5 Key Takeaways From DTX Manchester 2025 On the 2-3rd April, we spent two exciting days exhibiting at DTX Manchester. Lots...
How St James's Place Used Cyber Essentials to Dramatically Reduce Supply Chain Risks “A CE+ compliant Partnership network has made a...
The Threat Landscape: 10 Insights from Data Connect's Cyber Security Experts Drawing on extensive research and deep industry insights, Data Connect's cyber...
What You Need to Know About the Cyber Essentials Plus Certification Process All organisations with Cyber Essentials SHOULD be able to achieve...
Navigating Cyber Risk: A C-Suite Perspective What is the pivotal factor transforming the way organisations operate, drive efficiency, and propel substantial...
Network Segmentation Explained: Key Concepts and Benefits Understanding Network Segmentation Network segmentation is a cyber security strategy that involves dividing a...
Your Guide to Secure Access Service Edge (SASE) As organisations increasingly embrace digital transformation, securing their networks has become paramount. A comprehensive...
Quantifying Risk: A Look into Vulnerability Scoring Incl. CVSS & Qualys Decoding CVSS: An Introduction to Vulnerability Scoring The Common Vulnerability Scoring...
Charity Cyber Essentials Awareness Month Proud Certification Body and Cyber Advisor At Data Connect, we are proud to be a...
In April 2025, this blog was updated to add further context to the upcoming changes. Willow: New Cyber Essentials Question Set Published...
The Impact of Cyber Essentials: A 10-Year Review The Cyber Essentials scheme has celebrated its 10th anniversary this year, so we...
The Ransomware Ecosystem: RaaS, Extortion and the Impact on Your Business “Ransomware continues to be the most significant, serious and organised cyber crime threat faced by the UK.” – James...