Please consider updating your browser. Some parts of the website may not function as intended.

Webinar: Data Protection by Design & Default

Do you understand the principle of Data Protection by Design & Default? Does your organisation adhere to this much over-looked data protection requirement? If not, you aren’t alone.   Register for the webinar: How to Implement Data Protection by Design & Default DATE: Thursday, 7 May 2020 TIME: 2 pm (GMT) – 45 minutes; plus 15 […]

Cyber Essentials: The Changes

Whether you’re an existing Cyber Essentials or Cyber Essentials Plus certificate holder or not, you may be aware that the certification process is going through some changes – these are almost exclusively related to the accreditation process rather than the actual elements of the certification and framework – we’ll walk you through all of it. […]

Why Choose a CREST Accredited Pen Testing Company?

CREST Pen Testing

If you are looking to book your next penetration test and your prime consideration is getting the cheapest and quickest one available, simply because you need to tick a box, then this blog piece isn’t for you. If, on the other hand, your main concern is gaining a comprehensive picture of the security of your […]

Who’s Zoomin’ Who?

Zoom unsecure

Video conferencing has never been more popular, let’s have a look at the options and examine some of the security implications. Possibly you, like me may have been a bit disappointed to see that when it comes to video conferencing his taskforce, our Prime Minister simply used Zoom like many of the rest of us. […]

Webinar: How to Conduct a DPIA

DPIA Webinar

What is a Data Privacy Impact Assessment? When do you need to conduct one? Join us for this pragmatic and informative webinar hosted by our Data Privacy & Protection expert, Ursula Baye. Ursula will discuss the goals and objectives of this critical data protection requirement. She’ll walk you through a simple step-by-step demonstration of how […]

Webinar: What Data Flow Mapping Looks Like and How to Start

Data Flow Mapping Webinar

Both the UK Data Protection Act 2018 and General Data Protection Regulation (GDPR) require organisations to document how they process and transfer personal data from one location to another. And it’s the first critical step in conducting a Data Protection Impact Assessment (DPIA) to identify and address the associated security risks in this process. Join […]

GDPR Post-Brexit – Your Pressing Questions Answered

GDPR Post Brexit

In our recent webinar, ‘6 Things to do to Meet GDPR 3rd Country Requirements’, we provided information on how data privacy requirements may change and why organisations should prepare now. The webinar ended with a Q&A session with our data privacy and protection expert, Ursula Baye. In this post, we list the answers to those questions asked […]

Beware the Coronavirus Phishing Attacks

Coronavirus Phishing

On top of everything else to contend with you also need to be especially vigilant to COVID-19 based phishing emails – we talked about phishing emails generally in a previous blog post “Why you should fear the spear” I’ll refrain from expressing fully the contempt that all decent thinking people must feel towards those wishing […]

Working from Home? Don’t Forget Information Security.

working remotely information security

So COVID-19 or the Corona Virus as it’s still commonly referred to is really beginning to bite now, our news media outlets are immersed in the subject 24/7 so I won’t burden you with yet more facts and figures. We won’t be trying to clumsily shoehorn a sales message into this piece. Instead, we thought […]

4 Key Areas to ISO 27001 Compliance

ISO-27001-Compliance

Many things that are important in getting ISO 27001 compliant but in this blog post, I’ve narrowed it down to just 4 key areas. Trust me. By focussing on these objectives, you will greatly simplify your journey. Make it relevant First things first. You need to make it relevant. People will be more supportive if […]

Do NOT follow this link or you will be banned from the site!