Research Posts

someone holding a mobile phone at a desk, tightly cropped

What Does the Cyber Essentials 2023 Update Really Mean?

In 2022, National Cyber Security Centre (NCSC), the UK’s technical authority for cybersecurity, released a…

Read more
a london skyline overlaid with an orange block colour

Handling a data subject access request: the good, the bad and the occasionally very ugly

For those living in the UK and the EU, access to personal data is a…

Read more
bright lines and dots indicating a network on a dark background

How to build wireless-first and wireless-only enterprise networks… and how not to

Wireless technology has proven its value in terms of ubiquity and convenience over the past…

Read more
a computer circuit board

Privacy-Enhancing Technologies (PETs) – shortcut to compliance or road to ruin?

In September, the UK Information Commissioner’s Office (ICO) issued new guidance on privacy-enhancing technologies (PETs).…

Read more
a hand on a dark background holding floating envelopes indicating emails

What is Business Email Compromise – and why it is so dangerous?

Many organisations cover phishing attacks in their cyber security training, and most employees are familiar…

Read more
Man working on laptop in server room

What counts as ‘personal data’?

Senior Security Consultant, Shaun Wakefield, highlights what really counts as personal data. Imagine creating a…

Read more
woman using a mobile phone and a laptop

Top three Office 365 security tips for SMEs

It is well established that the majority of cyber attacks on organisations use email. These…

Read more

Book your free 30-minute cyber security consultation