A security platform which collects and displays information about a system searching for IOTs and reporting them to a Cyber...
The distribution of information by systems or people as allowed by access rights configuration.
Protecting organisational data from theft or access from potential hackers.
Navigating Cyber Risk: A C-Suite Perspective What is the pivotal factor transforming the way organisations operate, drive efficiency, and...
Network Segmentation Explained: Key Concepts and Benefits Understanding Network Segmentation Network segmentation is a cyber security strategy that involves...
Charity Cyber Essentials Awareness Month Proud Certification Body and Cyber Advisor At Data Connect, we are proud to...
Willow: New Cyber Essentials Question Set Published by IASME and the NCSC Willow, the new Cyber Essentials question set,...
The Impact of Cyber Essentials: A 10-Year Review The Cyber Essentials scheme has celebrated its 10th anniversary this year,...
Exposed: Critical Vulnerabilities in Remote Access VPNs Over the last year or so we have seen an uptick in...
Data Loss Prevention (DLP) refers to a set of tools and strategies used to identify, monitor, and protect sensitive data...
Identity management in cyber security refers to the framework of policies and technologies for ensuring that the proper people in...
Remote Browser Isolation (RBI) is a cyber security technology that separates browsing activity from a user's local network and device....
Vulnerability Management: Why Taking a Risk-Based Approach is Important Technology and the threat landscape are constantly evolving, leaving organisations exposed...
Do AI Tools Pose a Security Risk to Businesses? With the increasing prevalence of AI (artificial intelligence) tools for businesses,...
*This blog was updated in December 2024* Why Your Business is More Susceptible to Cyber Attack Over the Festive Season...
The Ransomware Ecosystem: RaaS, Extortion and the Impact on Your Business “Ransomware continues to be the most significant, serious and organised cyber crime threat faced by the UK.”...
20 Key Statistics For 20 years of Cyber Security Awareness Month As of June 2023 it has been 20 years...
What are the Different Types of Penetration Testing? Penetration testing, which can also be known as pen testing, is a...
‘It’s Time to BeReal’. In our latest podcast, we’re joined by a guest, Georgia, to talk about the popular app,...
An access management strategy, the tool involves requiring a secondary form of identification to allow access to sensitive information.
Manipulating people into carrying out specific actions, or divulging information, that's of use to an attacker.
A amalgamation of the words ‘phishing’ and ‘SMS’ in which mobile phone text messages are sent by an attacker with...
A similar concept to a password, yet rather than using characters, private keys create digital signatures, which are often randomly...
Data and information that relates to a specific identifiable person. This can include surnames, phone numbers to IP addresses.
We are excited to announce the launch of our brand new podcast, What’s Securin’? At Data Connect we help organisations...
When an individual unknowingly sends sensitive information out of an organisations systems.
A cyber security gap analysis helps organisations determine where they are currently in terms of their cyber and information security....
To encrypt information is to make it unreadable to all except for those with the key to decode it.
The digital information that is left behind from a user’s online activity is their ‘footprint’.
To ensure that sensitive information does not leave your systems, DLP software can be installed to prevent this. This can...
Cross Site Scripting is an attack method whereby the attacker has infected a website with malicious scripts onto an otherwise...
Information that has not been encrypted.
This is a programme designed to assist users and employees to develop their understanding of their role into reducing information...
The terms and conditions available on this page cover all product sales and vSOC Services. If you would like to...
Purpose This Privacy Statement describes Data Connect Groups’ privacy practices in relation to the use of the Company Web sites...
The Dangers of Social Media Social media has become an integral part of everyone’s daily lives. With the benefits of...
Cautionary Advice: Law Firm Hit with ICO Fine Due to Cyber Security Negligence Tuckers Solicitors has been hit with a...
Global Alert: The increased threat of ransomware The NCSC, in a joint effort with US and Australian advisories, have warned organisations...
Cyber Essentials: Major Updates in 2022 Cyber Essentials has just undergone the largest update since its launch in 2014. In...
Human Layer Security: How To Reduce Risk If Awareness Training Fails It’s important to note that the human firewall is...
Building On Your Cyber Security Posture In The Construction Industry The construction industry encompasses the literal building blocks of the...
Is Passwordless Feasible or Aspirational? Microsoft is just one example of a brand that has been talking about going ‘passwordless’...
NCSC Alert: Rise in cyber attacks hitting the education sector There has been a sharp rise in ransomware attacks for...
Cyber Essentials: Technical Control Themes In our last blog we shared the fundamental information about the Cyber Essentials scheme. This...
The Fundamentals: Cyber Essentials Cyber Essentials is the perfect name for the Government backed scheme. The principles behind the scheme...
Cyber Essentials Webinar 2020 Join us for a 40 minute informative Cyber Essentials webinar. We will share valuable information to...
Firewall Webinar Alert: An independent Overview If you are thinking of buying a firewall and want some advice on what’s...
Cyber Security for the Cloud Friday 27th September 2019 – Imperial War Museum North, 10am – 2pm Join us for...
Security in Office365 Microsoft #office365 is one of the most widely adopted cloud platforms across the globe and is something that many...
Crypto Jacking Are you protected against crypto mining attacks or is someone using your systems without your knowledge? Crypto mining is...
