SES Secure's Blogs Category All Cyber Security Software Escrow 17 July, 2019 The ICO Is Raising The Stakes Last week the news broke that hotel group Marriot is to be fined £99.2m by the Information Commissioners Office (ICO) after malicious attackers stole the records of 339m guests. 09 July, 2019 “We Don’t Store Customer Data On Site So There’s Nothing For Us To Lose” Part 2 In last weeks article we discussed a recent conversation with one of our clients who mentioned they didn’t need to take any measures to protect their organisation against a potential security breach as they didn’t store customer data on-site. 02 July, 2019 “We Don’t Store Customer Data On-Site, So There’s Nothing For Us To Lose” As a Cyber Security provider, we are always working closely with our clients and advising them on the best approach to protect their business from malicious threats, but earlier this week one conversation in particular stood out. 25 June, 2019 The Simplest Vulnerabilities Can Be Your Greatest Weaknesses Whilst most businesses are making strong progress in their efforts to secure their organisation, we regularly still hear excuses like “we are a small business, we don’t have the budget” or “we’re too insignificant to be targeted” for not taking any measures to increase organisational security. 19 February, 2019 Identifying & Mitigating Risk In Your Supply Chain We are well aware of the benefits to businesses of maintaining a healthy supply chain and the impact when the supply chain is not operating as it should, so it worries us that so many businesses are failing to build continuity plans into their supply chain. 12 February, 2019 Protecting Your Investment In Bespoke Applications Part 2 In last week’s article we discussed having bespoke applications developed and how a Transfer of IP Agreement protects your investment, ensuring you get what you pay for. 06 February, 2019 Protecting Your Investment In Bespoke Applications Part 1 As your business grows, it’s difficult to rely on standardised applications to meet your ever-expanding requirements. You need something bespoke that suits your individual needs and can be scaled as your organisation develops. 05 February, 2019 Mergers And Acquisitions: How Do You Protect Your Investment? Part 3 It’s been a while since we touched on the subject of Mergers and Acquisitions (M&As) but this is a topic still at the forefront of many of our customers minds. 28 January, 2019 Reselling Software? How Do You Protect Yourself & Your Clients? We are seeing an increase in the number of clients reselling or white labelling software applications as a way of expanding their service offering, to meet increasing customer demands or generate additional revenue to grow their businesses. 22 January, 2019 Transitioning To The Cloud: Who Is Responsible For Protecting Your Data? There are substantial benefits to be realised by businesses of transitioning to the cloud and utilising critical applications delivered through a SaaS model, these include: 11 December, 2018 A Guide To Protecting Your Critical SaaS Applications This article aims to build on last week’s piece, discussing how Software Escrow protection can be applied to applications delivered through a Software as a Service (SaaS) model. 06 December, 2018 How Do You Ensure Continuity For Business Critical Applications? In this week’s article we are discussing Software Escrow, how it works and the protections it offers to both users and developers of business-critical applications. Pagination First page « First Previous page ‹ Previous … Page 9 Page 10 Page 11 Page 12 Current page 13 Page 14 Page 15 Page 16 Page 17 … Next page Next › Last page Last »