+44 (0)20 7877 0060 contact@2-sec.com
Select Page

Archive

Stage 4: Detect

Stage 4: Detect

HOW DO I DETECT ATTACKS ON MY BUSINESS? Organisations need to have confidence that on a day-to-day basis, their business is well protected. Detecting a breach as soon as it happens is key to minimising the impact of an attack and recovering in optimal time. However,...
Cloud Security

Cloud Security

Do I need Cloud Security? Large-scale adoption of cloud computing has continued to mature as the benefits and understanding of the technology has grown. However, as with on-premise equipment, there are security risks when moving to the cloud. There are extensive...
Gambling Commission Security Audits

Gambling Commission Security Audits

What ARE GAMBLING COMMISSION SECURITY AUDITs? If you are a UK gaming business holder of a remote gambling operator licence (including specified remote lottery licences), you are required to engage a 3rd party to carry out an independent security audit and submit this...
Cyber Security Health Checks

Cyber Security Health Checks

What are Cyber Security Health Checks? Organisations will have provisions in place to protect the business, maintain software updates, train employees and make sure there are sufficient controls in place; but is everything supported within the business and kept up to...
Penetration Testing

Penetration Testing

What is a Penetration Test? Vulnerabilities can be found in 3 key areas: infrastructure; applications; and people. Penetration testing, also known as ethical hacking, is a process that is carried out to identify vulnerabilities and exploit them to determine the level...