Learn about the different types of penetration testing
Blog

Protecting your business by securing endpoint devices
Generation data has been evolving for the last 4 decades, from 1G voice only, to 5G IoT ready ultra-high reliability. We’re looking into how wireless technology has evolved over the years and our predictions for the future.

Simplifying Digital Transformation: How CASB can help reduce the causes of slow cloud adoption
Dave Barnett, Head of CASB at Forcepoint, shares the lessons he has learned from over 80 customer implementations of CASB technology – the good, the bad and the downright ugly.

Chess Brings Home Gold
Chess has been named Datto's UK & Ireland Business Management Partner of The Year at DattoCon19, Datto’s fifth annual European partner conference.

Protecting your business by securing endpoint devices
During this webinar, led by George Cochrane, Pre-Sales Engineer at Datto, we learned about the impact of downtime, and why backup alone is no longer enough.

What is next for malware?
Malware is a major problem worldwide, but the nature of malware is changing.
Despite numerous anti-malware measures, cybercriminals and hackers aren’t ones to give up easily, especially when there’s money to be made.
We welcome Jonathan and Fraser from Sophos HQ – they’re with us to discuss if AI can help towards the fight, and what we can do to protect ourselves.

Would Your Organisation Benefit From Leasing?
Your organisation is unique, however one similarity shared with practically every other business is the crucial role played by technology. It’s the k ...

Penetration Test Versus Vulnerability Assessment
For years customers have been confused what is the difference between a Penetration Test and a Vulnerability Assessment, with CREST officially launching separate accreditation for the two techniques now. Read this article to learn more.

Securing the Public Cloud with Sophos and Chess
Are you managing, moving, or planning to move to Amazon Web Services, Microsoft Azure, or Google Cloud Platform? Watch this video to learn more about how you can ensure the security of your data in the cloud.

Hands-on with the AGM X3 Rugged Smartphone
The AGM X3 is the rugged smartphone to beat, combining elegance with ruggedness at a price point that’s definitely premium. With components that rival current flagships, it easily tops our list of the best-rugged mobiles.
Real Life Cloud PBX Success Stories
Lynette King of Symphony Environmental discusses how Chess Cloud PBX has helped their business communicate and collaborate more effectively. During this short case study video, you’ll learn how Chess have supported Symphony Environmental with high quality calls and perfect one-click connection.
Changes to Chess ICT Limited’s Terms and Conditions
Chess’ updated terms and conditions will be effective from 1 September 2019. Chess’ updated terms and conditions will be effective from 1 Septe ...

Pay Less Get More With Cloud Telephony
Martin Bacon, Cloud Voice Specialist from Chess, looks into the features, benefits and what options are available to you and your business. Is your telephony system still stuck in the dark ages? Look at what you can do to move to the cloud and making business calls as simple as 1,2,3.

Chess Devices - Designed for Education
For schools' IT professionals, the countdown is on to a new academic term. 2020 brings with it a fresh new challenge - the imminent demise of Windo ...

Windows 7 End of Support FAQs
Microsoft will discontinue Windows 7 support on January 14, 2020 and has published the following advice, outlining options and the next steps.

Sophos Cloud Optix - Everything You Need to Know
Introducing the brand new Sophos product, that tracks assets in public cloud providers like AWS, Microsoft Azure, or Google Cloud Platform - and keeps them safe.

Going Phishing With Office 365
How Easy Is It To Hack Office 365 and 2FA?
This week we are joined by Stuart White, Chess Penetration Tester, he takes us through a live hack, targeting Office 365 accounts and the techniques you should be aware of to avoid being compromised, even when using 2-factor authentication.
Introducing Chess Device-as-a-Service
What is Chess Device as a Service, and how is this unique in the market? In this short video we hear about the benefits from business, operational and financial perspectives.

Six Reasons Why You Should Switch to Cloud Telephony
Cloud Telephony has many names, like VoIP, SIP Trunking and Hosted Voice. Whatever its name, it gives businesses like yours the tools to advance into the future. Read on to find out the 6 greatest benefits.

CREST Certified Penetration Test Sample Report
Not all Penetration Test Reports are created equal. Methodology can vary from supplier to supplier, but the essential element common to all Penetration Tests is the written report, key to guaranteeing the maximum value from the overall process. What should you look for in a Penetration Test Report?