Boldon James - HelpSystems Company Logo

The Cost and Consequences of Exposed PII

Reading Time: 5 minutes Hardly a day goes by without a media report about a data breach that involves exposed personally identifiable information (PII), and it’s no wonder that we hear about this so often; the latest IBM global study of data breaches… Read More

Classification in the Cloud

Reading Time: 5 minutes Cloud-based work environments are both convenient and cost-effective, especially in today’s remote world, but can present a challenge when it comes to meeting both regulatory compliance requirements and ensuring the protection of sensitive data. In order to maintain the… Read More

October: Cyber Security Awareness Month, and there are haunting consequences of not being cyber-savvy

Reading Time: 3 minutes Some may simply associate this time of year with pumpkins, ghosts and ghouls, but it is also European Cyber Security Month (ECSM), the EU’s annual awareness campaign which takes place every year in the month of October. The aim… Read More

The User-Driven Approach: 3 Main Benefits

Reading Time: 2 minutes We’ve seen the introduction to user-driven security, and the three main steps to implementing a user-driven approach to security. The last instalment of this three part series covers the three main benefits to your organisation: 1. Reduces Risk of… Read More

Data Breach Trends – Are You In The Know?

Reading Time: 3 minutes Data breaches are on the rise – it’s a fact. In times like these, it’s important to ask yourself – are you being vigilant? And crucially, are you in the know? The following statistics have been taken from the… Read More