5 Key Takeaways From DTX Manchester 2025 On the 2-3rd April, we spent two exciting days exhibiting at DTX Manchester. Lots of interesting talks...
How St James's Place Used Cyber Essentials to Dramatically Reduce Supply Chain Risks “A CE+ compliant Partnership network has made a massive difference to...
Identifying and Fixing Common Firewall Misconfigurations The role of the firewall has shifted a great deal in the last decade, becoming more and more feature...
The Threat Landscape: 10 Insights from Data Connect's Cyber Security Experts Drawing on extensive research and deep industry insights, Data Connect's cyber security experts have...
What You Need to Know About the Cyber Essentials Plus Certification Process All organisations with Cyber Essentials SHOULD be able to achieve Cyber Essentials Plus....
Passwords Are Out, It’s Time for Passwordless With Passkeys in 2025! If you haven’t already started using these for your business and personal apps then...
Navigating Cyber Risk: A C-Suite Perspective What is the pivotal factor transforming the way organisations operate, drive efficiency, and propel substantial growth? The answer...
Network Segmentation Explained: Key Concepts and Benefits Understanding Network Segmentation Network segmentation is a cyber security strategy that involves dividing a large network into...
Your Guide to Secure Access Service Edge (SASE) As organisations increasingly embrace digital transformation, securing their networks has become paramount. A comprehensive approach to network...
Quantifying Risk: A Look into Vulnerability Scoring Incl. CVSS & Qualys Decoding CVSS: An Introduction to Vulnerability Scoring The Common Vulnerability Scoring System (CVSS) is...
Charity Cyber Essentials Awareness Month Proud Certification Body and Cyber Advisor At Data Connect, we are proud to be a Certification Body, Assured...
In April 2025, this blog was updated to add further context to the upcoming changes. Willow: New Cyber Essentials Question Set Published by IASME and...