Can we approach GDPR in the easy to understand way – possibly. Implementation of privacy regulation GDPR explain in the simplest possible way – we can help with aspects which you cannot implement in house.
Reflecting on some recent cyber security incidents, I thought it of benefit to write a very simple guide on how to ‘stay safe’ – back to the basics, i.e. no admin rights, application whitelisting etc. […]
Advanced Persistent Threat –
ATP – enforce changes to the approach to cybersecurity – we can help with transformation.
As an SaaS vendor, the core of your operation is to provide your customers with a Web service you have developed. We have worked with a number of SaaS Vendors securing and protecting their services […]
A serious security incident is a question of “when”, not “if”. In 2016 we have seen a number of remarkable news bulletins about cybersecurity incidents. For example, recently we saw a very serious issue relating […]
Years ago the security of IT systems was focused on antivirus and firewalls. However, it is important to understand that antivirus was only able to detect and analyse processes which were running on specific hosts, […]
Over the course of several months, and during our discussions with various board members, ‘cyber security’ is often compared to an insurance policy, in that it is a requirement due to fear or compliance […]
The latest research from Trend Micro Incorporated, reveals that 20% of global organisations rank cyber espionage as the most serious threat to their business, with a quarter (26%) struggling to keep up […]
Europe’s General Data Protection Regulation (GDPR) will come into effect on May 25th 2018, necessitating all organisations that process data of EU residents with less than 12 months to meet the stringent requirements of the regulation. […]
A serious security incident is a question of “when,” not “if.” In 2016 and 2017 we have seen number of spectacular news about cybersecurity incidents. We have seen a very serious issue related to American […]
Regardless of how advanced the technological protective measures are, often the weakest part of any Information Security Management System is people or end users. It is critical to ensure that all staff and management are […]
GDPR, or the General Data Protection Regulation is on the top of mind of many managers in business community. The GDPR is due to come into force in 2018 and has the potential to significantly […]