SES Secure's Blogs Category All Cyber Security Software Escrow 15 August, 2019 SES Encrypts & Audits Global Client Data With GoAnywhere MFT SES are delighted to have been featured in a customer success story for our strategic partners: HelpSystems and GoAnywhere. 30 July, 2019 What Is The True Cost Of A Ransomware Attack? From the outset, having your systems encrypted and held to ransom by a ransomware attack can cost you thousands of pounds per minute, so the cost of paying the ransomware demands can appear minimal in comparison. 30 July, 2019 How Well Do You Know Your Data? Did you know that of all the unstructured data within your business, as much as 70% on average is Redundant, Obsolete or Trivial? 24 July, 2019 The GDPR Implications Of Weak Due Diligence Recently the news broke that the Information Commissioners Office (ICO) has begun to flex its muscles and ramp up the penalties for breaching GDPR, with both British Airways and Marriot International on the receiving end of monumental fines for the personal data breaches they reported in 2018. 17 July, 2019 ControlPoint from SES In Partnership With StoreX SES are delighted to announce that we have now partnered with StoreX ltd, a supplier of a unique File Analytic platform with in-depth reporting capabilities, powered by Micro Focus’ ControlPoint. 17 July, 2019 The ICO Is Raising The Stakes Last week the news broke that hotel group Marriot is to be fined £99.2m by the Information Commissioners Office (ICO) after malicious attackers stole the records of 339m guests. 09 July, 2019 “We Don’t Store Customer Data On Site So There’s Nothing For Us To Lose” Part 2 In last weeks article we discussed a recent conversation with one of our clients who mentioned they didn’t need to take any measures to protect their organisation against a potential security breach as they didn’t store customer data on-site. 02 July, 2019 “We Don’t Store Customer Data On-Site, So There’s Nothing For Us To Lose” As a Cyber Security provider, we are always working closely with our clients and advising them on the best approach to protect their business from malicious threats, but earlier this week one conversation in particular stood out. 25 June, 2019 The Simplest Vulnerabilities Can Be Your Greatest Weaknesses Whilst most businesses are making strong progress in their efforts to secure their organisation, we regularly still hear excuses like “we are a small business, we don’t have the budget” or “we’re too insignificant to be targeted” for not taking any measures to increase organisational security. 19 February, 2019 Identifying & Mitigating Risk In Your Supply Chain We are well aware of the benefits to businesses of maintaining a healthy supply chain and the impact when the supply chain is not operating as it should, so it worries us that so many businesses are failing to build continuity plans into their supply chain. 12 February, 2019 Protecting Your Investment In Bespoke Applications Part 2 In last week’s article we discussed having bespoke applications developed and how a Transfer of IP Agreement protects your investment, ensuring you get what you pay for. 06 February, 2019 Protecting Your Investment In Bespoke Applications Part 1 As your business grows, it’s difficult to rely on standardised applications to meet your ever-expanding requirements. You need something bespoke that suits your individual needs and can be scaled as your organisation develops. Pagination First page « First Previous page ‹ Previous … Page 12 Page 13 Page 14 Page 15 Current page 16 Page 17 Page 18 Page 19 Page 20 … Next page Next › Last page Last »