20 Key Statistics For 20 years of Cyber Security Awareness Month As of June 2023 it has been 20 years...
PODCAST | Working in Cyber Security: The Skills Gap, Recruitment and Diversity Listen to our latest podcast episode below called...
‘It’s Time to BeReal’. In our latest podcast, we’re joined by a guest, Georgia, to talk about the popular app,...
The Benefits Of Outsourcing Your Cyber Security The past few years have seen a shift in attitudes towards the importance...
Cautionary Advice: Law Firm Hit with ICO Fine Due to Cyber Security Negligence Tuckers Solicitors has been hit with a...
Threat Landscape: The Key Cyber Security Statistics from 2021 As the year winds to a close, it is important to...
Building On Your Cyber Security Posture In The Construction Industry The construction industry encompasses the literal building blocks of the...
The Education Roadmap: Mature Your Cyber Security Strategy The education sector is an industry that the Government is putting further...
Cyber Security for the Cloud Friday 27th September 2019 – Imperial War Museum North, 10am – 2pm Join us for...
What's your cyber security strategy for 2018? In the link below, you can find some very interesting insights in to...
Charity Cyber Essentials Awareness Month Proud Certification Body and Cyber Advisor At Data Connect, we are proud to...
Willow: New Cyber Essentials Question Set Published by IASME and the NCSC Willow, the new Cyber Essentials question set,...
The Impact of Cyber Essentials: A 10-Year Review The Cyber Essentials scheme has celebrated its 10th anniversary this year,...
Security Service Edge (SSE) is a framework designed to enhance cyber security by protecting data and applications at the network...
Do AI Tools Pose a Security Risk to Businesses? With the increasing prevalence of AI (artificial intelligence) tools for businesses,...
Steps to Simplify Cyber Essentials and Cyber Essentials Plus Recertification To maintain a valid Cyber Essentials certificate, organisations must...
Here we go again… continuing our discussion on Cyber Essentials but with a focus on the technical aspects of Cyber...
A security platform which collects and displays information about a system searching for IOTs and reporting them to a Cyber...
Boundary Firewalls and Internal Gateways, Secure Configurations, Access Controls, Malware Protect and Security Updates
In line with the Computer Misuse Act (1990), a cyber incident is a breach of a system's security policy in order...
Human Layer Security: How To Reduce Risk If Awareness Training Fails It’s important to note that the human firewall is...
The Cyber Attack Stages Explained | Board Edition Within the cyber security industry, there are varying models explaining the stages...
NCSC Alert: Rise in cyber attacks hitting the education sector There has been a sharp rise in ransomware attacks for...
The Hard Truth About Security Training Your Employees Cyber Security training is currently a hot topic in the IT sector with...
Cyber Essentials: Technical Control Themes In our last blog we shared the fundamental information about the Cyber Essentials scheme. This...
The Fundamentals: Cyber Essentials Cyber Essentials is the perfect name for the Government backed scheme. The principles behind the scheme...
Network Segmentation Explained: Key Concepts and Benefits Understanding Network Segmentation Network segmentation is a cyber security strategy that involves...
Your Guide to Secure Access Service Edge (SASE) As organisations increasingly embrace digital transformation, securing their networks has become paramount....
Quantifying Risk: A Look into Vulnerability Scoring Incl. CVSS & Qualys Decoding CVSS: An Introduction to Vulnerability Scoring The Common...
Exposed: Critical Vulnerabilities in Remote Access VPNs Over the last year or so we have seen an uptick in...
Identity management in cyber security refers to the framework of policies and technologies for ensuring that the proper people in...
Zero Trust Network Architecture (ZTNA) is a cyber security model that operates on the principle of "never trust, always verify."...
Remote Browser Isolation (RBI) is a cyber security technology that separates browsing activity from a user's local network and device....
Vulnerability Management: Why Taking a Risk-Based Approach is Important Technology and the threat landscape are constantly evolving, leaving organisations exposed...
What are the Different Types of Penetration Testing? Penetration testing, which can also be known as pen testing, is a...
Inspired by the Trojan Horse story, trojan in cyber security is a malware disguised as a legitimate software. The fake...
The process of assessing an organisations already existing cyber security measures to identify potential threats and vulnerabilities.
