
EDR & MDR: Defending Your Endpoints
This post is about understanding EDR & MDR – The dynamic Duo of Cyber Security In today’s digital age, organisations of all sizes are at
This post is about understanding EDR & MDR – The dynamic Duo of Cyber Security In today’s digital age, organisations of all sizes are at
Cybersecurity researchers uncovered an alarming mobile statistic. During the first few months of 2022, mobile malware attacks surged by 500%. This is alarming both in
Our technology inevitably comes with us when we travel. Most of us won’t even travel to the end of the block without our smartphones. When
🥊Threat Hunting with Sysmon As Cyber Threats continue to evolve, it is vital to have tools and strategies in place to detect and respond to
🎁 5 tips for safe online shopping this Christmas: 👀 Use a secure payment method to protect your personal and financial information. Some options include
⚙ Advanced Cyber Security solutions of today do great, but why not start from the basics with those two #quickwins? 👉If you’re on Office 365, consider
❗ Security alert ❗ Citrix has just announced a vulnerability discovered in Citrix Gateway and Citrix ADC. Citrix ADC or Citrix Gateway appliances configured as
🔒There has never been a more crucial time to secure our data, devices and people’s corporate identities. With the advent of cloud computing and remote
💡Did you know you can upgrade one or all your applications in Windows 11 & 10 (1709, build 16299 or later) using the command-line? The
COMPTEC I.T participated in this year’s IT Nation Conference in Melbourne at the Pullman Hotel. Our company representing at the conference and collaborating with other
Can you see yourself working with cutting-edge technologies and advancing your skills? Are you interested in collaborating with co-workers dispersed in different locations over the
Nearly all organisations own some form of NAS storage device that they use for various purposes. Firstly, as a backup destination which is the most
What is an MFA Fatigue Attack? An MFA Fatigue attack is a strategy used by threat actors to abuse sign-in security by forcing users to
Have you ever heard of the Air Gap Backups? This blog post discusses Air Gap Backups and how you can use them to your benefit.
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.