guidance to help keep you secure »

#1 "The Ransomware Heist"

UK mid-sized law firm hit by ransomware attack, £2 million ransom paid.

Previously thought of as a mass market attack, the shift towards more targeted ransomware attacks represents a major escalation [ more » ]

Speech Marks

With targeted ransomware attacks, the cyber criminals really go out of their way to ensure their actions have the maximum impact on the victim, leaving the business with no choice but to pay the ransom.

Joe Bertnick
CTO, Comtact Ltd.

#2 "The Inside Job"

Financial services company face an internal data theft.

Is data security at the heart of your operations? Protecting yourself from inside threats is difficult to predict and hard to identify...

#3 "Risky Business"

Ransomware epidemic at UK top 40 university.

7-10% of your IT budget should be allocated towards cyber security (Forrester, 2018). Discover the budget challenges a UK university faced and the impact of a crippling ransomware attack infecting 40,000 computers.

#4 "Big Phish"

Phishing attack affects major healthcare supplier.

It just takes one click. 91% of cyber attacks start with a phishing email. Discover what happened to this firm when someone unknowingly clicked on a phishing email.

CIO Guide to Cyber Security Improvement

CIO's Guide to Cyber Security Improvement

OUR MOST POPULAR GUIDE: 30 pages packed full of expert tips and advice.

LEARN how to build a board-level strategy to measurably improve your cyber security.

IDENTIFY your likely attackers – and your overall risk profile.

DISCOVER how to prioritise identified risks - and build an effective improvement plan.


The Cyber Source™ blog »

The cyber security resource for the UK's mid-sized businesses.

Threat Intelligence

Keep up to date with the latest critical security advisories.

Types of cyber attack

The 8 most common types of cyber attacks, explained.

Create strong passwords

Always use the same password? Create strong passwords you can remember.

The top CIS critical security controls

What are the top 20 critical security controls?

The CIS top 20 critical security controls provide an effective framework to develop your security and defend against the most prevalent types cyber attack.

Types of penetration test - What's the difference?

Types of penetration test

What are the different types? It's important to know the differences to understand which type meets your requirements. and objectives.

What is SIEM? How does SIEM work?

What is SIEM? (part 1 of 3)

SIEM (or Security Incident and Event Management) seeks to provide a holistic approach to an organisation's security monitoring.


VIDEO: What is the CIA Triad of information security?

What is the CIA Triad?

Confidentiality, Integrity and Availability are the three key principles which must be guaranteed in information security.

SOC team roles & responsibilities in a Security Operations Centre

SOC roles & responsibilities

Within a Security Operations Centre (SOC), teams work 24/7 to keep an Enterprise's digital assets secure. They’re both the front-line and the strategic command centre.

Guide to social engineering

Guide to social engineering

Humans are the weakest link in your security defences and cyber criminal know it - which is why >90% of successful cyber attacks start with a phishing email.


Subscribe to The Cyber Source™ and keep up to date.

About Comtact Ltd.

Secure & specialist SOC services - 24x7x365

We've built our reputation helping extend the abilities of the UK's leading organisations, providing the trusted expertise and support to scale and secure your critical security operations.

Comtact Ltd. - Working 24/7 to secure the UK's mid-sized businesses.

We're here to help you overcome the complex and ever-changing cyber security threats. Operating 24/7 from a state-of-the-art UK Security Operations Centre (SOC), Comtact’s experience and security capabilities extend your resources to help you prevent, detect and respond swiftly.


Operating 24/7 from a secure Tier 3 UK data centre.


Certified and experienced IT service team.


Cost-effective & flexible credit-based system.


Highly integrated 'best-of-breed' technologies.

Service Quality

ISO27001-accredited operations, UK-staffed.

24/7 security operations centre

Solving the cyber security challenge.

We're here to help you overcome the complex and ever-changing cyber threats, working in trusted partnerships to extend your capabilities and improve your security defences.

  • Highly experienced security team.
  • UK focused, UK staffed, UK governance.
  • Best-in-class services - on first name terms.



Mid-sized firms at significant threat of targeted ransomware, warns NCSC.

Read more


Sign-up for a FREE simulated phishing test...

Sign-up today!

Subscribe and keep your knowledge up to date.