Risk & Compliance

New standards for the General Data Protection Rule (GDPR) went into effect on May 25, 2018. They affect any EU business that collects data from customers. One of the key factors in the new standards is that companies must take a strict approach to ensuring personal data is deleted when it no longer needs to be stored for the purpose it was collected for. GDPR non-compliance penalties are substantial: up to €20 million or 4 percent of annual turnover (whichever is greater).

tmgroup have achieved ISO 27001 certification. The endorsement is only awarded to firms that comply with a mandated set of requirements relating to information security management.  Certified businesses must evidence an ongoing commitment to continually improving their systems.

Information security is a critical business risk. It is attracting increasing scrutiny in the management of supply chain risk and consumers are more alert to the way their data is stored and shared.  

Joe Pepper, Chief Executive Officer (CEO) at tmgroup comments:

On Tuesday 24th July, the Government published its updated National Planning Policy Framework (NPPF) immediately replacing the previous NPPF from March 2012.

The aim of the update is to set out the Government’s planning policy as to how sustainable development across the board should be planned, and how planning applications proposing development of all kinds should be determined.

As part of the Landmark Academy, we host webinars to provide guidance and training to help property solicitors and conveyancers identify and manage a host of risks that can occur in residential and commercial property transactions.

Jess Carey Posted By Jess Carey
from Burlington Media

Data security experts all echo the same sentiment: “It’s not if your organisation will be breached, it’s when.” Does your business have a breach response plan? In this blog, we offer several steps to take after a data breach so you can create - or update - your breach response plan.

Stay Calm

A data breach can cause widespread panic throughout your organisation. The key is not to overreact. As a leader, you must stay calm so you can address the situation with clarity and move forward with an incident response plan.

Post a Comment

What are penetration testing sessions?

We exclusive training sessions that take a closer look at the techniques used when performing a penetration test. The sessions help IT managers, IT directors and CISO’s understand exactly how an organisation can fall victim to cyber-attack.

Claim Technology are pleased to announce a partnership with Verius Risk Solutions. Verius’s VBase software contains over 6 million claims and over 100 million records, enabling businesses to access unique data sources of interest to the insurance industry and mobility suppliers in the fight against fraud.

“As we create the ‘touchless’ digital claim, we need to ensure that our fraud prevention and detection capabilities are second to none. This partnership is another step towards that goal” comments Michael Lewis, CEO.

Tip one: don’t take media home

Many small business owners take their backup media home with them. If you’re one of them, ask yourself the following question: What will happen to your data if tapes are stolen from your car or left on a bus or train? A data backup and rotation service eliminates the risks of taking your media home. After your media is backed up, it should be transported to a data vault in a secure, GPS-tracked vehicle for storage.

Post a Comment

By Fiona Hamilton, head of client services, Sprout IT

Given the highly sensitive nature of the data held on individuals and companies by legal firms, solicitors’ practices and barristers’ chambers often find themselves disproportionately targeted by cybercriminals keen to access their systems, download their data, and sell it to the highest bidder.

What are Sprout IT’s top 8 easy-to-follow rules for firms looking to protect themselves, their clients, and their staff?

1.   Don’t use obvious passwords

Post a Comment

This article was written by Thomas Crabtree, head of service development and learning at Ten10

Introduction

Testing is all about providing information to stakeholders about the quality of a system. There are a number of different types of testing that can be used to explore and test a system. The type of testing typically depends on what is actually being tested and the approach that is used to perform the testing.

Post a Comment
Syndicate content