Skip to content
  • Helpdesk
  • 024 777 12 000
  • [email protected]
New Syscomm Logo no strapline white textfavicolour
  • About
    • About you
    • About us
    • Careers
  • Who we help
    • Education: Colleges and MATs
    • Services Sector
    • Manufacturing and Engineering
    • Built Environments
  • Services
    • Cyber Security
    • Managed IT Services
    • Connectivity
    • Incident Response & Disaster Recovery
    • Network Solutions
    • IT Auditing & Compliance Solutions
    • Public and Private Cloud
  • Business solutions
  • Insights
  • Happy clients
  • FAQs
  • Contact us
  • About
    • About you
    • About us
    • Careers
  • Who we help
    • Education: Colleges and MATs
    • Services Sector
    • Manufacturing and Engineering
    • Built Environments
  • Services
    • Cyber Security
    • Managed IT Services
    • Connectivity
    • Incident Response & Disaster Recovery
    • Network Solutions
    • IT Auditing & Compliance Solutions
    • Public and Private Cloud
  • Business solutions
  • Insights
  • Happy clients
  • FAQs
  • Contact us
Find your gaps

Thoughts & Insights

Get guidance on building better IT systems, from the team that's seen it all.

Cyber Security

Latest and greatest

Explore our most recent and popular blog posts.

man using computer at home while third parties loom over him

Mind the Gap! #4 – Overreliance on 3rd Parties

Read More »
February 20, 2025

Popular blogs

Office 365 Backup – MS SLA addresses availability, not recoverability!

Next Generation Networks and the Rise of SD-WAN

The NIST Cybersecurity Framework: The Critical Role of Protection

Understanding the Kill Chain: Command and Control

Understanding Social Engineering Attacks

Mind the Gap! #3 – Misconfigurations

laptop in coffee shop with plain screen that reads mind the gap
Cyber Security

Mind the Gap! #2 – Bridging the Human Factor

Read More »
February 7, 2025
Cybersecurity-themed computer screen displaying 'Mind the Gap' with a padlock icon
Cyber Security

Mind the Gap! #1 – The Unseen Vulnerabilities

Read More »
February 1, 2025
Cyber Security

Understanding the Kill Chain: Action on Objections

Read More »
January 21, 2025
Illustration of a hooded figure placing a glowing cyber bug onto a castle
Cyber Security

Understanding the Kill Chain: Installation

Read More »
January 10, 2025
Hooded figure attempting to breach a brightly illuminated castle with a screwdriver
Cyber Security

Understanding the Kill Chain: Exploitation

Read More »
December 31, 2024
giant hooded figure aiming an arrow at a glowing castle, symbolizing targeted cybersecurity attacks
Cyber Security

Understanding the Kill Chain: Delivery

Read More »
December 28, 2024
shadowy knights approaching a castle guarded by a towering hooded figure
Cyber Security

Understanding the Kill Chain: Weaponisation

Read More »
December 19, 2024
figure with a magnifying glass examining a detailed castle, symbolizing cybersecurity vigilance and threat detection
Cyber Security

Understanding the Kill Chain: Reconnaissance

Read More »
December 13, 2024

Understanding the Kill Chain: The Importance of Defence in Depth

Read More »
December 7, 2024
« Previous Page1 Page2 Page3 … Page8 Next »
New Syscomm Logo no strapline white textfavicolour

One of the UK’s most nimble Managed IT Services providers, specialising in delivering continuous business critical IT, delivered end-to-end over our network.

Linkedin
Follow us on LinkedIn for industry insight!
Quick links:
  • About us
  • About you
  • Careers
  • FAQS
  • Privacy Policy
  • Carbon Reduction Plan
Contact:
  • [email protected]
  • 024 777 12 000
Address:

Boiler House, Electric Wharf,
Coventry, CV1 4JU

Registered in England number: 1826787 VAT registration number: 202 8841 25

©2025 All Rights Reserved.