🥊Threat Hunting with Sysmon As Cyber Threats continue to evolve, it is vital to have tools and strategies in place to detect and respond to malicious activity on our systems. One such tool is Sysmon, a system monitoring tool that can help detect and identify suspicious behaviour. Below we will explore how Sysmon can be […]
⚙ Advanced Cyber Security solutions of today do great, but why not start from the basics with those two #quickwins? 👉If you’re on Office 365, consider dumping Dropbox and start using OneDrive for Business. Dropbox is great – except for the security requirements that are needed in an enterprise; plus, it can’t compete with the integration […]
🔒There has never been a more crucial time to secure our data, devices and people’s corporate identities. With the advent of cloud computing and remote working, employees and freelancers can access company information from any location. This presents a problem for businesses that need personnel to be able to access sensitive data securely wherever they […]
COMPTEC I.T participated in this year’s IT Nation Conference in Melbourne at the Pullman Hotel. Our company representing at the conference and collaborating with other partners. We are looking forward to the London’s Conference in March 2023! And some photos of the event: https://www.linkedin.com/feed/update/urn:li:activity:7004058025678245888
Can you see yourself working with cutting-edge technologies and advancing your skills? Are you interested in collaborating with co-workers dispersed in different locations over the globe? COMPTEC I.T is excited to announce the latest opening for a System Engineer role within our European team. Please click the below link to download a pdf file with […]
Nearly all organisations own some form of NAS storage device that they use for various purposes. Firstly, as a backup destination which is the most common usage. Secondly, as a Web Server, and thirdly, as a hypervisor to host Virtual Machines. In this post, we focus on applying the best practices to such devices regardless […]
What is an MFA Fatigue Attack? An MFA Fatigue attack is a strategy used by threat actors to abuse sign-in security by forcing users to grant them access to get relief from the MFA flood. The method is also known as MFA bombing and is considered a high-profile attack. How it works This strategy, combined […]
It appears two new Microsoft Exchange Zero-Day vulnerabilities are being exploited in the wild. While the exploitation is not yet confirmed, attacks have been launched on fully patched Exchange servers affecting companies and organisations. If you run Microsoft Exchange on-premises and have Outlook Web App (OWA) facing the internet, the chances are you are impacted. […]
This infographic is about the 10 top types of Phishing Attacks as of today, September 2022.
This infographic is about the 6 most common Phishing Attacks and how they can be detected.
We are delighted to announce that our new Cloud-Hosted solution is now live and available to a broad range of businesses! The solution enables organisations to access their data from anywhere and reduce Capital and Operating expenditures (CapEx & OpEx) by retiring on-premises legacy equipment. The solution comes with the below features: Accessible from everywhere […]
The landscape is changing so does the legislation. NIS2 Directive is now a reality for European Union and its members. The Directive comes as a response to the increased exposure of Europe to cyber threats and now covers medium and large entities from more critical sectors of the economy and society. A Cyber Security programme and Incident […]
On Monday, May 30, 2022, Microsoft disclosed the “Follina” dubbed remote code execution (RCE) CVE-2022-30190 zero-day vulnerability, affecting Microsoft Office products. Zero-day means no patch is available yet, and our InfoSec department here at COMPTEC I.T acted quickly and worked overnight to provide a response for our clientele and partner network. Once we got them […]