BlogCyber Security 101 Free Information Security Policy for Startups A major challenge for startups is figuring out how to invest in cybersecurity. Despite the…FranklinNovember 19, 2018
BlogCyber Security 101 4 Ways to Get Your Information Security Policies Under Control An information security policy is a set of rules and guidelines that an organisation issues…FranklinNovember 16, 2018
BlogCyber Security 101Industry What’s the difference between Cyber Essentials, ISO 27001 and PCI DSS? – Cyber Security Practicing good cyber hygiene has never been more important for SMEs. In the last two…FranklinNovember 14, 2018
BlogCyber Security 101 Understanding GDPR Data Controller in 5 easy steps Understanding GDPR Data Controller in 5 easy steps By now most of have heard of…FranklinJuly 16, 2018
BlogCyber Security 101 9 Secrets To Make Your Medtech Startup Compliant Running a startup is hard especially in a heavily regulated sector like MedTech and because…FranklinJuly 3, 2018
BlogInside CyberSmart Case Study: Livesmart Your Company Why is data protection important to LiveSmart? LiveSmart aims to create a better world…FranklinJuly 3, 2018
BlogCyber Security 101 Who’s ready for GDPR? In this podcast, our co-founders Jamie Akhtar and Mariella Thanner had a chat with James…JamieMay 18, 2018
BlogCyber Security 101 What GDPR is going to look like in practice Speaking at the lecture for the Institute of Chartered Accountants in England and Wales in…FranklinApril 30, 2018
BlogCyber Security 101Industry The 5 control areas of Cyber Essentials (minus the technical jargon!) Step 1 to CE: Boundary Firewalls and internet gateways A firewall or gateway protects internal…FranklinApril 11, 2018