We use cookies on all our websites to gather anonymous data to improve your experience of our websites and serve relevant ads that may be of interest to you. Please refer to the cookies policy to find out more.

By continuing, scrolling the page or clicking a link, you agree to the use of cookies.

26

Insights

Data breach? Are you protected against data losses and liabilities?

May 23, 2018
Sarah Turpin and Alexander Bradley-Sitch
Ahead of the GDPR coming into force on 25 May 2018, it is important to understand the potential liabilities organisations face, and how cyber insurance can protect them.
Data breach? Are you protected against data losses and liabilities?
Laptop-and-lock

Data breach? Are you protected against data losses and liabilities?

May 23, 2018
Sarah Turpin and Alexander Bradley-Sitch
Data breach? Are you protected against data losses and liabilities?

Cyber Security Series: When it Comes to Cyber Risk, Execute or Be Executed!

May 03, 2018
Gregory Touhill
Our latest Insights blog focuses on the possibility of accountability leading to effective cyber security.
Cyber Security Series: When it Comes to Cyber Risk, Execute or Be Executed!
hack

Cyber Security Series: When it Comes to Cyber Risk, Execute or Be Executed!

May 03, 2018
Gregory Touhill
Cyber Security Series: When it Comes to Cyber Risk, Execute or Be Executed!

Cyber Security: Combating the Rising Threat of Malicious AI Uses

Apr 05, 2018
Phil Zongo
Phil Zongo tackles the pressing issue of Artificial Intelligence and the potential dangers as it advances.
Cyber Security: Combating the Rising Threat of Malicious AI Uses
Code

Cyber Security: Combating the Rising Threat of Malicious AI Uses

Apr 05, 2018
Phil Zongo
Cyber Security: Combating the Rising Threat of Malicious AI Uses

Cyber Security: Board-level cybersecurity considerations

Mar 12, 2018
Dottie Schindlinger
​Dottie Schindlinger analyses what potential cyber criminals look for in their targets and how organisations can avoid falling into the trap.
Cyber Security: Board-level cybersecurity considerations
pexels-photo-735911

Cyber Security: Board-level cybersecurity considerations

Mar 12, 2018
Dottie Schindlinger
Cyber Security: Board-level cybersecurity considerations

Cybercrime: Psychological Weakness

Mar 06, 2018
Ouida Taaffe
Ouida Taaffe reports on the basics for both large and small organisations to prevent cyber attacks.
Cybercrime: Psychological Weakness
computer-1591018_960_720

Cybercrime: Psychological Weakness

Mar 06, 2018
Ouida Taaffe
Cybercrime: Psychological Weakness

GDPR: The Role of the DPO – And How to Find One in a Competitive Landscape

Feb 15, 2018
Michael Hughes
GDPR is only round the corner, Michael Hughes explains the importance of Data Protection Officers after the reform.
GDPR: The Role of the DPO – And How to Find One in a Competitive Landscape
data

GDPR: The Role of the DPO – And How to Find One in a Competitive Landscape

Feb 15, 2018
Michael Hughes
GDPR: The Role of the DPO – And How to Find One in a Competitive Landscape

Cyber Security Series: What Directors Want to Believe about Cyber Security vs. Real Cyber Risk

Dec 07, 2017
Dottie Schindlinger
In our latest Cyber Security Article, we explore the best practice for Directors concerning keeping data safe.
Cyber Security Series: What Directors Want to Believe about Cyber Security vs. Real Cyber Risk
pexels-photo-546819

Cyber Security Series: What Directors Want to Believe about Cyber Security vs. Real Cyber Risk

Dec 07, 2017
Dottie Schindlinger
Cyber Security Series: What Directors Want to Believe about Cyber Security vs. Real Cyber Risk

Cyber Security Series: No End in Sight for Impact of Equifax Breach

Nov 17, 2017
Alex Holden
Cyber Security Series: No End in Sight for Impact of Equifax Breach
finance-tech

Cyber Security Series: No End in Sight for Impact of Equifax Breach

Nov 17, 2017
Alex Holden
Cyber Security Series: No End in Sight for Impact of Equifax Breach

Cyber Security Series: Creating a CyberCulture

Nov 01, 2017
Matt Loeb
In the ever-changing digital environment, how important is it to develop a cyber culture for the safety of users.
Cyber Security Series: Creating a CyberCulture
hack

Cyber Security Series: Creating a CyberCulture

Nov 01, 2017
Matt Loeb
Cyber Security Series: Creating a CyberCulture