Understanding post-Brexit penalties and fines for GDPR
Now that the set period for Brexit transition has come to an end, there are two different versions of the General Data Protection Regulation (GDPR) that…
Now that the set period for Brexit transition has come to an end, there are two different versions of the General Data Protection Regulation (GDPR) that…
How well do you Know Your Customers? Sure, you perform KYC (Know Your Customer) checks on all new clients, but is that enough? How do…
May 6th will see people all over the planet take part in World Password Day editing and updating the multi-character credentials they have adopted to…
Despite all the warnings issued by cybercrime experts, many people are still employing passwords that are simple to guess. From “1234” and “password” to the…
Whether it’s downloaded by accident or insidiously planted on a device, malware can cause a host of issues for an enterprise, from slow systems to…
When upgrades are issued for software and hardware used by your firm, you may find security fixes for known vulnerabilities included in the update. If…
If your business uses Microsoft Office 365 Enterprise, you and your employees may have started receiving weekly emails with the subject line ‘Your daily briefing’…
File Integrity Monitoring, or FIM for short, is the name given to IT security processes and technology that has been designed to examine and identify…
Across the UK, businesses use mobile devices and desktop computers to search through data and to store and conduct data processes. Performing regular backups of…
The National Cyber Security Centre (NCSC) website recommends that companies should always work on the premise that systems may be