As GDPR enforcement approaches you should start to think about the ESI (Electronically Stored Information) held on your systems that could contain personal data. Whilst reviewing how data is being stored, processed, transferred, updated and protected you must also consider how to later perform e-Discovery on all of that data. Not unlike the proverbial see-saw, the more you lock something away the more difficult it…
Security Through Maturity
How's your posture?Previously a buzz word and often tongue-in-cheek as another fad that would come and go, whether we like it or not, or are even aware of it Cloud computing is now being used by half of all UK businesses. Market research company Ipsos Mori reported last year that 66% of UK medium sized firms use cloud providers to host websites or email, or transfer or…
In today’s digital world data is considered to be the crown jewels and should be protected from those that might abuse it. The value to the business that data represents should be balanced against the risk of it being exposed. Traditionally viewed as a pure security issue, as data protection laws start to change this will become much more of a compliance issue. In simple…
The countdown to the new millennium heard of horror stories predicted for planes falling out of the sky for failing to deal with the looming date of 31st December 1999. Working in a bank all night I witnessed the world transit through the different time zones, following the dawn. By the time we in the UK were in the early hours of the New Year…
Recent years have demonstrated great efforts made by organisations to encrypt any data that needs to physically leave the building where it is normally stored – the “data at rest” is made unreadable to any person or entity that is not authorised to read that data. Traditionally it is patient and finance data that have been the focus, typically stored or used on a mobile…