SES Secure's Blogs Category All Cyber Security Software Escrow 10 August, 2021 How Can You Ensure Business Continuity & Mitigate Risk Post COVID-19? As we move on from the COVID-19 pandemic and return to the “new normal”. Darragh Lavin of SES explores how business continuity plans and the need to protect software assets has changed. 07 July, 2021 Join Our Survey "Understanding Your Cyber Security Landscape: 2021" Join our survey "Understanding Your Cyber Security Landscape: 2021" for your chance to win an Executive Cyber Awareness session with the CEO of our Cyber Security partner, Protection Group International; usually charged at £3,000. 23 June, 2021 5 Advantages To Exercising Your Cyber Incident Response Plan According to IBM’s 2020 Cost Of A Data Breach Report, the average total cost of a successful breach in 2020 was $3.86 million. Can you afford not to put a robust Incident Response Plan in place? 16 June, 2021 How Do You Test Your Recovery Procedure? Having a disaster recovery plan to protect against unforeseen circumstances is essential to getting your business back online should the worst happen. With that in mind, how do you test that the recovery plans you have invested in are robust enough to guarantee that your critical applications can be swiftly and accurately redeployed in the event of a release? 09 June, 2021 Penetration Testing: How To Protect Your Business Against Cyber Threats What is Penetration Testing and how does it protect your business? Adam Boland of SES explores how Penetration Testing enables you to identify weaknesses in your organisation’s cyber security. 02 June, 2021 Cyber Attacks From Unexpected Sources: Have You Considered Your Risk? Script kiddies, human error, low-level criminals, disgruntled employees, serious organised cyber criminals, nation state-sponsored groups. When we talk about cyber threats, these are the ‘threat actors’ likely to be behind them. 19 May, 2021 GDPR Fines Rise, Increasing Pressure On Businesses As we get closer to the third anniversary of the introduction of GDPR legislation we have witnessed the number and severity of fines for breach of GDPR steadily increase. 12 May, 2021 Trawling For Victims: How Would Your Workforce Handle A Phishing Email? Each year, the headlines in the media about cyber-attacks don’t change much, with ‘cyber-attacks are on the rise’ and ‘cyber-attacks are getting more sophisticated’ being just two we see most often. 21 April, 2021 Guarantee Your Business Continuity With Replication & Redeployment Advancements in technology are creating a huge shift in the way we as end users are incorporating critical applications into our organisations. Locally installed on-premise applications which require huge financial and time outlays to purchase and integrate are being replaced with SaaS applications delivered through a third party hosting partner. 07 April, 2021 Phishing Attacks: How They Work & The Steps You Can Take To Overcome Them What are phishing scams? In this article, Adam Boland of SES explores the various types of phishing attacks and the steps you can take to defend against them. 17 March, 2021 OVH Data Centre Disaster: Time To Review Your Disaster Recovery Plans European Cloud Computing giant OVH have announced last week that a major fire has destroyed one of its Strasbourg data centres and damaged another. The disaster is estimated to have brought more than 3.5 million websites offline. 10 March, 2021 Business Continuity & Disaster Recovery Planning For 2021 As we begin 2021 it is important to reflect on 2020 and the challenges we faced, preparing us for what lies ahead as we get back to what many describe as “the new normal”. Pagination First page « First Previous page ‹ Previous … Page 4 Page 5 Page 6 Page 7 Current page 8 Page 9 Page 10 Page 11 Page 12 … Next page Next › Last page Last »