Online SecurityLegal AdviceData & InformationGovernance
11/12/2023
What is a Data Transfer Risk Assessment?
If you are transferring personal data from the UK, it is likely that you will need to undertake a transfer risk assessment (TRA) before you hit ‘send’.
Online SecurityData & InformationSoftwareDigital StrategySystems Selection & Implementationcyber security
17/05/2023
Going green: are virtual desktops sustainable?
You might be aware that virtual desktop solutions can enhance the flexibility, productivity and efficiency of your operations, but did you know that they might also be a greener option for your…
Online SecurityGrowing Your BusinessData & InformationControl & DirectionSystems Selection & Implementation
14/04/2023
How to know when your small business is ready for a server
If you use two or more computers to share scanners, information or internet access, a small business server will benefit you.
Online SecurityLegal AdviceData & InformationControl & DirectionBusiness Planning
16/12/2022
Received a Subject Access Request? Here’s what to do
Under the UK GDPR and Data Protection Act 2018, anybody has the right to make a Subject Access Request (SAR). For a business dealing with these requests, this can be an onerous, complex and very…
Online SecurityData & InformationSoftwareDigital StrategySystems Selection & Implementationcyber security
27/10/2022
Finding your first cloud service: Six steps for success
Navigating your way through the Cloud can feel like a long and winding road as you battle with the complexities and complications thrown up at every twist and turn.
Online SecurityWorkplace & EmployeesData & InformationEmployeesCultureBusiness Risk Management
26/04/2022
Modern workplace transformation
Becoming a Modern Workplace isn’t a simple process and it isn’t about simply installing a chat tool for your team. It has to be driven from a deep desire and understanding within the business.
Online SecurityData & InformationBusiness Risk ManagementDigital StrategySystems Selection & Implementationcyber security
12/04/2022
The small to mid-size business guide to cyber security
It's not a matter of if, but when...
Online SecuritySoftwareResearch & AnalysisData AnalysisSystems Selection & Implementation
18/03/2022
Reduce the Cost and Complexity of Machine Learning Preprocessing
In the world of AWS cloud technology with buckets and instances, I sometimes find myself baffled by the complexity of our solution architectures we produce. But as technical as the solution may be,…
Online SecurityData & InformationSoftwareControl & DirectionBusiness Risk ManagementSystems Selection & Implementationcyber security
10/03/2022
Data backup and disaster recovery policy
Every day, your business creates vast swathes of data; data which travels further, manages more processes and is shared across a wider range of technologies than ever before. That’s why a Data Backup…
Online SecuritySoftwareResearch & AnalysisData AnalysisDigital Strategy
24/02/2022
Collecting, Archiving and Retrieving Surveillance Data With AWS
In the world of AWS cloud technology with buckets and instances, I sometimes find myself baffled by the complexity of our solution architectures we produce. But as technical as the solution may be,…