Skip to main content

SES Blog

19 February, 2020

Managing Supply Chain Risk

According to the Hiscox Cyber Readiness Report 2019. 65% of organisations experience one or more cyber attacks as a result of a weak link in their supply chain.
12 February, 2020

An SES Guide To Getting The Most Out Of Penetration Testing

Penetration Testing is a key element in mitigating organisations cyber risks. However, different organisations have different responses to penetration testers coming in to test their networks.
05 February, 2020

The Next Step In Simplifying Your Escrow Protection

As we touched upon last week, SES has always focused on making Software Escrow simple and increasing our security. Simplifying Escrow so that more businesses can benefit from its protection and enhancing security to give our customers the confidence to secure their critical applications with us. 
29 January, 2020

A History Of Simplicity & Security

Software Escrow needn’t be complex or difficult to introduce within your business. It’s designed to provide business continuity by protecting against unforeseen circumstances and, as we see it, more organisations should put it at the top of their priority list.
22 January, 2020

The Impact Of Over Reliance On Business Critical Applications

Business applications are essential in today's world of work. In a world that’s always on, always pushing for the next insight, the next edge and the next innovation which gives us an advantage over our competition, business applications have helped us reimagine the workplace.
28 October, 2019

Malicious Threats In Action & How To Defend Against Them

Over the previous couple of weeks, we have released a mini-series of articles which aimed to highlight the benefits of taking a new perspective on your organisations cyber security.
23 October, 2019

Seven Strategies To Protect Your Data

Over the course of the previous few articles SES has outlined the strategies attackers use to breach your systems and networks to steal your valuable data.
22 October, 2019

8 Common Hacking Techniques Your Organisation Is Facing

Following on from the previous article detailing Cyber Security terminology (if you missed the article you can find it here). This article details eight of the most popular attack types malicious individuals use to breach their targets.
22 October, 2019

An SES Guide To Cyber Security Terminology

It’s within everyone’s reach to read up on the vulnerabilities affecting their organisation, there are numerous articles all over the internet exploring vulnerabilities and breaking down the latest attacks.
22 October, 2019

A New Perspective On Cyber Security

In this day and age, the continuity of your business is constantly at risk from factors outside of your control. Data security incidents are on the rise and attackers are continuously searching for new ways to bypass your defences and breach your systems causing damage and disruption.
15 October, 2019

The Characteristics Of APT & How To Defend Against It

Advanced Persistent Threat (APT) involves a prolonged and targeted cyber attack in which a malicious individual gains access to your network whilst remaining undetected for a significant period of time.
10 October, 2019

Recent Figures Suggest An Alarming Lack Of Awareness Surrounding Cyber Security

In a recent study conducted by insurance broker Gallagher, UK councils have reported being targeted by more than 263 million cyber attacks in the first half of 2019 alone, equating to 800 attacks every hour.

Contact us

If you would like further information, discuss your requirements, get a free no obligation quotation or just a friendly chat on how we could possibly help please fill in the details below and one of our team will get back to you as soon as possible.
Tick the box to receive regular updates and industry insights