Skip to main content

SES Secure's Blogs

27 November, 2018

Four Steps To Securing Your Supply Chain

Most organisations rely on at least one third party supplier to deliver products, systems and services, utilising additional organisations and their capabilities to deliver enhanced service offerings.
27 November, 2018

How Regular Scanning Can Increase Your Security Posture

This week’s article aims to build on last weeks piece, discussing how regular Vulnerability Assessments blended with Penetration Testing can help improve your organisations security posture.
21 November, 2018

You Don’t Need To Be Targeted To Be Attacked

Every business needs to have Cyber Security on its strategic agenda.

Security breaches on organisations are a case of when, not if, as malicious individuals are constantly scanning the internet for websites with vulnerabilities.
15 November, 2018

SES & UKFast – A Powerful Partnership

SES is delighted to announce that UKFast have become one of our strategic partners, to deliver our key client facing web services and helping us to realise the next level of our Software Escrow offering with immediate effect.
13 November, 2018

How Do You Ensure Your Business Continuity In 2019?

In this day and age, the continuity of your business is consistently at risk from factors outside of your control.
06 November, 2018

Independent Testing Makes Your Applications More Secure

From marketing automation to finance or internal communications, organisations are using internal web applications every day that are critical to their business’s operation.
22 October, 2018

“I Wouldn’t Know How To Use The Code If It Was Released”

The majority of organisations are heavily reliant on 3rd party software owners to develop and maintain their business critical applications and business process tools.
16 October, 2018

Start With The Basics: The SES Guide To Good Cyber Hygiene

Cyber Hygiene relates to the practices and precautions organisations need to take in order to protect their devices and infrastructure, maintain system health and improve their online security.
05 October, 2018

Simplify SaaS Escrow With SFTP Depositing

Using applications delivered through a Software as a Service (SaaS) model is becoming an increasingly popular way to deliver critical applications. SaaS Applications reduce the need for users to invest in and support their own infrastructure.
25 September, 2018

Protect Your Critical Applications With Software Escrow

All businesses use at least one critical application in their organisation which is essential to their daily operation, examples include: CRM, financial software, stock control and logistics software and your company’s website.
19 September, 2018

The Importance Of A Multi Layered Security Approach

Following on from last week’s mailer where we discussed the various phishing attacks which exist and how your organisation can defend against them, this article discusses the advantages of a multi layered approach to secure your organisation against phishing threats.
11 September, 2018

Do You Know Your Smishing From Your Whaling? A Guide To Phishing Attacks

Phishing is a type of social engineering attack used to steal individual’s sensitive data such as login credentials and credit card data. Attackers masquerade as trusted entities and dupe their victims into opening malicious links which can lead to the target revealing sensitive information or malware being installed on their devices.

Contact us

If you would like further information, discuss your requirements, get a free no obligation quotation or just a friendly chat on how we could possibly help please fill in the details below and one of our team will get back to you as soon as possible.
Tick the box to receive regular updates and industry insights