blog

Ethical Hacking.jpg
CREST Certified Penetration Test Sample Report

Not all Penetration Test Reports are created equal. Methodology can vary from supplier to supplier, but the essential element common to all Penetration Tests is the written report, key to guaranteeing the maximum value from the overall process. What should you look for in a Penetration Test Report? 

GettyImages-591404161.jpg
7 Top Reasons To Lease Business IT

Leasing is the purchase model that more and more companies are opting for, according to Gartner, who estimate that by next year, 30% of business devices will be purchased through an opex model. Find out the Seven Top Reasons why.

1200px-Council-House-Nottingham.jpg
Testing City Defences

Chess has won the bid to deliver Penetration Testing for Nottingham City Council. The bid was won on a combination of factors including its CREST accreditation, consultative approach, flexibility, track record and price competitiveness.

PenTestBLOG.jpg
Cyber Essentials - Get Certified With Chess

Chess has been announced as a Certification Body for the UK Government Cyber Essentials scheme.

Can You Hack It.jpg
Cyber Security Breaches Survey 2019

New government research published this week reveals that 32% of businesses identified cybersecurity breaches or attacks in the last 12 months. 

NHS event.jpg
Healthcare Breakfast Forum

Bringing together expertise from leading healthcare technology providers Microsoft and Sophos to explore and share the ongoing and emerging challenges faced in the transformation of patient outcomes.

Hacker hand.jpg
Lawsuit Rests On Evidence of Cyber Training

Proof you’ve delivered cybersecurity training to your people may turn out be vital evidence you rely on in court.

Valentines.jpg
5 Ways To Love Your People This Valentine's Day

Valentine’s Day is the day to show love and appreciation for those close to you. But when it comes to sharing the love with your work family, roses and chocolates are just not going to cut it. It’s time to turn to tech.

 

Coding woman .jpg
Actionable Intelligence with SIEM and UEBA

At the heart of any digital transformation is the harness of data to continually improve customer outcomes and operational excellence.

However, how can organisations be digitally innovative whilst keeping data safe, ensuring it is compliant and enabling the exploitation of data efficiency?

 

Detox Your Data .jpg
Detox Your Data

As we plunge into 2019, the world of technology is becoming more advanced. We’ve come up with the top 6 ways to protect and move your business forward in 2019. 

INTERCEPT X with EDR verB.png
Sophos Intercept X with EDR Review

This On Demand webinar explores in depth

  • The current and emerging threat landscape
  • Sophos Intercept x + EDR features and capability

 

NHS small_2.jpg
Protecting Windows 10 Within The NHS

Following the Microsoft EA announcement, it’s now more important than ever to adopt a multi-layered approach to protect your Trust.