Skip to main content

SES Blog

11 February, 2020

A Guide To Phishing & Ransomware Terminology

Recently we published an article summarising some of the findings for Proofpoint’s 2020 “State of the Phish” report. That article focused on the rise in phishing threats over the last 12 months. However, this week we will be focusing on another concerning finding from the report – a lack of understanding when it comes to common phishing and ransomware threats.
11 February, 2020

Frequent Depositing Vs Emergency Depositing

When setting up an Escrow agreement to protect hosted applications, ensuring you can retain access to the most current version of your application data should be your number one priority. 
10 February, 2020

“We Never Even Considered It!”

Do you understand the potential risks of third party developed, cloud based applications? Last week we shared a piece of content discussing some of the dangers of becoming reliant on unprotected third party applications and within minutes of sharing it one customer was already on the phone to us. 
10 February, 2020

Are Your SaaS Applications Secure?

In recent years we have seen a significant shift in the way end users access their business critical applications. Almost gone are the days of lengthy uploads to install applications on site, now we simply log into our applications from a web browser using our unique credentials.
10 February, 2020

55% Of All Organisations Successfully Breached By Phishing Threats In 2019

A recent report by cyber security company Proofpoint highlighted that 55% of all organisations were successfully breached by phishing scams in 2019.
06 February, 2020

Four Questions To Ask Your Application Provider

You’ve gone through the process of finding the right developer, scoped your needs, had the application developed and implemented and your employees have been trained to use it effectively. You’ve got so much invested in the application, its critical to your business, so what happens when you’re no longer able to use it? 
23 January, 2020

The Next Step In Simplifying Your Escrow Protection

As we touched upon last week, SES has always focused on making Software Escrow simple and increasing our security. Simplifying Escrow so that more businesses can benefit from its protection and enhancing security to give our customers the confidence to secure their critical applications with us. 
23 January, 2020

A History Of Simplicity & Security

Software Escrow needn’t be complex or difficult to introduce within your business. It’s designed to provide business continuity by protecting against unforeseen circumstances and, as we see it, more organisations should put it at the top of their priority list.
21 January, 2020

Increase Customer Value With Software Escrow

Standardised, off the shelf applications no longer fulfill the requirements of today's highly dynamic organisations. Although these applications are good as a starting point, a foundation to build on, they often don’t fulfil the true needs of their users.
13 January, 2020

Managing Supply Chain Risk

According to the Hiscox Cyber Readiness Report 2019. 65% of organisations experience one or more cyber attacks as a result of a weak link in their supply chain.
13 January, 2020

An SES Guide To Getting The Most Out Of Penetration Testing

Penetration Testing is a key element in mitigating organisations cyber risks. However, different organisations have different responses to penetration testers coming in to test their networks.
13 January, 2020

Software Escrow – Debunking Myths & Overcoming The Challenges

As one of the UK’s leading Software Escrow agents, we’ve heard every myth, challenge and reason in the book why Software Escrow isn’t at the top of your priority list.

Speak to a specialist

Please use the form below to get in touch, one of our specialists will get back to you within one business day.