The Threat Landscape: 10 Insights from Data Connect's Cyber Security Experts Drawing on extensive research and deep industry insights, Data...
Charity Cyber Essentials Awareness Month Proud Certification Body and Cyber Advisor At Data Connect, we are proud to...
In April 2025, this blog was updated to add further context to the upcoming changes. Willow: New Cyber Essentials Question...
Do AI Tools Pose a Security Risk to Businesses? With the increasing prevalence of AI (artificial intelligence) tools for businesses,...
Steps to Simplify Cyber Essentials and Cyber Essentials Plus Recertification To maintain a valid Cyber Essentials certificate, organisations must...
20 Key Statistics For 20 years of Cyber Security Awareness Month As of June 2023 it has been 20 years...
In April 2025, this blog was updated to give you more up to date info and statistics. The Benefits Of...
Identifying and Fixing Common Firewall Misconfigurations The role of the firewall has shifted a great deal in the last decade,...
Passwords Are Out, It’s Time for Passwordless With Passkeys in 2025! If you haven’t already started using these for your...
Network Segmentation Explained: Key Concepts and Benefits Understanding Network Segmentation Network segmentation is a cyber security strategy that involves...
Your Guide to Secure Access Service Edge (SASE) As organisations increasingly embrace digital transformation, securing their networks has become paramount....
Quantifying Risk: A Look into Vulnerability Scoring Incl. CVSS & Qualys Decoding CVSS: An Introduction to Vulnerability Scoring The Common...
The Ransomware Ecosystem: RaaS, Extortion and the Impact on Your Business “Ransomware continues to be the most significant, serious and organised cyber crime threat faced by the UK.”...
What are the Different Types of Penetration Testing? Penetration testing, which can also be known as pen testing, is a...
The terms and conditions available on this page cover all product sales and vSOC Services. If you would like to...
Purpose This Privacy Statement describes Data Connect Groups’ privacy practices in relation to the use of the Company Web sites...
The Dangers of Social Media Social media has become an integral part of everyone’s daily lives. With the benefits of...
Global Alert: The increased threat of ransomware The NCSC, in a joint effort with US and Australian advisories, have warned organisations...
The Threat Landscape: 10 Insights from Data Connect's Cyber Security Experts Drawing on extensive research and deep industry insights, Data...
Charity Cyber Essentials Awareness Month Proud Certification Body and Cyber Advisor At Data Connect, we are proud to...
In April 2025, this blog was updated to add further context to the upcoming changes. Willow: New Cyber Essentials Question...
Do AI Tools Pose a Security Risk to Businesses? With the increasing prevalence of AI (artificial intelligence) tools for businesses,...
Steps to Simplify Cyber Essentials and Cyber Essentials Plus Recertification To maintain a valid Cyber Essentials certificate, organisations must...
20 Key Statistics For 20 years of Cyber Security Awareness Month As of June 2023 it has been 20 years...
In April 2025, this blog was updated to give you more up to date info and statistics. The Benefits Of...
Identifying and Fixing Common Firewall Misconfigurations The role of the firewall has shifted a great deal in the last decade,...
Passwords Are Out, It’s Time for Passwordless With Passkeys in 2025! If you haven’t already started using these for your...
Network Segmentation Explained: Key Concepts and Benefits Understanding Network Segmentation Network segmentation is a cyber security strategy that involves...
Your Guide to Secure Access Service Edge (SASE) As organisations increasingly embrace digital transformation, securing their networks has become paramount....
Quantifying Risk: A Look into Vulnerability Scoring Incl. CVSS & Qualys Decoding CVSS: An Introduction to Vulnerability Scoring The Common...
The Ransomware Ecosystem: RaaS, Extortion and the Impact on Your Business “Ransomware continues to be the most significant, serious and organised cyber crime threat faced by the UK.”...
What are the Different Types of Penetration Testing? Penetration testing, which can also be known as pen testing, is a...
The Dangers of Social Media Social media has become an integral part of everyone’s daily lives. With the benefits of...
Global Alert: The increased threat of ransomware The NCSC, in a joint effort with US and Australian advisories, have warned organisations...
The terms and conditions available on this page cover all product sales and vSOC Services. If you would like to...
Purpose This Privacy Statement describes Data Connect Groups’ privacy practices in relation to the use of the Company Web sites...