phishing

What is Phishing?

00Cyber Security October, 19

It’s thought that cyber-attacks on UK businesses rose by a staggering 243% this summer, which vividly illustrates the digital threat we all face during our daily working lives.

Phishing is one of the most common methods of cyber-attack, so let’s take look into what exactly it is, and how you can avoid becoming a victim.

More info

phishing

Useful resources on Data Privacy and Data Protection

00Cyber Security, Enterprise Risk Management, Uncategorized July, 19

Here at Risk Evolves, we regularly deliver briefings and updates on all things related to data privacy and data protection, and we often signpost to other services. Over the years, we’ve amassed a long list of trusted sources of up to date information, tools and training materials, the vast majority of which is free !  So, if you can’t get along to one of the events where we’re speaking, then have a look at the list below or give us as call and we’ll see what we can do to help you.

Remember, data privacy and protection doesn’t need to be expensive !

More info

censorship-limitations-freedom-of-expression-restricted-39584

Wow this is scary stuff!!

00Cyber Essentials, Cyber Security April, 19

In my world as a Risk Consultant I spend a lot of time reviewing and trying understand the risks that face UK organisations with a view to helping businesses of any size keep their business, assets and money safe.

As part of this I attend lots of seminars, conferences and events where the Police or Government bodies such as the ICO, the National Cyber Security Centre or the National Crime Agency share their wisdom and actual details of the impact of cyber-crime or data losses…….Exciting stuff but someone has to do it!!

More info

North Wales Business Gains Accreditation to Protect Sensitive Client Data

00Cyber Security January, 19

An investment and financial planning company based in North Wales has been awarded a UK certification for protecting sensitive client data.

RPG Wealth based in St Asaph now has an IASME certification – the scheme for delivering best practice for information security. It includes the Government and National Cyber Security Centre’s own scheme Cyber Essentials and brings the business in line with the new General Data Protection Regulations (GDPR).

More info

2019-predictions

Risk Evolves reflections and predictions for 2019

00Business Process and Standards, Cyber Security, Enterprise Risk Management, GDPR Critical Friend, GDPR Discovery Review, Supply Chain January, 19

Well it’s that time of the year when we reflect on what happened in the previous 12 months and polish the Risk Evolves crystal ball to see whether we can predict what may happen in the future.

2018 was the year that saw the biggest change in data protection legislation and regulation in a generation as the General Data Protection Regulation and UK Data Protection Act (2018) were introduced. At the same time we saw the increase in phishing emails and businesses succumbing to hacks and data breaches which GDPR is trying to protect against!

More info

car-690275_640

Did you reveal too much this summer?

00Cyber Security September, 18

The glorious sunshine we have had this summer prompted me to get my sandals out and show a bit of ankle! I even went as far as putting my shorts on, sorry to shock those of a nervous disposition.

But we haven’t always had that luxury. Back in the 1920’s there were laws against that sort of thing.

So – what’s this got to do with computers? Well it’s a roundabout way of getting you to think about what you’re revealing to the world in terms of your personal data.

I know I.T. people nag incessantly about passwords but in these days of email communication, social media and online file storage, often the only thing standing between you and a voyeur is the strength of your password.
So – here’s a list of 10 deadly sins that I’ve come across – I’m sure none of you have ever done any of these but here they are as a reminder of what not to do.
More info