Skip to the content
Menu
40-Minute Video

FIT 2022 Panel - Old Tricks V New Victims How To Get Cyber Security Right

Malware is nothing new, yet the risk of cyber attacks is higher than ever with malware and ransomware as a service becoming widely available. In the last 12 months, 66% of organisations were hit by ransomware and 9 in 10 experienced some form of operations impact, according to Sophos.

Join this panel discussion during which the leaders in the cyber security industry will talk about how to protect your data, systems and people, within your budget. We will discuss future trends, the big red flags you need to be on the look out for and the quick wins. Sophos, Microsoft, Cisco, Forcepoint and Forescout will share what their solutions are tracking and the most note-worthy discoveries from their labs. 

Free Cyber Security Consultation 

Protect Your Data

How do you keep your business data secure when employees are working from anywhere? With employees working from the office, home, and on the go, cybercriminals are taking advantage of this new type of working model to exploit any vulnerabilities. 

Multi-Factor Authentication

Multi-Factor Authentication, often shortened to MFA, is the process of requiring more than one authentication method for login. Enabling MFA for your employees’ accounts helps to keep them secure and prevent unauthorised access.

Virtual Private Networks

VPNs create a secure tunnel for your employees to access company systems, files, and data. 


Endpoint Security

Chess offers a comprehensive endpoint protection program for businesses. Monitor and manage all your devices regardless of where they are.

Microsoft 365 Security

Our staged approach will help you adopt best practices and help your people adapt to a new, remote-working environment with intelligent Microsoft security features.

Hybrid Working Solutions

​​
Infrastructure Security

Solutions which help protect your critical infrastructure by processing and analysing large volumes of data, providing full visibility, improving security resilience.

Learn More

Network Security

Solutions which protect your network from hacking attacks and prevent external agents from accessing, changing and deleting your business data. 

Learn More

Endpoint Security

Endpoint security solutions protect business end-user devices such as laptops, mobile phones, tablets, PCs from external malicious agents.

Learn More

Cloud Security

Protect the data you entrust to the cloud through a range of cloud security solutions including multi-factor authentication, identity and access management and VPNs.

Learn More

Gateway Security

For the optimum solution in gateway security, you require complex firewall technology, combined with mobile device management, web and email proxy solutions and specialist web application firewalls.

Learn More

How We Work With You

Consult

Our team of experts will assess your environment and advise on the implementation of best IT practices - keep your business secure, your operations compliant, while also reducing your costs. 

Deliver

Our engineers boast the latest accreditations from leading bodies and will deliver the solution and help you rollout enhanced features, which may be already available within your subscription.  

Adopt

We will provide you with additional training and documentation to ensure your people adopt fully the new technology, make your journey a success and increase return on investment.

Support

You can also choose our expert team to provide continuous support throughout your journey, helping you to stay protected and compliant at all times. A variety of managed support options available.  

Other Keynotes You May Find Interesting

 

Team Work Anywhere, Anytime

The successful adoption of Microsoft Teams can help organisations reduce their costs dramatically. Companies with hybrid workforces saw savings of $6.9 million through the tool you can use to meet, chat, call, and collaborate. In this session we will cover:

  • How Teams can be used to enable your hybrid workplace
  • What’s new including tips and tricks, security and compliance
  • How Teams Phone can address the PSTN (your line and broadband) switch off

 

Secure Your Hybrid Team

Your people work remotely, in the office or at home, so the demand for anywhere, anytime access to apps is growing. Over 80% of breaches are due to compromised credentials so you need to connect your people to your data securely. In this session we will cover:

How to give users secure access to applications and data
How to enable secure connectivity to branch offices with SD-WAN and SASE (Secure Access Service Edge)
How to converge and unite your solutions to reduce your operational costs

 

Connect Your People and Customers

Use great customer experience to stand out from the crowd. Over three quarters of users are likely to pay more for better service and consumer expectations have never been higher. Now is the time to review how you connect and communicate with your customers. In this session we will cover:

  • Why is customer experience the key to your growth
  • How to address challenges such as long hold times, insufficient customer information and disjointed communication channels
  • Technology solutions to reduce your costs while boosting customer satisfaction and revenue

 

Your PC is Your Office

Three quarters of organisations want secure devices and the latest software to ensure their people can deliver their best work. In today’s hybrid environment with some of us in the office, some on the road and some at home, tools and devices are critical. In this session we will cover:

  • The impact on your business when using the right solutions and devices
  • How to mitigate security risk and ensure compliance for your hybrid workforce
  • How to make the most of your technology budget and streamline purchasing

Recommended Content

Old Tricks V New Victims

eBook Old Tricks V New Victims: How To Get Cyber Security Right

In this eBook, industry cyber security experts share their insights and experiences on the common reasons why organisations fall victim to cyberattacks, and what they should be doing to improve their security posture.

Old Tricks V New Victims

Blog: Getting Cyber Security Right

Adam Gleeson, Cyber Security Vendor Alliance Manager, discusses the common reasons organisations are exposed to Cyber Attacks and what can be done to improve their security posture.