An attempt to gain illegal access to a single or multiple computer or network. Launched by a cyber criminal, cyber...
The Cyber Attack Stages Explained | Board Edition Within the cyber security industry, there are varying models explaining the stages...
NCSC Alert: Rise in cyber attacks hitting the education sector There has been a sharp rise in ransomware attacks for...
Charity Cyber Essentials Awareness Month Proud Certification Body and Cyber Advisor At Data Connect, we are proud to...
Willow: New Cyber Essentials Question Set Published by IASME and the NCSC Willow, the new Cyber Essentials question set,...
The Impact of Cyber Essentials: A 10-Year Review The Cyber Essentials scheme has celebrated its 10th anniversary this year,...
Steps to Simplify Cyber Essentials and Cyber Essentials Plus Recertification To maintain a valid Cyber Essentials certificate, organisations must...
20 Key Statistics For 20 years of Cyber Security Awareness Month As of June 2023 it has been 20 years...
Cyber Essentials is a government backed scheme (UK) that will help you protect your organisation, whatever its size, against a...
An actor with malicious intentions who aims to exploit systems by taking control, disrupting, damaging, stealing or manipulating data/systems. Attackers...
The Benefits Of Outsourcing Your Cyber Security The past few years have seen a shift in attitudes towards the importance...
Cautionary Advice: Law Firm Hit with ICO Fine Due to Cyber Security Negligence Tuckers Solicitors has been hit with a...
Cyber Essentials: Major Updates in 2022 Cyber Essentials has just undergone the largest update since its launch in 2014. In...
Threat Landscape: The Key Cyber Security Statistics from 2021 As the year winds to a close, it is important to...
Building On Your Cyber Security Posture In The Construction Industry The construction industry encompasses the literal building blocks of the...
The Education Roadmap: Mature Your Cyber Security Strategy The education sector is an industry that the Government is putting further...
Cyber Essentials: Technical Control Themes In our last blog we shared the fundamental information about the Cyber Essentials scheme. This...
The Fundamentals: Cyber Essentials Cyber Essentials is the perfect name for the Government backed scheme. The principles behind the scheme...
Cyber Security for the Cloud Friday 27th September 2019 – Imperial War Museum North, 10am – 2pm Join us for...
Network Segmentation Explained: Key Concepts and Benefits Understanding Network Segmentation Network segmentation is a cyber security strategy that involves...
Quantifying Risk: A Look into Vulnerability Scoring Incl. CVSS & Qualys Decoding CVSS: An Introduction to Vulnerability Scoring The Common...
Data Loss Prevention (DLP) refers to a set of tools and strategies used to identify, monitor, and protect sensitive data...
A Secure Web Gateway (SWG) is a security solution designed to regulate and monitor all outgoing and incoming network traffic...
Do AI Tools Pose a Security Risk to Businesses? With the increasing prevalence of AI (artificial intelligence) tools for businesses,...
What are the Different Types of Penetration Testing? Penetration testing, which can also be known as pen testing, is a...
This is the lack of action or unintentional action made by users or employees that can cause, spread or permit...
Investigating and analysing cyber attacks, while also preserving the evidence.
A framework implemented by a company detailing the procedures to take to maximise your businesses chance of survival subsequent to...
A backup is a copy of your systems that can be used if the current version fails or if the...
Most cyber attacks are by ‘chancers’ hitting a lot of targets and hoping to find a common vulnerability somewhere to...
The Dangers of Social Media Social media has become an integral part of everyone’s daily lives. With the benefits of...
Is Passwordless Feasible or Aspirational? Microsoft is just one example of a brand that has been talking about going ‘passwordless’...
The Hard Truth About Security Training Your Employees Cyber Security training is currently a hot topic in the IT sector with...
Your Guide to Secure Access Service Edge (SASE) As organisations increasingly embrace digital transformation, securing their networks has become paramount....
Exposed: Critical Vulnerabilities in Remote Access VPNs Over the last year or so we have seen an uptick in...
Vulnerability Management: Why Taking a Risk-Based Approach is Important Technology and the threat landscape are constantly evolving, leaving organisations exposed...
The Ransomware Ecosystem: RaaS, Extortion and the Impact on Your Business “Ransomware continues to be the most significant, serious and organised cyber crime threat faced by the UK.”...
We are excited to announce the launch of our brand new podcast, What’s Securin’? At Data Connect we help organisations...
This is a programme designed to assist users and employees to develop their understanding of their role into reducing information...
The terms and conditions available on this page cover all product sales and vSOC Services. If you would like to...
The 5 Critical Challenges Affecting Data Protection Officers Unlike other departmental roles, a DPO does not fit neatly within an...
Global Alert: The increased threat of ransomware The NCSC, in a joint effort with US and Australian advisories, have warned organisations...
Human Layer Security: How To Reduce Risk If Awareness Training Fails It’s important to note that the human firewall is...
Crypto Jacking Are you protected against crypto mining attacks or is someone using your systems without your knowledge? Crypto mining is...
