Webinar Topic of the Month

How Organisations Actually Get Breached

Join us in our monthly webinar series, this time focusing on the types of attack that target organizations. With guest speakers from the Cyber Security industry, sign-up to stay ahead with the latest threat trends to be aware of.

Register for this webinar

Intouch Tech is committed to protecting and respecting your privacy, and we’ll only use your personal information to administer your account and to provide the products and services you requested from us. From time to time, we would like to contact you about our products and services and other webinars, as well as other content that may be of interest to you. Please consent to us contacting you for this purpose.

You can unsubscribe from these communications at any time. For more information on how to unsubscribe, our privacy practices, and how we are committed to protecting and respecting your privacy, please review our Privacy Policy.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Thursday 16th April | Time: 14:00 | Duration: 30mins

Days
00
Hours
00
Minutes
00
Seconds
00

Webinar Details

Most SMB breaches come from the same few gaps: phishing, weak credentials, unprotected endpoints, and poor recovery planning. In this session, we’ll break down what actually gets SMBs breached and what a practical, cost-effective security stack looks like, from Cloud Email Security and Anti-Phishing to EDR, SOC, and Business Continuity.

How Phishing Simulations and Security Awareness Training reduce user-driven risk

Why Cloud Email Security, AV, and EDR matter and where each fits

How a SOC and Dark Web Monitoring help spot threats and leaked credentials early.

How Firewalls, Vulnerability Scanning, and Pen-Testing reduce exposure.

How Managed IT Support improves security day-to-day.

Guest Speakers

David Hughes

Managing Director

Sam Kent

Head of Cyber Security Sales

Kaseya mystery Person

Coming Soon