What are the Different Types of Penetration Testing? Penetration testing, which can also be known as pen testing, is a process that is used to...
PODCAST | Working in Cyber Security: The Skills Gap, Recruitment and Diversity Listen to our latest podcast episode below called Working in Cyber Security: The...
The Myriad of Detection and Response Acronyms Right now, there’s a lot of buzz in the security industry around detection and response technologies and associated...
‘It’s Time to BeReal’. In our latest podcast, we’re joined by a guest, Georgia, to talk about the popular app, BeReal. We explore the risks...
Here we go again… continuing our discussion on Cyber Essentials but with a focus on the technical aspects of Cyber Essentials Plus and looking at...
We are excited to announce the launch of our brand new podcast, What’s Securin’? At Data Connect we help organisations of all sizes improve their...
In April 2025, this blog was updated to give you more up to date info and statistics. The Benefits Of Outsourcing Your Cyber Security ...
The Dangers of Social Media Social media has become an integral part of everyone’s daily lives. With the benefits of communication, meeting new people, forming...
The 5 Critical Challenges Affecting Data Protection Officers Unlike other departmental roles, a DPO does not fit neatly within an organisation’s structure, often further complicating...
Cautionary Advice: Law Firm Hit with ICO Fine Due to Cyber Security Negligence Tuckers Solicitors has been hit with a £98,000 fine by the Information Commissioner’s...
Global Alert: The increased threat of ransomware The NCSC, in a joint effort with US and Australian advisories, have warned organisations about ransomware and the sophistication...
Cyber Essentials: Major Updates in 2022 Cyber Essentials has just undergone the largest update since its launch in 2014. In December 2021, IASME and the NCSC announced...