blog

university-of-bedfordshire-subnav-k.jpg
Leveraging the Power of Logs

Learn more about security information and event management solutions and how LogPoint's special pricing for universities helps them save money and improve efficiency. 

Blog Post 750x500px.jpg (6)
Untangling the web of IT security

We head over to Sophos to discuss all thing IT and security with Jonathan Hope (Sophos) and Gavin Wood (Chess) asking those important questions, What do you need to protect your network, is public cloud secure and how you can train your staff to help against the fight of IT Security. 

Can You Hack It.jpg
8 Tips for Choosing the Right Multi-factor Authentication Solution

Read 8 Tips for Choosing the Right Multi-factor Authentication Solution – a guest blog post by SecurEnvoy - to help you make the right decision for your organisation.

Cyber score2.jpg
Cybersecurity Checklist - The Five Basic Controls

How Cyber Savvy Are You? Our 25 Cyber Must Knows.

Download this government checklist to reveal how ready you are to fight off a cybercrime attack.

Cloud computing .jpg
We are now G Cloud 11 Certified

We have been certified under the G Cloud 11 Framework to offer a suite of cyber security solutions to UK Government Organisations, including the NHS. 

2.jpg
Can you be hacked by a Rubber Duck?

This week we are once again joined by Stuart White, Chess Penetration Tester, he takes us through a live hack, this time demonstrating the importance of endpoint protection in your systems and how a Rubber Ducky attack can very quickly compromise your tech.

11.jpg
Going Phishing With Office 365

This week we are joined by Stuart White, Chess Penetration Tester, he takes us through a live hack, targeting Office 365 accounts and the techniques you should be aware of to avoid being compromised, even when using 2-factor authentication.

sophos-cloud-optix-sn_a.jpg
Introducing Sophos Cloud Optix

Keeping track of assets in public cloud providers like AWS, Microsoft Azure, or Google Cloud Platform - and keeping them safe - is the toughest challenge in cloud security. 

Sophos Awards 2019.jpg
Chess Win Multiple Cyber Security Awards

Chess CyberSecurity pick up double awards from Sophos and Forescout for stand out innovation in the sector.  

Ethical Hacking.jpg
CREST Certified Penetration Test Sample Report

Not all Penetration Test Reports are created equal. Methodology can vary from supplier to supplier, but the essential element common to all Penetration Tests is the written report, key to guaranteeing the maximum value from the overall process. What should you look for in a Penetration Test Report? 

Sophos Cloud.png
Exposed: Cyberattacks on Cloud Honeypots - Report

Sophos' study of 10 cloud server honeypots, placed worldwide, reveals how relentlessly persistent cybercriminals can be when targeting an organisation’s cloud platforms.

GettyImages-591404161.jpg
7 Top Reasons To Lease Business IT

Leasing is the purchase model that more and more companies are opting for, according to Gartner, who estimate that by next year, 30% of business devices will be purchased through an opex model. Find out the Seven Top Reasons why.