Archives

Cyber Security

The Age Appropriate Design Code
The Age Appropriate Design Code

The Children's Code The Children’s Code (or Age Appropriate Design Code to give its proper title) is a data protection code of practice for online services. This includes apps, online games, and web and social media sites that are likely to be accessed by...

Your CCTV and the GDPR?
Your CCTV and the GDPR?

In case you didn’t know, but CCTV footage is subject to the GDPR (General Data Protection Regulation). The Regulation isn’t just about written or electronic data such as names and addresses. It applies to any information that can identify someone. That includes...

UK firms face high compliance costs
UK firms face high compliance costs

British firms face a bill of up to £1.6 billion if the UK government fails to win an EU adequacy decision. The decision, if granted, would allow dataflows to continue as normal. This was revealed by a new report published on Monday last (23rd November 2020). UK firms...

Black Friday 2020 scams
Black Friday 2020 scams

And how to avoid them… The scramble for bargains and supposedly unbelievable savings, whatever your thoughts about Black Friday are, brings with it a spike in cybersecurity threats. Cybercriminals will be just as keen to take advantage of you as you are desperate for...

ISO 27701 – are you privacy ready?
ISO 27701 – are you privacy ready?

ISO/IEC 27701 is the international standard for privacy information management systems and is a companion standard for ISO 27001. ISO/IEC 27701 enables organisations to demonstrate compliance with all applicable privacy regulations, including the GDPR and the Data...

Data protection health-checks
Data protection health-checks

Why is a Data Protection Health Check important? GDPR, other regulations and data protection best practices are not one time operations. They aren't set and forget They are on-going, living projects that require constant attention and maintenance. The GDPR Compliance...

Phishing attack risk
Phishing attack risk

Are your employees prone to phishing attacks? Find out with our free test Did you know that 91% of successful data breaches started with a spear phishing attack? Find out what percentage of your employees are prone to this type of attack with your free...