The Cyber Attack Stages Explained | Board Edition Within the cyber security industry, there are varying models explaining the stages...
NCSC Alert: Rise in cyber attacks hitting the education sector There has been a sharp rise in ransomware attacks for...
Charity Cyber Essentials Awareness Month Proud Certification Body and Cyber Advisor At Data Connect, we are proud to...
Willow: New Cyber Essentials Question Set Published by IASME and the NCSC Willow, the new Cyber Essentials question set,...
The Impact of Cyber Essentials: A 10-Year Review The Cyber Essentials scheme has celebrated its 10th anniversary this year,...
Steps to Simplify Cyber Essentials and Cyber Essentials Plus Recertification To maintain a valid Cyber Essentials certificate, organisations must...
20 Key Statistics For 20 years of Cyber Security Awareness Month As of June 2023 it has been 20 years...
The Benefits Of Outsourcing Your Cyber Security The past few years have seen a shift in attitudes towards the importance...
Cautionary Advice: Law Firm Hit with ICO Fine Due to Cyber Security Negligence Tuckers Solicitors has been hit with a...
Cyber Essentials: Major Updates in 2022 Cyber Essentials has just undergone the largest update since its launch in 2014. In...
Threat Landscape: The Key Cyber Security Statistics from 2021 As the year winds to a close, it is important to...
Building On Your Cyber Security Posture In The Construction Industry The construction industry encompasses the literal building blocks of the...
The Education Roadmap: Mature Your Cyber Security Strategy The education sector is an industry that the Government is putting further...
Cyber Essentials: Technical Control Themes In our last blog we shared the fundamental information about the Cyber Essentials scheme. This...
The Fundamentals: Cyber Essentials Cyber Essentials is the perfect name for the Government backed scheme. The principles behind the scheme...
Cyber Security for the Cloud Friday 27th September 2019 – Imperial War Museum North, 10am – 2pm Join us for...
Network Segmentation Explained: Key Concepts and Benefits Understanding Network Segmentation Network segmentation is a cyber security strategy that involves...
Quantifying Risk: A Look into Vulnerability Scoring Incl. CVSS & Qualys Decoding CVSS: An Introduction to Vulnerability Scoring The Common...
Do AI Tools Pose a Security Risk to Businesses? With the increasing prevalence of AI (artificial intelligence) tools for businesses,...
What are the Different Types of Penetration Testing? Penetration testing, which can also be known as pen testing, is a...
The Dangers of Social Media Social media has become an integral part of everyone’s daily lives. With the benefits of...
Is Passwordless Feasible or Aspirational? Microsoft is just one example of a brand that has been talking about going ‘passwordless’...
The Hard Truth About Security Training Your Employees Cyber Security training is currently a hot topic in the IT sector with...
Your Guide to Secure Access Service Edge (SASE) As organisations increasingly embrace digital transformation, securing their networks has become paramount....
Exposed: Critical Vulnerabilities in Remote Access VPNs Over the last year or so we have seen an uptick in...
Vulnerability Management: Why Taking a Risk-Based Approach is Important Technology and the threat landscape are constantly evolving, leaving organisations exposed...
The Ransomware Ecosystem: RaaS, Extortion and the Impact on Your Business “Ransomware continues to be the most significant, serious and organised cyber crime threat faced by the UK.”...
We are excited to announce the launch of our brand new podcast, What’s Securin’? At Data Connect we help organisations...
The 5 Critical Challenges Affecting Data Protection Officers Unlike other departmental roles, a DPO does not fit neatly within an...
Global Alert: The increased threat of ransomware The NCSC, in a joint effort with US and Australian advisories, have warned organisations...
Human Layer Security: How To Reduce Risk If Awareness Training Fails It’s important to note that the human firewall is...
Crypto Jacking Are you protected against crypto mining attacks or is someone using your systems without your knowledge? Crypto mining is...
The terms and conditions available on this page cover all product sales and vSOC Services. If you would like to...
An attempt to gain illegal access to a single or multiple computer or network. Launched by a cyber criminal, cyber...
Cyber Essentials is a government backed scheme (UK) that will help you protect your organisation, whatever its size, against a...
An actor with malicious intentions who aims to exploit systems by taking control, disrupting, damaging, stealing or manipulating data/systems. Attackers...
Data Loss Prevention (DLP) refers to a set of tools and strategies used to identify, monitor, and protect sensitive data...
A Secure Web Gateway (SWG) is a security solution designed to regulate and monitor all outgoing and incoming network traffic...
This is the lack of action or unintentional action made by users or employees that can cause, spread or permit...
Investigating and analysing cyber attacks, while also preserving the evidence.
A framework implemented by a company detailing the procedures to take to maximise your businesses chance of survival subsequent to...
A backup is a copy of your systems that can be used if the current version fails or if the...
Most cyber attacks are by ‘chancers’ hitting a lot of targets and hoping to find a common vulnerability somewhere to...
This is a programme designed to assist users and employees to develop their understanding of their role into reducing information...