SES Secure's Blogs Category All Cyber Security Software Escrow 08 September, 2021 A Guide To Maximising Business Continuity What steps do you take to maximise your business continuity against unforeseen circumstances? This short series explores the protections SES has developed to provide our customers with guaranteed business continuity in the event your software supplier is unable to support your business critical applications. 01 September, 2021 SES Recertifies ISO: 9001 & ISO: 27001 As part of our continued commitment to providing the highest levels of information security standards available in the UK Software Escrow industry, SES has achieved recertification of ISO: 9001 and ISO: 27001. 10 August, 2021 How Can You Ensure Business Continuity & Mitigate Risk Post COVID-19? As we move on from the COVID-19 pandemic and return to the “new normal”. Darragh Lavin of SES explores how business continuity plans and the need to protect software assets has changed. 07 July, 2021 Join Our Survey "Understanding Your Cyber Security Landscape: 2021" Join our survey "Understanding Your Cyber Security Landscape: 2021" for your chance to win an Executive Cyber Awareness session with the CEO of our Cyber Security partner, Protection Group International; usually charged at £3,000. 23 June, 2021 5 Advantages To Exercising Your Cyber Incident Response Plan According to IBM’s 2020 Cost Of A Data Breach Report, the average total cost of a successful breach in 2020 was $3.86 million. Can you afford not to put a robust Incident Response Plan in place? 16 June, 2021 How Do You Test Your Recovery Procedure? Having a disaster recovery plan to protect against unforeseen circumstances is essential to getting your business back online should the worst happen. With that in mind, how do you test that the recovery plans you have invested in are robust enough to guarantee that your critical applications can be swiftly and accurately redeployed in the event of a release? 09 June, 2021 Penetration Testing: How To Protect Your Business Against Cyber Threats What is Penetration Testing and how does it protect your business? Adam Boland of SES explores how Penetration Testing enables you to identify weaknesses in your organisation’s cyber security. 02 June, 2021 Cyber Attacks From Unexpected Sources: Have You Considered Your Risk? Script kiddies, human error, low-level criminals, disgruntled employees, serious organised cyber criminals, nation state-sponsored groups. When we talk about cyber threats, these are the ‘threat actors’ likely to be behind them. 19 May, 2021 GDPR Fines Rise, Increasing Pressure On Businesses As we get closer to the third anniversary of the introduction of GDPR legislation we have witnessed the number and severity of fines for breach of GDPR steadily increase. 12 May, 2021 Trawling For Victims: How Would Your Workforce Handle A Phishing Email? Each year, the headlines in the media about cyber-attacks don’t change much, with ‘cyber-attacks are on the rise’ and ‘cyber-attacks are getting more sophisticated’ being just two we see most often. 21 April, 2021 Guarantee Your Business Continuity With Replication & Redeployment Advancements in technology are creating a huge shift in the way we as end users are incorporating critical applications into our organisations. Locally installed on-premise applications which require huge financial and time outlays to purchase and integrate are being replaced with SaaS applications delivered through a third party hosting partner. 07 April, 2021 Phishing Attacks: How They Work & The Steps You Can Take To Overcome Them What are phishing scams? In this article, Adam Boland of SES explores the various types of phishing attacks and the steps you can take to defend against them. Pagination First page « First Previous page ‹ Previous … Page 5 Page 6 Page 7 Page 8 Current page 9 Page 10 Page 11 Page 12 Page 13 … Next page Next › Last page Last »