Our Blog
- Home
- Our Blog
Windows 8.1 Just Lost All Support. What you need to know
Companies both large and small share this one cybersecurity problem. They have computers that are still running older operating systems. Staff might use these devices
8 Reasons Every Company is now a Technology Company
Whether you sell shoes or run an accounting firm, you need some type of technology to operate. Today’s companies aren’t just in the business of
What not to do on your Work Computer
Whether you work remotely or in an office, the line between personal and work tasks can become blurred when working on your company computer. If
6 Ways to Prevent Misconfiguration
6 Ways to Prevent Misconfiguration (the Main Cause of Cloud Breaches) Misconfiguration of cloud solutions is often overlooked when companies plan cybersecurity strategies. Cloud apps
Cybersecurity Attack Trends for 2023
The new year has begun and it’s a time of renewal as we plan for the possibilities to come in 2023. It’s also a time
How to Bulletproof your NAS storage against Ransomware
Nearly all organisations own some form of NAS storage device that they use for various purposes. Firstly, as a backup destination which is the most
What is MFA Fatigue & how to defend against it
What is an MFA Fatigue Attack? An MFA Fatigue attack is a strategy used by threat actors to abuse sign-in security by forcing users to
How Process Explorer Enhances Cyber Security
🔍How Process Explorer Enhances Your Cyber Security Sysinternals Process Explorer is a powerful tool for I.T professionals to monitor and manage system processes, security, and performance.
COMPTEC I.T adds Netwrix to its solution portfolio
We are excited to announce our new partnership with Netwrix, a premier provider of Data Security and Compliance solutions. This partnership allows us to provide
Signs that Computers Are Infected with Malware
Approximately 34% of businesses take a week or longer to regain access to their data and systems once hit with a malware attack. Malware is
EDR & MDR: Defending Your Endpoints
This post is about understanding EDR & MDR – The dynamic Duo of Cyber Security In today’s digital age, organisations of all sizes are at
Mobile Malware Increase – What Should You Do?
Cybersecurity researchers uncovered an alarming mobile statistic. During the first few months of 2022, mobile malware attacks surged by 500%. This is alarming both in
8 Tech Checks to Make Before You Travel
Our technology inevitably comes with us when we travel. Most of us won’t even travel to the end of the block without our smartphones. When
Threat Hunting with Sysmon
🥊Threat Hunting with Sysmon As Cyber Threats continue to evolve, it is vital to have tools and strategies in place to detect and respond to