Navigating Cyber Risk: A C-Suite Perspective What is the pivotal factor transforming the way organisations operate, drive efficiency, and propel substantial...
Network Segmentation Explained: Key Concepts and Benefits Understanding Network Segmentation Network segmentation is a cyber security strategy that involves dividing a...
Your Guide to Secure Access Service Edge (SASE) As organisations increasingly embrace digital transformation, securing their networks has become paramount. A comprehensive...
Quantifying Risk: A Look into Vulnerability Scoring Incl. CVSS & Qualys Decoding CVSS: An Introduction to Vulnerability Scoring The Common Vulnerability Scoring...
Charity Cyber Essentials Awareness Month Proud Certification Body and Cyber Advisor At Data Connect, we are proud to be a...
Willow: New Cyber Essentials Question Set Published by IASME and the NCSC Willow, the new Cyber Essentials question set, was published...
The Impact of Cyber Essentials: A 10-Year Review The Cyber Essentials scheme has celebrated its 10th anniversary this year, so we...
The Ransomware Ecosystem: RaaS, Extortion and the Impact on Your Business “Ransomware continues to be the most significant, serious and organised cyber crime threat faced by the UK.” – James...
20 Key Statistics For 20 years of Cyber Security Awareness Month As of June 2023 it has been 20 years since experts...
PODCAST | Working in Cyber Security: The Skills Gap, Recruitment and Diversity Listen to our latest podcast episode below called Working in...
The Myriad of Detection and Response Acronyms Right now, there’s a lot of buzz in the security industry around detection and response...
‘It’s Time to BeReal’. In our latest podcast, we’re joined by a guest, Georgia, to talk about the popular app, BeReal. We...