https://www.vigilantsoftware.co.uk/category/compliance-tools

A third-party supplier has breached the GDPR – am I liable?

Third-party suppliers are a common concern for organisations getting their GDPR (General Data Protection Regulation) compliance in order. When the Regulation was first introduced, the issue of third-party suppliers and their relation ...
Why does GDPR Matter in the Tech and Media Industry?

Why does GDPR Matter in the Tech and Media Industry?

Robust have never been so high-profile. The introduction of the EU GDPR (General Data Protection Regulation) in May 2018 put personal data protection firmly in the public consciousness. Cybercrime continues to grab ...

Why are so many CIOs leaving the NHS?

Last November, Health Secretary Matt Hancock told NHS chiefs: “If you haven’t got your CIO on board then you need to be asking serious questions of yourself.” Hancock argued that CIOs were ...

Is ISO 27001 accreditation worth it?

Have you ever wondered whether your organisation should become certified to ISO 27001? ISO 27001 provides the specification for an effective ISMS (information security management system) – a framework that offers a ...

Five warning signs you are at risk of a data breach

Data breaches are one of the biggest threat to organisations today. They can bring operations to a grinding halt, drastically damage your reputation and your relationship with customers, and cause severe financial ...

Banking – Building trust in an age of disruption

Digital disruption has long made its presence felt in the retail banking sector. A series of challenger brands have launched in recent years, building innovative and intuitive digital interfaces from the ground ...
Cyber risk management: safeguarding your organisation

Cyber risk management: safeguarding your organisation

What is cyber risk management? Cyber risk is the identification, analysis and evaluation of cyber risks. It understands and analyses the IT infrastructure, identifies the potential vulnerabilities within different systems, then prioritises ...

What is ‘data protection by design and by default’?

| | EU GDPR, Risk Assessments
Articles 25(1) and 25(2) of the GDPR (General Data Protection Regulation) outline your obligations concerning ‘data protection by design and by default’. This requirement ensures that the six data protection principles are ...
Loading...