Incident Response

This white paper contains advice to help to guide organisations of all sizes to build strong incident response capacity for whatever risks may occur.

Email Security

There are many risks associated with email: just as it can distribute legitimate business communications, it can also send non-business related material such as malicious software, copyrighted material, spam, or content of an illegal, immoral or racist nature. It is also a very effective attack vector for criminals and fraudsters. That is why it is […]

Ransomware

We created this white paper to help companies and public agencies of all sizes to recognise signs of a possible ransomware infection, and take measures to take to prevent it from spreading and causing damage. This document details several recommendations to help you in reducing the likelihood of future infection by ransomware, or indeed any […]

DPO FAQ: answering key data protection questions: part two

DPO (Data Protection Officer)

As we saw in part one of this series, every organisation handling personal data must comply with the GDPR, but not all need to appoint a data protection officer (DPO). In this second of our two-part blog, we take a closer look at the nature of the role, and the part they play in activities […]

DPO FAQ: answering key data protection questions

DPO (Data Protection Officer)

Every organisation needs to comply with the EU General Data Protection Regulation (GDPR) when it comes to personal data. However, not every organisation needs a designated data protection officer (DPO). This blog is the first of a two-part series looking at what kinds of organisations need a DPO, who is suitable to fill the role, […]

Security Roundup February 2022

Security Watch

Curated advice, guidance, learning and trends in cybersecurity and privacy, as chosen by our consultants. How to take the pulse of your security efforts/health check As any seasoned infosec professional knows, the security landscape shifts constantly. At times of elevated threat levels, it can be useful to take the pulse of important security controls, to […]