phishing

Useful resources on Data Privacy and Data Protection

00Cyber Security, Enterprise Risk Management, Uncategorized July, 19

Here at Risk Evolves, we regularly deliver briefings and updates on all things related to data privacy and data protection, and we often signpost to other services. Over the years, we’ve amassed a long list of trusted sources of up to date information, tools and training materials, the vast majority of which is free !  So, if you can’t get along to one of the events where we’re speaking, then have a look at the list below or give us as call and we’ll see what we can do to help you.

Remember, data privacy and protection doesn’t need to be expensive !

More info

censorship-limitations-freedom-of-expression-restricted-39584

Wow this is scary stuff!!

00Cyber Essentials, Cyber Security April, 19

In my world as a Risk Consultant I spend a lot of time reviewing and trying understand the risks that face UK organisations with a view to helping businesses of any size keep their business, assets and money safe.

As part of this I attend lots of seminars, conferences and events where the Police or Government bodies such as the ICO, the National Cyber Security Centre or the National Crime Agency share their wisdom and actual details of the impact of cyber-crime or data losses…….Exciting stuff but someone has to do it!!

More info

North Wales Business Gains Accreditation to Protect Sensitive Client Data

00Cyber Security January, 19

An investment and financial planning company based in North Wales has been awarded a UK certification for protecting sensitive client data.

RPG Wealth based in St Asaph now has an IASME certification – the scheme for delivering best practice for information security. It includes the Government and National Cyber Security Centre’s own scheme Cyber Essentials and brings the business in line with the new General Data Protection Regulations (GDPR).

More info

2019-predictions

Risk Evolves reflections and predictions for 2019

00Business Process and Standards, Cyber Security, Enterprise Risk Management, GDPR Critical Friend, GDPR Discovery Review, Supply Chain January, 19

Well it’s that time of the year when we reflect on what happened in the previous 12 months and polish the Risk Evolves crystal ball to see whether we can predict what may happen in the future.

2018 was the year that saw the biggest change in data protection legislation and regulation in a generation as the General Data Protection Regulation and UK Data Protection Act (2018) were introduced. At the same time we saw the increase in phishing emails and businesses succumbing to hacks and data breaches which GDPR is trying to protect against!

More info

car-690275_640

Did you reveal too much this summer?

00Cyber Security September, 18

The glorious sunshine we have had this summer prompted me to get my sandals out and show a bit of ankle! I even went as far as putting my shorts on, sorry to shock those of a nervous disposition.

But we haven’t always had that luxury. Back in the 1920’s there were laws against that sort of thing.

So – what’s this got to do with computers? Well it’s a roundabout way of getting you to think about what you’re revealing to the world in terms of your personal data.

I know I.T. people nag incessantly about passwords but in these days of email communication, social media and online file storage, often the only thing standing between you and a voyeur is the strength of your password.
So – here’s a list of 10 deadly sins that I’ve come across – I’m sure none of you have ever done any of these but here they are as a reminder of what not to do.
More info

stress

Crisis Management – By failing to prepare ….

00Cyber Essentials, Cyber SecurityTags: , , , May, 18

It’s an old adage but it’s surprising how few organisations take Benjamin Franklin’s quote seriously enough to put his advice into practise. ‘By failing to prepare you are preparing to fail’ he said.  Of course it is tough for organisations like smaller businesses and charities who don’t feel they have the time or money to spend on training. Unfortunately though, when it comes to dealing with a crisis of any sort, it is the preparation for that possibility which will save both in the long run. More info

process

GDPR – We’ve Been Here Before (Haven’t We?)

00Cyber Security, GDPR Discovery Review, Virtual DPOTags: , , May, 18

 The GDPR Parallels :

If we are honest, and that’s the best way to be, the GDPR has been a long time coming. The current data protection legislation was well overdue for modernisation. Most companies are already dealing with processes similar to the GDPR, but many may not have drawn those parallels. Once those parallels are recognised and acknowledged, bringing it into a business can be smoother than initially thought.

Every year as a nation we always seem to be surprised that things happen – like Christmas, or School Holidays, or Birthdays. Despite having plenty of advance notice they still creep up on us. Every time we also seem to have to reinvent the wheel – ‘this year I’ll do all my shopping online’, or ‘I’ll send a card from MoonPig as opposed to picking one up from the supermarket’. Yet deep down inside we all know what works best for us, what time and again has fitted in well to our time-starved lives to help us get through these challenges of life. More info