SES Secure's Blogs Category All Cyber Security Software Escrow 05 August, 2020 Seven Ways SES Simplify Your Software Escrow Journey Software Escrow is essential to protect your business applications, especially those which are bespoke, highly customised, business critical or revenue generating as the time and financial cost of sourcing suitable alternatives in the event your supplier is unable to support them can be astronomical. 22 July, 2020 Increase Customer Value With Software Escrow Standardised, off the shelf applications no longer fulfill the requirements of today's highly dynamic organisations. Although these applications are good as a starting point, a foundation to build on, they often don’t fulfil the true needs of their users. 15 July, 2020 A Guide To Phishing & Ransomware Terminology Recently we published an article summarising some of the findings from Proofpoint’s 2020 “State of the Phish” report. That article focused on the rise in phishing threats over the last 12 months. However, this week we will be focusing on another concerning finding from the report – a lack of understanding when it comes to common phishing and ransomware threats. 08 July, 2020 Frequent Depositing Vs Emergency Depositing When setting up an Escrow agreement to protect hosted applications, ensuring you can retain access to the most current version of your application data should be your number one priority. 01 July, 2020 6 Habits To Improve Your Security Posture Security threats are increasing year on year and 2019 was no different. Organisations across the world were constantly targeted by scams and vast quantities of data was breached by malicious actors. 03 June, 2020 What Happens When Validation Goes Wrong? & Is It Really The End Of The World If It Does? Validation is an important step in the Software Escrow process. It provides an audit of the application development process to determine whether all the pieces required to build the application are present and accurate. 20 May, 2020 Increasing Clarity Around GDPR We are now almost two years on from the introduction of GDPR. During the first year of enforcement, the Information Commissioners Office (ICO) were quite lenient in their enforcement of the regulation, giving businesses the extra time they needed to adapt to the tightening regulations. 13 May, 2020 55% Of All Organisations Successfully Breached By Phishing Threats In 2019 A recent report by cyber security company Proofpoint highlighted that 55% of all organisations were successfully breached by phishing scams in 2019. 06 May, 2020 Cyber Threats Amid COVID-19 Part 3: Fake News & Misinformation In the final part of our three part series, which explored how malicious individuals are using the global COVID-19 pandemic as a distraction to further their criminal activities, we are focusing on how threat actors are spreading fake news and misinformation to further their nefarious gains. 23 April, 2020 Ensuring Business Critical Applications Function During The Coronavirus (COVID-19) Lockdown With more employees than ever working remotely, how can companies ensure business continuity? Read the full article (recently featured in ‘The Gazette’) to find out and discover the solutions SES has created to combat these potential risks. 22 April, 2020 Cyber Threats Amid COVID-19 Part 2: Business As Usual For Malicious Actors This week we are focusing on how threat actors are continuing their criminal activity whilst the rest of the world is in turmoil and providing advice and guidance on how to protect yourself in these torrid times. 15 April, 2020 Cyber Threats Amid COVID-19 Part 1: Coronavirus Maps & Malicious Apps For many organisations, cyber security has taken a backseat as we deal with the COVID-19 pandemic. However, a change in working practices and a growing thirst for the latest information have led malicious actors to exploit the outbreak for their own nefarious gains. Pagination First page « First Previous page ‹ Previous … Page 6 Page 7 Page 8 Page 9 Current page 10 Page 11 Page 12 Page 13 Page 14 … Next page Next › Last page Last »