BlogCyber Security 101Industry GDPR Subject access request (SAR) – 6 steps to deal with it A Subject Access Request (SAR) is the Right of Access allowing an individual to obtain…FranklinNovember 21, 2018
Blog Cyber Essentials Network Firewalls Explained One of the five major controls for the Cyber Essentials Scheme is to configure and…FranklinNovember 20, 2018
BlogCyber Security 101 Free Information Security Policy for Startups A major challenge for startups is figuring out how to invest in cybersecurity. Despite the…FranklinNovember 19, 2018
BlogCyber Security 101 4 Ways to Get Your Information Security Policies Under Control An information security policy is a set of rules and guidelines that an organisation issues…FranklinNovember 16, 2018
BlogCyber Security 101Industry What’s the difference between Cyber Essentials, ISO 27001 and PCI DSS? – Cyber Security Practicing good cyber hygiene has never been more important for SMEs. In the last two…SamNovember 14, 2018
BlogCyber Security 101 Understanding GDPR Data Controller in 5 easy steps Understanding GDPR Data Controller in 5 easy steps By now most of have heard of…SamJuly 16, 2018
BlogCyber Security 101 9 Secrets To Make Your Medtech Startup Compliant Running a startup is hard especially in a heavily regulated sector like MedTech and because…SamJuly 3, 2018
BlogInside CyberSmart Case Study: Livesmart Your Company Why is data protection important to LiveSmart? LiveSmart aims to create a better world…SamJuly 3, 2018
BlogCyber Security 101 How could Cyber Essentials certification benefit your customers? Cyber Essentials is a UK-Government-backed cyber-security scheme which encourages businesses to take steps in order…JamieJune 18, 2018
BlogCyber Security 101 Who’s ready for GDPR? In this podcast, our co-founders Jamie Akhtar and Mariella Thanner had a chat with James…JamieMay 18, 2018