Skip to main content

SES Blog

13 January, 2020

Managing Supply Chain Risk

According to the Hiscox Cyber Readiness Report 2019. 65% of organisations experience one or more cyber attacks as a result of a weak link in their supply chain.
13 January, 2020

An SES Guide To Getting The Most Out Of Penetration Testing

Penetration Testing is a key element in mitigating organisations cyber risks. However, different organisations have different responses to penetration testers coming in to test their networks.
13 January, 2020

Software Escrow – Debunking Myths & Overcoming The Challenges

As one of the UK’s leading Software Escrow agents, we’ve heard every myth, challenge and reason in the book why Software Escrow isn’t at the top of your priority list.
13 January, 2020

Defence Or Containment – What’s The Best Approach To Securing Your Business?

When it comes to fighting cyber crime, the emphasis is overwhelmingly on prevention. 

However, as the volume of attacks against businesses grows significantly, organisations are struggling to prevent wave after wave of attacks
13 January, 2020

The Impact Of Over Reliance On Business Critical Applications

Business applications are essential in today's world of work. In a world that’s always on, always pushing for the next insight, the next edge and the next innovation which gives us an advantage over our competition, business applications have helped us reimagine the workplace.
28 October, 2019

Malicious Threats In Action & How To Defend Against Them

Over the previous couple of weeks, we have released a mini-series of articles which aimed to highlight the benefits of taking a new perspective on your organisations cyber security.
23 October, 2019

Seven Strategies To Protect Your Data

Over the course of the previous few articles SES has outlined the strategies attackers use to breach your systems and networks to steal your valuable data.
22 October, 2019

Eight Common Hacking Techniques Your Organisation Is Facing

Following on from the previous article detailing Cyber Security terminology (if you missed the article you can find it here). This article details eight of the most popular attack types malicious individuals use to breach their targets.
22 October, 2019

An SES Guide To Cyber Security Terminology

It’s within everyone’s reach to read up on the vulnerabilities affecting their organisation, there are numerous articles all over the internet exploring vulnerabilities and breaking down the latest attacks.
22 October, 2019

A New Perspective On Cyber Security

In this day and age, the continuity of your business is constantly at risk from factors outside of your control. Data security incidents are on the rise and attackers are continuously searching for new ways to bypass your defences and breach your systems causing damage and disruption.
15 October, 2019

The Characteristics Of APT & How To Defend Against It

Advanced Persistent Threat (APT) involves a prolonged and targeted cyber attack in which a malicious individual gains access to your network whilst remaining undetected for a significant period of time.
10 October, 2019

Recent Figures Suggest An Alarming Lack Of Awareness Surrounding Cyber Security

In a recent study conducted by insurance broker Gallagher, UK councils have reported being targeted by more than 263 million cyber attacks in the first half of 2019 alone, equating to 800 attacks every hour.

Speak to a specialist

Please use the form below to get in touch, one of our specialists will get back to you within one business day.