Dark Mode

    Free Trial

    GYTPOL's Blog

    Image of Jake Dillon
    • 9 min read

    Hardening NHS Security With Better Device Configuration

    In the digital age, data protection and security are paramount, especially within the healthcare sector. The National Health Service (NHS) in the UK recognizes the importance of safeguarding...

    Hardening NHS Security With Better Device Configuration

    In the digital age, data protection and security are paramount, especially within the healthcare sector. The National Health Service (NHS) in the UK recognizes the importance of safeguarding...

    9 min read

    Thriving Through the NCSC CAF: Ensuring Secure Configurations at Scale

    Threat actors are taking advantage of misconfigurations on various devices, such as PCs, laptops, and servers. So much so that according to Microsoft, 80% of successful ransomware attacks ar...

    Thriving Through the NCSC CAF: Ensuring Secure Configurations at Scale

    Threat actors are taking advantage of misconfigurations on various devices, such as PCs, laptops, and servers. So much so that according to Microsoft, 80% of successful ransomware attacks ar...

    11 min read

    Your Complete Guide to Cyber Essentials Compliance

    Cyber Essentials is a cyber security certification that has been designed by the government to make it simple for organizations to protect themselves against common cyber threats.

    Your Complete Guide to Cyber Essentials Compliance

    Cyber Essentials is a cyber security certification that has been designed by the government to make it simple for organizations to protect themselves against common cyber threats.

    5 min read

    Jake Dillon

    A passionate sales leader and full-time techie, Jake loves solving enterprise problems and selling cybersecurity.

    Blog Posts by “Jake Dillon”

    Image of Jake Dillon
    • 9 min read

    Hardening NHS Security With Better Device Configuration

    In the digital age, data protection and security are paramount, especially within the heal...

    9 min read

    Thriving Through the NCSC CAF: Ensuring Secure Configurations at Scale

    Threat actors are taking advantage of misconfigurations on various devices, such as PCs, l...

    11 min read
    Image of Jake Dillon
    • 5 min read

    Your Complete Guide to Cyber Essentials Compliance

    Cyber Essentials is a cyber security certification that has been designed by the governmen...

    5 min read