Menu

Call us on 03450 21 21 51

The SRM Blog

data protection

Filter by category
Filter by topic
The power of 2FA: value, requirements and mandating

The power of 2FA: value, requirements and mandating

Two Factor Authentication (or 2FA) is already a strong recommendation in many security frameworks. But could it soon become a requirement? Back in May of last year, US President..

Give the board of directors what they want: how to showcase the value of effective cybersecurity with hard evidence rather than horror stories

Give the board of directors what they want: how to showcase the value of effective cybersecurity with hard evidence rather than horror stories

It’s a core tenet of responsible information security to avoid scaremongering – even though the stories of damaging hacks, data breaches and system meltdowns can be powerful indeed. Instead,..

Cyber shame: how to avoid the stigma of being a victim

Cyber shame: how to avoid the stigma of being a victim

When is a crime ever considered to be the fault of the victim? And when is the victim punished and fined for having been the target of someone else’s..

How to implement Track and Trace safely without compromising your data security

How to implement Track and Trace safely without compromising your data security

The further easing of lockdown restrictions this month has allowed many face-to-face businesses like hospitality, retail and leisure to re-open under controlled conditions. This means that after the hiatus..

GDPR compliance: key issues facing law firms

GDPR compliance: key issues facing law firms

GDPR compliance: key issues facing law firms Only 25 per cent of law firms consider themselves to be compliant with the forthcoming EU General Data Protection Regulation (GDPR) which..

GDPR: the world will not stand still on 25th May 2018

GDPR: the world will not stand still on 25th May 2018

The 25th May 2018 is not an end date. Far from it. It marks the beginning of a new era in data protection but one that will continue to..