Skip to main content

SES Blog

Cyber Security
06 May, 2020

Cyber Threats Amid COVID-19 Part 3: Fake News & Misinformation

In the final part of our three part series, which explored how malicious individuals are using the global COVID-19 pandemic as a distraction to further their criminal activities, we are focusing on how threat actors are spreading fake news and misinformation to further their nefarious gains.
22 April, 2020

Cyber Threats Amid COVID-19 Part 2: Business As Usual For Malicious Actors

This week we are focusing on how threat actors are continuing their criminal activity whilst the rest of the world is in turmoil and providing advice and guidance on how to protect yourself in these torrid times.
15 April, 2020

Cyber Threats Amid COVID-19 Part 1: Coronavirus Maps & Malicious Apps

For many organisations, cyber security has taken a backseat as we deal with the COVID-19 pandemic. However, a change in working practices and a growing thirst for the latest information have led malicious actors to exploit the outbreak for their own nefarious gains. 
04 March, 2020

Defence Or Containment – What’s The Best Approach To Securing Your Business?

When it comes to fighting cyber crime, the emphasis is overwhelmingly on prevention. 

However, as the volume of attacks against businesses grows significantly, organisations are struggling to prevent wave after wave of attacks
19 February, 2020

Managing Supply Chain Risk

According to the Hiscox Cyber Readiness Report 2019. 65% of organisations experience one or more cyber attacks as a result of a weak link in their supply chain.
12 February, 2020

An SES Guide To Getting The Most Out Of Penetration Testing

Penetration Testing is a key element in mitigating organisations cyber risks. However, different organisations have different responses to penetration testers coming in to test their networks.
28 October, 2019

Malicious Threats In Action & How To Defend Against Them

Over the previous couple of weeks, we have released a mini-series of articles which aimed to highlight the benefits of taking a new perspective on your organisations cyber security.
23 October, 2019

Seven Strategies To Protect Your Data

Over the course of the previous few articles SES has outlined the strategies attackers use to breach your systems and networks to steal your valuable data.
22 October, 2019

8 Common Hacking Techniques Your Organisation Is Facing

Following on from the previous article detailing Cyber Security terminology (if you missed the article you can find it here). This article details eight of the most popular attack types malicious individuals use to breach their targets.
22 October, 2019

An SES Guide To Cyber Security Terminology

It’s within everyone’s reach to read up on the vulnerabilities affecting their organisation, there are numerous articles all over the internet exploring vulnerabilities and breaking down the latest attacks.
22 October, 2019

A New Perspective On Cyber Security

In this day and age, the continuity of your business is constantly at risk from factors outside of your control. Data security incidents are on the rise and attackers are continuously searching for new ways to bypass your defences and breach your systems causing damage and disruption.
15 October, 2019

The Characteristics Of APT & How To Defend Against It

Advanced Persistent Threat (APT) involves a prolonged and targeted cyber attack in which a malicious individual gains access to your network whilst remaining undetected for a significant period of time.

Contact us

If you would like further information, discuss your requirements, get a free no obligation quotation or just a friendly chat on how we could possibly help please fill in the details below and one of our team will get back to you as soon as possible.
Tick the box to receive regular updates and industry insights