The process of prioritising, assessing and executing appropriate risk controls to avoid cyber security breaches.
The process identifying, analysing and evaluating cyber security risks to ensure that time, efforts and resources are being allocated correctly.
Focuses upon an organisations ability to prevent, survive and recuperate from cyber security incidences.
We are excited to announce the launch of our brand new podcast, What’s Securin’? At Data Connect we help organisations...
A cyber security gap analysis helps organisations determine where they are currently in terms of their cyber and information security....
This is a programme designed to assist users and employees to develop their understanding of their role into reducing information...
In cyber security, an alert is often an automated notification from your security systems to highlight an event which could...
An acronym for assess, improve and maintain. Assess: Review and identify key security areas of risk. Seeking out opportunity for...
Systems are configured in a way to only allow individuals and other systems access to functions they require to carry...
The terms and conditions available on this page cover all product sales and vSOC Services. If you would like to...
The Dangers of Social Media Social media has become an integral part of everyone’s daily lives. With the benefits of...
The 5 Critical Challenges Affecting Data Protection Officers Unlike other departmental roles, a DPO does not fit neatly within an...
Global Alert: The increased threat of ransomware The NCSC, in a joint effort with US and Australian advisories, have warned organisations...
Is Passwordless Feasible or Aspirational? Microsoft is just one example of a brand that has been talking about going ‘passwordless’...
A Secure Web Gateway (SWG) is a security solution designed to regulate and monitor all outgoing and incoming network traffic...
The Ransomware Ecosystem: RaaS, Extortion and the Impact on Your Business “Ransomware continues to be the most significant, serious and organised cyber crime threat faced by the UK.”...
Most cyber attacks are by ‘chancers’ hitting a lot of targets and hoping to find a common vulnerability somewhere to...
Firewall Management [sp_easyaccordion id="1371"] Cyber Essentials [sp_easyaccordion id="1373"] Vulnerability Management [sp_easyaccordion id="1376"] Security Awareness Training [sp_easyaccordion id="1917"]
Purpose This Privacy Statement describes Data Connect Groups’ privacy practices in relation to the use of the Company Web sites...
20 Key Statistics For 20 years of Cyber Security Awareness Month As of June 2023 it has been 20 years...
PODCAST | Working in Cyber Security: The Skills Gap, Recruitment and Diversity Listen to our latest podcast episode below called...
‘It’s Time to BeReal’. In our latest podcast, we’re joined by a guest, Georgia, to talk about the popular app,...
The Benefits Of Outsourcing Your Cyber Security The past few years have seen a shift in attitudes towards the importance...
Cautionary Advice: Law Firm Hit with ICO Fine Due to Cyber Security Negligence Tuckers Solicitors has been hit with a...
Threat Landscape: The Key Cyber Security Statistics from 2021 As the year winds to a close, it is important to...
Building On Your Cyber Security Posture In The Construction Industry The construction industry encompasses the literal building blocks of the...
The Education Roadmap: Mature Your Cyber Security Strategy The education sector is an industry that the Government is putting further...
Cyber Security for the Cloud Friday 27th September 2019 – Imperial War Museum North, 10am – 2pm Join us for...
What's your cyber security strategy for 2018? In the link below, you can find some very interesting insights in to...
Charity Cyber Essentials Awareness Month Proud Certification Body and Cyber Advisor At Data Connect, we are proud to...
Willow: New Cyber Essentials Question Set Published by IASME and the NCSC Willow, the new Cyber Essentials question set,...
The Impact of Cyber Essentials: A 10-Year Review The Cyber Essentials scheme has celebrated its 10th anniversary this year,...
Do AI Tools Pose a Security Risk to Businesses? With the increasing prevalence of AI (artificial intelligence) tools for businesses,...
Steps to Simplify Cyber Essentials and Cyber Essentials Plus Recertification To maintain a valid Cyber Essentials certificate, organisations must...
Here we go again… continuing our discussion on Cyber Essentials but with a focus on the technical aspects of Cyber...
Human Layer Security: How To Reduce Risk If Awareness Training Fails It’s important to note that the human firewall is...
The Cyber Attack Stages Explained | Board Edition Within the cyber security industry, there are varying models explaining the stages...
