Marketing vs GDPR: What You Need to Know about Using Data

2020-06-30T16:29:20+00:00June 30th, 2020|Categories: Compliance, IT Security|Tags: , , , , |

Marketing vs GDPR: What You Need to Know about Using Data Decisions have always been driven by data, it’s just that right now the world generates unprecedented amounts of data and we have access to a host of (relatively) new tools to slice, dice, quantify and analyse it. At the same time, however, [...]

Retail and cyber security

2018-05-15T10:53:51+00:00May 15th, 2018|Categories: IT Security|Tags: , |

Retail and cyber security As new research shows that the retail sector was targeted more than any other in cyber attacks in 2017, it is time for retailers to up their game when it comes to dealing with these organised attackers. The most common way to compromise retail systems was phishing and social engineering, [...]

Do start-ups need outsourced IT support?

2021-12-09T23:00:49+00:00May 2nd, 2018|Categories: IT Support|Tags: , , , , , , |

Start-Ups Outsourced IT Support ? As anyone who’s done it will know, business start-ups aren't necessarily easy, in fact, there’s a lot to think about, a lot to do and a lot to budget for. This means that many people may be asking themselves, quite reasonably, whether or not start-ups really need to [...]

Cambridge Analytica and Facebook

2018-04-16T19:27:51+00:00April 16th, 2018|Categories: Security Bulletin|Tags: , , , , , |

Cambridge Analytica and Facebook: is your data safe? Cambridge Analytica has made what was probably a rather unwelcome transition from being a niche player to being one of the most (in)famous brand names around. Facebook, meanwhile, has long been controversial from a data protection/privacy perspective and, while some of the stories circulating the [...]

Only 1 in 10 SMEs are ready for GDPR: are you?

2018-04-11T12:33:23+00:00April 11th, 2018|Categories: Compliance|Tags: , , , , |

Only 1 in 10 SMEs are ready for GDPR: are you? Even though the General Data Protection Regulation was adopted on 27th April 2016, only 8% of SMEs have stated that they are ready for when it goes live on 25th May 2018. This would not be so bad if the other 90+% were [...]

The role of CFOs and CMOs in cyber security

2018-04-11T12:29:39+00:00April 11th, 2018|Categories: IT Security|Tags: , , , , , |

The role of CFOs and CMOs in cyber security The internet has made it possible for people to work together even when they are on different continents and yet there seems to be nothing technology can do to erase the barriers that can stop different departments from fighting over competing priorities and internal territorial [...]

Security and your iPhone

2018-03-23T12:33:25+00:00February 15th, 2018|Categories: IT Security|Tags: , , , , |

Security and your iPhone Smartphone security is increasingly in the news and, as we use our phones and tablets to store a vast amount of personal information and professional data, it is always wise to protect them with a ‘belt and braces’ approach. Assuming that the generic settings on your device will be sufficient [...]

Safe browsing: the primer you need for online security

2018-03-23T12:34:13+00:00February 15th, 2018|Categories: IT Security|Tags: , , , , , , , |

Safe browsing: the primer you need for online security In honour of Data Privacy Day earlier this week, we wanted to look at how you can stay safe and secure while you browse online. You might already know to avoid suspicious websites and be careful who you give cookie permission to, but many [...]

B2B communications and GDPR

2021-07-08T11:36:32+00:00January 24th, 2018|Categories: IT Security|Tags: , , , , |

B2B communications and GDPR GDPR is, fundamentally, all about the protection of personal data; basically it’s about an individual’s right to privacy. As such, most of the literature around it has tended to focus on what businesses need to do to protect customer data and to ensure that all marketing communications are compliant [...]

Chip security: a lesson in management

2018-04-09T13:41:48+00:00January 22nd, 2018|Categories: IT Security|Tags: , , , , |

Chip security: a lesson in management Up until recently, the term spectre would probably have been associated more with James Bond than computers. In Bond films, supervillains plot to destroy the world through various spectacular means whereas the recent spectre alert is a vulnerability discovered on computer chips that could have had a [...]

Go to Top