Cybersecurity

Vulnerability Assessment

Making Sense of Vulnerability Management

Making Sense of Vulnerability Management When software companies push new updates, there are often weaknesses in the code that hackers can find and exploit. Software makers then address the vulnerabilities with a security patch. This cycle continues with each new software or hardware update that is released. It’s estimated that about 93% of corporate networks […]
Read More
end user computing sheffield

Insider Threats

Insider Threats Are Getting More Dangerous! Here’s How to Stop Them Here at Commstec, we believe that one of the most difficult types of attacks to detect are those performed by insiders. An “insider” would be anyone that has legitimate access to your company network and data. This would be via a login or other […]
Read More