GDPR Compliance and Data Processing Agreements

  Any business that is subject to the EU General Data Protection Regulation (GDPR) as a Controller will need to have in place an appropriate contract with any other Controller ...
Read More

Alternative Legal IT Conference 25th-26th September 2018

The Alternative Legal IT Conference is unique, now in its 10th year it is the only Conference totally focused on how IT can support and influence the strategic development of the ...
Read More

Cyber Essentials for Law Firms - Understanding Insider Threats

Cybersecurity attacks are so commonplace that incidents regularly make front page news. They don’t discriminate either; cybercriminals target any sized company from every sector. ...
Read More

Top 5 Reason You Need Visibility Around Data Flow

Data is the lifeblood of most organisations. Odd, then, that many CIOs and CISOs can't explain how data moves in and out of their company, or how it flows through their networks. ...
Read More

How to get the most, out of your public cloud

Very few would dispute the notion that the public cloud, also known as infrastructure as a service (IaaS) platforms, have provided IT with a hugely powerful way to deploy services ...
Read More

What is Digital Transformation?

Digital transformation is more than just a buzzword - it's a process of using technology to radically change your business. Look beyond the hype and you'll find a daunting ...
Read More

A Brief History of Hacking

Cybercrime is a blight on the modern world, but you may be surprised to discover that it’s nothing new. In fact, ever since people first invented communications technology there ...
Read More

Halfway Through 2018, is This the Year of the Insider Threat?

The likes of Yahoo! made 2016 the year of the data breach; in 2017 WannaCry and its effect on the NHS ensured that ransomware was on everyone's lips. When it comes to ...
Read More

As breaches become more sophisticated, firms must train for the next war, not the last battle

Businesses hit by a cyber attack must not dwell on the past but should instead fortify their organisation for the future. Cyber-attacks are continuing to increase and evolve at an ...
Read More

Cyber-attack! Would your firm handle it better than this?

What's it like being the victim of a live cyber-attack? What should you do to protect your company from further damage? And should you pay that ransom demand? Technology of ...
Read More