Tech Driven. People Powered.

Blog

Insights, analysis, and thought leadership from the front lines of cybersecurity. Our blog covers emerging threats, best practices, and expert perspectives to help you stay secure in a constantly evolving digital world.

Image for Blog
Blog Post Image

14/03/2023

8 ways to protect employees who are using public WiFi

Maintaining the security of employee endpoints is an important consideration for any organisation, especially when employees are using public WiFi…

Read More
Blog Post Image

28/02/2023

The impact of employee burnout on cyber security

Employee burnout is a serious issue that can have a significant impact on a company’s cyber security. Burnout is a…

Read More
Blog Post Image

27/02/2023

Working with the Check Point Partner Advocacy Team

SEP2 continues to grow and strengthen our relationship with Check Point. SEP2 have been a partner of Check Point since…

Read More
Blog Post Image

03/02/2023

SEP2 is 7

SEP2’s 7th Birthday This week at SEP2, we are proud to be celebrating our 7th Birthday. Much has changed over…

Read More
Blog Post Image

31/01/2023

The Dangers of Social Engineering

How cyber criminals exploit human nature, and what you can do to stop them. Social engineering is a tactic used…

Read More
Blog Post Image

14/12/2022

A look back at 2022

This year has been filled with positives for SEP2 as we have continued to grow and evolve as an organisation….

Read More
Blog Post Image

25/08/2022

Five Legendary Hacks

From cereal box whistles to billion-dollar breaches: five hacks that made history. Today the word “Hacker” is synonymous with individuals…

Read More
Blog Post Image

11/07/2022

Is cyber security important for small businesses?

Why cybercriminals are targeting smaller companies—and how to fight back You often will see stories in the news about large…

Read More
Blog Post Image

31/05/2022

Follina – Zero day exploit in MS Office – workaround instructions

A new zero-day remote code execution bug has been found in Microsoft Office. This was first picked up by security…

Read More
Blog Post Image

14/04/2022

Cyber Security in Sport

Technology is at the centre of almost everything in modern-day life, and the world of sport is no exception. Where…

Read More
Blog Post Image

10/03/2022

GDPR: Four Years On

Reflecting on the impact, challenges, and future of data protection in a post-GDPR world It’s been four years since GDPR…

Read More
Blog Post Image

08/03/2022

Women in tech: The gender gap in the tech sector

Unpacking the statistics, the stereotypes, and the steps toward a more inclusive future The Tech Sector is a rapidly growing…

Read More

.