2019-predictions

Risk Evolves reflections and predictions for 2019

00Business Process and Standards, Cyber Security, Enterprise Risk Management, GDPR Critical Friend, GDPR Discovery Review, Supply Chain January, 19

Well it’s that time of the year when we reflect on what happened in the previous 12 months and polish the Risk Evolves crystal ball to see whether we can predict what may happen in the future.

2018 was the year that saw the biggest change in data protection legislation and regulation in a generation as the General Data Protection Regulation and UK Data Protection Act (2018) were introduced. At the same time we saw the increase in phishing emails and businesses succumbing to hacks and data breaches which GDPR is trying to protect against!

More info

Success 1 RE

Navigating to success

00Business Process and Standards, Enterprise Risk Management, Risk & Governance Review November, 18

I’ve recently returned to the office following a great holiday abroad. Our journey back involved a ferry between two islands and whilst watching our holiday destination disappear over the horizon, my eye was caught by the route that the ship was taking. Although our journey was a direct one from one port to the other, the captain was steering the boat in a zig zag, adjusting the direction to cope with the swell of the sea, the keen cross wind and the ocean currents.
More info

car-690275_640

Did you reveal too much this summer?

00Cyber Security September, 18

The glorious sunshine we have had this summer prompted me to get my sandals out and show a bit of ankle! I even went as far as putting my shorts on, sorry to shock those of a nervous disposition.

But we haven’t always had that luxury. Back in the 1920’s there were laws against that sort of thing.

So – what’s this got to do with computers? Well it’s a roundabout way of getting you to think about what you’re revealing to the world in terms of your personal data.

I know I.T. people nag incessantly about passwords but in these days of email communication, social media and online file storage, often the only thing standing between you and a voyeur is the strength of your password.
So – here’s a list of 10 deadly sins that I’ve come across – I’m sure none of you have ever done any of these but here they are as a reminder of what not to do.
More info

adventure-bay-beach-307008 (1)

Manage your Supply Chain – ‘No man is an island ?’

00Business Process and Standards, Cyber Essentials, Enterprise Risk Management, GDPR Discovery Review, Supply ChainTags: , , , , , , August, 18

I don’t believe that any one of us working in any type of organisation, regardless of whether you’re a small business, a charity, a school or even a sole trader today can operate without the products or services of a 3rd party provider. We may well have chosen to outsource our accountancy, HR, IT and compliance management requirements. Equally, our clients outsource to us e.g. audit requirements, Data Protection Officer and so on. Our Clients all have a dependency on us to deliver services. Here at Risk Evolves – we’re no different. We’re great examples of the fact that very few, if any, organisations can operate without the support of a 3rd party. A 3rd party could be providing IT, critical resource, logistics support, payroll services, catering, cleaning etc. And yet, how many of us step back and analyse exactly what we would do if one of those third parties wasn’t available one day. What happened if they were to suffer a flood to their premises so that they couldn’t operate, if they were to go out of business, cease to provide the service that we are reliant on, be acquired by another organisation – the list goes on. More info