Understand where critical business IP and personal data exists at rest across your organisation
Global brands and market innovators must protect their business-critical, sensitive data against accidental data loss, compromised users and malicious insiders. However, they must first understand where sensitive content is located within their organisation and how this data is being used.
Read more “Webinar – Forcepoint: Data Discovery”
Have you ever mistakenly sent an email to the wrong person?
Misaddressed emails were the primary form of digital data security incident reported to the Information Commissioner’s Office (ICO) in 2017.
Read more “Webinar – Tessian: Preventing Data Loss With Machine Intelligent Email Security”
Recent high profile outbreaks were facilitated by organisations not having appropriate security patches deployed. The last 2 high profile outbreaks could have been prevented if the security patches had been deployed. Though these patches were available days before the outbreaks, organisations across the globe had not got round to applying the patches fast enough to prevent the threats. This is supported by research conducted in September 2015 in the Kenna Security Report:
Read more “Why Relying On Standard Patching Processes Is Not Enough In Today’s Threat Landscape”
The EU General Data Protection Regulation (or GDPR) is a topic that is on many security and compliance persons minds right now, and for good reason. It comes in to affect in a little over two month’s time and will significantly alter the way organisations think about, and manage, the data they hold.
Read more “Where’s Your Data and Who’s Looking At It?”
It’s not uncommon for Executives to state what they want to achieve in their first 100 days or write about what they have achieved. To go one better, I thought I would write a quick review of what’s happened in my first year (or 354 days to be exact) at Secon Cyber Security.
Read more “A Year at Secon Cyber”
To commemorate International Women’s day we sat with Hannah Bullock, finance and admin manager, based in Hersham, who spoke to us about her work at Secon Cyber.
Interview: Hannah Bullock
Read more “Interview: Hannah Bullock”
Being at the helm of Secon Cyber and developing close relationships with our clients I have come to the realisation that in today’s cyber security environment we are not doing enough by settling for incremental improvements to our clients’ security as a Value Added Reseller (VAR). I felt that in some instances we were actually doing a disservice, particularly when a client had a P1 (Priority 1) issue such as a malware outbreak or system failure, we would find ourselves being reactive to the critical situation and becoming the ‘go-between’ the technology vendor and our client, often receiving impractical advice with possible severe impact on the customer’s business operation.
Read more “CEO Insight: Our Transformation Journey”
CheckRecipient has rebranded and is to now be known as Tessian
Tessian (formerly CheckRecipient), was founded in 2013 by three engineering graduates from Imperial College, as an email security platform that uses machine learning to protect highly sensitive information from being sent to the wrong person. The rebrand comes following a year of triple-digit growth for the company, which also saw the team increase from 7 to 40 heads.
Read more “Press Release: CheckRecipient rebrands as Tessian”
Nearly all of us use a computer of some description today to do our daily activities, be that a desktop, laptop or tablet. For the sake of convenience or mere time saving many of us leave our computers turned on overnight too, as it takes a long time to boot up and log in first thing in the morning. However, there may be other people (or processes) using your computers and your electricity (with some statistics stating that could be over $600USD per year) for their gains. This will not only cost you more in terms of electricity used, but it could also be shortening the life of your PC and its battery (if laptop/tablet).
Read more “Who’s using your computers?”
On the 28th February 2018, Secon Cyber Security hosted another webinar with Thycotic. Our technical director, David King, and Tim Carolan, sales engineer from Thycotic discussed the challenges of securing your privileged passwords and explained how Thycotic’s Secret Server can help you to identify your privileged passwords.
Read more “Video – Thycotic Privileged Account Management: Ensuring Least Privilege – a highly practical guide”
Janakan Nadarajah, joins Secon Cyber Security as chief operating officer to lead and drive Secon Cyber’s transformation to become a leading Managed Security Service Provider.
Read more “Press Release: Secon Cyber Security appoints Chief Operating Officer”
Protect your endpoints with a market leader
Trend Micro has been named a leader once again in the 2018 Gartner Magic Quadrant for Endpoint Protection Platforms. This year, there were only three Leaders named amongst a field of 21 vendors evaluated and Trend Micro has been recognized again, just like they have since 2002.
Read more “Trend Micro Named a Leader Once Again in the 2018 Gartner Magic Quadrant for Endpoint Protection Platforms”