Blog


09 Sep
rule based vs role-based access control
How to calculate the cost of a data breach
Category: Advisory, Blog
This method of activity-based costing incorporates a range of activities and their associated costs of a data breach: Detection and escalation – Activities that enable a comp...
02 Sep
Remote working will increase data breach costs
Category: Blog, File Sharing, Uncategorized
In a new report by IBM, remote work during COVID-19 was expected to increase data breach costs and incident response times. Of organizations that required remote work as a result o...
21 Aug
On average companies have over 14,600 folders containing sensitive information open to every employee
Category: Advisory, Blog, Data Governance, Ins...
Even before the current Covid-19 crisis, online crime accounted for half of all property crime in the UK (Anderson et al, WEIS, 2019). The costs are phenomenal; estimated at over $...
18 Aug
Automation the only answer for secure sharing
Category: Advisory, Blog, Data Governance
When it comes to sharing files and compliance, you can’t just implement collaboration platforms such as Teams or Office 365 without implementing data governance policies. But...
22 Jul
Data access security for temporary job roles and functions
Category: Advisory, Blog, Data access, File Sh...
As hundreds of businesses move staff into temporary roles or take on temporary workers, how can you securely assign access to the data your changing workforce needs. Because of the...
13 May
What’s a normal reaction to auditors announcing a visit?
Category: Advisory, Blog, Compliance, Data Gov...