Security Information and Event Management (SIEM)

A security platform which collects and displays information about a system searching for IOTs and reporting them to a Cyber...

Information Sharing

The distribution of information by systems or people as allowed by access rights configuration.

Information Security

Protecting organisational data from theft or access from potential hackers.

Do AI Tools Pose a Security Risk to Businesses?

Do AI Tools Pose a Security Risk to Businesses? With the increasing prevalence of AI (artificial intelligence)  tools for businesses,...

Why Your Business Is More Susceptible to Attack Over the Festive Season

Why Your Business Is More Susceptible to Attack Over the Festive Season   Often, the festive season sees a good...

The Ransomware Ecosystem: RaaS, Extortion and the Impact on Your Business

The Ransomware Ecosystem:  RaaS, Extortion and the Impact on Your Business   “Ransomware continues to be the most significant, serious and organised cyber crime threat faced by the UK.”...

20 Key Statistics For 20 years of Cyber Security Awareness Month

20 Key Statistics For 20 years of Cyber Security Awareness Month As of June 2023 it has been 20 years...

What are the Different Types of Penetration Testing?

What are the Different Types of Penetration Testing? Penetration testing, which can also be known as pen testing, is a...

Podcast | Being Real With Cyber Security: The Implications of Emerging Apps

‘It’s Time to BeReal’. In our latest podcast, we’re joined by a guest, Georgia, to talk about the popular app,...

Two Factor Authentication (2FA)

An access management strategy, the tool involves requiring a secondary form of identification to allow access to sensitive information.

Social engineering

Manipulating people into carrying out specific actions, or divulging information, that's of use to an attacker.

Smishing

A amalgamation of the words ‘phishing’ and ‘SMS’ in which mobile phone text messages are sent by an attacker with...

Private Key

A similar concept to a password, yet rather than using characters, private keys create digital signatures, which are often randomly...

Personal Data

Data and information that relates to a specific identifiable person. This can include surnames, phone numbers to IP addresses.

Ey-Up! What’s Securin’? The Data Connect Podcast

We are excited to announce the launch of our brand new podcast, What’s Securin’? At Data Connect we help organisations...

Inadvertent Disclosure

When an individual unknowingly sends sensitive information out of an organisations systems.

Gap Analysis

A cyber security gap analysis helps organisations determine where they are currently in terms of their cyber and information security....

Encryption

To encrypt information is to make it unreadable to all except for those with the key to decode it.

Digital Footprint

The digital information that is left behind from a user’s online activity is their ‘footprint’.

Data Leakage Prevention (DLP)

To ensure that sensitive information does not leave your systems, DLP software can be installed to prevent this. This can...

Cross Site Scripting (XSS)

Cross Site Scripting is an attack method whereby the attacker has infected a website with malicious scripts onto an otherwise...

Clear Text

Information that has not been encrypted.

Awareness Training

This is a programme designed to assist users and employees to develop their understanding of their role into reducing information...

Terms & Conditions

The terms and conditions available on this page cover all product sales and vSOC Services. If you would like to...

Privacy Statement

Purpose This Privacy Statement describes Data Connect Groups’ privacy practices in relation to the use of the Company Web sites...

The Dangers of Social Media

The Dangers of Social Media Social media has become an integral part of everyone’s daily lives. With the benefits of...

Cautionary Advice: Law Firm Hit with ICO Fine Due to Cyber Security Negligence

Cautionary Advice: Law Firm Hit with ICO Fine Due to Cyber Security Negligence Tuckers Solicitors has been hit with a...

Global Alert: The increased threat of ransomware

Global Alert: The increased threat of ransomware The NCSC, in a joint effort with US and Australian advisories, have warned organisations...

Cyber Essentials: Major Updates in 2022

Cyber Essentials: Major Updates in 2022 Cyber Essentials has just undergone the largest update since its launch in 2014. In...

Human Layer Security: How To Reduce Risk If Awareness Training Fails

Human Layer Security: How To Reduce Risk If Awareness Training Fails It’s important to note that the human firewall is...

Building On Your Cyber Security Posture In The Construction Industry

Building On Your Cyber Security Posture In The Construction Industry The construction industry encompasses the literal building blocks of the...

Is Passwordless Feasible or Aspirational?

Is Passwordless Feasible or Aspirational? Microsoft is just one example of a brand that has been talking about going ‘passwordless’...

NCSC Alert: Rise in cyber attacks hitting the education sector

NCSC Alert: Rise in cyber attacks hitting the education sector There has been a sharp rise in ransomware attacks for...

Cyber Essentials: Technical Control Themes

Cyber Essentials: Technical Control Themes In our last blog we shared the fundamental information about the Cyber Essentials scheme. This...

The Fundamentals: Cyber Essentials

The Fundamentals: Cyber Essentials Cyber Essentials is the perfect name for the Government backed scheme. The principles behind the scheme...

Cyber Essentials Webinar 2020

Cyber Essentials Webinar 2020 Join us for a 40 minute informative Cyber Essentials webinar.  We will share valuable information to...

Firewall Webinar Alert: An independent Overview

Firewall Webinar Alert: An independent Overview If you are thinking of buying a firewall and want some advice on what’s...

Cyber Security for the Cloud

Cyber Security for the Cloud Friday 27th September 2019 – Imperial War Museum North, 10am – 2pm Join us for...

Security in Office365

Security in Office365 Microsoft #office365 is one of the most widely adopted cloud platforms across the globe and is something that many...

Crypto Jacking

Crypto Jacking Are you protected against crypto mining attacks or is someone using your systems without your knowledge?  Crypto mining is...

