Skip to main content

SES Blog

10 February, 2020

“We Never Even Considered It!”

Do you understand the potential risks of third party developed, cloud based applications? Last week we shared a piece of content discussing some of the dangers of becoming reliant on unprotected third party applications and within minutes of sharing it one customer was already on the phone to us. 
10 February, 2020

Are Your SaaS Applications Secure?

In recent years we have seen a significant shift in the way end users access their business critical applications. Almost gone are the days of lengthy uploads to install applications on site, now we simply log into our applications from a web browser using our unique credentials.
05 February, 2020

The Next Step In Simplifying Your Escrow Protection

As we touched upon last week, SES has always focused on making Software Escrow simple and increasing our security. Simplifying Escrow so that more businesses can benefit from its protection and enhancing security to give our customers the confidence to secure their critical applications with us. 
29 January, 2020

A History Of Simplicity & Security

Software Escrow needn’t be complex or difficult to introduce within your business. It’s designed to provide business continuity by protecting against unforeseen circumstances and, as we see it, more organisations should put it at the top of their priority list.
22 January, 2020

The Impact Of Over Reliance On Business Critical Applications

Business applications are essential in today's world of work. In a world that’s always on, always pushing for the next insight, the next edge and the next innovation which gives us an advantage over our competition, business applications have helped us reimagine the workplace.
21 January, 2020

Increase Customer Value With Software Escrow

Standardised, off the shelf applications no longer fulfill the requirements of today's highly dynamic organisations. Although these applications are good as a starting point, a foundation to build on, they often don’t fulfil the true needs of their users.
28 October, 2019

Malicious Threats In Action & How To Defend Against Them

Over the previous couple of weeks, we have released a mini-series of articles which aimed to highlight the benefits of taking a new perspective on your organisations cyber security.
23 October, 2019

Seven Strategies To Protect Your Data

Over the course of the previous few articles SES has outlined the strategies attackers use to breach your systems and networks to steal your valuable data.
22 October, 2019

8 Common Hacking Techniques Your Organisation Is Facing

Following on from the previous article detailing Cyber Security terminology (if you missed the article you can find it here). This article details eight of the most popular attack types malicious individuals use to breach their targets.
22 October, 2019

An SES Guide To Cyber Security Terminology

It’s within everyone’s reach to read up on the vulnerabilities affecting their organisation, there are numerous articles all over the internet exploring vulnerabilities and breaking down the latest attacks.
22 October, 2019

A New Perspective On Cyber Security

In this day and age, the continuity of your business is constantly at risk from factors outside of your control. Data security incidents are on the rise and attackers are continuously searching for new ways to bypass your defences and breach your systems causing damage and disruption.
15 October, 2019

The Characteristics Of APT & How To Defend Against It

Advanced Persistent Threat (APT) involves a prolonged and targeted cyber attack in which a malicious individual gains access to your network whilst remaining undetected for a significant period of time.

Contact us

If you would like further information, discuss your requirements, get a free no obligation quotation or just a friendly chat on how we could possibly help please fill in the details below and one of our team will get back to you as soon as possible.