SES Secure's Blogs Category All Cyber Security Software Escrow 15 July, 2020 A Guide To Phishing & Ransomware Terminology Recently we published an article summarising some of the findings from Proofpoint’s 2020 “State of the Phish” report. That article focused on the rise in phishing threats over the last 12 months. However, this week we will be focusing on another concerning finding from the report – a lack of understanding when it comes to common phishing and ransomware threats. 08 July, 2020 Frequent Depositing Vs Emergency Depositing When setting up an Escrow agreement to protect hosted applications, ensuring you can retain access to the most current version of your application data should be your number one priority. 01 July, 2020 6 Habits To Improve Your Security Posture Security threats are increasing year on year and 2019 was no different. Organisations across the world were constantly targeted by scams and vast quantities of data was breached by malicious actors. 03 June, 2020 What Happens When Validation Goes Wrong? & Is It Really The End Of The World If It Does? Validation is an important step in the Software Escrow process. It provides an audit of the application development process to determine whether all the pieces required to build the application are present and accurate. 20 May, 2020 Increasing Clarity Around GDPR We are now almost two years on from the introduction of GDPR. During the first year of enforcement, the Information Commissioners Office (ICO) were quite lenient in their enforcement of the regulation, giving businesses the extra time they needed to adapt to the tightening regulations. 13 May, 2020 55% Of All Organisations Successfully Breached By Phishing Threats In 2019 A recent report by cyber security company Proofpoint highlighted that 55% of all organisations were successfully breached by phishing scams in 2019. 06 May, 2020 Cyber Threats Amid COVID-19 Part 3: Fake News & Misinformation In the final part of our three part series, which explored how malicious individuals are using the global COVID-19 pandemic as a distraction to further their criminal activities, we are focusing on how threat actors are spreading fake news and misinformation to further their nefarious gains. 23 April, 2020 Ensuring Business Critical Applications Function During The Coronavirus (COVID-19) Lockdown With more employees than ever working remotely, how can companies ensure business continuity? Read the full article (recently featured in ‘The Gazette’) to find out and discover the solutions SES has created to combat these potential risks. 22 April, 2020 Cyber Threats Amid COVID-19 Part 2: Business As Usual For Malicious Actors This week we are focusing on how threat actors are continuing their criminal activity whilst the rest of the world is in turmoil and providing advice and guidance on how to protect yourself in these torrid times. 15 April, 2020 Cyber Threats Amid COVID-19 Part 1: Coronavirus Maps & Malicious Apps For many organisations, cyber security has taken a backseat as we deal with the COVID-19 pandemic. However, a change in working practices and a growing thirst for the latest information have led malicious actors to exploit the outbreak for their own nefarious gains. 09 April, 2020 Ensuring Continuity Amongst COVID-19 Uncertainty Figures from the first Business Impact Tracker report issued by the British Chamber of Commerce (BCC) present concerning, yet unsurprising reading for businesses affected by the current global pandemic. 25 March, 2020 Maximise Your Protection In Uncertain Times An increasing number of organisations rely on 3rd party developed, business critical applications which are delivered through a hosting provider such as Amazon Web Services, Microsoft Azure and Google Cloud Platform using a Software as a Service (SaaS) model. Pagination First page « First Previous page ‹ Previous … Page 8 Page 9 Page 10 Page 11 Current page 12 Page 13 Page 14 Page 15 Page 16 … Next page Next › Last page Last »