Load more
Do AI Tools Pose a Security Risk to Businesses?

Do AI Tools Pose a Security Risk to Businesses? With the increasing prevalence of AI (artificial intelligence)  tools for businesses,...

Why Your Business Is More Susceptible to Attack Over the Festive Season

Why Your Business Is More Susceptible to Attack Over the Festive Season   Often, the festive season sees a good...

The Ransomware Ecosystem: RaaS, Extortion and the Impact on Your Business

The Ransomware Ecosystem:  RaaS, Extortion and the Impact on Your Business   “Ransomware continues to be the most significant, serious and organised cyber crime threat faced by the UK.”...

20 Key Statistics For 20 years of Cyber Security Awareness Month

20 Key Statistics For 20 years of Cyber Security Awareness Month As of June 2023 it has been 20 years...

What are the Different Types of Penetration Testing?

What are the Different Types of Penetration Testing? Penetration testing, which can also be known as pen testing, is a...

Podcast | Being Real With Cyber Security: The Implications of Emerging Apps

‘It’s Time to BeReal’. In our latest podcast, we’re joined by a guest, Georgia, to talk about the popular app,...

Ey-Up! What’s Securin’? The Data Connect Podcast

We are excited to announce the launch of our brand new podcast, What’s Securin’? At Data Connect we help organisations...

The Dangers of Social Media

The Dangers of Social Media Social media has become an integral part of everyone’s daily lives. With the benefits of...

Cautionary Advice: Law Firm Hit with ICO Fine Due to Cyber Security Negligence

Cautionary Advice: Law Firm Hit with ICO Fine Due to Cyber Security Negligence Tuckers Solicitors has been hit with a...

Global Alert: The increased threat of ransomware

Global Alert: The increased threat of ransomware The NCSC, in a joint effort with US and Australian advisories, have warned organisations...

Cyber Essentials: Major Updates in 2022

Cyber Essentials: Major Updates in 2022 Cyber Essentials has just undergone the largest update since its launch in 2014. In...

Human Layer Security: How To Reduce Risk If Awareness Training Fails

Human Layer Security: How To Reduce Risk If Awareness Training Fails It’s important to note that the human firewall is...

Building On Your Cyber Security Posture In The Construction Industry

Building On Your Cyber Security Posture In The Construction Industry The construction industry encompasses the literal building blocks of the...

Is Passwordless Feasible or Aspirational?

Is Passwordless Feasible or Aspirational? Microsoft is just one example of a brand that has been talking about going ‘passwordless’...

NCSC Alert: Rise in cyber attacks hitting the education sector

NCSC Alert: Rise in cyber attacks hitting the education sector There has been a sharp rise in ransomware attacks for...

Cyber Essentials: Technical Control Themes

Cyber Essentials: Technical Control Themes In our last blog we shared the fundamental information about the Cyber Essentials scheme. This...

The Fundamentals: Cyber Essentials

The Fundamentals: Cyber Essentials Cyber Essentials is the perfect name for the Government backed scheme. The principles behind the scheme...

Cyber Essentials Webinar 2020

Cyber Essentials Webinar 2020 Join us for a 40 minute informative Cyber Essentials webinar.  We will share valuable information to...

Firewall Webinar Alert: An independent Overview

Firewall Webinar Alert: An independent Overview If you are thinking of buying a firewall and want some advice on what’s...

Cyber Security for the Cloud

Cyber Security for the Cloud Friday 27th September 2019 – Imperial War Museum North, 10am – 2pm Join us for...

Security in Office365

Security in Office365 Microsoft #office365 is one of the most widely adopted cloud platforms across the globe and is something that many...

Crypto Jacking

Crypto Jacking Are you protected against crypto mining attacks or is someone using your systems without your knowledge?  Crypto mining is...

Load more
Terms & Conditions

The terms and conditions available on this page cover all product sales and vSOC Services. If you would like to...

Privacy Statement

Purpose This Privacy Statement describes Data Connect Groups’ privacy practices in relation to the use of the Company Web sites...

Load more
Security Information and Event Management (SIEM)

A security platform which collects and displays information about a system searching for IOTs and reporting them to a Cyber...

Information Sharing

The distribution of information by systems or people as allowed by access rights configuration.

Information Security

Protecting organisational data from theft or access from potential hackers.

Two Factor Authentication (2FA)

An access management strategy, the tool involves requiring a secondary form of identification to allow access to sensitive information.

Social engineering

Manipulating people into carrying out specific actions, or divulging information, that's of use to an attacker.

Smishing

A amalgamation of the words ‘phishing’ and ‘SMS’ in which mobile phone text messages are sent by an attacker with...

Private Key

A similar concept to a password, yet rather than using characters, private keys create digital signatures, which are often randomly...

Personal Data

Data and information that relates to a specific identifiable person. This can include surnames, phone numbers to IP addresses.

Inadvertent Disclosure

When an individual unknowingly sends sensitive information out of an organisations systems.

Gap Analysis

A cyber security gap analysis helps organisations determine where they are currently in terms of their cyber and information security....

Encryption

To encrypt information is to make it unreadable to all except for those with the key to decode it.

Digital Footprint

The digital information that is left behind from a user’s online activity is their ‘footprint’.

Data Leakage Prevention (DLP)

To ensure that sensitive information does not leave your systems, DLP software can be installed to prevent this. This can...

Cross Site Scripting (XSS)

Cross Site Scripting is an attack method whereby the attacker has infected a website with malicious scripts onto an otherwise...

Clear Text

Information that has not been encrypted.

Awareness Training

This is a programme designed to assist users and employees to develop their understanding of their role into reducing information...

Load more