The Threat Landscape: 10 Insights from Data Connect’s Cyber Security Experts

The Threat Landscape: 10 Insights from Data Connect's Cyber Security Experts Drawing on extensive research and deep industry insights, Data Connect's cyber security experts have...

What You Need to Know About the Cyber Essentials Plus Process

What You Need to Know About the Cyber Essentials Plus Certification Process All organisations with Cyber Essentials SHOULD be able to achieve Cyber Essentials Plus....

Passwords Are Out, It’s Time for Passwordless With Passkeys in 2025!

Passwords Are Out, It’s Time for Passwordless With Passkeys in 2025! If you haven’t already started using these for your business and personal apps then...

Navigating Cyber Risk: A C-Suite Perspective

Navigating Cyber Risk: A C-Suite Perspective   What is the pivotal factor transforming the way organisations operate, drive efficiency, and propel substantial growth? The answer...

Cyber Risk, December 18, 2024
Network Segmentation Explained: Key Concepts and Benefits 

Network Segmentation Explained: Key Concepts and Benefits    Understanding Network Segmentation  Network segmentation is a cyber security strategy that involves dividing a large network into...

Your Guide to Secure Access Service Edge (SASE)

Your Guide to Secure Access Service Edge (SASE) As organisations increasingly embrace digital transformation, securing their networks has become paramount. A comprehensive approach to network...

Quantifying Risk: A Look into Vulnerability Scoring Incl. CVSS & Qualys

Quantifying Risk: A Look into Vulnerability Scoring Incl. CVSS & Qualys Decoding CVSS: An Introduction to Vulnerability Scoring The Common Vulnerability Scoring System (CVSS) is...

Charity Cyber Essentials Awareness Month

Charity Cyber Essentials Awareness Month     Proud Certification Body and Cyber Advisor At Data Connect, we are proud to be a Certification Body, Assured...

Willow: New Cyber Essentials Question Set Published by IASME and NCSC

Willow: New Cyber Essentials Question Set Published by IASME and the NCSC   Willow, the new Cyber Essentials question set, was published on Monday (23rd...

The Impact of Cyber Essentials: A 10-Year Review

The Impact of Cyber Essentials: A 10-Year Review   The Cyber Essentials scheme has celebrated its 10th anniversary this year, so we thought it would...

Exposed: Critical Vulnerabilities in Remote Access VPNs

Exposed: Critical Vulnerabilities in Remote Access VPNs   Over the last year or so we have seen an uptick in critical vulnerabilities which have left...

Vulnerability Management: Why Taking a Risk-Based Approach is Important

Vulnerability Management: Why Taking a Risk-Based Approach is Important Technology and the threat landscape are constantly evolving, leaving organisations exposed to new risks. Managing security...