What is an Air Gap Backup (and why it is important to your data)
Have you ever heard of the Air Gap Backups? This blog post discusses Air Gap Backups and how you can use them to your benefit.
Have you ever heard of the Air Gap Backups? This blog post discusses Air Gap Backups and how you can use them to your benefit.
It appears two new Microsoft Exchange Zero-Day vulnerabilities are being exploited in the wild. While the exploitation is not yet confirmed, attacks have been launched
🎁 5 tips for safe online shopping this Christmas: 👀 Use a secure payment method to protect your personal and financial information. Some options include
🔒There has never been a more crucial time to secure our data, devices and people’s corporate identities. With the advent of cloud computing and remote
❗ Security alert ❗ Citrix has just announced a vulnerability discovered in Citrix Gateway and Citrix ADC. Citrix ADC or Citrix Gateway appliances configured as
The landscape is changing so does the legislation. NIS2 Directive is now a reality for European Union and its members. The Directive comes as a
This infographic is about the 6 most common Phishing Attacks and how they can be detected.
💡Did you know you can upgrade one or all your applications in Windows 11 & 10 (1709, build 16299 or later) using the command-line? The
Can you see yourself working with cutting-edge technologies and advancing your skills? Are you interested in collaborating with co-workers dispersed in different locations over the
COMPTEC I.T participated in this year’s IT Nation Conference in Melbourne at the Pullman Hotel. Our company representing at the conference and collaborating with other
This infographic is about how to protect your Corporate Data.
This infographic is about the 10 top types of Phishing Attacks as of today, September 2022.
We are delighted to announce that our new Cloud-Hosted solution is now live and available to a broad range of businesses! The solution enables organisations
On Monday, May 30, 2022, Microsoft disclosed the “Follina” dubbed remote code execution (RCE) CVE-2022-30190 zero-day vulnerability, affecting Microsoft Office products. Zero-day means no patch
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.