Resources

Blog

Next Generation Organization Agility... Are You Ready?

The blurring of work and life boundaries that exist on devices, both with the changes to the law on flexible working and the general rise of BYOD, means that it’s far too easy to send information to the wrong person via email – and then be penalised for it.
Blog

Inside Out, Outside in, Inside in...

Threats from outside the organization are still happening, but it's the threats from within which are causing a greater challenge. Not just employees but third parties who have access to internal systems and information.
Blog

Why Access Information?

Blog by Kevin Bailey, Head of Market Strategy. One of the easiest ways to stop attacks on information is to close down the shutters, build impenetrable firewalls, stop all access and return to the world of the chalk and blackboard.
Blog

Quit While You’re Ahead...?

Last week saw The Open Group conference take place in London. In conjunction with this was The Jericho Forum’s announcement that after ten years they were declaring success and sunsetting.
Blog

The Pitfalls of Handling Credit Card Details

Credit card fraud in 2012 cost $5.55 billion worldwide. But there are other problems - is the way you handle credit card information sufficient?