This infographic is about the 6 most common Phishing Attacks and how they can be detected.
This blog post discusses the SPF, DKIM and DMARC mechanisms and how organisations can use them to their benefit. Contrary to popular belief, their role is not to protect a mail system against threats. Instead, they act as protection mechanisms for the mail exchange worldwide, adding to the Cyber Hygiene of this ecosystem. Did we […]
The landscape is changing so does the legislation. NIS2 Directive is now a reality for European Union and its members. The Directive comes as a response to the increased exposure of Europe to cyber threats and now covers medium and large entities from more critical sectors of the economy and society. A Cyber Security programme and Incident […]
On Monday, May 30, 2022, Microsoft disclosed the “Follina” dubbed remote code execution (RCE) CVE-2022-30190 zero-day vulnerability, affecting Microsoft Office products. Zero-day means no patch is available yet, and our InfoSec department here at COMPTEC I.T acted quickly and worked overnight to provide a response for our clientele and partner network. Once we got them […]
- 1
- 2