We have been certified under the G Cloud 11 Framework to offer a suite of cyber security solutions to UK Government Organisations, including the NHS.
This week we are once again joined by Stuart White, Chess Penetration Tester, he takes us through a live hack, this time demonstrating the importance of endpoint protection in your systems and how a Rubber Ducky attack can very quickly compromise your tech.
This week we are joined by Stuart White, Chess Penetration Tester, he takes us through a live hack, targeting Office 365 accounts and the techniques you should be aware of to avoid being compromised, even when using 2-factor authentication.
Keeping track of assets in public cloud providers like AWS, Microsoft Azure, or Google Cloud Platform - and keeping them safe - is the toughest challenge in cloud security.
Chess CyberSecurity pick up double awards from Sophos and Forescout for stand out innovation in the sector.
Not all Penetration Test Reports are created equal. Methodology can vary from supplier to supplier, but the essential element common to all Penetration Tests is the written report, key to guaranteeing the maximum value from the overall process. What should you look for in a Penetration Test Report?
Sophos' study of 10 cloud server honeypots, placed worldwide, reveals how relentlessly persistent cybercriminals can be when targeting an organisation’s cloud platforms.
Leasing is the purchase model that more and more companies are opting for, according to Gartner, who estimate that by next year, 30% of business devices will be purchased through an opex model. Find out the Seven Top Reasons why.
Chess has been announced as a Certification Body for the UK Government Cyber Essentials scheme.
New government research published this week reveals that 32% of businesses identified cybersecurity breaches or attacks in the last 12 months.
Bringing together expertise from leading healthcare technology providers Microsoft and Sophos to explore and share the ongoing and emerging challenges faced in the transformation of patient outcomes.
Proof you’ve delivered cybersecurity training to your people may turn out be vital evidence you rely on in court.