Navigating Cyber Risk: A C-Suite Perspective What is the pivotal factor transforming the way organisations operate, drive efficiency, and...
Network Segmentation Explained: Key Concepts and Benefits Understanding Network Segmentation Network segmentation is a cyber security strategy that involves...
Charity Cyber Essentials Awareness Month Proud Certification Body and Cyber Advisor At Data Connect, we are proud to...
Willow: New Cyber Essentials Question Set Published by IASME and the NCSC Willow, the new Cyber Essentials question set,...
The Impact of Cyber Essentials: A 10-Year Review The Cyber Essentials scheme has celebrated its 10th anniversary this year,...
Exposed: Critical Vulnerabilities in Remote Access VPNs Over the last year or so we have seen an uptick in...
Vulnerability Management: Why Taking a Risk-Based Approach is Important Technology and the threat landscape are constantly evolving, leaving organisations exposed...
Do AI Tools Pose a Security Risk to Businesses? With the increasing prevalence of AI (artificial intelligence) tools for businesses,...
*This blog was updated in December 2024* Why Your Business is More Susceptible to Cyber Attack Over the Festive Season...
The Ransomware Ecosystem: RaaS, Extortion and the Impact on Your Business “Ransomware continues to be the most significant, serious and organised cyber crime threat faced by the UK.”...
20 Key Statistics For 20 years of Cyber Security Awareness Month As of June 2023 it has been 20 years...
What are the Different Types of Penetration Testing? Penetration testing, which can also be known as pen testing, is a...
‘It’s Time to BeReal’. In our latest podcast, we’re joined by a guest, Georgia, to talk about the popular app,...
We are excited to announce the launch of our brand new podcast, What’s Securin’? At Data Connect we help organisations...
The Dangers of Social Media Social media has become an integral part of everyone’s daily lives. With the benefits of...
Cautionary Advice: Law Firm Hit with ICO Fine Due to Cyber Security Negligence Tuckers Solicitors has been hit with a...
Global Alert: The increased threat of ransomware The NCSC, in a joint effort with US and Australian advisories, have warned organisations...
Cyber Essentials: Major Updates in 2022 Cyber Essentials has just undergone the largest update since its launch in 2014. In...
Human Layer Security: How To Reduce Risk If Awareness Training Fails It’s important to note that the human firewall is...
Building On Your Cyber Security Posture In The Construction Industry The construction industry encompasses the literal building blocks of the...
Is Passwordless Feasible or Aspirational? Microsoft is just one example of a brand that has been talking about going ‘passwordless’...
NCSC Alert: Rise in cyber attacks hitting the education sector There has been a sharp rise in ransomware attacks for...
Cyber Essentials: Technical Control Themes In our last blog we shared the fundamental information about the Cyber Essentials scheme. This...
The Fundamentals: Cyber Essentials Cyber Essentials is the perfect name for the Government backed scheme. The principles behind the scheme...
Cyber Essentials Webinar 2020 Join us for a 40 minute informative Cyber Essentials webinar. We will share valuable information to...
Firewall Webinar Alert: An independent Overview If you are thinking of buying a firewall and want some advice on what’s...
Cyber Security for the Cloud Friday 27th September 2019 – Imperial War Museum North, 10am – 2pm Join us for...
Security in Office365 Microsoft #office365 is one of the most widely adopted cloud platforms across the globe and is something that many...
Crypto Jacking Are you protected against crypto mining attacks or is someone using your systems without your knowledge? Crypto mining is...
The terms and conditions available on this page cover all product sales and vSOC Services. If you would like to...
Purpose This Privacy Statement describes Data Connect Groups’ privacy practices in relation to the use of the Company Web sites...
A security platform which collects and displays information about a system searching for IOTs and reporting them to a Cyber...
The distribution of information by systems or people as allowed by access rights configuration.
Protecting organisational data from theft or access from potential hackers.
Data Loss Prevention (DLP) refers to a set of tools and strategies used to identify, monitor, and protect sensitive data...
Identity management in cyber security refers to the framework of policies and technologies for ensuring that the proper people in...
Remote Browser Isolation (RBI) is a cyber security technology that separates browsing activity from a user's local network and device....
An access management strategy, the tool involves requiring a secondary form of identification to allow access to sensitive information.
Manipulating people into carrying out specific actions, or divulging information, that's of use to an attacker.
A amalgamation of the words ‘phishing’ and ‘SMS’ in which mobile phone text messages are sent by an attacker with...
A similar concept to a password, yet rather than using characters, private keys create digital signatures, which are often randomly...
Data and information that relates to a specific identifiable person. This can include surnames, phone numbers to IP addresses.
When an individual unknowingly sends sensitive information out of an organisations systems.
A cyber security gap analysis helps organisations determine where they are currently in terms of their cyber and information security....
To encrypt information is to make it unreadable to all except for those with the key to decode it.
The digital information that is left behind from a user’s online activity is their ‘footprint’.
To ensure that sensitive information does not leave your systems, DLP software can be installed to prevent this. This can...
Cross Site Scripting is an attack method whereby the attacker has infected a website with malicious scripts onto an otherwise...
Information that has not been encrypted.
This is a programme designed to assist users and employees to develop their understanding of their role into reducing information...