Encryption – The Benefits for Businesses

What is Encryption? Encryption is an added security measure. It involves converting human-readable data to ciphertext. This is so that it cannot be read by those who are not the intended recipients of the data. Only those with the key to decrypt the data can convert it back to plaintext. Decryption is the process [...]

By |2023-03-15T12:34:12+00:0015th March, 2023|Cybersecurity, DPO, Encryption, International|

Tabletop exercises prepare your team for real cybersecurity disasters

Imagine you’re hiring a bodyguard. There are two candidates for the position, and Candidate A has read every security book that there is. Candidate B may not have such an encyclopaedic understanding of the industry, but what he does bring is ten years of proven experience of real security scenarios. Unless Candidate A can [...]

By |2022-05-27T11:45:37+01:0012th May, 2022|Cybersecurity|

The New Threat of Cyber Warfare webinar recording

The increased risk of cyber warfare is one of the biggest issues facing businesses across sectors, and around the world. What should you be looking out for and how to protect your business? Watch the recording of our expert panel discussion on the threat of cyber warfare. Sign up to [...]

By |2022-05-04T13:24:03+01:004th May, 2022|Cybersecurity|

Key considerations for tackling ransomware

Recent headlines have highlighted the growing cybersecurity risks to UK firms, in line with the ‘steady and significant’ rise in ICO-reported attacks. Additionally, there has been some speculation that risks will continue to grow in retaliation to sanctions against Russia. However, not all attacks are equal. Since the ICO began publishing their data in [...]

By |2022-03-31T15:17:18+01:0030th March, 2022|Cybersecurity, DPO|

The Ukraine crisis and the heightened risk of cyberattacks

In these dark days of war in Eastern Europe, it is sad to say that the risk of cyberattacks is heightened. It is important to remain vigilant and to ensure all necessary proactive steps are taken to protect data, including:Revisit your risk profile and, if you are a processor holding personal data for other organisations, [...]

By |2022-05-06T10:20:31+01:0025th February, 2022|Cybersecurity, International, News, ThoughtLeadership|
Go to Top