The Crucial Security Gap Within Software Applications

A key aspect of modern software inhibits traditional data protection efforts In many organisations, it is all too easy for the technical implementation of data protection to fall through the cracks. In concept, many different functional areas have a vested interest in this: compliance officers, cybersecurity teams, the CTO’s organization, business units, and more. In […]

eBook: Data Protection Is Everyone’s Job, so It’s No One’s Job

Implementing data protection is an ambiguous area of responsibility for too many organizations, and well-meaning truisms like “Security is everybody’s job” do not help the situation. Long experience in the field across different industries confirms this, whether the businesses in question create software for external customers or only for internal use. Given the lack of clarity about who is […]

Put up the best possible defence: COVID-19: Top ten cyber security tips

Cyber security criminals are using the ongoing Coronavirus pandemic to unleash a torrent of attacks designed to infiltrate businesses when they are potentially at their weakest.  Phishing attacks seem to be the weapon of choice, with hackers sending text messages and emails to employees, encouraging them to click on the links contained within.  If they […]

Rethinking ‘Disproportionate Effort’ exemption under GDPR for web-scraping

-A Legal Consultancy firm wants to access all the names and contact details of Solicitors in UK. -A marketing agency needs contact details of potential customers so it can promote products/services to them, be it via e-mail , phone or post. In all these circumstances, the business in question will need access to vast amounts […]