Man working at home in front of PC

The Perils of Credential Stuffing: Unpacking the Risks and Mitigation Strategies

In the evolving landscape of cyber threats, credential stuffing emerges as a formidable challenge for businesses across the globe. This type of cyberattack leverages automated tools to test stolen login credentials against numerous platforms, aiming for unauthorised access. Its implications are profound, affecting not just the security but the very integrity of a business. In…

Read more
Close up of person holding a smart phone in their right hand and a tablet in their left hand

Addressing the Surge in QR Code Phishing Attacks with Advanced Email Security Measures

The cybersecurity domain is witnessing an alarming surge in QR code phishing attacks, particularly targeting corporate executives and managers. This sophisticated tactic, known as “quishing,” leverages the ubiquitous QR code to bypass traditional digital defenses, making it imperative for companies to fortify their security posture with innovative solutions. Recent reports, including a comprehensive analysis by…

Read more
Man working at home in front of PC

Elevating Cybersecurity Through Behavioural Change: The Imperative of User Training

In an ever-evolving digital landscape, where cyber threats loom larger with each passing day, the linchpin of organisational security increasingly hinges on the human element. As our reliance on technology deepens, so does the sophistication of cyber adversaries, shifting the battlefield from digital fortifications to the very behaviours of employees. This paradigm shift underlines a…

Read more

Next Generation Networks: Cloud-driven Networking

Cloud Networking for Multi-sited businesses Delivers End-to-End Effortless Networking In today’s digital age, IT teams face increasing pressure to deliver an advanced, coordinated IT capability across all sites in their business, irrespective of how remote or how small they might be. Moreover, this must be achieved without adding further strain on already overstretched IT budgets…

Read more
Close up of person holding a smart phone in their right hand and a tablet in their left hand

Six Steps to Take if Your Business is Hit by a Ransomware Attack

What to Do in Case of a Network Breach? Ransomware has fast become the major threat to business IT infrastructures across virtually every sector. It is an aggressive form of attack through which cybercriminals gain access your network, blocking user access to files or systems. These are then held hostage using encryption until the victim…

Read more
Close up of person holding a smart phone in their right hand and a tablet in their left hand

Coronavirus Presenting Opportunities for Cyberthreat Increase

As organisations rush to shift their business and classes online, cybercriminals have been ramping up their tactics to take advantage of those who may have inadequate or naive security policies in place. This large, rapid migration of people from enterprise and education networks that are closely monitored and secured, to largely unmonitored and often unsecure…

Read more

Syscomm Awarded G-Cloud 12 Framework Agreement

Syscomm is delighted to announce that that we have are to feature on the UK government’s Crown Commercial Services’ G-Cloud 12 framework, helping public sector organisations bridge the gap between legacy IT systems and digitally enabled services. Syscomm is proud to be recognised on this important government framework. Securing a place means that we can…

Read more

Ransomware: The Leading Cyberthreat Facing Education

Ransomware attacks are skyrocketing According to antivirus firm Sophos 48% of UK organisations have been hit by ransomware attacks in the last year. Trend Micro’s 2019 ransomware report also indicates that ransomware activity is on the rise, with over 40 million ransomware “detections” made between January and April 2019 – compared to just over 50…

Read more
Have a question? We're always happy to chat through our solutions

Let us call you for a quick chat

Please fill out the form below and one of our professional and friendly team will be in contact with you.