Cyber Security Consultancy: Policy and Data Protection

Cyber Security Consultancy: Policy and Data Protection

Introduction The team confirms that information security policies are good. Wireless networks are secure, endpoints are protected, and access rights are documented. But then it happens… Fraudulent activity is identified across customer accounts. Then the calls come. Many customers are impacted. Forensics teams are involved. A data breach is traced to an insecure wireless access […]

Legal and Regulatory Lessons from Real-World Breaches

Legal and Regulatory Lessons from Real-World Breaches

Introduction An organisation has a mixture of technology, new and old. A third party provides IT support. Then it happens… Suddenly, a legacy system stops working. Operations grind to a halt. There’s a massive reliance on old technology. The third-party IT team spent days getting the system back online. There are clear signs of a […]