Blog

Ransomware Attack Scenario at “Shoes-4-U” – How Would You React?

Ever wondered what it’s like to experience a cyber-attack? Want to know what the warning signs are? This article recreates a typical ransomware attack scenario of what a business may go through in the first 24 hours when experiencing a data breach.

The Scenario

Fictional high street shoe retailer Shoes-4-U, with branches in every town nationwide, has recently received an email from a supplier.

more →

Blog

GDPR: Top 10 Technologies To Aid Compliance (Part 5 of 5)

Max Pritchard

In Part 1 of this GDPR blog series, we looked at the PII threat landscape and the legal & financial consequences of technology failure. In Part 2, we highlighted the major provisions in the GDPR for technological measures to protect data. In Part 3, we examined some of the guiding principles to be considered in relation to the technological impact of the GDPR within an organization.

more →

Blog

GDPR: Taking A Risk-based Approach To The Technological Measures Required To Protect Data (Part 2 of 5)

In Part 1 of this GDPR blog series, we looked at the PII threat landscape and the legal & financial consequences of technology failure. In this post, we highlight the major provisions in the GDPR for technological measures to protect data, and examine the importance of taking a risk-based approach to GDPR technology investments.

more →

Blog

Get Ready For GDPR: WAF is a Must-Have Security Control to Aid Compliance

Preparing for the EU’s new data protection regime: General Data Protection Regulation (GDPR)

Could your business withstand a fine of 4% of its worldwide revenue? That’s turnover, not profit. Most would face severe difficulties, if not insolvency. But that’s the sort of fine that the European Union (EU) will soon be able to impose on companies who work with personal data if they allow a security breach or can’t demonstrate adequate data protection.

more →