The Threat Landscape: 10 Insights from Data Connect’s Cyber Security Experts

The Threat Landscape: 10 Insights from Data Connect's Cyber Security Experts Drawing on extensive research and deep industry insights, Data...

Charity Cyber Essentials Awareness Month

Charity Cyber Essentials Awareness Month     Proud Certification Body and Cyber Advisor At Data Connect, we are proud to...

Willow: New Cyber Essentials Question Set Published by IASME and NCSC

In April 2025, this blog was updated to add further context to the upcoming changes.  Willow: New Cyber Essentials Question...

Do AI Tools Pose a Security Risk to Businesses?

Do AI Tools Pose a Security Risk to Businesses? With the increasing prevalence of AI (artificial intelligence)  tools for businesses,...

Steps to Simplify Cyber Essentials and Cyber Essentials Plus Recertification

Steps to Simplify Cyber Essentials and Cyber Essentials Plus Recertification   To maintain a valid Cyber Essentials certificate, organisations must...

20 Key Statistics For 20 years of Cyber Security Awareness Month

20 Key Statistics For 20 years of Cyber Security Awareness Month As of June 2023 it has been 20 years...

The Benefits Of Outsourcing Your Cyber Security

In April 2025, this blog was updated to give you more up to date info and statistics.  The Benefits Of...

Identifying and Fixing Common Firewall Misconfigurations

Identifying and Fixing Common Firewall Misconfigurations The role of the firewall has shifted a great deal in the last decade,...

Passwords Are Out, It’s Time for Passwordless With Passkeys in 2025!

Passwords Are Out, It’s Time for Passwordless With Passkeys in 2025! If you haven’t already started using these for your...

Network Segmentation Explained: Key Concepts and Benefits 

Network Segmentation Explained: Key Concepts and Benefits    Understanding Network Segmentation  Network segmentation is a cyber security strategy that involves...

Your Guide to Secure Access Service Edge (SASE)

Your Guide to Secure Access Service Edge (SASE) As organisations increasingly embrace digital transformation, securing their networks has become paramount....

Quantifying Risk: A Look into Vulnerability Scoring Incl. CVSS & Qualys

Quantifying Risk: A Look into Vulnerability Scoring Incl. CVSS & Qualys Decoding CVSS: An Introduction to Vulnerability Scoring The Common...

The Ransomware Ecosystem: RaaS, Extortion and the Impact on Your Business

The Ransomware Ecosystem:  RaaS, Extortion and the Impact on Your Business   “Ransomware continues to be the most significant, serious and organised cyber crime threat faced by the UK.”...

What are the Different Types of Penetration Testing?

What are the Different Types of Penetration Testing? Penetration testing, which can also be known as pen testing, is a...

Terms & Conditions

The terms and conditions available on this page cover all product sales and vSOC Services. If you would like to...

Privacy Statement

Purpose This Privacy Statement describes Data Connect Groups’ privacy practices in relation to the use of the Company Web sites...

The Dangers of Social Media

The Dangers of Social Media Social media has become an integral part of everyone’s daily lives. With the benefits of...

Global Alert: The increased threat of ransomware

Global Alert: The increased threat of ransomware The NCSC, in a joint effort with US and Australian advisories, have warned organisations...

Load more
The Threat Landscape: 10 Insights from Data Connect’s Cyber Security Experts

The Threat Landscape: 10 Insights from Data Connect's Cyber Security Experts Drawing on extensive research and deep industry insights, Data...

Charity Cyber Essentials Awareness Month

Charity Cyber Essentials Awareness Month     Proud Certification Body and Cyber Advisor At Data Connect, we are proud to...

Willow: New Cyber Essentials Question Set Published by IASME and NCSC

In April 2025, this blog was updated to add further context to the upcoming changes.  Willow: New Cyber Essentials Question...

Do AI Tools Pose a Security Risk to Businesses?

Do AI Tools Pose a Security Risk to Businesses? With the increasing prevalence of AI (artificial intelligence)  tools for businesses,...

Steps to Simplify Cyber Essentials and Cyber Essentials Plus Recertification

Steps to Simplify Cyber Essentials and Cyber Essentials Plus Recertification   To maintain a valid Cyber Essentials certificate, organisations must...

20 Key Statistics For 20 years of Cyber Security Awareness Month

20 Key Statistics For 20 years of Cyber Security Awareness Month As of June 2023 it has been 20 years...

The Benefits Of Outsourcing Your Cyber Security

In April 2025, this blog was updated to give you more up to date info and statistics.  The Benefits Of...

Identifying and Fixing Common Firewall Misconfigurations

Identifying and Fixing Common Firewall Misconfigurations The role of the firewall has shifted a great deal in the last decade,...

Passwords Are Out, It’s Time for Passwordless With Passkeys in 2025!

Passwords Are Out, It’s Time for Passwordless With Passkeys in 2025! If you haven’t already started using these for your...

Network Segmentation Explained: Key Concepts and Benefits 

Network Segmentation Explained: Key Concepts and Benefits    Understanding Network Segmentation  Network segmentation is a cyber security strategy that involves...

Your Guide to Secure Access Service Edge (SASE)

Your Guide to Secure Access Service Edge (SASE) As organisations increasingly embrace digital transformation, securing their networks has become paramount....

Quantifying Risk: A Look into Vulnerability Scoring Incl. CVSS & Qualys

Quantifying Risk: A Look into Vulnerability Scoring Incl. CVSS & Qualys Decoding CVSS: An Introduction to Vulnerability Scoring The Common...

The Ransomware Ecosystem: RaaS, Extortion and the Impact on Your Business

The Ransomware Ecosystem:  RaaS, Extortion and the Impact on Your Business   “Ransomware continues to be the most significant, serious and organised cyber crime threat faced by the UK.”...

What are the Different Types of Penetration Testing?

What are the Different Types of Penetration Testing? Penetration testing, which can also be known as pen testing, is a...

The Dangers of Social Media

The Dangers of Social Media Social media has become an integral part of everyone’s daily lives. With the benefits of...

Global Alert: The increased threat of ransomware

Global Alert: The increased threat of ransomware The NCSC, in a joint effort with US and Australian advisories, have warned organisations...

Load more
Terms & Conditions

The terms and conditions available on this page cover all product sales and vSOC Services. If you would like to...

Privacy Statement

Purpose This Privacy Statement describes Data Connect Groups’ privacy practices in relation to the use of the Company Web sites...

Load more