Research Posts

a cropped image of the london skyline with grey clouds

Beyond the Breach: Unraveling Cyber Security Lessons from Recent Incidents

In the wake of the alarming breaches at both PSNI and the Electoral Commission, it’s…

Read more
a spider web covered in dew on a black background

eBook: What is Data Privacy and Protection?

Data privacy considerations are a part of everyday life, both for organisations and private individuals.…

Read more
five years of gdpr report

Report: Five Years of GDPR – From Revolution to Evolution

Download your free report now! Discover the profound impact of the General Data Protection Regulation…

Read more
a cyborg human-like robot on a blurred background indicating AI

Privacy and AI: how do you balance innovation and protecting personal data

Artificial Intelligence (AI) has become an increasingly hot topic in recent months. While some famous…

Read more
computer screens

Endpoint Detection and Response (EDR) – Common Pitfalls

A common strand of activity for us here at Reliance Cyber surrounds Incident Response; helping…

Read more
someone holding a mobile phone at a desk, tightly cropped

What Does the Cyber Essentials 2023 Update Really Mean?

In 2022, National Cyber Security Centre (NCSC), the UK’s technical authority for cybersecurity, released a…

Read more
a london skyline overlaid with an orange block colour

Handling a data subject access request: the good, the bad and the occasionally very ugly

For those living in the UK and the EU, access to personal data is a…

Read more
bright lines and dots indicating a network on a dark background

How to build wireless-first and wireless-only enterprise networks… and how not to

Wireless technology has proven its value in terms of ubiquity and convenience over the past…

Read more
a computer circuit board

Privacy-Enhancing Technologies (PETs) – shortcut to compliance or road to ruin?

In September, the UK Information Commissioner’s Office (ICO) issued new guidance on privacy-enhancing technologies (PETs).…

Read more
a hand on a dark background holding floating envelopes indicating emails

What is Business Email Compromise – and why it is so dangerous?

Many organisations cover phishing attacks in their cyber security training, and most employees are familiar…

Read more

Book your free 30-minute cyber security consultation