The benefits of penetration testing By Editor Last - April 8th, 2021 Posted in Information Security cyber security, mobile app testing, pen test, pen testing, penetration testing, web app testing Most business decisions are ultimately based on the management of risk, whether it be threats from cyber attackers or the opportunities p...
AdTech & RTB – what are the issues? By Paren Raval - March 11th, 2021 Posted in Data Protection, Information Security adtech, advertising, apps, data, privacy, tracking Earlier this year, the Information Commissioner’s Office (“ICO”) announced plans to restart its investigation of the AdTech industry, wit...
Data sharing – the new code of practice By James Robson - February 19th, 2021 Posted in Compliance, Data Protection, Information Security code of practice, controllers, data, data pooling, data protection, data sharing, data sharing tips, DPIA, key data, key points The Information Commissioner’s Office (the “ICO”) recently published its new Data Sharing Code of Practice (the “code”) as a replacement ...
‘Cyber Essentials’ – what is it? By Thomas O'Donnell - February 10th, 2021 Posted in Compliance, Data Protection, Information Security Simply put, Cyber Essentials (CE) is a UK Government backed scheme to help companies ensure that they are secured against the most common...
What is a ‘privacy nutrition’ label and why do they matter? By James Robson - February 3rd, 2021 Posted in Data Protection, Information Security app, app privacy, data, data security, nutrition label, personal data, privacy With the recent global events over the past few months, you may have missed Apple’s announcement in November last year. From December 8th...
Zoom security & privacy tips By James Robson - November 8th, 2020 Posted in Data Protection, Information Security The phrase “Zoom fatigue” became prevalent this year. Other phrases and words like “we’ll zoom”, “I’ll zoom you” and “Zoombombing” became...
Penetration Testing – what is it and why is it necessary? By Nelson Santos - November 1st, 2020 Posted in Information Security A penetration test (or ‘pen test’) is a simulated cyber attack through which you can identify the very vulnerabilities that a...
What does a cyber security consultant do? By Georgina Donovan - October 26th, 2020 Posted in Information Security Headline grabbing cyber attacks, you know the ones, “multi-national company ‘X’, has been hit by ransomware and has been demanded to pay ...