Supply chain cyber security: is your business vulnerable? By Evalian® - April 12th, 2022 Posted in Information Security supply chain security, third party security Supplier cyber security risks refer to the threats of data loss, exposure or a breach of your own systems resulting from security inciden...
Interview with Sean Huggett By Evalian® - March 24th, 2022 Posted in evalian® News cyber security, Sean Huggett The following interview with Sean Hugget was published in CyberNews on 20 March 2022 With the hit of the pandemic, cybersecurity has been...
How to choose an incident response supplier By Evalian® - March 7th, 2022 Posted in Information Security No matter the size of your organisation, having an incident response plan in place is pivotal. Below, we offer advice on how to choose an...
2022 Guide to US state privacy laws By Evalian® - May 14th, 2021 Posted in Compliance, Data Protection laws, legislation, privacy, US, USA Note to readers: In the coming months, we will regularly update this guidance in line with legislative movements. Update February 2022 ...
evalian® earn CREST accreditation for penetration testing services By Evalian® - April 12th, 2021 Posted in evalian® News, Penetration Testing We are delighted to announce that evalian® has recently achieved globally recognised CREST accreditation for our penetration testing serv...
AdTech & RTB – what are the issues? By Evalian® - March 11th, 2021 Posted in Data Protection adtech, advertising, apps, data, privacy, tracking Earlier this year, the Information Commissioner’s Office (“ICO”) announced plans to restart its investigation of the AdTech industry, wit...
How to protect your business from a data breach By Evalian® - February 19th, 2021 Posted in Data Protection anti virus, data, data breach, data protection, firewall, security It is hardly surprising that as technology progresses, cyber attacks are becoming a common and frequent problem, anyone can be at risk of...
Data protection glossary: common terms explained By Evalian® - January 25th, 2021 Posted in Data Protection data, data protection, data transfers, DPIA, DPO, EPDB, GDPR, ICO, LIA, processor, RoPA, SAR Any given subject usually comes with its own set of acronyms and jargon. A quick scan through our own website and service offerings such ...