Skip to content
Know what you're looking for?
Cyber Security Incident Response
Email Threat Prevention
Threat Detection & Response
Vulnerability Patch Management
UK & EU Representative
Know what you're looking for?
*Reassuringly dull cyber security
t: +44 (0) 203 855 6215
Advice, articles and opinions on the world of cyber security and data protection
The top five cyber security challenges facing logistics companies…and how to solve them
Case Study: Coveris
What the current cookie chaos means for UK businesses
What is cyber insurance and do you really need it?
Case Study: Fowler Welch
In house vs. outsourced cyber security management
Video: What marketing leaders need to know about data protection law
How to define and assess your cyber risk appetite
A Tale of Trust Built and Lost: International Personal Data Transfers, the story so far…
How to manage cyber risk effectively – a guide for midmarket companies
Pulse Secure declares new SSL VPN Zero Day vulnerability
Video: How to manage your cyber security strategy
UK on the brink of post-Brexit data protection divorce?
Why midmarket companies ignore cyber security risk
Why in-house legal teams need access to data protection lawyers
Video: How to measure the effectiveness of your cyber defenses
Five signs that your organisation has been hacked
Five things to do this week to protect against almost all cyber attacks
Choppy waters or land ahoy? How to ride the waves of international data transfers
Six questions to ask your provider before you sign up to CSaaS
What is Cyber Security as a Service and is it right for you?
A tale of two GDPRs…the data protection implications of Brexit
How the ICO’s Accountability Framework helps to demonstrate compliance
The Buyer’s Guide to Managed Cyber Security Services
Brexit – the countdown to 1st January 2021
Security compliance – a carrot or a stick?
What can we learn from the H&M GDPR fine?
National Data Strategy: A data protection regime blueprint?
Case Study: One YMCA
How to align safeguarding and data protection in schools
Protecting your organisation from ransomware
Case Study: Ferrero
Case Study: Nth Dimension
BA £20 million fine by ICO – big deal or big flop?
What business leaders need to know about cyber security
Benefits of Digital Transformation
How to create a cyber security incident response plan
Data Protection Impact Assessments and the GDPR
To disclose or not to disclose a data breach?
International cross-border transfers – FAQs
The top five cyber security threats facing UK businesses today
A yellow brick roadmap to change
Email data protection errors that cause personal data breaches
Employee health screening and data protection
Cookie law guidance updated by the EDPB
Victims of abuse identity revealed by email error
GDPR & the security principle – a data protection webinar
Wrong choice of DPO results in €50,000 fine
Help! We’ve been breached – now what? – a webinar
Managing and mitigating cyber risk in uncertain times
GDPR & Data Protection in the context of Covid-19
Home working tips – Speedy, simple and free
Morrisons not liable for rogue employee data leak
How to create an effective cyber security awareness programme
How to protect devices, users and rights when working from home
COVID-19 & data protection in the UK – Top tips
Real Time Bidding, AdTech & Data Protection
Employee emails and the data protection implications of access
Biometric data and the data protection implications
Yachting industry hit by data breach that exposed 17,379 people
Directors Personal Liability & Data Protection
The CCPA (California Consumer Privacy Act) and you
Brexit and the Data Protection implications in the UK
Case Study: Perpetuum
Case Study: Chambers and Partners
Case Study: Montreal Associates
Case Study: Cavendish Maxwell
Claim for compensation for data breaches – the new norm?
Suprema data breach – norm’s DPO comments
Monzo PIN breach results in 500,000 PIN changes
Capital One breach: what was stolen and how?
Get in touch.
+44 (0) 203 855 6215
***** Been breached?
Call 020 3855 5303