SES Secure's Blogs Category All Cyber Security Software Escrow 11 March, 2020 Software Escrow – Debunking Myths & Overcoming The Challenges As one of the UK’s leading Software Escrow agents, we’ve heard every myth, challenge and reason in the book why Software Escrow isn’t at the top of your priority list. 04 March, 2020 Defence Or Containment – What’s The Best Approach To Securing Your Business? When it comes to fighting cyber crime, the emphasis is overwhelmingly on prevention. However, as the volume of attacks against businesses grows significantly, organisations are struggling to prevent wave after wave of attacks 19 February, 2020 Managing Supply Chain Risk According to the Hiscox Cyber Readiness Report 2019. 65% of organisations experience one or more cyber attacks as a result of a weak link in their supply chain. 12 February, 2020 An SES Guide To Getting The Most Out Of Penetration Testing Penetration Testing is a key element in mitigating organisations cyber risks. However, different organisations have different responses to penetration testers coming in to test their networks. 05 February, 2020 The Next Step In Simplifying Your Escrow Protection As we touched upon last week, SES has always focused on making Software Escrow simple and increasing our security. Simplifying Escrow so that more businesses can benefit from its protection and enhancing security to give our customers the confidence to secure their critical applications with us. 29 January, 2020 A History Of Simplicity & Security Software Escrow needn’t be complex or difficult to introduce within your business. It’s designed to provide business continuity by protecting against unforeseen circumstances and, as we see it, more organisations should put it at the top of their priority list. 22 January, 2020 The Impact Of Over Reliance On Business Critical Applications Business applications are essential in today's world of work. In a world that’s always on, always pushing for the next insight, the next edge and the next innovation which gives us an advantage over our competition, business applications have helped us reimagine the workplace. 28 October, 2019 Malicious Threats In Action & How To Defend Against Them Over the previous couple of weeks, we have released a mini-series of articles which aimed to highlight the benefits of taking a new perspective on your organisations cyber security. 23 October, 2019 Seven Strategies To Protect Your Data Over the course of the previous few articles SES has outlined the strategies attackers use to breach your systems and networks to steal your valuable data. 22 October, 2019 8 Common Hacking Techniques Your Organisation Is Facing Following on from the previous article detailing Cyber Security terminology (if you missed the article you can find it here). This article details eight of the most popular attack types malicious individuals use to breach their targets. 22 October, 2019 An SES Guide To Cyber Security Terminology It’s within everyone’s reach to read up on the vulnerabilities affecting their organisation, there are numerous articles all over the internet exploring vulnerabilities and breaking down the latest attacks. 22 October, 2019 A New Perspective On Cyber Security In this day and age, the continuity of your business is constantly at risk from factors outside of your control. Data security incidents are on the rise and attackers are continuously searching for new ways to bypass your defences and breach your systems causing damage and disruption. Pagination First page « First Previous page ‹ Previous … Page 9 Page 10 Page 11 Page 12 Current page 13 Page 14 Page 15 Page 16 Page 17 … Next page Next › Last page Last »