Supporting you to drive compliance and manage risk in your organisation through consultancy, training and assessment.
We work with legal Practices as well as all other sectors

Our articles on data protection, cyber security, risk and compliance

We publish articles on LinkedIn; they are free to view. Just click on the links, below.

 

 

 

 

Perspective in Practice: Faking it, (even if you didn't really mean to)

With 'added value' from suppliers comes risk through 'off the shelf' controls, policies and procedures. Here, we examine the very real risks of the procedural version of using someone else's toothbrush.

Read the article, here. 

 

 

 

 

Perspective in Practice: Appointing a data protection leader; not a DPO

Most organisations don't need a Data Protection Officer; instead, they need a data protection leader. Specifically appointing a DPO when one isn't appropriate for your organisation could be the 'wrong' thing to do, with the potential for troubling consequences.

Read the article, here. 

 

 

 

Perspective in Practice: The risks of free-to-use messaging apps

Use of WhatsApp and other messaging services is commonplace in our 'connected world', but just because they are part of our everyday landscape doe not mean they are safe; in fact, very far from it.

Read the article, here. 

 

 

 

 

Perspective in Practice: The data that you didn't see

The vast majority of organisations don't realise the full extent of personal data that they hold; not by a long shot. Without full visibility is is near-impossible to steer yourself out of a tough spot.

Read the article, here. 

 

 

 

 

Perspective in Practice: What to do to prepare for GDPR

Don't be fooled by the seemingly redundant title; the GDPR might be 'old news' but the reality is that it hasn't even shed its baby teeth yet. This relatively short article reveals some of the sharper, pointy bits that you would most likely wish to avoid.

Read the article, here. 

 

 

 

 

 

Perspective in Practice: Danger beneath 'opt in' emails

Last year saw a deluge of emails from suppliers pleading with us to allow them to retain us on their mailing lists. In fact, seeking our consent wasn't always strictly necessary, but that's another story. Now, as was the case then, threat actors are using unsubscribes to lure us to click in dangerous places; sometimes leading to Phishing and Whaling threats.

Read the article, here. 

 

 

 

 

 

 

Perspective in Practice: Information (data and cyber) security; food for (uncomfortable) thought

It is essential that business leaders understand that cyber threat is not the responsibility of the IT department; it a a people problem, first and foremost. This article highlights the risks faced by every organisation that uses connected computer technology to conduct its work.

Read the article, here. 

 

 

 

Perspective in Practice: The unseen danger; Data Subject Access Requests

We've been supporting organisation in handing DSARs (Data Subject Access Requests). We're very good at it and we need to be; DSARs usually unpack into am alarming volume of documents and there is a regulated timescale for fulfilling them. So, it's essential that DSARs are recognised and managed quickly and efficiently. The trouble is; most staff don't know how to spot them and what to do next.

Read the article, here.