Skip to content
  • Helpdesk
  • 024 777 12 000
  • [email protected]
New Syscomm Logo no strapline white textfavicolour
  • About
    • About you
    • About us
    • Careers
  • Who we help
    • Education: Colleges and MATs
    • Services Sector
    • Manufacturing and Engineering
    • Built Environments
  • Services
    • Cyber Security
    • Managed IT Services
    • Connectivity
    • Incident Response & Disaster Recovery
    • Network Solutions
    • IT Auditing & Compliance Solutions
    • Public and Private Cloud
  • Business solutions
  • Insights
  • Happy clients
  • FAQs
  • Contact us
  • About
    • About you
    • About us
    • Careers
  • Who we help
    • Education: Colleges and MATs
    • Services Sector
    • Manufacturing and Engineering
    • Built Environments
  • Services
    • Cyber Security
    • Managed IT Services
    • Connectivity
    • Incident Response & Disaster Recovery
    • Network Solutions
    • IT Auditing & Compliance Solutions
    • Public and Private Cloud
  • Business solutions
  • Insights
  • Happy clients
  • FAQs
  • Contact us
Find your gaps

Thoughts & Insights

Get guidance on building better IT systems, from the team that's seen it all.

Cyber Security

Latest and greatest

Explore our most recent and popular blog posts.

man using computer at home while third parties loom over him

Mind the Gap! #4 – Overreliance on 3rd Parties

Read More »
February 20, 2025

Popular blogs

Security Teaming: The Importance of a Purple Team

Mind the Gap! #2 – Bridging the Human Factor

Understanding the Kill Chain: Installation

Security Teaming: The Importance of a Red Team

Ransomware: The Leading Cyberthreat Facing Education

Enhancing Network Security with Honeypots

screen in data centre with code running on it with text in the middle that says mind the gap

Mind the Gap! #3 – Misconfigurations

Read More »
February 14, 2025
Cybersecurity-themed computer screen displaying 'Mind the Gap' with a padlock icon

Mind the Gap! #1 – The Unseen Vulnerabilities

Read More »
February 1, 2025

Understanding the Kill Chain: Action on Objections

Read More »
January 21, 2025
A vibrant fantasy scene of a glowing, mystical figure looming behind a fortified castle

Understanding the Kill Chain: Command and Control

Read More »
January 17, 2025
Hooded figure attempting to breach a brightly illuminated castle with a screwdriver

Understanding the Kill Chain: Exploitation

Read More »
December 31, 2024
giant hooded figure aiming an arrow at a glowing castle, symbolizing targeted cybersecurity attacks

Understanding the Kill Chain: Delivery

Read More »
December 28, 2024
shadowy knights approaching a castle guarded by a towering hooded figure

Understanding the Kill Chain: Weaponisation

Read More »
December 19, 2024
figure with a magnifying glass examining a detailed castle, symbolizing cybersecurity vigilance and threat detection

Understanding the Kill Chain: Reconnaissance

Read More »
December 13, 2024

Understanding the Kill Chain: The Importance of Defence in Depth

Read More »
December 7, 2024
« Previous Page1 Page2 Page3 … Page8 Next »
New Syscomm Logo no strapline white textfavicolour

One of the UK’s most nimble Managed IT Services providers, specialising in delivering continuous business critical IT, delivered end-to-end over our network.

Linkedin
Follow us on LinkedIn for industry insight!
Quick links:
  • About us
  • About you
  • Careers
  • FAQS
  • Privacy Policy
  • Carbon Reduction Plan
Contact:
  • [email protected]
  • 024 777 12 000
Address:

Boiler House, Electric Wharf,
Coventry, CV1 4JU

Registered in England number: 1826787 VAT registration number: 202 8841 25

©2025 All Rights Reserved.