Skip to the content

Blog

Types of Penetration Test - What is the Difference?

Types of Penetration Test - What is the Difference?

Learn about the different types of penetration testing

5G rollout in the UK

Protecting your business by securing endpoint devices

Generation data has been evolving for the last 4 decades, from 1G voice only, to 5G IoT ready ultra-high reliability. We’re looking into how wireless technology has evolved over the years and our predictions for the future.

Simplifying Digital Transformation: How CASB can help reduce the causes of slow cloud adoption

Dave Barnett, Head of CASB at Forcepoint, shares the lessons he has learned from over 80 customer implementations of CASB technology – the good, the bad and the downright ugly.

Chess has been named Datto's UK & Ireland Business Management Partner of The Year at DattoCon19

Chess Brings Home Gold

Chess has been named Datto's UK & Ireland Business Management Partner of The Year at DattoCon19, Datto’s fifth annual European partner conference.

Downtime is Money

Protecting your business by securing endpoint devices

During this webinar, led by George Cochrane, Pre-Sales Engineer at Datto, we learned about the impact of downtime, and why backup alone is no longer enough.

Talking Security with Sophos

What is next for malware?

Malware is a major problem worldwide, but the nature of malware is changing.
Despite numerous anti-malware measures, cybercriminals and hackers aren’t ones to give up easily, especially when there’s money to be made.
We welcome Jonathan and Fraser from Sophos HQ – they’re with us to discuss if AI can help towards the fight, and what we can do to protect ourselves.

Would Your Organisation Benefit From Leasing?

Your organisation is unique, however one similarity shared with practically every other business is the crucial role played by technology. It’s the k ...

Penetration Test Versus Vulnerability Assessment

Penetration Test Versus Vulnerability Assessment

For years customers have been confused what is the difference between a Penetration Test and a Vulnerability Assessment, with CREST officially launching separate accreditation for the two techniques now. Read this article to learn more.

Securing the Public Cloud with Sophos and Chess

Securing the Public Cloud with Sophos and Chess

Are you managing, moving, or planning to move to Amazon Web Services, Microsoft Azure, or Google Cloud Platform? Watch this video to learn more about how you can ensure the security of your data in the cloud.

 

Hands-on with the AGM X3 Rugged Smartphone

The AGM X3 is the rugged smartphone to beat, combining elegance with ruggedness at a price point that’s definitely premium. With components that rival current flagships, it easily tops our list of the best-rugged mobiles.

Real Life Cloud PBX Success Stories

Lynette King of Symphony Environmental discusses how Chess Cloud PBX has helped their business communicate and collaborate more effectively. During this short case study video, you’ll learn how Chess have supported Symphony Environmental with high quality calls and perfect one-click connection.

Changes to Chess ICT Limited’s Terms and Conditions

Chess’ updated terms and conditions will be effective from 1 September 2019. Chess’ updated terms and conditions will be effective from 1 Septe ...

Pay Less Get More With Cloud Telephony

Martin Bacon, Cloud Voice Specialist from Chess, looks into the features, benefits and what options are available to you and your business. Is your telephony system still stuck in the dark ages? Look at what you can do to move to the cloud and making business calls as simple as 1,2,3.

 

Chess Devices - Designed for Education

For schools' IT professionals, the countdown is on to a new academic term. 2020 brings with it a fresh new challenge - the imminent demise of Windo ...

Windows 7 End of Support FAQs

Windows 7 End of Support FAQs

Microsoft will discontinue Windows 7 support on January 14, 2020 and has published the following advice, outlining options and the next steps.

Sophos Cloud Optix

Sophos Cloud Optix - Everything You Need to Know

Introducing the brand new Sophos product, that tracks assets in public cloud providers like AWS, Microsoft Azure, or Google Cloud Platform - and keeps them safe.

Going Phishing With Office 365

How Easy Is It To Hack Office 365 and 2FA?

This week we are joined by Stuart White, Chess Penetration Tester, he takes us through a live hack, targeting Office 365 accounts and the techniques you should be aware of to avoid being compromised, even when using 2-factor authentication.

Introducing Chess Device-as-a-Service

What is Chess Device as a Service, and how is this unique in the market? In this short video we hear about the benefits from business, operational and financial perspectives.  

Six Reasons Why You Should Switch to Cloud Telephony

Six Reasons Why You Should Switch to Cloud Telephony

Cloud Telephony has many names, like VoIP, SIP Trunking and Hosted Voice. Whatever its name, it gives businesses like yours the tools to advance into the future. Read on to find out the 6 greatest benefits.  

CREST Certified Penetration Test Sample Report

CREST Certified Penetration Test Sample Report

Not all Penetration Test Reports are created equal. Methodology can vary from supplier to supplier, but the essential element common to all Penetration Tests is the written report, key to guaranteeing the maximum value from the overall process. What should you look for in a Penetration Test Report?