SES Secure's Blogs Category All Cyber Security Software Escrow 27 November, 2018 Four Steps To Securing Your Supply Chain Most organisations rely on at least one third party supplier to deliver products, systems and services, utilising additional organisations and their capabilities to deliver enhanced service offerings. 27 November, 2018 How Regular Scanning Can Increase Your Security Posture This week’s article aims to build on last weeks piece, discussing how regular Vulnerability Assessments blended with Penetration Testing can help improve your organisations security posture. 21 November, 2018 You Don’t Need To Be Targeted To Be Attacked Every business needs to have Cyber Security on its strategic agenda. Security breaches on organisations are a case of when, not if, as malicious individuals are constantly scanning the internet for websites with vulnerabilities. 15 November, 2018 SES & UKFast – A Powerful Partnership SES is delighted to announce that UKFast have become one of our strategic partners, to deliver our key client facing web services and helping us to realise the next level of our Software Escrow offering with immediate effect. 13 November, 2018 How Do You Ensure Your Business Continuity In 2019? In this day and age, the continuity of your business is consistently at risk from factors outside of your control. 06 November, 2018 Independent Testing Makes Your Applications More Secure From marketing automation to finance or internal communications, organisations are using internal web applications every day that are critical to their business’s operation. 22 October, 2018 “I Wouldn’t Know How To Use The Code If It Was Released” The majority of organisations are heavily reliant on 3rd party software owners to develop and maintain their business critical applications and business process tools. 16 October, 2018 Start With The Basics: The SES Guide To Good Cyber Hygiene Cyber Hygiene relates to the practices and precautions organisations need to take in order to protect their devices and infrastructure, maintain system health and improve their online security. 05 October, 2018 Simplify SaaS Escrow With SFTP Depositing Using applications delivered through a Software as a Service (SaaS) model is becoming an increasingly popular way to deliver critical applications. SaaS Applications reduce the need for users to invest in and support their own infrastructure. 25 September, 2018 Protect Your Critical Applications With Software Escrow All businesses use at least one critical application in their organisation which is essential to their daily operation, examples include: CRM, financial software, stock control and logistics software and your company’s website. 19 September, 2018 The Importance Of A Multi Layered Security Approach Following on from last week’s mailer where we discussed the various phishing attacks which exist and how your organisation can defend against them, this article discusses the advantages of a multi layered approach to secure your organisation against phishing threats. 11 September, 2018 Do You Know Your Smishing From Your Whaling? A Guide To Phishing Attacks Phishing is a type of social engineering attack used to steal individual’s sensitive data such as login credentials and credit card data. Attackers masquerade as trusted entities and dupe their victims into opening malicious links which can lead to the target revealing sensitive information or malware being installed on their devices. Pagination First page « First Previous page ‹ Previous … Page 10 Page 11 Page 12 Page 13 Current page 14 Page 15 Page 16 Page 17 Page 18 … Next page Next › Last page Last »