Advisory


08 Oct
using teams securely
The manual cost of updating permissions
Category: Advisory, Blog, Data Governance, Fil...
09 Sep
rule based vs role-based access control
How to calculate the cost of a data breach
Category: Advisory, Blog
This method of activity-based costing incorporates a range of activities and their associated costs of a data breach: Detection and escalation – Activities that enable a comp...
21 Aug
On average companies have over 14,600 folders containing sensitive information open to every employee
Category: Advisory, Blog, Data Governance, Ins...
Even before the current Covid-19 crisis, online crime accounted for half of all property crime in the UK (Anderson et al, WEIS, 2019). The costs are phenomenal; estimated at over $...
18 Aug
Automation the only answer for secure sharing
Category: Advisory, Blog, Data Governance
When it comes to sharing files and compliance, you can’t just implement collaboration platforms such as Teams or Office 365 without implementing data governance policies. But...
22 Jul
Data access security for temporary job roles and functions
Category: Advisory, Blog, Data access, File Sh...
As hundreds of businesses move staff into temporary roles or take on temporary workers, how can you securely assign access to the data your changing workforce needs. Because of the...
03 Jul
Watch Again: CONFIDENT DATA GOVERNANCE FOR HOMEWORKING
Category: Advisory, Data access, Data Governan...
13 May
What’s a normal reaction to auditors announcing a visit?
Category: Advisory, Blog, Compliance, Data Gov...