Network Segmentation Explained: Key Concepts and Benefits 

Network Segmentation Explained: Key Concepts and Benefits    Understanding Network Segmentation  Network segmentation is a cyber security strategy that involves dividing a large network into...

Technical, December 9, 2024
Your Guide to Secure Access Service Edge (SASE)

Your Guide to Secure Access Service Edge (SASE) As organisations increasingly embrace digital transformation, securing their networks has become paramount. A comprehensive approach to network...

Technical, November 21, 2024
Quantifying Risk: A Look into Vulnerability Scoring Incl. CVSS & Qualys

Quantifying Risk: A Look into Vulnerability Scoring Incl. CVSS & Qualys Decoding CVSS: An Introduction to Vulnerability Scoring The Common Vulnerability Scoring System (CVSS) is...

Charity Cyber Essentials Awareness Month

Charity Cyber Essentials Awareness Month     Proud Certification Body and Cyber Advisor At Data Connect, we are proud to be a Certification Body, Assured...

Willow: New Cyber Essentials Question Set Published by IASME and NCSC

Willow: New Cyber Essentials Question Set Published by IASME and the NCSC   Willow, the new Cyber Essentials question set, was published on Monday (23rd...

The Impact of Cyber Essentials: A 10-Year Review

The Impact of Cyber Essentials: A 10-Year Review   The Cyber Essentials scheme has celebrated its 10th anniversary this year, so we thought it would...

Exposed: Critical Vulnerabilities in Remote Access VPNs

Exposed: Critical Vulnerabilities in Remote Access VPNs   Over the last year or so we have seen an uptick in critical vulnerabilities which have left...

Vulnerability Management: Why Taking a Risk-Based Approach is Important

Vulnerability Management: Why Taking a Risk-Based Approach is Important Technology and the threat landscape are constantly evolving, leaving organisations exposed to new risks. Managing security...

Do AI Tools Pose a Security Risk to Businesses?

Do AI Tools Pose a Security Risk to Businesses? With the increasing prevalence of AI (artificial intelligence)  tools for businesses, many have taken this opportunity...

Steps to Simplify Cyber Essentials and Cyber Essentials Plus Recertification

Steps to Simplify Cyber Essentials and Cyber Essentials Plus Recertification   To maintain a valid Cyber Essentials certificate, organisations must complete the recertification process every...

The Ransomware Ecosystem: RaaS, Extortion and the Impact on Your Business

The Ransomware Ecosystem:  RaaS, Extortion and the Impact on Your Business   “Ransomware continues to be the most significant, serious and organised cyber crime threat faced by the UK.” – James Babbage, NCA Director ...

20 Key Statistics For 20 years of Cyber Security Awareness Month

20 Key Statistics For 20 years of Cyber Security Awareness Month As of June 2023 it has been 20 years since experts at GCHQ were...