NCSC Alert: Rise in cyber attacks hitting the education sector There has been a sharp rise in ransomware attacks for...
The Hard Truth About Security Training Your Employees Cyber Security training is currently a hot topic in the IT sector with...
Cyber Essentials: Technical Control Themes In our last blog we shared the fundamental information about the Cyber Essentials scheme. This...
The Fundamentals: Cyber Essentials Cyber Essentials is the perfect name for the Government backed scheme. The principles behind the scheme...
Network Segmentation Explained: Key Concepts and Benefits Understanding Network Segmentation Network segmentation is a cyber security strategy that involves...
Your Guide to Secure Access Service Edge (SASE) As organisations increasingly embrace digital transformation, securing their networks has become paramount....
Quantifying Risk: A Look into Vulnerability Scoring Incl. CVSS & Qualys Decoding CVSS: An Introduction to Vulnerability Scoring The Common...
Exposed: Critical Vulnerabilities in Remote Access VPNs Over the last year or so we have seen an uptick in...
Vulnerability Management: Why Taking a Risk-Based Approach is Important Technology and the threat landscape are constantly evolving, leaving organisations exposed...
What are the Different Types of Penetration Testing? Penetration testing, which can also be known as pen testing, is a...
We are excited to announce the launch of our brand new podcast, What’s Securin’? At Data Connect we help organisations...
The Dangers of Social Media Social media has become an integral part of everyone’s daily lives. With the benefits of...
The 5 Critical Challenges Affecting Data Protection Officers Unlike other departmental roles, a DPO does not fit neatly within an...
Global Alert: The increased threat of ransomware The NCSC, in a joint effort with US and Australian advisories, have warned organisations...
Is Passwordless Feasible or Aspirational? Microsoft is just one example of a brand that has been talking about going ‘passwordless’...
The Ransomware Ecosystem: RaaS, Extortion and the Impact on Your Business “Ransomware continues to be the most significant, serious and organised cyber crime threat faced by the UK.”...
The terms and conditions available on this page cover all product sales and vSOC Services. If you would like to...
Firewall Management [sp_easyaccordion id="1371"] Cyber Essentials [sp_easyaccordion id="1373"] Vulnerability Management [sp_easyaccordion id="1376"] Security Awareness Training [sp_easyaccordion id="1917"]
Purpose This Privacy Statement describes Data Connect Groups’ privacy practices in relation to the use of the Company Web sites...
Security Service Edge (SSE) is a framework designed to enhance cyber security by protecting data and applications at the network...
A security platform which collects and displays information about a system searching for IOTs and reporting them to a Cyber...
Boundary Firewalls and Internal Gateways, Secure Configurations, Access Controls, Malware Protect and Security Updates
In line with the Computer Misuse Act (1990), a cyber incident is a breach of a system's security policy in order...
Identity management in cyber security refers to the framework of policies and technologies for ensuring that the proper people in...
Zero Trust Network Architecture (ZTNA) is a cyber security model that operates on the principle of "never trust, always verify."...
Remote Browser Isolation (RBI) is a cyber security technology that separates browsing activity from a user's local network and device....
Inspired by the Trojan Horse story, trojan in cyber security is a malware disguised as a legitimate software. The fake...
The process of assessing an organisations already existing cyber security measures to identify potential threats and vulnerabilities.
The process of prioritising, assessing and executing appropriate risk controls to avoid cyber security breaches.
The process identifying, analysing and evaluating cyber security risks to ensure that time, efforts and resources are being allocated correctly.
Focuses upon an organisations ability to prevent, survive and recuperate from cyber security incidences.
A cyber security gap analysis helps organisations determine where they are currently in terms of their cyber and information security....
This is a programme designed to assist users and employees to develop their understanding of their role into reducing information...
In cyber security, an alert is often an automated notification from your security systems to highlight an event which could...
An acronym for assess, improve and maintain. Assess: Review and identify key security areas of risk. Seeking out opportunity for...
Systems are configured in a way to only allow individuals and other systems access to functions they require to carry...
A Secure Web Gateway (SWG) is a security solution designed to regulate and monitor all outgoing and incoming network traffic...
Most cyber attacks are by ‘chancers’ hitting a lot of targets and hoping to find a common vulnerability somewhere to...