Content written by Jim Steven

Data breach dilemma: Who is accountable – you or your…

GDPR readiness… As we all ready ourselves for the EU General Data Protection Regulation (GDPR) that comes into play on 25 May 2018, it’s easy to overlook our network of third party suppliers. And...

Blog - Apr 2018
standup-project-meeting-large
Data Breach: The insider threat – why it pays to…

Do you have access to details about your employees, including those who work on sensitive data within your supply chain? For many businesses, the answer may be ‘no’. And while historically, data...

Blog - Mar 2018
Data breach: Four key risks to consider when partnering with…

Whilst business models become increasingly complex, so do the exciting opportunities to deliver better value and services to customers. The need for expertise or support services from a third-party...

Blog - Mar 2018
Half of consumers say it’s an organisation’s responsibility to protect…

51% of British adults think it’s an organisation’s responsibility to protect their personal data from online theft and only 9% believe it’s their own – that’s according to our research...

Blog - Dec 2017
The Three Rs of a Data Breach: Respond, Reassure &…

The ability to act quickly after a data breach is essential, but only achievable if you have a plan in place Current research...

Blog - Dec 2017
How FinTechs disrupt retail banking and other financial services
21% of UK businesses have suffered a data breach in…

This year, more UK businesses of all sizes have invested in response plans than ever before (78%). This shows a greater awareness of cybercrime and a positive step in the right direction. However,...

Blog - Jul 2017
Do you know what your customers are thinking? When it…

Any company, small or large, depends on its customers for business – and therefore success. They’re the lifeblood. And yet, our research has revealed that in the event of a crisis, specifically...

Blog - Jun 2017
Friend or Foe? Why candidate pre-screening goes hand in hand…

Increasingly organisations are becoming aware of the real threat of data breaches. Those at the top of their game are quick to realise that ‘insider threat’ is one of the causes of a data breach...

Blog - Jan 2017
Who’s ultimately responsible for protecting personal data – Individuals or…

It is fair to say we are constantly updating and sharing our personally identifiable information (PII) across our growing personal online and offline networks - friends, family and organisations –...

Blog - Aug 2016
Why data breach planning and notification needs to be at…

The threat of data breaches is still on the rise and regardless of size, of business a plan to respond, reassure and recover should be at the heart every business. Those managing large volumes of...

Blog - Jul 2016
The Business Debate: An array of risks with a multitude…

Each and every day businesses face the continual undertaking of assessing an array of risks, which could directly impact their business, changing day by day. These risks present themselves in...

Blog - Jul 2016