5 Key Takeaways From DTX Manchester 2025

5 Key Takeaways From DTX Manchester 2025   On the 2-3rd April, we spent two exciting days exhibiting at DTX Manchester. Lots of interesting talks...

How St James’s Place Used Cyber Essentials to Dramatically Reduce Supply Chain Risks

How St James's Place Used Cyber Essentials to Dramatically Reduce Supply Chain Risks   “A CE+ compliant Partnership network has made a massive difference to...

Identifying and Fixing Common Firewall Misconfigurations

Identifying and Fixing Common Firewall Misconfigurations The role of the firewall has shifted a great deal in the last decade, becoming more and more feature...

The Threat Landscape: 10 Insights from Data Connect’s Cyber Security Experts

The Threat Landscape: 10 Insights from Data Connect's Cyber Security Experts Drawing on extensive research and deep industry insights, Data Connect's cyber security experts have...

What You Need to Know About the Cyber Essentials Plus Process

What You Need to Know About the Cyber Essentials Plus Certification Process All organisations with Cyber Essentials SHOULD be able to achieve Cyber Essentials Plus....

Passwords Are Out, It’s Time for Passwordless With Passkeys in 2025!

Passwords Are Out, It’s Time for Passwordless With Passkeys in 2025! If you haven’t already started using these for your business and personal apps then...

Navigating Cyber Risk: A C-Suite Perspective

Navigating Cyber Risk: A C-Suite Perspective   What is the pivotal factor transforming the way organisations operate, drive efficiency, and propel substantial growth? The answer...

Cyber Risk, December 18, 2024
Network Segmentation Explained: Key Concepts and Benefits 

Network Segmentation Explained: Key Concepts and Benefits    Understanding Network Segmentation  Network segmentation is a cyber security strategy that involves dividing a large network into...

Your Guide to Secure Access Service Edge (SASE)

Your Guide to Secure Access Service Edge (SASE) As organisations increasingly embrace digital transformation, securing their networks has become paramount. A comprehensive approach to network...

Quantifying Risk: A Look into Vulnerability Scoring Incl. CVSS & Qualys

Quantifying Risk: A Look into Vulnerability Scoring Incl. CVSS & Qualys Decoding CVSS: An Introduction to Vulnerability Scoring The Common Vulnerability Scoring System (CVSS) is...

Charity Cyber Essentials Awareness Month

Charity Cyber Essentials Awareness Month     Proud Certification Body and Cyber Advisor At Data Connect, we are proud to be a Certification Body, Assured...

Willow: New Cyber Essentials Question Set Published by IASME and NCSC

In April 2025, this blog was updated to add further context to the upcoming changes.  Willow: New Cyber Essentials Question Set Published by IASME and...