Data Flow Mapping Tool – Instructional Video

3 data flow mapping challenges to comply with the GDPR

As part of your GDPR (General Data Protection Regulation) compliance project, your organisation must understand what personal data it processes. To help you do this, you must create a data flow map. A data flow ...
A third-party supplier has breached the GDPR – am I liable?

A third-party supplier has breached the GDPR – am I liable?

Third-party suppliers are a common source of confusion for organisations considering their GDPR (General Data Protection Regulation) compliance requirements. When the Regulation was first introduced, the issue of third-party suppliers and their ...
Why does GDPR Matter in the Tech and Media Industry?

Why does GDPR Matter in the Tech and Media Industry?

Robust have never been so high-profile. The introduction of the EU GDPR (General Data Protection Regulation) in May 2018 put personal data protection firmly in the public consciousness. Cybercrime continues to grab ...

Why are so many CIOs leaving the NHS?

Last November, Health Secretary Matt Hancock told NHS chiefs: “If you haven’t got your CIO on board then you need to be asking serious questions of yourself.” Hancock argued that CIOs were ...
5 signs that you might be about to suffer a data breach

5 signs that you might be about to suffer a data breach

Data breaches are one of the biggest threat to organisations today. They can bring operations to a grinding halt, drastically damage your reputation and your relationship with customers, and cause severe financial ...

Banking – Building trust in an age of disruption

Digital disruption has long made its presence felt in the retail banking sector. A series of challenger brands have launched in recent years, building innovative and intuitive digital interfaces from the ground ...

Every organisation is affected by cyber risk!

Organisations that believe they can ignore cyber risk management and the benefits it offers will probably lose out as others adopt more efficient, more economical, less human-resource-intensive solutions. For effective cyber risk ...

Myth-busting: Why risk assessments shouldn’t be a one-time thing

We’re kicking off a new series of blogs tackling some of the biggest misconceptions around risk assessments, information security, data protection, regulatory compliance, and other issues that our customers are grappling with ...