In the digital age, our online experiences are shaped by the websites we visit. From shopping […]
Cyber Essentials is a new certification that helps organisations to prove their cyber security standards to clients, and deter hackers. It is necessary to get many Government contracts and is very important for many organisations. But how does it actually work? Find out the five key controls that Cyber Essentials evaluates in this short blog post.
Confidential documents and sensitive information is often leaked in many companies. One of the easiest ways this can happen is leaving such documents unattended. A clear desk policy is a simple solution to avoid this problem. Find out more in this blog post.
You company just got a Data Subject Access Request, but it contains the personal data of two or more parties. How do you balance the GDPR’s principle ‘right to access’ with ‘what to disclose’? How should you properly redact the data before disclosing it?
Everyone thinks collecting massive amounts of data is the best thing to do for marketing, and the general growth of a company. However, is this actually true? Hyper-growth models of big data are showing to be heavily limited, and Data minimisation is the next big thing. Find out more in this short blog post.
As Cyber Crimes increase in frequency, sophistication, and lethality, the cost of fixing any breaches are rising. Here are some easy to follow tips on how to protect yourself against cyber crime.
Primary Care Networks increase the scope of data sharing. But this also widens the cyber-security threat, even though data security standards have increased. What risks can General Practices face and how can they safeguard against them? Find out more in this short blog post.
Patient Self Check-in kiosk is installed by Engage Health across most GP practices to enable patients to verify their identity and book appointments. However, what are the potential privacy implications of this feature? What safeguards can be adopted to mitigate these risks?
NHS Digital recently updated the Data Security and Protection toolkit for 2019-2020. What are these changes and what implications do they have? How can we comply with this new Act? Find out in this short article.
Recent Comments