GDPR: Your Data Integrity and Confidentiality Needs Protected Table of Contents Toggle Confidentiality, Integrity and the GDPRWill Existing Security Suffice?Privacy Impact Assessments and Data Protection Officers (PIA & DPOs)Final Thoughts Here’s a thought; if you...
The Surprising Steps You Need To Be GDPR Savvy Table of Contents Toggle AwarenessInformationCommunicating Privacy InformationIndividual RightsSubject Access RequestsLawful BasisConsentChildrenData BreachesInternational The GDPR (General Data Protection...
The Myths and Facts Surrounding GDPR: A Cheat Sheet Table of Contents Toggle The GDPR is a brick wall that all companies will run up against in May 2018Under the GDPR all data breaches must be reported to the ICOIf a reportable breach occurs, all information must be...
Endpoint Security – What you Need to Know Table of Contents Toggle What Is Endpoint Protection?An Agile, AI-Powered Solution for Endpoint SecurityPatching Your DevicesMinimising Human ErrorDoing Justice To The Importance of Endpoint Security The digital security...
Why you Should Invest in IT Security Awareness Training Table of Contents Toggle What Does GDPR Mean For IT Security?Avoiding the Most Common Cyber ThreatsKeeping Your Passwords SecureThe Importance of Updates and PatchesDo I Need Security Awareness Training?What’s...
Downtime Calculator: Why your Business Needs One To Win Table of Contents Toggle Analysing the ThreatAssessing the Financial EffectPlanning Proactively – Proactive Planning?Supporting Growing SMEs: Jera IT Here, we explore how IT system failures, however occasional,...